Compare commits

..

No commits in common. "f8c524bf4a1a2e8167673a8eb722799c19f10f83" and "4cc524d1c543f664badc3019b6e07d93868f473a" have entirely different histories.

4 changed files with 7 additions and 114 deletions

View file

@ -98,27 +98,6 @@
}
},
"crane_2": {
"inputs": {
"nixpkgs": [
"made-you-look",
"nixpkgs"
]
},
"locked": {
"lastModified": 1718730147,
"narHash": "sha256-QmD6B6FYpuoCqu6ZuPJH896ItNquDkn0ulQlOn4ykN8=",
"owner": "ipetkov",
"repo": "crane",
"rev": "32c21c29b034d0a93fdb2379d6fabc40fc3d0e6c",
"type": "github"
},
"original": {
"owner": "ipetkov",
"repo": "crane",
"type": "github"
}
},
"crane_3": {
"inputs": {
"nixpkgs": [
"warthunder-leak-counter",
@ -353,7 +332,7 @@
},
"flake-utils_4": {
"inputs": {
"systems": "systems_4"
"systems": "systems_5"
},
"locked": {
"lastModified": 1681202837,
@ -391,24 +370,6 @@
"inputs": {
"systems": "systems_7"
},
"locked": {
"lastModified": 1681202837,
"narHash": "sha256-H+Rh19JDwRtpVPAWp64F+rlEtxUWBAQW28eAi3SRSzg=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "cfacdce06f30d2b68473a46042957675eebb3401",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"flake-utils_7": {
"inputs": {
"systems": "systems_8"
},
"locked": {
"lastModified": 1710146030,
"narHash": "sha256-SZ5L6eA7HJ/nmkzGG7/ISclqe6oZdOZTNoesiInkXPQ=",
@ -444,28 +405,6 @@
"type": "github"
}
},
"made-you-look": {
"inputs": {
"crane": "crane_2",
"flake-utils": "flake-utils_4",
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1728148016,
"narHash": "sha256-63w9Nt1bt2l7HSGHca99rcDXsk8giISsWlRhiEp1XtY=",
"ref": "refs/heads/main",
"rev": "acd877886420f4e0b00af1548a6cbda8dc89632f",
"revCount": 2,
"type": "git",
"url": "https://git.lelgenio.com/lelgenio/made-you-look"
},
"original": {
"type": "git",
"url": "https://git.lelgenio.com/lelgenio/made-you-look"
}
},
"nix-index-database": {
"inputs": {
"nixpkgs": [
@ -584,7 +523,6 @@
"disko": "disko",
"dzgui-nix": "dzgui-nix",
"home-manager": "home-manager",
"made-you-look": "made-you-look",
"nix-index-database": "nix-index-database",
"nixos-mailserver": "nixos-mailserver",
"nixpkgs": "nixpkgs",
@ -747,24 +685,9 @@
"type": "github"
}
},
"systems_8": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
},
"tlauncher": {
"inputs": {
"flake-utils": "flake-utils_5",
"flake-utils": "flake-utils_4",
"nixpkgs": [
"nixpkgs"
]
@ -801,7 +724,7 @@
},
"utils": {
"inputs": {
"systems": "systems_5"
"systems": "systems_4"
},
"locked": {
"lastModified": 1709126324,
@ -834,8 +757,8 @@
},
"warthunder-leak-counter": {
"inputs": {
"crane": "crane_3",
"flake-utils": "flake-utils_6",
"crane": "crane_2",
"flake-utils": "flake-utils_5",
"nixpkgs": [
"nixpkgs"
]
@ -856,7 +779,7 @@
},
"wl-crosshair": {
"inputs": {
"flake-utils": "flake-utils_7",
"flake-utils": "flake-utils_6",
"nixpkgs": [
"nixpkgs"
]

View file

@ -62,10 +62,6 @@
url = "git+https://git.lelgenio.com/lelgenio/warthunder-leak-counter";
inputs.nixpkgs.follows = "nixpkgs";
};
made-you-look = {
url = "git+https://git.lelgenio.com/lelgenio/made-you-look";
inputs.nixpkgs.follows = "nixpkgs";
};
catboy-spinner = {
url = "git+https://git.lelgenio.com/lelgenio/catboy-spinner";
flake = false;

View file

@ -27,9 +27,6 @@ in
ENABLED = true;
DEFAULT_ACTIONS_URL = "github";
};
repository = {
ENABLE_PUSH_CREATE_USER = true;
};
server = {
DOMAIN = "git.lelgenio.com";
HTTP_PORT = 3000;

View file

@ -1,28 +1,5 @@
{ inputs, config, ... }:
{ inputs, ... }:
{
imports = [
inputs.warthunder-leak-counter.nixosModules.default
inputs.made-you-look.nixosModules.default
];
services.warthunder-leak-counter.enable = true;
services.nginx.virtualHosts."warthunder-leak-counter.lelgenio.com" = {
enableACME = true;
forceSSL = true;
locations."/" = {
proxyPass = "http://127.0.0.1:${toString config.services.warthunder-leak-counter.port}";
};
};
services.made-you-look.enable = true;
services.nginx.virtualHosts."coolest-thing-ever.lelgenio.com" = {
enableACME = true;
forceSSL = true;
locations."/" = {
proxyPass = "http://127.0.0.1:${toString config.services.made-you-look.port}";
};
};
services.nginx.virtualHosts."catboy-spinner.lelgenio.com" = {
enableACME = true;
forceSSL = true;