diff --git a/flake.nix b/flake.nix index bede4134..8add6abe 100644 --- a/flake.nix +++ b/flake.nix @@ -295,7 +295,7 @@ "nix-store.chn.moe" = { upstream = "internal.pc.chn.moe:443"; rewriteHttps = true; }; "anchor.fm" = { upstream = "anchor.fm:443"; rewriteHttps = true; }; "podcasters.spotify.com" = { upstream = "podcasters.spotify.com:443"; rewriteHttps = true; }; - "xlog.chn.moe" = { upstream = "xlog.chn.moe:443"; rewriteHttps = true; }; + "xlog.chn.moe" = { upstream = "cname.xlog.app:443"; rewriteHttps = true; }; }; }; applications = diff --git a/modules/bugs/default.nix b/modules/bugs/default.nix index 40b42d57..a4b1db0b 100644 --- a/modules/bugs/default.nix +++ b/modules/bugs/default.nix @@ -46,10 +46,8 @@ inputs: wantedBy = [ "multi-user.target" ]; }; # xmunet use old encryption - xmunet.nixpkgs.config.packageOverrides = pkgs: - { - wpa_supplicant = pkgs.wpa_supplicant.overrideAttrs (attrs: { patches = attrs.patches ++ [ ./xmunet.patch ];}); - }; + xmunet.nixpkgs.config.packageOverrides = pkgs: { wpa_supplicant = pkgs.wpa_supplicant.overrideAttrs + (attrs: { patches = attrs.patches ++ [ ./xmunet.patch ];}); }; suspend-hibernate-waydroid.systemd.services = let systemctl = "${inputs.pkgs.systemd}/bin/systemctl";