1
0
Fork 0
forked from DGNum/lab-infra

Compare commits

...

3 commits

2 changed files with 6 additions and 30 deletions

View file

@ -1,5 +1,5 @@
# TODO: revamp to use the same framework as the other VMs # TODO: revamp to use the same framework as the other VMs
{ pkgs, inputs, ... }: { pkgs, ... }:
let let
address = "129.199.146.101"; address = "129.199.146.101";
@ -9,8 +9,9 @@ in
./_hardware-configuration.nix ./_hardware-configuration.nix
# NOTE: For now, only deploy the bare minimum # NOTE: For now, only deploy the bare minimum
./photoprism.nix
./immich.nix ./immich.nix
./nginx.nix
./photoprism.nix
]; ];
deployment.targetHost = address; deployment.targetHost = address;
@ -33,7 +34,6 @@ in
]; ];
security.acme.acceptTerms = true; security.acme.acceptTerms = true;
security.acme.defaults.email = "webmaster@nixos.org";
systemd.network = { systemd.network = {
config.routeTables = { config.routeTables = {
@ -53,29 +53,4 @@ in
}; };
}; };
}; };
# TODO: switch to unixsockets if supported
nix = {
settings = {
trusted-users = [
"@wheel"
"root"
"nix-ssh"
];
auto-optimise-store = true;
};
#package = pkgs.nixUnstable;
extraOptions =
let
empty_registry = builtins.toFile "empty-flake-registry.json" ''{"flakes":[],"version":2}'';
in
''
experimental-features = nix-command flakes
flake-registry = ${empty_registry}
builders-use-substitutes = true
'';
registry.nixpkgs.flake = inputs.nixpkgs;
nixPath = [ "nixpkgs=${inputs.nixpkgs}" ];
};
} }

View file

@ -1,7 +1,8 @@
{ {
services.immich = { services.immich = {
enable = true; enable = true;
# default port: 3001 # NOTE: default port changes in a later version
port = 3001;
machine-learning.enable = true; machine-learning.enable = true;
host = "localhost"; host = "localhost";
}; };
@ -10,6 +11,6 @@
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;
serverAliases = [ ]; serverAliases = [ ];
locations."/".proxyPass = "http://localhost:2283/"; locations."/".proxyPass = "http://localhost:3001/";
}; };
} }