1
0
Fork 0
forked from DGNum/lab-infra

Compare commits

...

3 commits

2 changed files with 6 additions and 30 deletions

View file

@ -1,5 +1,5 @@
# TODO: revamp to use the same framework as the other VMs
{ pkgs, inputs, ... }:
{ pkgs, ... }:
let
address = "129.199.146.101";
@ -9,8 +9,9 @@ in
./_hardware-configuration.nix
# NOTE: For now, only deploy the bare minimum
./photoprism.nix
./immich.nix
./nginx.nix
./photoprism.nix
];
deployment.targetHost = address;
@ -33,7 +34,6 @@ in
];
security.acme.acceptTerms = true;
security.acme.defaults.email = "webmaster@nixos.org";
systemd.network = {
config.routeTables = {
@ -53,29 +53,4 @@ in
};
};
};
# TODO: switch to unixsockets if supported
nix = {
settings = {
trusted-users = [
"@wheel"
"root"
"nix-ssh"
];
auto-optimise-store = true;
};
#package = pkgs.nixUnstable;
extraOptions =
let
empty_registry = builtins.toFile "empty-flake-registry.json" ''{"flakes":[],"version":2}'';
in
''
experimental-features = nix-command flakes
flake-registry = ${empty_registry}
builders-use-substitutes = true
'';
registry.nixpkgs.flake = inputs.nixpkgs;
nixPath = [ "nixpkgs=${inputs.nixpkgs}" ];
};
}

View file

@ -1,7 +1,8 @@
{
services.immich = {
enable = true;
# default port: 3001
# NOTE: default port changes in a later version
port = 3001;
machine-learning.enable = true;
host = "localhost";
};
@ -10,6 +11,6 @@
enableACME = true;
forceSSL = true;
serverAliases = [ ];
locations."/".proxyPass = "http://localhost:2283/";
locations."/".proxyPass = "http://localhost:3001/";
};
}