config/modules/services/immich/default.nix

55 lines
1.5 KiB
Nix

{
config,
lib,
pkgs,
myData,
nixpkgs-unstable,
...
}:
let
cfg = config.mj.services.immich;
immich-package = pkgs.pkgs-unstable.immich;
in
{
options.mj.services.immich = with lib.types; {
enable = lib.mkEnableOption "enable immich";
bindPaths = lib.mkOption { type = attrsOf str; };
bindAsUser = lib.mkOption { type = str; };
};
imports = [ "${nixpkgs-unstable}/nixos/modules/services/web-apps/immich.nix" ];
config = lib.mkIf cfg.enable {
services.immich = {
package = immich-package;
enable = true;
port = myData.ports.immich-server;
};
services.caddy.virtualHosts."photos2.jakstys.lt:80".extraConfig = ''
@denied not remote_ip ${myData.subnets.tailscale.cidr}
reverse_proxy localhost:${toString myData.ports.immich-server}
'';
systemd = {
tmpfiles.rules = [ "d /data 0755 root root -" ];
services.immich-server.serviceConfig = {
TemporaryFileSystem = "/data";
PrivateDevices = lib.mkForce false; # /dev/fuse
#ExecStart = ''
# ${lib.concatMapStringsSep "\n" (name: "+${pkgs.coreutils}/bin/install -o immich -d /data/${name}") cfg.bindPaths}
# exec ${lib.getExe immich-package}
#'';
# #++ lib.mapAttrsToList (
# # name: srcpath: "+${pkgs.bindfs}/bin/bindfs -u ${cfg.bindAsUser} ${srcpath} /data/${name}"
# #) cfg.bindPaths;
#ExecStopPost = lib.mapAttrsToList (
# name: _: "+${pkgs.util-linux}/bin/umount /data/${name}"
#) cfg.bindPaths;
};
};
};
}