nixfiles/hosts/koi/containers/navidrome/default.nix

72 lines
No EOL
1.8 KiB
Nix

{ config, pkgs, ... }:
let
UID = 1102;
feishin = pkgs.callPackage ./feishin.nix {};
feishinConfig = builtins.replaceStrings [ "\n" ] [ "" ] ''
window.SERVER_URL="https://navi.stupid.fish";
window.SERVER_NAME="stupid.fish";
window.SERVER_TYPE="navidrome";
window.SERVER_LOCK=true;
'';
in {
desu.secrets.navidrome-env.owner = "navidrome";
users.users.navidrome = {
isNormalUser = true;
uid = UID;
extraGroups = [ "geesefs" ];
};
virtualisation.oci-containers.containers.navidrome = {
image = "deluan/navidrome:0.53.3";
volumes = [
"${./navidrome.toml}:/navidrome.toml"
"/mnt/s3-desu-priv-encrypted/music:/music/s3:ro"
"/srv/navidrome:/data"
];
environment = {
ND_CONFIGFILE = "/navidrome.toml";
};
environmentFiles = [
config.desu.secrets.navidrome-env.path
];
user = "${builtins.toString UID}:${builtins.toString UID}";
extraOptions = [
"--group-add=${builtins.toString config.users.groups.geesefs.gid}"
];
};
systemd.services.docker-navidrome.requires = [ "ecryptfs.service" ];
systemd.tmpfiles.rules = [
"d /srv/navidrome 0755 ${builtins.toString UID} ${builtins.toString UID} -"
];
services.nginx.virtualHosts."navi.stupid.fish" = {
forceSSL = true;
useACMEHost = "stupid.fish";
locations."/" = {
proxyPass = "http://navidrome.docker:4533$request_uri";
extraConfig = ''
proxy_buffering off;
'';
};
locations."/feishin/" = {
extraConfig = ''
alias ${feishin}/;
try_files $uri $uri/ /index.html;
'';
};
locations."/feishin/settings.js" = {
extraConfig = ''
add_header 'Content-Type' 'application/javascript';
return 200 '${feishinConfig}';
'';
};
};
}