nixos-config/services/mealie.nix

100 lines
2.2 KiB
Nix
Raw Normal View History

2024-07-03 20:27:35 +02:00
{
config,
lib,
pkgs,
...
}: let
inherit
(lib)
mkEnableOption
mkIf
mkOption
;
cfg = config.my.services.mealie;
my = config.my;
domain = config.networking.domain;
hostname = config.networking.hostName;
fqdn = "${hostname}.${domain}";
in {
options.my.services.mealie = let
inherit (lib) types;
in {
enable = mkEnableOption "Mealie";
port = mkOption {
type = types.port;
example = 8080;
description = "Internal port for Mealie webapp";
};
};
config = mkIf cfg.enable {
services.mealie = {
enable = true;
2024-07-05 18:06:58 +02:00
package = pkgs.unstable.mealie;
2024-07-03 20:27:35 +02:00
listenAddress = "127.0.0.1";
port = cfg.port;
2024-07-03 21:16:59 +02:00
settings = {
ALLOW_SIGNUP = "false";
2024-07-03 21:29:29 +02:00
BASE_URL = "https://mealie.${domain}";
TZ = config.time.timeZone;
# Use PostgreSQL
DB_ENGINE = "postgres";
# Settings for Mealie 1.2
2024-07-05 18:06:58 +02:00
#POSTGRES_USER = "mealie";
#POSTGRES_PASSWORD = "";
#POSTGRES_SERVER = "/run/postgresql";
## Pydantic and/or mealie doesn't handle the URI correctly, hijack it
## with query parameters...
#POSTGRES_DB = "mealie?host=/run/postgresql&dbname=mealie";
2024-07-03 21:29:29 +02:00
# Settings for Mealie 1.7+, when that gets into NixOS stable
2024-07-05 18:06:58 +02:00
POSTGRES_URL_OVERRIDE = "postgresql://mealie:@/mealie?host=/run/postgresql";
2024-07-03 21:29:29 +02:00
};
};
systemd.services = {
mealie = {
after = [ "postgresql.service" ];
requires = [ "postgresql.service" ];
2024-07-03 21:16:59 +02:00
};
2024-07-03 20:27:35 +02:00
};
2024-07-03 21:29:29 +02:00
# Set-up database
services.postgresql = {
enable = true;
ensureDatabases = [ "mealie" ];
ensureUsers = [
{
name = "mealie";
ensureDBOwnership = true;
}
];
};
services.postgresqlBackup = {
databases = ["mealie"];
};
2024-07-03 20:27:35 +02:00
services.nginx.virtualHosts."mealie.${domain}" = {
forceSSL = true;
useACMEHost = fqdn;
locations."/" = {
proxyPass = "http://127.0.0.1:${toString cfg.port}/";
proxyWebsockets = true;
};
};
security.acme.certs.${fqdn}.extraDomainNames = ["mealie.${domain}"];
my.services.restic-backup = {
paths = ["/var/lib/mealie"];
};
};
}