Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

immich: 1.117.0 -> 1.118.1 #348890

Merged
merged 3 commits into from
Oct 16, 2024
Merged

immich: 1.117.0 -> 1.118.1 #348890

merged 3 commits into from
Oct 16, 2024

Conversation

dotlambda
Copy link
Member

@dotlambda dotlambda commented Oct 15, 2024

https://github.com/immich-app/immich/releases/tag/v1.118.0
https://github.com/immich-app/immich/releases/tag/v1.118.1

fixes #348829

Things done

  • Built on platform(s)
    • x86_64-linux
    • aarch64-linux
    • x86_64-darwin
    • aarch64-darwin
  • For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
    • sandbox = relaxed
    • sandbox = true
  • Tested, as applicable:
  • Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
  • Tested basic functionality of all binary files (usually in ./result/bin/)
  • 24.11 Release Notes (or backporting 23.11 and 24.05 Release notes)
    • (Package updates) Added a release notes entry if the change is major or breaking
    • (Module updates) Added a release notes entry if the change is significant
    • (Module addition) Added a release notes entry if adding a new NixOS module
  • Fits CONTRIBUTING.md.

Add a 👍 reaction to pull requests you find important.

@@ -91,7 +91,7 @@ in
};
port = mkOption {
type = types.port;
default = 3001;
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why change the default port? Seems it could complicate peoples configs if they never set the port option. I would prefer if this option was kept at the current value.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's described in the second commit:

This was always upstream's default but they also change the internal port, i.e. behind the reverse proxy, to 2283 in immich-app/immich#13185.

This could be a breaking change though. Should this be behind a stateVersion flag?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should this be behind a stateVersion flag?

I thought about that but I don't think it's necessary since the module hasn't made it to a stable NixOS version yet.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should this be behind a stateVersion flag?

I thought about that but I don't think it's necessary since the module hasn't made it to a stable NixOS version yet.

People are still using the unstable branch though. In the end the port number doesn't really matter.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This could be a breaking change though. Should this be behind a stateVersion flag?

It's too heavy for something not released yet and immich clearly advertises they wont let backward-compatibility in their way.
This worked for me after updating the reverse proxy. Phone app and CLI worked as well.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

After some thinking I agree with @dotlambda on this topic.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

My config is

services.nginx = {
    enable = true;
    virtualHosts."immich.example.com" = {
      enableACME = true;
      forceSSL = true;
      locations."/" = {
        proxyPass = "http://${config.services.immich.host}:${toString config.services.immich.port}";
        proxyWebsockets = true;
      };
      extraConfig = ''
        client_max_body_size 512M;
      '';
    };
  };

so I don't even need to change anything.

Copy link
Contributor

@kevincox kevincox Oct 17, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree that a stateVersion change would likely be too heavy. But I do wonder what the benefit of changing the port at all is. The upstream port choice really has no bearing on what we use in NixOS so I would have just left what was originally assigned.

That being said I also used config.services.immich.port in my config so it won't be a bother for me. But in general I would avoid changing things that don't need changing.

Either way too late now. But may be useful for future changes of similar nature.

@dotlambda dotlambda marked this pull request as ready for review October 16, 2024 10:10
@dotlambda
Copy link
Member Author

@ofborg build immich immich.passthru.tests

@Scrumplex
Copy link
Member

@dotlambda I would be interested in maintaining this package and module long-term. Would you want to add me (and also yourself if you are interested too) as maintainers for both?

@Titaniumtown
Copy link
Contributor

Titaniumtown commented Oct 16, 2024

@dotlambda could I be added as a maintainer as well? I would love to help maintain this package :)

@dotlambda
Copy link
Member Author

Why did people approve even though immich-machine-learning doesn't even build?

@teto
Copy link
Member

teto commented Oct 16, 2024

Why did people approve even though immich-machine-learning doesn't even build?

haha it never built for me with cuda, so I've it disabled.

@Titaniumtown
Copy link
Contributor

Titaniumtown commented Oct 16, 2024

@dotlambda try rebasing on latest master commit as the onnx package was fixed.

I approved because the onnx changes would've fixed it i believe :p

@dotlambda
Copy link
Member Author

I approved because the onnx changes would've fixed it i believe :p

No, pydantic and pydantic-settings had to be updated.

@Scrumplex
Copy link
Member

Why did people approve even though immich-machine-learning doesn't even build?

Borg was green even after you ran ofborg build immich immich.passthru.tests so I assumed it was good 👀

But I can now indeed confirm that pydantic was updated ^^

@dotlambda
Copy link
Member Author

Result of nixpkgs-review pr 348890 run on x86_64-linux 1

1 package blacklisted:
  • nixos-install-tools
4 packages built:
  • immich
  • immich-cli
  • immich-machine-learning
  • immich-machine-learning.dist

@Scrumplex
Copy link
Member

I'll test it in production!

@Scrumplex
Copy link
Member

Runs on my server!

Screenshot showing about page

Copy link
Member

@Scrumplex Scrumplex left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Changes LGTM. Packages build and run fine on my server. Machine Learning also works.

@dotlambda dotlambda merged commit a9dee7c into NixOS:master Oct 16, 2024
34 of 36 checks passed
@dotlambda dotlambda deleted the immich branch October 16, 2024 19:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Update request: immich 1.117.0 → 1.118.0
5 participants