forked from aylac.top/nixcfg
this repo has no description

dude i wanted to replace webdav-server with copyparty but i can't get stylus or violetmonkey to work with it

Changed files
+119 -15
hosts
modules
flake
snippets
tailnet
+65 -15
flake.lock
···
"inputs": {
"flake-parts": "flake-parts_3",
"git-hooks": "git-hooks",
-
"nixpkgs": "nixpkgs"
},
"locked": {
"lastModified": 1753483837,
···
"type": "github"
}
},
"crane": {
"locked": {
"lastModified": 1731098351,
···
"original": {
"owner": "hercules-ci",
"repo": "flake-parts",
"type": "github"
}
},
···
},
"nixpkgs": {
"locked": {
-
"lastModified": 1740126099,
-
"narHash": "sha256-ozoOtE2hGsqh4XkTJFsrTkNxkRgShxpQxDynaPZUGxk=",
-
"owner": "nixos",
"repo": "nixpkgs",
-
"rev": "32fb99ba93fea2798be0e997ea331dd78167f814",
"type": "github"
},
"original": {
-
"owner": "nixos",
-
"ref": "nixos-unstable",
-
"repo": "nixpkgs",
-
"type": "github"
}
},
"nixpkgs-lib": {
···
},
"nixpkgs_2": {
"locked": {
"lastModified": 1755186698,
"narHash": "sha256-wNO3+Ks2jZJ4nTHMuks+cxAiVBGNuEBXsT29Bz6HASo=",
"owner": "NixOS",
···
"type": "github"
}
},
-
"nixpkgs_3": {
"locked": {
"lastModified": 1755186698,
"narHash": "sha256-wNO3+Ks2jZJ4nTHMuks+cxAiVBGNuEBXsT29Bz6HASo=",
···
"nur": {
"inputs": {
"flake-parts": "flake-parts_6",
-
"nixpkgs": "nixpkgs_3"
},
"locked": {
"lastModified": 1755615368,
···
"inputs": {
"actions-nix": "actions-nix",
"agenix": "agenix",
"disko": "disko",
"files": "files",
"firefox-onebar": "firefox-onebar",
···
"git-hooks-nix": "git-hooks-nix_2",
"home-manager": "home-manager_3",
"lanzaboote": "lanzaboote",
-
"nixpkgs": "nixpkgs_2",
"nixpkgs-unstable": "nixpkgs-unstable",
"nur": "nur",
"secrets": "secrets"
···
"secrets": {
"flake": false,
"locked": {
-
"lastModified": 1755593350,
-
"narHash": "sha256-eZmgZh++H7IzcmIFUxBY14P9B3BVT1PPitvwbGN9WLA=",
"owner": "ayla6",
"repo": "secrets",
-
"rev": "babaa14c8e6f1b47567d690371794d157aed260c",
"type": "github"
},
"original": {
···
"inputs": {
"flake-parts": "flake-parts_3",
"git-hooks": "git-hooks",
+
"nixpkgs": "nixpkgs_2"
},
"locked": {
"lastModified": 1753483837,
···
"type": "github"
}
},
+
"copyparty": {
+
"inputs": {
+
"flake-utils": "flake-utils",
+
"nixpkgs": "nixpkgs"
+
},
+
"locked": {
+
"lastModified": 1755558529,
+
"narHash": "sha256-Q7eOM63Ky+Mb7HS5+eSxn2UOQSFAK82v2K1pL2pEiIw=",
+
"owner": "9001",
+
"repo": "copyparty",
+
"rev": "c51371c71d0449e3d3b223e7a3425f241065cae5",
+
"type": "github"
+
},
+
"original": {
+
"owner": "9001",
+
"repo": "copyparty",
+
"type": "github"
+
}
+
},
"crane": {
"locked": {
"lastModified": 1731098351,
···
"original": {
"owner": "hercules-ci",
"repo": "flake-parts",
+
"type": "github"
+
}
+
},
+
"flake-utils": {
+
"locked": {
+
"lastModified": 1678901627,
+
"narHash": "sha256-U02riOqrKKzwjsxc/400XnElV+UtPUQWpANPlyazjH0=",
+
"owner": "numtide",
+
"repo": "flake-utils",
+
"rev": "93a2b84fc4b70d9e089d029deacc3583435c2ed6",
+
"type": "github"
+
},
+
"original": {
+
"owner": "numtide",
+
"repo": "flake-utils",
"type": "github"
}
},
···
},
"nixpkgs": {
"locked": {
+
"lastModified": 1748162331,
+
"narHash": "sha256-rqc2RKYTxP3tbjA+PB3VMRQNnjesrT0pEofXQTrMsS8=",
+
"owner": "NixOS",
"repo": "nixpkgs",
+
"rev": "7c43f080a7f28b2774f3b3f43234ca11661bf334",
"type": "github"
},
"original": {
+
"id": "nixpkgs",
+
"ref": "nixos-25.05",
+
"type": "indirect"
}
},
"nixpkgs-lib": {
···
},
"nixpkgs_2": {
"locked": {
+
"lastModified": 1740126099,
+
"narHash": "sha256-ozoOtE2hGsqh4XkTJFsrTkNxkRgShxpQxDynaPZUGxk=",
+
"owner": "nixos",
+
"repo": "nixpkgs",
+
"rev": "32fb99ba93fea2798be0e997ea331dd78167f814",
+
"type": "github"
+
},
+
"original": {
+
"owner": "nixos",
+
"ref": "nixos-unstable",
+
"repo": "nixpkgs",
+
"type": "github"
+
}
+
},
+
"nixpkgs_3": {
+
"locked": {
"lastModified": 1755186698,
"narHash": "sha256-wNO3+Ks2jZJ4nTHMuks+cxAiVBGNuEBXsT29Bz6HASo=",
"owner": "NixOS",
···
"type": "github"
}
},
+
"nixpkgs_4": {
"locked": {
"lastModified": 1755186698,
"narHash": "sha256-wNO3+Ks2jZJ4nTHMuks+cxAiVBGNuEBXsT29Bz6HASo=",
···
"nur": {
"inputs": {
"flake-parts": "flake-parts_6",
+
"nixpkgs": "nixpkgs_4"
},
"locked": {
"lastModified": 1755615368,
···
"inputs": {
"actions-nix": "actions-nix",
"agenix": "agenix",
+
"copyparty": "copyparty",
"disko": "disko",
"files": "files",
"firefox-onebar": "firefox-onebar",
···
"git-hooks-nix": "git-hooks-nix_2",
"home-manager": "home-manager_3",
"lanzaboote": "lanzaboote",
+
"nixpkgs": "nixpkgs_3",
"nixpkgs-unstable": "nixpkgs-unstable",
"nur": "nur",
"secrets": "secrets"
···
"secrets": {
"flake": false,
"locked": {
+
"lastModified": 1755626705,
+
"narHash": "sha256-JkJTF26k+bAW8BqD6Ubw9iAR3QZMzCUgy5gMtLcCxeM=",
"owner": "ayla6",
"repo": "secrets",
+
"rev": "0104df7648c10187393222b200e59831fab54ade",
"type": "github"
},
"original": {
+2
flake.nix
···
inputs.nixpkgs.follows = "nixpkgs";
};
disko = {
url = "github:nix-community/disko";
inputs.nixpkgs.follows = "nixpkgs";
···
inputs.nixpkgs.follows = "nixpkgs";
};
+
copyparty.url = "github:9001/copyparty";
+
disko = {
url = "github:nix-community/disko";
inputs.nixpkgs.follows = "nixpkgs";
+6
hosts/nanpi/secrets.nix
···
syncthingKey.file = "${self.inputs.secrets}/ayla/syncthing/nanpi/key.age";
vaultwarden.file = "${self.inputs.secrets}/vaultwarden.age";
gemini.file = "${self.inputs.secrets}/gemini.age";
};
}
···
syncthingKey.file = "${self.inputs.secrets}/ayla/syncthing/nanpi/key.age";
vaultwarden.file = "${self.inputs.secrets}/vaultwarden.age";
gemini.file = "${self.inputs.secrets}/gemini.age";
+
copyparty = {
+
file = "${self.inputs.secrets}/copyparty.age";
+
owner = "copyparty";
+
group = "copyparty";
+
mode = "0400";
+
};
};
}
+38
hosts/nanpi/services.nix
···
reverse_proxy ${config.mySnippets.tailnet.networkMap.karakeep.hostName}:${toString config.mySnippets.tailnet.networkMap.karakeep.port}
'';
};
};
# it's failing to build because it can't download some stuff
···
PORT = "7020";
};
environmentFile = config.age.secrets.gemini.path;
};
};
···
reverse_proxy ${config.mySnippets.tailnet.networkMap.karakeep.hostName}:${toString config.mySnippets.tailnet.networkMap.karakeep.port}
'';
};
+
+
"${config.mySnippets.tailnet.networkMap.copyparty.vHost}" = {
+
extraConfig = ''
+
bind tailscale/copyparty
+
encode zstd gzip
+
reverse_proxy ${config.mySnippets.tailnet.networkMap.copyparty.hostName}:${toString config.mySnippets.tailnet.networkMap.copyparty.port} {
+
flush_interval -1
+
}
+
'';
+
};
};
# it's failing to build because it can't download some stuff
···
PORT = "7020";
};
environmentFile = config.age.secrets.gemini.path;
+
};
+
+
copyparty = {
+
enable = true;
+
settings = {
+
i = "0.0.0.0";
+
p = [config.mySnippets.tailnet.networkMap.copyparty.port (config.mySnippets.tailnet.networkMap.copyparty.port + 1)];
+
no-reload = true;
+
ignored-flag = false;
+
};
+
accounts = {
+
ayla = {
+
passwordFile = config.age.secrets.copyparty.path;
+
};
+
};
+
volumes = {
+
"/" = {
+
path = "/data/copyparty";
+
access = {
+
r = ["*"];
+
A = ["ayla"];
+
};
+
flags = {
+
fk = 4;
+
scan = 480;
+
};
+
};
+
};
};
};
+2
modules/flake/nixos.nix
···
modules = [
../../hosts/${host}
inputs.agenix.nixosModules.default
inputs.disko.nixosModules.disko
inputs.home-manager.nixosModules.home-manager
inputs.lanzaboote.nixosModules.lanzaboote
···
nixpkgs = {
overlays = [
self.inputs.nur.overlays.default
];
config.allowUnfree = true;
};
···
modules = [
../../hosts/${host}
inputs.agenix.nixosModules.default
+
inputs.copyparty.nixosModules.default
inputs.disko.nixosModules.disko
inputs.home-manager.nixosModules.home-manager
inputs.lanzaboote.nixosModules.lanzaboote
···
nixpkgs = {
overlays = [
self.inputs.nur.overlays.default
+
self.inputs.copyparty.overlays.default
];
config.allowUnfree = true;
};
+6
modules/snippets/tailnet/default.nix
···
port = 7020;
vHost = "karakeep.${config.mySnippets.tailnet.name}";
};
};
};
};
···
port = 7020;
vHost = "karakeep.${config.mySnippets.tailnet.name}";
};
+
+
copyparty = {
+
hostName = "nanpi";
+
port = 3210;
+
vHost = "copyparty.${config.mySnippets.tailnet.name}";
+
};
};
};
};