wip: fix(copypary): zotero webdav #19
6
flake.lock
generated
6
flake.lock
generated
@@ -76,11 +76,11 @@
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1762095388,
|
||||
"narHash": "sha256-7Q8LtcvKWHbP8znARRTOY2tpU5WoV6FHwp5TZJOI8Us=",
|
||||
"lastModified": 1774411715,
|
||||
"narHash": "sha256-mceIHtVMXpLAfr1W0VK9ceTBX5yKu4gGWpVbThWTsAA=",
|
||||
"owner": "9001",
|
||||
"repo": "copyparty",
|
||||
"rev": "ac085b8149ff50e03d260128596dd130ed1c7cae",
|
||||
"rev": "26e663d111e39ca96c63702ad27a05b6736607cf",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
|
||||
@@ -58,7 +58,7 @@
|
||||
lldap.pam.enable = true;
|
||||
nginx.enable = true;
|
||||
slskd.enable = true;
|
||||
webdav.enable = true;
|
||||
# webdav.enable = true;
|
||||
copyparty.enable = true;
|
||||
syncthing.enable = true;
|
||||
cache.enable = true;
|
||||
|
||||
18
modules/home/prism-launcher.nix
Normal file
18
modules/home/prism-launcher.nix
Normal file
@@ -0,0 +1,18 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let cfg = config.sydnix.prism-launcher;
|
||||
in {
|
||||
options.sydnix.prism-launcher = {
|
||||
enable = lib.mkEnableOption "Prism Launcher";
|
||||
};
|
||||
|
||||
config = lib.mkIf cfg.enable {
|
||||
home.packages = [
|
||||
pkgs.prismlauncher
|
||||
];
|
||||
|
||||
sydnix.impermanence.directories = [
|
||||
".local/share/PrismLauncher"
|
||||
];
|
||||
};
|
||||
}
|
||||
11
modules/home/users/msyds/emacs/bookmarks
Normal file
11
modules/home/users/msyds/emacs/bookmarks
Normal file
@@ -0,0 +1,11 @@
|
||||
;;;; Emacs Bookmark Format Version 1;;;; -*- coding: utf-8-emacs; mode: lisp-data -*-
|
||||
;;; This format is meant to be slightly human-readable;
|
||||
;;; nevertheless, you probably don't want to edit it.
|
||||
;;; -*- End Of Bookmark File Format Version Stamp -*-
|
||||
(("org-capture-last-stored"
|
||||
(filename . "~/org/daily/2026-03-26.org")
|
||||
(front-context-string . "* The significan")
|
||||
(rear-context-string . "le: 2026-03-26\n\n")
|
||||
(position . 89)
|
||||
(last-modified 27077 32462 617656 528000))
|
||||
)
|
||||
@@ -27,7 +27,8 @@
|
||||
cider-doc-buffer)
|
||||
(defun syd-clojure-eval-region (beg end)
|
||||
(cider-eval-region beg end))
|
||||
(syd-handle '(clojure-mode clojurescript-mode cider-repl-mode)
|
||||
(syd-handle '(clojure-mode clojurescript-mode cider-repl-mode
|
||||
cider-clojure-interaction-mode)
|
||||
:docs #'cider-doc
|
||||
:eval-region #'syd-clojure-eval-region
|
||||
:load-buffer #'cider-load-buffer)
|
||||
|
||||
1
modules/home/users/msyds/emacs/transient/history.el
Normal file
1
modules/home/users/msyds/emacs/transient/history.el
Normal file
@@ -0,0 +1 @@
|
||||
nil
|
||||
@@ -13,10 +13,14 @@ in {
|
||||
};
|
||||
};
|
||||
|
||||
imports = [ ./copyparty/vault.nix ];
|
||||
imports = [
|
||||
./copyparty/vault.nix
|
||||
./copyparty/webdav.nix
|
||||
];
|
||||
|
||||
config = lib.mkIf cfg.enable {
|
||||
sydnix.deertopia.copyparty.vault.enable = true;
|
||||
sydnix.deertopia.copyparty.webdav.enable = true;
|
||||
|
||||
sydnix.impermanence.directories = [
|
||||
"/var/lib/copyparty"
|
||||
@@ -29,8 +33,8 @@ in {
|
||||
"media"
|
||||
];
|
||||
|
||||
# HACK: Make files created by copyparty.service initialise with the mode
|
||||
# 775.
|
||||
# HACK: Make files created by copyparty.service initialise with
|
||||
# the mode 775.
|
||||
systemd.services.copyparty.serviceConfig.UMask = lib.mkForce "002";
|
||||
|
||||
services.copyparty = {
|
||||
@@ -56,7 +60,7 @@ in {
|
||||
"/Media library" = {
|
||||
path = "/media/library";
|
||||
# View and upload, but no deleting.
|
||||
access.rw = "*";
|
||||
access.r = "*";
|
||||
access.rwmd = "@jellyfin-admin";
|
||||
};
|
||||
"/Torrents" = {
|
||||
|
||||
@@ -36,6 +36,12 @@ in {
|
||||
access.A = [ "msyds" ];
|
||||
access.rwmd = [ "zotero" ];
|
||||
};
|
||||
"/msyds/zotero-root" = {
|
||||
path = "/vault/msyds/zotero-root";
|
||||
flags.daw = true;
|
||||
access.A = [ "msyds" ];
|
||||
access.rwmd = [ "zotero" ];
|
||||
};
|
||||
"/~msyds/public" = {
|
||||
path = "/vault/~msyds/public";
|
||||
access.A = [ "msyds" ];
|
||||
|
||||
57
modules/nixos/deertopia/copyparty/webdav.nix
Normal file
57
modules/nixos/deertopia/copyparty/webdav.nix
Normal file
@@ -0,0 +1,57 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let cfg = config.sydnix.deertopia.copyparty.webdav;
|
||||
in {
|
||||
options.sydnix.deertopia.copyparty.webdav = {
|
||||
enable = lib.mkEnableOption "WebDAV via copyparty";
|
||||
port = lib.mkOption {
|
||||
type = lib.types.port;
|
||||
description = ''
|
||||
Port on which Copyparty shall listen for WebDAV traffic.
|
||||
'';
|
||||
default = 3924;
|
||||
};
|
||||
};
|
||||
|
||||
# https://github.com/9001/copyparty/issues/1142
|
||||
config = lib.mkIf cfg.enable {
|
||||
services.copyparty.settings = {
|
||||
rproxy = -1;
|
||||
xff-src = "lan";
|
||||
daw = true;
|
||||
dav-auth = true;
|
||||
ihead = "*";
|
||||
ohead = "*";
|
||||
dav-port = cfg.port;
|
||||
};
|
||||
|
||||
services.authelia.instances.deertopia.settings =
|
||||
lib.mkIf config.sydnix.deertopia.authelia.enable {
|
||||
access_control.rules = lib.mkBefore [
|
||||
{
|
||||
domain = "dav.deertopia.net";
|
||||
policy = "bypass";
|
||||
methods = [ "OPTIONS" "PROPFIND" ];
|
||||
}
|
||||
];
|
||||
};
|
||||
|
||||
sydnix.deertopia.nginx.vhosts."dav" = {
|
||||
directory = null;
|
||||
vhost = {
|
||||
forceSSL = true;
|
||||
enableACME = true;
|
||||
extraConfig = ''
|
||||
include ${../authelia/authelia-location.conf};
|
||||
# Increase limit of upload sizes.
|
||||
client_max_body_size 20G;
|
||||
'';
|
||||
locations."/".extraConfig = ''
|
||||
include ${../authelia/authelia-authrequest.conf};
|
||||
include ${../authelia/proxy.conf};
|
||||
proxy_pass http://localhost:${builtins.toString cfg.port};
|
||||
'';
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
@@ -46,6 +46,7 @@
|
||||
kdeconnect.enable = true;
|
||||
qalculate.enable = true;
|
||||
toki-pona.enable = true;
|
||||
prism-launcher.enable = true;
|
||||
sops = {
|
||||
enable = true;
|
||||
keyFile = "/persist/private-keys/age/crumb";
|
||||
|
||||
Reference in New Issue
Block a user