stockholm/lass/2configs/syncthing.nix

37 lines
1.1 KiB
Nix
Raw Normal View History

2019-04-18 08:16:02 +00:00
{ config, pkgs, ... }: with import <stockholm/lib>; let
all_peers = filterAttrs (n: v: v.syncthing.id != null) config.krebs.hosts;
own_peers = filterAttrs (n: v: v.owner.name == "lass") all_peers;
mk_peers = mapAttrs (n: v: { id = v.syncthing.id; });
2019-04-18 08:16:02 +00:00
in {
2017-04-16 21:35:25 +00:00
services.syncthing = {
enable = true;
2019-04-07 16:44:57 +00:00
group = "syncthing";
configDir = "/var/lib/syncthing";
2020-04-08 10:33:08 +00:00
declarative = {
key = toString <secrets/syncthing.key>;
cert = toString <secrets/syncthing.cert>;
devices = mk_peers all_peers;
folders."/home/lass/sync" = {
devices = attrNames (filterAttrs (n: v: n != "phone") own_peers);
# ignorePerms = false;
};
};
2017-04-16 21:35:25 +00:00
};
krebs.iptables.tables.filter.INPUT.rules = [
{ predicate = "-p tcp --dport 22000"; target = "ACCEPT";}
{ predicate = "-p udp --dport 21027"; target = "ACCEPT";}
];
2019-04-07 16:44:57 +00:00
system.activationScripts.syncthing-home = ''
${pkgs.coreutils}/bin/chmod a+x /home/lass
'';
2019-04-18 08:16:02 +00:00
krebs.permown."/home/lass/sync" = {
2019-05-29 13:47:58 +00:00
file-mode = "u+rw,g+rw";
2019-04-18 08:16:02 +00:00
owner = "lass";
group = "syncthing";
2019-05-29 13:47:58 +00:00
umask = "0002";
2020-09-27 13:39:47 +00:00
keepGoing = true;
2019-04-18 08:16:02 +00:00
};
2017-04-16 21:35:25 +00:00
}