From 9f6d24f88591c83bd41aae2aad92f337ec4b3fe9 Mon Sep 17 00:00:00 2001 From: blake Date: Tue, 14 Oct 2025 13:19:24 -0500 Subject: [PATCH] add copyparty --- flake.lock | 58 ++++++++++++++++++++++++-- modules/holocron/copyparty/default.nix | 15 ++++--- 2 files changed, 61 insertions(+), 12 deletions(-) diff --git a/flake.lock b/flake.lock index ebc686e..2d403f1 100644 --- a/flake.lock +++ b/flake.lock @@ -1,5 +1,24 @@ { "nodes": { + "copyparty": { + "inputs": { + "flake-utils": "flake-utils", + "nixpkgs": "nixpkgs" + }, + "locked": { + "lastModified": 1760309387, + "narHash": "sha256-yCjkJuQbt6DjdS1XJL2uwyLu1AcmDvlyMGojBq8Ua38=", + "owner": "9001", + "repo": "copyparty", + "rev": "d099e5e84e191d67a7bffa574ab39b6d0d4f6adf", + "type": "github" + }, + "original": { + "owner": "9001", + "repo": "copyparty", + "type": "github" + } + }, "flake-compat": { "flake": false, "locked": { @@ -37,6 +56,21 @@ "type": "github" } }, + "flake-utils": { + "locked": { + "lastModified": 1678901627, + "narHash": "sha256-U02riOqrKKzwjsxc/400XnElV+UtPUQWpANPlyazjH0=", + "owner": "numtide", + "repo": "flake-utils", + "rev": "93a2b84fc4b70d9e089d029deacc3583435c2ed6", + "type": "github" + }, + "original": { + "owner": "numtide", + "repo": "flake-utils", + "type": "github" + } + }, "home-manager": { "inputs": { "nixpkgs": [ @@ -75,11 +109,11 @@ }, "nixpkgs": { "locked": { - "lastModified": 1760139962, - "narHash": "sha256-4xggC56Rub3WInz5eD7EZWXuLXpNvJiUPahGtMkwtuc=", + "lastModified": 1748162331, + "narHash": "sha256-rqc2RKYTxP3tbjA+PB3VMRQNnjesrT0pEofXQTrMsS8=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "7e297ddff44a3cc93673bb38d0374df8d0ad73e4", + "rev": "7c43f080a7f28b2774f3b3f43234ca11661bf334", "type": "github" }, "original": { @@ -103,6 +137,21 @@ "type": "indirect" } }, + "nixpkgs_2": { + "locked": { + "lastModified": 1760139962, + "narHash": "sha256-4xggC56Rub3WInz5eD7EZWXuLXpNvJiUPahGtMkwtuc=", + "owner": "NixOS", + "repo": "nixpkgs", + "rev": "7e297ddff44a3cc93673bb38d0374df8d0ad73e4", + "type": "github" + }, + "original": { + "id": "nixpkgs", + "ref": "nixos-25.05", + "type": "indirect" + } + }, "nvf": { "inputs": { "flake-compat": "flake-compat", @@ -129,8 +178,9 @@ }, "root": { "inputs": { + "copyparty": "copyparty", "home-manager": "home-manager", - "nixpkgs": "nixpkgs", + "nixpkgs": "nixpkgs_2", "nixpkgs-unstable": "nixpkgs-unstable", "nvf": "nvf", "sops-nix": "sops-nix", diff --git a/modules/holocron/copyparty/default.nix b/modules/holocron/copyparty/default.nix index 091da20..2bcb072 100644 --- a/modules/holocron/copyparty/default.nix +++ b/modules/holocron/copyparty/default.nix @@ -10,6 +10,7 @@ sec = config.sops.secrets; homelab = config.modules.homelab; in { + imports = [inputs.copyparty.nixosModules.default]; options.holocron.${service} = { enable = lib.mkEnableOption "enables ${service}"; @@ -42,8 +43,6 @@ in { }; config = lib.mkIf cfg.enable { - imports = [inputs.copyparty.nixosModules.default]; - # declare ${service} group users.groups.${service} = { gid = lib.mkForce cfg.ids; @@ -75,12 +74,12 @@ in { }; }; -# # override umask to make permissions work out -# systemd.services.${service}.serviceConfig = { -# UMask = lib.mkForce "0007"; -# # User = service; -# # Group = service; -# }; + # # override umask to make permissions work out + # systemd.services.${service}.serviceConfig = { + # UMask = lib.mkForce "0007"; + # # User = service; + # # Group = service; + # }; # open firewall networking.firewall.allowedTCPPorts = [cfg.port];