Compare commits

...

3 commits

Author SHA1 Message Date
113186b1b9
update 2025-10-09 13:34:45 +02:00
188ddc66c4
install copyparty 2025-10-09 13:33:28 +02:00
1e9714ba0b
Revert "non working: install collabora online server"
This reverts commit 02cb481104.
2025-10-09 13:33:28 +02:00
3 changed files with 139 additions and 67 deletions

132
flake.lock generated
View file

@ -107,6 +107,25 @@
"url": "ssh://forgejo@forgejo.005540.xyz/logistic-bot/cassowary"
}
},
"copyparty": {
"inputs": {
"flake-utils": "flake-utils",
"nixpkgs": "nixpkgs"
},
"locked": {
"lastModified": 1759964119,
"narHash": "sha256-Z5jYHaAtVHpm4++3dZ9fnJuk4ySzXf0NMLSg0/JY6RA=",
"owner": "9001",
"repo": "copyparty",
"rev": "dbd8f837e8c84bd39ae6cd4e2548bf4eda322d22",
"type": "github"
},
"original": {
"owner": "9001",
"repo": "copyparty",
"type": "github"
}
},
"devshell": {
"inputs": {
"nixpkgs": [
@ -132,11 +151,11 @@
"doomemacs": {
"flake": false,
"locked": {
"lastModified": 1757906800,
"narHash": "sha256-wyaJKkSf8t72Pinq9izxWHQtSRMuJ6B4kT9JopHjhGo=",
"lastModified": 1759180402,
"narHash": "sha256-Y67ooUjDMWjPk+/IjMRnhe+OPn19Q0wF73prtExwyiI=",
"owner": "doomemacs",
"repo": "doomemacs",
"rev": "9429892d2002788c709c658942dcc7d56e5368b6",
"rev": "5e7e93beb9f2b5a81768aaf4950203ceea21c4f6",
"type": "github"
},
"original": {
@ -155,11 +174,11 @@
]
},
"locked": {
"lastModified": 1757902281,
"narHash": "sha256-sSgxXWFOx9Rgv6OnDDBbSvHNl2QPEkjjKqJcScgPXws=",
"lastModified": 1759975588,
"narHash": "sha256-TcEbsHcvyIIJtZ76GxCLN/ynKwljLt+QGAdYGFhmK9w=",
"owner": "nix-community",
"repo": "emacs-overlay",
"rev": "2eadd129c00b17c1dffa6c05a6372be4d6698be5",
"rev": "626aff270b7d05c077cb30b37ecb39c06aa26ccf",
"type": "github"
},
"original": {
@ -276,6 +295,21 @@
}
},
"flake-utils": {
"locked": {
"lastModified": 1678901627,
"narHash": "sha256-U02riOqrKKzwjsxc/400XnElV+UtPUQWpANPlyazjH0=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "93a2b84fc4b70d9e089d029deacc3583435c2ed6",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"flake-utils_2": {
"locked": {
"lastModified": 1667395993,
"narHash": "sha256-nuEHfE/LcWyuSWnS8t12N1wc105Qtau+/OdUAjtQ0rA=",
@ -290,7 +324,7 @@
"type": "github"
}
},
"flake-utils_2": {
"flake-utils_3": {
"inputs": {
"systems": "systems_2"
},
@ -308,7 +342,7 @@
"type": "github"
}
},
"flake-utils_3": {
"flake-utils_4": {
"inputs": {
"systems": "systems_3"
},
@ -422,11 +456,11 @@
]
},
"locked": {
"lastModified": 1757808926,
"narHash": "sha256-K6PEI5PYY94TVMH0mX3MbZNYFme7oNRKml/85BpRRAo=",
"lastModified": 1758463745,
"narHash": "sha256-uhzsV0Q0I9j2y/rfweWeGif5AWe0MGrgZ/3TjpDYdGA=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "f21d9167782c086a33ad53e2311854a8f13c281e",
"rev": "3b955f5f0a942f9f60cdc9cacb7844335d0f21c3",
"type": "github"
},
"original": {
@ -477,9 +511,9 @@
"mms": {
"inputs": {
"flake-compat": "flake-compat",
"flake-utils": "flake-utils",
"flake-utils": "flake-utils_2",
"nix": "nix",
"nixpkgs": "nixpkgs_2"
"nixpkgs": "nixpkgs_3"
},
"locked": {
"lastModified": 1669478601,
@ -498,7 +532,7 @@
"nix": {
"inputs": {
"lowdown-src": "lowdown-src",
"nixpkgs": "nixpkgs",
"nixpkgs": "nixpkgs_2",
"nixpkgs-regression": "nixpkgs-regression"
},
"locked": {
@ -547,11 +581,11 @@
"systems": "systems"
},
"locked": {
"lastModified": 1757925703,
"narHash": "sha256-KtGw5NFLENDilB9SB5BEYsfUoxhmF+B3HI08s74QHek=",
"lastModified": 1759999311,
"narHash": "sha256-KdSbU31WtMo0PYiyv8NWT9/EwW+DgKg6rhkUa5sJ9ss=",
"owner": "marienz",
"repo": "nix-doom-emacs-unstraightened",
"rev": "14733217c48cb6e8b7434f2788a6dcf27482958a",
"rev": "44e3b5759334e10c5502aacec7e8f6d80c586a20",
"type": "github"
},
"original": {
@ -562,7 +596,7 @@
},
"nixos-06cb-009a-fingerprint-sensor": {
"inputs": {
"nixpkgs": "nixpkgs_3"
"nixpkgs": "nixpkgs_4"
},
"locked": {
"lastModified": 1734692513,
@ -580,18 +614,17 @@
},
"nixpkgs": {
"locked": {
"lastModified": 1657693803,
"narHash": "sha256-G++2CJ9u0E7NNTAi9n5G8TdDmGJXcIjkJ3NF8cetQB8=",
"lastModified": 1748162331,
"narHash": "sha256-rqc2RKYTxP3tbjA+PB3VMRQNnjesrT0pEofXQTrMsS8=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "365e1b3a859281cf11b94f87231adeabbdd878a2",
"rev": "7c43f080a7f28b2774f3b3f43234ca11661bf334",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-22.05-small",
"repo": "nixpkgs",
"type": "github"
"id": "nixpkgs",
"ref": "nixos-25.05",
"type": "indirect"
}
},
"nixpkgs-lib": {
@ -624,11 +657,11 @@
},
"nixpkgs-unstable": {
"locked": {
"lastModified": 1757745802,
"narHash": "sha256-hLEO2TPj55KcUFUU1vgtHE9UEIOjRcH/4QbmfHNF820=",
"lastModified": 1759831965,
"narHash": "sha256-vgPm2xjOmKdZ0xKA6yLXPJpjOtQPHfaZDRtH+47XEBo=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "c23193b943c6c689d70ee98ce3128239ed9e32d1",
"rev": "c9b6fb798541223bbb396d287d16f43520250518",
"type": "github"
},
"original": {
@ -639,6 +672,22 @@
}
},
"nixpkgs_2": {
"locked": {
"lastModified": 1657693803,
"narHash": "sha256-G++2CJ9u0E7NNTAi9n5G8TdDmGJXcIjkJ3NF8cetQB8=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "365e1b3a859281cf11b94f87231adeabbdd878a2",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-22.05-small",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_3": {
"locked": {
"lastModified": 1669378442,
"narHash": "sha256-nm+4PN0A4SnV0SzEchxrMyKPvI3Ld/aoom4PnHeHucs=",
@ -654,7 +703,7 @@
"type": "github"
}
},
"nixpkgs_3": {
"nixpkgs_4": {
"locked": {
"lastModified": 1734323986,
"narHash": "sha256-m/lh6hYMIWDYHCAsn81CDAiXoT3gmxXI9J987W5tZrE=",
@ -669,13 +718,13 @@
"type": "indirect"
}
},
"nixpkgs_4": {
"nixpkgs_5": {
"locked": {
"lastModified": 1757810152,
"narHash": "sha256-Vp9K5ol6h0J90jG7Rm4RWZsCB3x7v5VPx588TQ1dkfs=",
"lastModified": 1759735786,
"narHash": "sha256-a0+h02lyP2KwSNrZz4wLJTu9ikujNsTWIC874Bv7IJ0=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "9a094440e02a699be5c57453a092a8baf569bdad",
"rev": "20c4598c84a671783f741e02bf05cbfaf4907cff",
"type": "github"
},
"original": {
@ -685,7 +734,7 @@
"type": "github"
}
},
"nixpkgs_5": {
"nixpkgs_6": {
"locked": {
"lastModified": 1721924956,
"narHash": "sha256-Sb1jlyRO+N8jBXEX9Pg9Z1Qb8Bw9QyOgLDNMEpmjZ2M=",
@ -704,7 +753,7 @@
"nixvim": {
"inputs": {
"flake-parts": "flake-parts",
"nixpkgs": "nixpkgs_5",
"nixpkgs": "nixpkgs_6",
"nixvim": "nixvim_2"
},
"locked": {
@ -778,7 +827,7 @@
},
"nuschtosSearch": {
"inputs": {
"flake-utils": "flake-utils_2",
"flake-utils": "flake-utils_3",
"nixpkgs": [
"nixvim",
"nixvim",
@ -801,7 +850,7 @@
},
"other-transcode": {
"inputs": {
"flake-utils": "flake-utils_3",
"flake-utils": "flake-utils_4",
"nixpkgs": [
"nixpkgs"
]
@ -844,11 +893,12 @@
"inputs": {
"breezex-cursor": "breezex-cursor",
"cassowary": "cassowary",
"copyparty": "copyparty",
"home-manager": "home-manager",
"mms": "mms",
"nix-doom-emacs-unstraightened": "nix-doom-emacs-unstraightened",
"nixos-06cb-009a-fingerprint-sensor": "nixos-06cb-009a-fingerprint-sensor",
"nixpkgs": "nixpkgs_4",
"nixpkgs": "nixpkgs_5",
"nixpkgs-unstable": "nixpkgs-unstable",
"nixvim": "nixvim",
"other-transcode": "other-transcode",
@ -877,11 +927,11 @@
"tinted-zed": "tinted-zed"
},
"locked": {
"lastModified": 1757361712,
"narHash": "sha256-GwObJtrAqVim66e4Jb5VzAKT6zGFJ3KOi63rfcrfMV4=",
"lastModified": 1759596342,
"narHash": "sha256-1Eda1V8pjpviMdBTdDXrFp7jkaUokIgXgBYTZyzDODk=",
"owner": "danth",
"repo": "stylix",
"rev": "3bf1430ed85a4484e4e1facee2344d2bb20288e6",
"rev": "4d065856e936fc6a99ba55d39ac2df9ded6bedbe",
"type": "github"
},
"original": {

View file

@ -47,6 +47,8 @@
};
mms.url = "github:mkaito/nixos-modded-minecraft-servers";
copyparty.url = "github:9001/copyparty";
};
outputs = {
nixpkgs,
@ -61,6 +63,7 @@
nixos-06cb-009a-fingerprint-sensor,
cassowary,
mms,
copyparty,
...
}: let
system = "x86_64-linux";
@ -92,6 +95,12 @@
stylix.nixosModules.stylix
./stylix.nix
copyparty.nixosModules.default
({ ... }: {
# add the copyparty overlay to expose the package to the module
nixpkgs.overlays = [ copyparty.overlays.default ];
})
];
specialArgs = {
pkgs-unstable = nixpkgs-unstable.legacyPackages.${system};

View file

@ -56,6 +56,7 @@
# package for controlling brightness on external monitor
environment.systemPackages = [
pkgs.ddcutil
pkgs.copyparty
];
# mount external drive
@ -342,27 +343,6 @@
NEXTCLOUD_URL = "https://nextcloud.005540.xyz";
};
};
services.collabora-online = {
enable = true;
settings = {
ssl = {
enable = false;
termination = true;
};
net = {
listen = "loopback";
post_allow.host = ["::1"];
};
storage.wopi = {
"@allow" = true;
host = ["nextcloud.005540.xyz"];
};
server_name = "collabora.005540.xyz";
};
};
# dynamic dns
services.ddclient = {
@ -394,6 +374,41 @@
};
};
services.copyparty = {
enable = true;
settings = {
z = true;
i = "127.0.0.1";
p = "3004";
xff-hdr = "X-Forwarded-For";
xff-src = "127.0.0.1";
rproxy = 1;
e2dsa = true;
e2ts = true;
re-maxage = 7200; # rescan every 2 hours
no-robots = true;
theme = 2;
shr = "/shr";
};
accounts = {
"khais" = {
passwordFile = "/etc/nixos/secrets/copyparty/khais.password";
};
};
volumes = {
"/" = {
path = "/pile/copyparty/";
access = {
"g" = "*";
"A" = ["khais"];
};
flags = {
fk = 8;
};
};
};
};
services.victorialogs = {
enable = true;
extraOptions = ["-memory.allowedBytes=100MB"];
@ -421,6 +436,7 @@
recommendedGzipSettings = true;
recommendedProxySettings = true;
logError = "stderr info";
clientMaxBodySize = "64G";
appendHttpConfig = ''
access_log syslog:server=unix:/dev/log combined;
'';
@ -481,11 +497,8 @@
enableACME = true;
forceSSL = true;
};
"collabora.005540.xyz" = {
locations."/" = {
proxyPass = "http://[::1]:${toString config.services.collabora-online.port}";
proxyWebsockets = true;
};
"copyparty.005540.xyz" = {
locations."/".proxyPass = "http://localhost:3004";
enableACME = true;
forceSSL = true;
};