nix/nixos/common/services/syncthing.nix

50 lines
1.5 KiB
Nix
Raw Normal View History

2024-08-14 05:26:22 +02:00
{ username, hostname, deployment_type, ... }: {
# Set up the secrets file:
sops.secrets."syncthing_cert" = {
owner = "root";
sopsFile = ../../../secrets/${deployment_type}/${hostname}.yaml;
restartUnits = [ "syncthing.service" ];
};
sops.secrets."syncthing_key" = {
owner = "root";
sopsFile = ../../../secrets/${deployment_type}/${hostname}.yaml;
restartUnits = [ "syncthing.service" ];
};
2024-08-14 05:26:22 +02:00
networking.firewall.interfaces.tailscale0 = {
allowedTCPPorts = [ 8384 22000 ];
allowedUDPPorts = [ 22000 21027 ];
};
services.syncthing = {
enable = true;
2024-08-14 05:26:22 +02:00
urAccepted = "-1";
cert = "/run/secrets/syncthing_cert";
key = "/run/secrets/syncthing_key";
user = "${username}";
configDir = "/home/${username}/.config/syncthing";
overrideDevices = true;
overrideFolders = true;
settings = {
devices = {
"framework-server" = { # The docker container, not the host
2024-08-14 02:54:00 +02:00
autoAcceptFolders = true;
id = "ULRNA7N-Q7WTZR3-PDQW52W-IWT4UOG-ABF5RCT-W6XJXOW-WQTJIWR-GBFUJQR";
};
"nixos-framework" = {
2024-08-14 02:54:00 +02:00
autoAcceptFolders = true;
id = "TT3EHRG-U6MMJUC-S3UPF2F-TRUMBPI-TC37RMI-BQ7TT5W-N7DIIWK-653TFAU";
};
"nixos-desktop" = {
2024-08-14 02:54:00 +02:00
autoAcceptFolders = true;
id = "5VWSC5F-UKNQK7L-5XDJORY-SJXJUFC-D5QCNYX-YPQBJ4J-AFSVHWY-CXO3MQT";
};
"rdesktop" = {
2024-08-14 02:54:00 +02:00
autoAcceptFolders = true;
id = "VJH2YXUG-Y2QTRZ5-Q2XEKLU-7MVETXQ-WRWDDLD-D4PCJ47-T4KVVNV-XXC6PA";
};
};
2024-02-13 14:10:40 +01:00
};
};
2024-03-10 01:31:42 +01:00
}