sync permissions through syncthing

This commit is contained in:
Yan Lin 2026-01-23 08:14:17 +01:00
parent 26e63198d1
commit 9dc88b9a2d

View file

@ -3,25 +3,23 @@
let let
cfg = config.syncthing-custom; cfg = config.syncthing-custom;
# Device groupings
pcDevices = [ "macbook" "imac" "thinkpad" "nfss" ]; pcDevices = [ "macbook" "imac" "thinkpad" "nfss" ];
touchDevices = [ "iphone" "ipad" ]; touchDevices = [ "iphone" "ipad" ];
allDevices = pcDevices ++ touchDevices; allDevices = pcDevices ++ touchDevices;
# Common versioning configuration
commonVersioning = { commonVersioning = {
type = "staggered"; type = "staggered";
params = { params = {
maxAge = "15552000"; # 180 days in seconds maxAge = "15552000"; # 180 days
cleanInterval = "3600"; # Clean every hour cleanInterval = "3600"; # 1 hour
}; };
}; };
liteVersioning = { liteVersioning = {
type = "staggered"; type = "staggered";
params = { params = {
maxAge = "2592000"; # 30 days in seconds maxAge = "2592000"; # 30 days
cleanInterval = "3600"; # Clean every hour cleanInterval = "3600";
}; };
}; };
@ -41,21 +39,15 @@ in
}; };
config = { config = {
# Enable Syncthing service
services.syncthing = { services.syncthing = {
enable = true; enable = true;
# Don't enable tray on server (Linux) or macOS
tray.enable = false; tray.enable = false;
# Listen on all interfaces for the GUI
guiAddress = lib.mkIf cfg.enableGui "127.0.0.1:8384";
# Declarative configuration - will override any GUI changes
overrideDevices = true; overrideDevices = true;
overrideFolders = true; overrideFolders = true;
guiAddress = lib.mkIf cfg.enableGui "127.0.0.1:8384";
settings = { settings = {
# Define all devices
devices = { devices = {
"iphone" = { "iphone" = {
id = "NMWI5MP-J4FC4A6-SDDXZPD-G66TJCO-2W7KGFD-RJWQ53U-I7GUVWP-WHF4QQO"; id = "NMWI5MP-J4FC4A6-SDDXZPD-G66TJCO-2W7KGFD-RJWQ53U-I7GUVWP-WHF4QQO";
@ -77,13 +69,11 @@ in
}; };
}; };
# Define shared folders (only enabled ones)
folders = folders =
(lib.optionalAttrs (lib.elem "Credentials" cfg.enabledFolders) { (lib.optionalAttrs (lib.elem "Credentials" cfg.enabledFolders) {
"Credentials" = { "Credentials" = {
path = "~/Credentials"; path = "~/Credentials";
devices = allDevices; devices = allDevices;
ignorePerms = true;
versioning = commonVersioning; versioning = commonVersioning;
}; };
}) })
@ -91,7 +81,6 @@ in
"Documents" = { "Documents" = {
path = "~/Documents"; path = "~/Documents";
devices = pcDevices; devices = pcDevices;
ignorePerms = true;
versioning = commonVersioning; versioning = commonVersioning;
}; };
}) })
@ -99,7 +88,6 @@ in
"Media" = { "Media" = {
path = "~/Media"; path = "~/Media";
devices = lib.filter (d: d != "iphone") allDevices; devices = lib.filter (d: d != "iphone") allDevices;
ignorePerms = true;
versioning = liteVersioning; versioning = liteVersioning;
}; };
}) })
@ -107,12 +95,10 @@ in
"Archive" = { "Archive" = {
path = "~/Archive"; path = "~/Archive";
devices = allDevices; devices = allDevices;
ignorePerms = true;
versioning = commonVersioning; versioning = commonVersioning;
}; };
}); });
# GUI settings with authentication
gui = { gui = {
enabled = cfg.enableGui; enabled = cfg.enableGui;
user = "yanlin"; user = "yanlin";
@ -121,9 +107,8 @@ in
insecureSkipHostcheck = true; insecureSkipHostcheck = true;
}; };
# Additional settings
options = { options = {
urAccepted = -1; # Disable usage reporting urAccepted = -1;
relaysEnabled = true; relaysEnabled = true;
localAnnounceEnabled = true; localAnnounceEnabled = true;
globalAnnounceEnabled = true; globalAnnounceEnabled = true;
@ -131,13 +116,14 @@ in
}; };
}; };
# Override the launchd agent to add RunAtLoad on macOS
launchd.agents.syncthing = lib.mkIf (pkgs.stdenv.isDarwin && config.services.syncthing.enable) { launchd.agents.syncthing = lib.mkIf (pkgs.stdenv.isDarwin && config.services.syncthing.enable) {
config.RunAtLoad = true; config.RunAtLoad = true;
}; };
# For NixOS systems, we need to add Syncthing as a manual service in Traefik home.activation.reloadSyncthing = lib.mkIf (pkgs.stdenv.isDarwin && config.services.syncthing.enable) (
# Since Syncthing runs as a systemd service (not container), we'll handle routing via static config lib.hm.dag.entryAfter ["writeBoundary"] ''
# or create a container wrapper for it to use with service discovery $DRY_RUN_CMD /bin/launchctl kickstart -k gui/$(id -u)/org.nix-community.home.syncthing || true
''
);
}; };
} }