infrastructure/machines/compute01/nextcloud.nix

76 lines
1.6 KiB
Nix
Raw Normal View History

2023-09-11 11:17:30 +02:00
{ config, lib, pkgs, dgn-lib, ... }:
let
inherit (dgn-lib) setDefault;
host = "cloud.dgnum.eu";
in {
services.nextcloud = {
enable = true;
hostName = host;
package = pkgs.nextcloud27;
https = true;
config = {
overwriteProtocol = "https";
dbtype = "pgsql";
adminpassFile = config.age.secrets."nextcloud-adminpass_file".path;
adminuser = "thubrecht";
defaultPhoneRegion = "FR";
trustedProxies = [ "::1" ];
objectstore.s3 = {
enable = true;
hostname = "s3.dgnum.eu";
region = "garage";
usePathStyle = true;
port = 443;
bucket = "nextcloud-dgnum";
key = "GKda5367c73ca607c349d83c35";
autocreate = false;
secretFile = config.age.secrets."nextcloud-s3_secret_file".path;
};
2023-09-11 11:17:30 +02:00
};
notify_push = { enable = true; };
database.createLocally = true;
configureRedis = true;
autoUpdateApps.enable = true;
enableBrokenCiphersForSSE = false;
extraOptions = {
overwritehost = host;
"overwrite.cli.url" = "https://${host}";
updatechecker = false;
allow_local_remote_servers = true;
"opcache.interned_strings_buffer" = 32;
2023-09-11 11:17:30 +02:00
};
};
services.nginx.virtualHosts.${host} = {
enableACME = true;
forceSSL = true;
};
environment.systemPackages = [ pkgs.ffmpeg_6-headless ];
2023-09-11 11:17:30 +02:00
dgn-secrets.options = [
(setDefault { owner = "nextcloud"; }
(builtins.filter (lib.hasPrefix "nextcloud-") config.dgn-secrets.names))
2023-09-11 11:17:30 +02:00
];
networking.firewall.allowedTCPPorts = [ 80 443 ];
}