Format the entire project.
This commit is contained in:
parent
1dc50ae17d
commit
6f9db5e3a4
115 changed files with 3451 additions and 2901 deletions
|
@ -1,57 +1,65 @@
|
|||
{ config, lib, pkgs, fn, ... }:
|
||||
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
fn,
|
||||
...
|
||||
}:
|
||||
with lib;
|
||||
|
||||
mkIf (elem "nextcloud" config.machine.services) {
|
||||
services = let
|
||||
cfg = config.machine;
|
||||
domain = (findFirst (s: s.service == "nextcloud") cfg cfg.vHosts).domain;
|
||||
in {
|
||||
nextcloud = {
|
||||
enable = true;
|
||||
enableBrokenCiphersForSSE = false;
|
||||
home = "/var/lib/nextcloud";
|
||||
hostName = domain;
|
||||
https = true;
|
||||
maxUploadSize = "1024M";
|
||||
package = pkgs.nextcloud27;
|
||||
config = {
|
||||
adminuser = mkDefault (elemAt cfg.administrators 0).name;
|
||||
adminpassFile = config.sops.secrets."services/nextcloud/adminPass".path;
|
||||
dbtype = "mysql";
|
||||
dbhost = "localhost";
|
||||
dbport = "3306";
|
||||
dbuser = "nextcloud";
|
||||
dbpassFile = config.sops.secrets."services/nextcloud/dbPass".path;
|
||||
dbname = "nextcloud";
|
||||
dbtableprefix = "oc_";
|
||||
extraTrustedDomains = cfg.extraDomains;
|
||||
mkIf (elem "nextcloud" config.machine.services) {
|
||||
services = let
|
||||
cfg = config.machine;
|
||||
domain = (findFirst (s: s.service == "nextcloud") cfg cfg.vHosts).domain;
|
||||
in {
|
||||
nextcloud = {
|
||||
enable = true;
|
||||
enableBrokenCiphersForSSE = false;
|
||||
home = "/var/lib/nextcloud";
|
||||
hostName = domain;
|
||||
https = true;
|
||||
maxUploadSize = "1024M";
|
||||
package = pkgs.nextcloud27;
|
||||
config = {
|
||||
adminuser = mkDefault (elemAt cfg.administrators 0).name;
|
||||
adminpassFile = config.sops.secrets."services/nextcloud/adminPass".path;
|
||||
dbtype = "mysql";
|
||||
dbhost = "localhost";
|
||||
dbport = "3306";
|
||||
dbuser = "nextcloud";
|
||||
dbpassFile = config.sops.secrets."services/nextcloud/dbPass".path;
|
||||
dbname = "nextcloud";
|
||||
dbtableprefix = "oc_";
|
||||
extraTrustedDomains = cfg.extraDomains;
|
||||
};
|
||||
caching = {
|
||||
apcu = true;
|
||||
memcached = true;
|
||||
redis = false;
|
||||
};
|
||||
};
|
||||
caching = {
|
||||
apcu = true;
|
||||
memcached = true;
|
||||
redis = false;
|
||||
# Turn Server used for nextcloud-talk
|
||||
# This stuff is still untested.
|
||||
coturn = mkIf (elem "nextcloud-talk" config.machine.services) {
|
||||
# TLS is not needed as WebRTC is already encrypted.
|
||||
enable = true;
|
||||
realm = domain;
|
||||
listening-port = 3478;
|
||||
use-auth-secret = true;
|
||||
extraConfig = ''
|
||||
fingerprint
|
||||
total-quota=100
|
||||
bps-capacity=0
|
||||
stale-nonce
|
||||
no-multicast-peers
|
||||
'';
|
||||
};
|
||||
};
|
||||
# Turn Server used for nextcloud-talk
|
||||
# This stuff is still untested.
|
||||
coturn = mkIf (elem "nextcloud-talk" config.machine.services) {
|
||||
# TLS is not needed as WebRTC is already encrypted.
|
||||
enable = true;
|
||||
realm = domain;
|
||||
listening-port = 3478;
|
||||
use-auth-secret = true;
|
||||
extraConfig = ''
|
||||
fingerprint
|
||||
total-quota=100
|
||||
bps-capacity=0
|
||||
stale-nonce
|
||||
no-multicast-peers
|
||||
'';
|
||||
};
|
||||
};
|
||||
sops.secrets = (fn.sopsHelper
|
||||
(name: "services/nextcloud/${name}")
|
||||
[ "adminPass" "dbPass" ]
|
||||
{ owner = "nextcloud"; group = "nextcloud"; });
|
||||
}
|
||||
sops.secrets =
|
||||
fn.sopsHelper
|
||||
(name: "services/nextcloud/${name}")
|
||||
["adminPass" "dbPass"]
|
||||
{
|
||||
owner = "nextcloud";
|
||||
group = "nextcloud";
|
||||
};
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue