Merge remote-tracking branch 'origin/nextcloud'
This commit is contained in:
commit
202381d181
|
@ -4,60 +4,83 @@ let
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
sops.secrets = {
|
sops.secrets = {
|
||||||
nextcloud_adminpass = {
|
nextcloud_adminpass.owner = "nextcloud";
|
||||||
|
nextcloud_ldap_search = {
|
||||||
|
key = "portunus/search-password";
|
||||||
owner = "nextcloud";
|
owner = "nextcloud";
|
||||||
group = "nextcloud";
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
postgresql = {
|
|
||||||
enable = true;
|
|
||||||
ensureUsers = [
|
|
||||||
{
|
|
||||||
name = "nextcloud";
|
|
||||||
ensurePermissions = {
|
|
||||||
"DATABASE nextcloud" = "ALL PRIVILEGES";
|
|
||||||
};
|
|
||||||
}
|
|
||||||
];
|
|
||||||
ensureDatabases = [ "nextcloud" ];
|
|
||||||
};
|
|
||||||
|
|
||||||
nextcloud = {
|
nextcloud = {
|
||||||
enable = true;
|
enable = true;
|
||||||
package = pkgs.nextcloud26; # Use current latest nextcloud package
|
package = pkgs.nextcloud25;
|
||||||
enableBrokenCiphersForSSE = false; # disable the openssl warning
|
enableBrokenCiphersForSSE = false; # disable the openssl warning
|
||||||
hostName = "${domain}";
|
hostName = domain;
|
||||||
https = true; # Use https for all urls
|
https = true; # Use https for all urls
|
||||||
phpExtraExtensions = all: [
|
phpExtraExtensions = all: [
|
||||||
all.ldap # Enable ldap php extension
|
all.ldap # Enable ldap php extension
|
||||||
];
|
];
|
||||||
config = {
|
config = {
|
||||||
dbtype = "pgsql";
|
dbtype = "pgsql";
|
||||||
dbuser = "nextcloud";
|
|
||||||
dbhost = "/run/postgresql";
|
|
||||||
dbname = "nextcloud";
|
|
||||||
adminpassFile = config.sops.secrets.nextcloud_adminpass.path;
|
adminpassFile = config.sops.secrets.nextcloud_adminpass.path;
|
||||||
adminuser = "root";
|
adminuser = "root";
|
||||||
};
|
};
|
||||||
|
# postgres database is configured automatically
|
||||||
|
database.createLocally = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
# Enable ACME and force SSL
|
# Enable ACME and force SSL
|
||||||
nginx = {
|
nginx.virtualHosts.${domain} = {
|
||||||
recommendedProxySettings = true;
|
|
||||||
virtualHosts = {
|
|
||||||
"${domain}" = {
|
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# ensure that postgres is running *before* running the setup
|
# ensure that postgres is running *before* running the setup
|
||||||
systemd.services."nextcloud-setup" = {
|
systemd.services."nextcloud-setup" = {
|
||||||
requires = [ "postgresql.service" ];
|
requires = [ "postgresql.service" ];
|
||||||
after = [ "postgresql.service" ];
|
after = [ "postgresql.service" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# configure some settings automatically
|
||||||
|
systemd.services."phpfpm-nextcloud" =
|
||||||
|
let
|
||||||
|
occ = lib.getExe config.services.nextcloud.occ;
|
||||||
|
ldapConfig = rec {
|
||||||
|
ldapAgentName = "uid=search,ou=users,${ldapBase}";
|
||||||
|
ldapBase = config.services.portunus.ldap.suffix;
|
||||||
|
ldapBaseGroups = "ou=groups,${ldapBase}";
|
||||||
|
ldapBaseUsers = "ou=users,${ldapBase}";
|
||||||
|
ldapConfigurationActive = "1";
|
||||||
|
ldapEmailAttribute = "mail";
|
||||||
|
ldapGroupFilterObjectclass = "groupOfNames";
|
||||||
|
ldapGroupMemberAssocAttr = "member";
|
||||||
|
ldapHost = "localhost";
|
||||||
|
ldapPort = "389";
|
||||||
|
ldapUserDisplayName = "cn";
|
||||||
|
ldapUserFilterObjectclass = "posixAccount";
|
||||||
|
# generated by nextcloud
|
||||||
|
ldapGroupFilter = "(&(|(objectclass=groupOfNames)))";
|
||||||
|
ldapUserFilter = "(|(objectclass=posixAccount))";
|
||||||
|
ldapLoginFilter = "(&(|(objectclass=posixAccount))(uid=%uid))";
|
||||||
|
};
|
||||||
|
preStart = pkgs.writeScript "nextcloud-preStart" ''
|
||||||
|
# enable included LDAP app
|
||||||
|
${occ} app:enable user_ldap
|
||||||
|
|
||||||
|
# set up new LDAP config if it does not exist
|
||||||
|
if ! ${occ} ldap:show-config s01 > /dev/null; then
|
||||||
|
${occ} ldap:create-empty-config
|
||||||
|
fi
|
||||||
|
|
||||||
|
# update LDAP config
|
||||||
|
${lib.concatLines (lib.mapAttrsToList (name: value: "${occ} ldap:set-config s01 '${name}' '${value}'") ldapConfig)}
|
||||||
|
${occ} ldap:set-config s01 'ldapAgentPassword' $(cat ${config.sops.secrets.nextcloud_ldap_search.path})
|
||||||
|
'';
|
||||||
|
in
|
||||||
|
{
|
||||||
|
# run the whole preStart as nextcloud user, so that the log won't be cluttered by lots of sudo calls
|
||||||
|
serviceConfig.ExecStartPre = "/run/wrappers/bin/sudo -u nextcloud --preserve-env=NEXTCLOUD_CONFIG_DIR --preserve-env=OC_PASS ${preStart}";
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue