server: nextcloud: disable onlyoffice and set maxUploadSize

This commit is contained in:
Kabbone 2024-12-31 15:57:49 +01:00
parent e590739346
commit fc852aee67
Signed by: Kabbone
SSH Key Fingerprint: SHA256:ezolxoMIF3LNo1yc1aGNCvFNUiSZNjUbNhrZohFeKd0

View File

@ -11,7 +11,8 @@
https = true; https = true;
package = pkgs.nextcloud30; package = pkgs.nextcloud30;
database.createLocally = false; database.createLocally = false;
notify_push.enable = true; notify_push.enable = false;
maxUploadSize = "512M";
caching = { caching = {
redis = true; redis = true;
apcu = false; apcu = false;
@ -46,15 +47,15 @@
#autoUpdateApps.enable = true; #autoUpdateApps.enable = true;
}; };
services.onlyoffice = { # services.onlyoffice = {
enable = true; # enable = true;
hostname = "docs.cloud.kabtop.de"; # hostname = "docs.cloud.kabtop.de";
postgresName = "onlyoffice"; # postgresName = "onlyoffice";
postgresHost = "localhost"; # postgresHost = "localhost";
postgresUser = "onlyoffice"; # postgresUser = "onlyoffice";
postgresPasswordFile = config.age.secrets."services/nextcloud/onlyofficedb".path; # postgresPasswordFile = config.age.secrets."services/nextcloud/onlyofficedb".path;
jwtSecretFile = config.age.secrets."services/nextcloud/onlyofficejwt".path; # jwtSecretFile = config.age.secrets."services/nextcloud/onlyofficejwt".path;
}; # };
services.redis = { services.redis = {
vmOverCommit = true; vmOverCommit = true;
@ -72,11 +73,11 @@
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;
}; };
"${config.services.onlyoffice.hostname}" = { # "${config.services.onlyoffice.hostname}" = {
enableACME = true; # enableACME = true;
forceSSL = true; # forceSSL = true;
}; # };
}; # };
}; };
age.secrets."services/nextcloud/dbpassFile" = { age.secrets."services/nextcloud/dbpassFile" = {
@ -87,14 +88,14 @@
file = ../../../secrets/services/nextcloud/adminpassFile.age; file = ../../../secrets/services/nextcloud/adminpassFile.age;
owner = "nextcloud"; owner = "nextcloud";
}; };
age.secrets."services/nextcloud/onlyofficedb" = { # age.secrets."services/nextcloud/onlyofficedb" = {
file = ../../../secrets/services/nextcloud/onlyofficedb.age; # file = ../../../secrets/services/nextcloud/onlyofficedb.age;
owner = "onlyoffice"; # owner = "onlyoffice";
}; # };
age.secrets."services/nextcloud/onlyofficejwt" = { # age.secrets."services/nextcloud/onlyofficejwt" = {
file = ../../../secrets/services/nextcloud/onlyofficejwt.age; # file = ../../../secrets/services/nextcloud/onlyofficejwt.age;
owner = "onlyoffice"; # owner = "onlyoffice";
}; # };
systemd.services."nextcloud-setup" = { systemd.services."nextcloud-setup" = {
requires = ["postgresql.service"]; requires = ["postgresql.service"];