Compare commits

...

2 Commits

Author SHA1 Message Date
a074ac551d
flake update 2025-01-26 20:53:22 +01:00
978f0a537c
server: enable onlyoffice again 2025-01-26 20:53:09 +01:00
2 changed files with 21 additions and 42 deletions

17
flake.lock generated
View File

@ -337,22 +337,6 @@
"type": "github"
}
},
"nixpkgs-orca": {
"locked": {
"lastModified": 1737630003,
"narHash": "sha256-zX9kmYEaPU4g+NC3NpDy7KEGV5RlXFcifNg8tivd9CU=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "13eb9ce5b5c051be0fa1d0ff073ea8db6dc14d54",
"type": "github"
},
"original": {
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "13eb9ce5b5c051be0fa1d0ff073ea8db6dc14d54",
"type": "github"
}
},
"nixpkgs-stable": {
"locked": {
"lastModified": 1730741070,
@ -423,7 +407,6 @@
"microvm": "microvm",
"nixos-hardware": "nixos-hardware",
"nixpkgs": "nixpkgs",
"nixpkgs-orca": "nixpkgs-orca",
"nixpkgs-unstable": "nixpkgs-unstable"
}
},

View File

@ -1,10 +1,6 @@
{ config, pkgs, ... }:
{
environment.systemPackages = with pkgs; [ # Default packages install system-wide
appimage-run
];
services.nextcloud = {
enable = true;
hostName = "cloud.kabtop.de";
@ -47,15 +43,15 @@
#autoUpdateApps.enable = true;
};
# services.onlyoffice = {
# enable = true;
# hostname = "docs.cloud.kabtop.de";
# postgresName = "onlyoffice";
# postgresHost = "localhost";
# postgresUser = "onlyoffice";
# postgresPasswordFile = config.age.secrets."services/nextcloud/onlyofficedb".path;
# jwtSecretFile = config.age.secrets."services/nextcloud/onlyofficejwt".path;
# };
services.onlyoffice = {
enable = true;
hostname = "docs.cloud.kabtop.de";
postgresName = "onlyoffice";
postgresHost = "localhost";
postgresUser = "onlyoffice";
postgresPasswordFile = config.age.secrets."services/nextcloud/onlyofficedb".path;
jwtSecretFile = config.age.secrets."services/nextcloud/onlyofficejwt".path;
};
services.redis = {
vmOverCommit = true;
@ -73,10 +69,10 @@
enableACME = true;
forceSSL = true;
};
# "${config.services.onlyoffice.hostname}" = {
# enableACME = true;
# forceSSL = true;
# };
"${config.services.onlyoffice.hostname}" = {
enableACME = true;
forceSSL = true;
};
};
};
@ -88,14 +84,14 @@
file = ../../../secrets/services/nextcloud/adminpassFile.age;
owner = "nextcloud";
};
# age.secrets."services/nextcloud/onlyofficedb" = {
# file = ../../../secrets/services/nextcloud/onlyofficedb.age;
# owner = "onlyoffice";
# };
# age.secrets."services/nextcloud/onlyofficejwt" = {
# file = ../../../secrets/services/nextcloud/onlyofficejwt.age;
# owner = "onlyoffice";
# };
age.secrets."services/nextcloud/onlyofficedb" = {
file = ../../../secrets/services/nextcloud/onlyofficedb.age;
owner = "onlyoffice";
};
age.secrets."services/nextcloud/onlyofficejwt" = {
file = ../../../secrets/services/nextcloud/onlyofficejwt.age;
owner = "onlyoffice";
};
systemd.services."nextcloud-setup" = {
requires = ["postgresql.service"];