Compare commits

...

2 Commits

Author SHA1 Message Date
a074ac551d
flake update 2025-01-26 20:53:22 +01:00
978f0a537c
server: enable onlyoffice again 2025-01-26 20:53:09 +01:00
2 changed files with 21 additions and 42 deletions

17
flake.lock generated
View File

@ -337,22 +337,6 @@
"type": "github" "type": "github"
} }
}, },
"nixpkgs-orca": {
"locked": {
"lastModified": 1737630003,
"narHash": "sha256-zX9kmYEaPU4g+NC3NpDy7KEGV5RlXFcifNg8tivd9CU=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "13eb9ce5b5c051be0fa1d0ff073ea8db6dc14d54",
"type": "github"
},
"original": {
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "13eb9ce5b5c051be0fa1d0ff073ea8db6dc14d54",
"type": "github"
}
},
"nixpkgs-stable": { "nixpkgs-stable": {
"locked": { "locked": {
"lastModified": 1730741070, "lastModified": 1730741070,
@ -423,7 +407,6 @@
"microvm": "microvm", "microvm": "microvm",
"nixos-hardware": "nixos-hardware", "nixos-hardware": "nixos-hardware",
"nixpkgs": "nixpkgs", "nixpkgs": "nixpkgs",
"nixpkgs-orca": "nixpkgs-orca",
"nixpkgs-unstable": "nixpkgs-unstable" "nixpkgs-unstable": "nixpkgs-unstable"
} }
}, },

View File

@ -1,10 +1,6 @@
{ config, pkgs, ... }: { config, pkgs, ... }:
{ {
environment.systemPackages = with pkgs; [ # Default packages install system-wide
appimage-run
];
services.nextcloud = { services.nextcloud = {
enable = true; enable = true;
hostName = "cloud.kabtop.de"; hostName = "cloud.kabtop.de";
@ -47,15 +43,15 @@
#autoUpdateApps.enable = true; #autoUpdateApps.enable = true;
}; };
# services.onlyoffice = { services.onlyoffice = {
# enable = true; enable = true;
# hostname = "docs.cloud.kabtop.de"; hostname = "docs.cloud.kabtop.de";
# postgresName = "onlyoffice"; postgresName = "onlyoffice";
# postgresHost = "localhost"; postgresHost = "localhost";
# postgresUser = "onlyoffice"; postgresUser = "onlyoffice";
# postgresPasswordFile = config.age.secrets."services/nextcloud/onlyofficedb".path; postgresPasswordFile = config.age.secrets."services/nextcloud/onlyofficedb".path;
# jwtSecretFile = config.age.secrets."services/nextcloud/onlyofficejwt".path; jwtSecretFile = config.age.secrets."services/nextcloud/onlyofficejwt".path;
# }; };
services.redis = { services.redis = {
vmOverCommit = true; vmOverCommit = true;
@ -73,10 +69,10 @@
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;
}; };
# "${config.services.onlyoffice.hostname}" = { "${config.services.onlyoffice.hostname}" = {
# enableACME = true; enableACME = true;
# forceSSL = true; forceSSL = true;
# }; };
}; };
}; };
@ -88,14 +84,14 @@
file = ../../../secrets/services/nextcloud/adminpassFile.age; file = ../../../secrets/services/nextcloud/adminpassFile.age;
owner = "nextcloud"; owner = "nextcloud";
}; };
# age.secrets."services/nextcloud/onlyofficedb" = { age.secrets."services/nextcloud/onlyofficedb" = {
# file = ../../../secrets/services/nextcloud/onlyofficedb.age; file = ../../../secrets/services/nextcloud/onlyofficedb.age;
# owner = "onlyoffice"; owner = "onlyoffice";
# }; };
# age.secrets."services/nextcloud/onlyofficejwt" = { age.secrets."services/nextcloud/onlyofficejwt" = {
# file = ../../../secrets/services/nextcloud/onlyofficejwt.age; file = ../../../secrets/services/nextcloud/onlyofficejwt.age;
# owner = "onlyoffice"; owner = "onlyoffice";
# }; };
systemd.services."nextcloud-setup" = { systemd.services."nextcloud-setup" = {
requires = ["postgresql.service"]; requires = ["postgresql.service"];