Compare commits

..

No commits in common. "a074ac551d56b4001fe8ec76edb0957865851a3c" and "42214c869c1e487387a4797bfe4a604aa01de49c" have entirely different histories.

2 changed files with 42 additions and 21 deletions

17
flake.lock generated
View File

@ -337,6 +337,22 @@
"type": "github" "type": "github"
} }
}, },
"nixpkgs-orca": {
"locked": {
"lastModified": 1737630003,
"narHash": "sha256-zX9kmYEaPU4g+NC3NpDy7KEGV5RlXFcifNg8tivd9CU=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "13eb9ce5b5c051be0fa1d0ff073ea8db6dc14d54",
"type": "github"
},
"original": {
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "13eb9ce5b5c051be0fa1d0ff073ea8db6dc14d54",
"type": "github"
}
},
"nixpkgs-stable": { "nixpkgs-stable": {
"locked": { "locked": {
"lastModified": 1730741070, "lastModified": 1730741070,
@ -407,6 +423,7 @@
"microvm": "microvm", "microvm": "microvm",
"nixos-hardware": "nixos-hardware", "nixos-hardware": "nixos-hardware",
"nixpkgs": "nixpkgs", "nixpkgs": "nixpkgs",
"nixpkgs-orca": "nixpkgs-orca",
"nixpkgs-unstable": "nixpkgs-unstable" "nixpkgs-unstable": "nixpkgs-unstable"
} }
}, },

View File

@ -1,6 +1,10 @@
{ config, pkgs, ... }: { config, pkgs, ... }:
{ {
environment.systemPackages = with pkgs; [ # Default packages install system-wide
appimage-run
];
services.nextcloud = { services.nextcloud = {
enable = true; enable = true;
hostName = "cloud.kabtop.de"; hostName = "cloud.kabtop.de";
@ -43,15 +47,15 @@
#autoUpdateApps.enable = true; #autoUpdateApps.enable = true;
}; };
services.onlyoffice = { # services.onlyoffice = {
enable = true; # enable = true;
hostname = "docs.cloud.kabtop.de"; # hostname = "docs.cloud.kabtop.de";
postgresName = "onlyoffice"; # postgresName = "onlyoffice";
postgresHost = "localhost"; # postgresHost = "localhost";
postgresUser = "onlyoffice"; # postgresUser = "onlyoffice";
postgresPasswordFile = config.age.secrets."services/nextcloud/onlyofficedb".path; # postgresPasswordFile = config.age.secrets."services/nextcloud/onlyofficedb".path;
jwtSecretFile = config.age.secrets."services/nextcloud/onlyofficejwt".path; # jwtSecretFile = config.age.secrets."services/nextcloud/onlyofficejwt".path;
}; # };
services.redis = { services.redis = {
vmOverCommit = true; vmOverCommit = true;
@ -69,10 +73,10 @@
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;
}; };
"${config.services.onlyoffice.hostname}" = { # "${config.services.onlyoffice.hostname}" = {
enableACME = true; # enableACME = true;
forceSSL = true; # forceSSL = true;
}; # };
}; };
}; };
@ -84,14 +88,14 @@
file = ../../../secrets/services/nextcloud/adminpassFile.age; file = ../../../secrets/services/nextcloud/adminpassFile.age;
owner = "nextcloud"; owner = "nextcloud";
}; };
age.secrets."services/nextcloud/onlyofficedb" = { # age.secrets."services/nextcloud/onlyofficedb" = {
file = ../../../secrets/services/nextcloud/onlyofficedb.age; # file = ../../../secrets/services/nextcloud/onlyofficedb.age;
owner = "onlyoffice"; # owner = "onlyoffice";
}; # };
age.secrets."services/nextcloud/onlyofficejwt" = { # age.secrets."services/nextcloud/onlyofficejwt" = {
file = ../../../secrets/services/nextcloud/onlyofficejwt.age; # file = ../../../secrets/services/nextcloud/onlyofficejwt.age;
owner = "onlyoffice"; # owner = "onlyoffice";
}; # };
systemd.services."nextcloud-setup" = { systemd.services."nextcloud-setup" = {
requires = ["postgresql.service"]; requires = ["postgresql.service"];