dotfiles/modules/nixos/services/nextcloud/default.nix

63 lines
1.6 KiB
Nix
Raw Normal View History

2023-07-09 16:26:53 +00:00
{
config,
lib,
pkgs,
...
}: let
2023-07-09 16:26:53 +00:00
cfg = config.aa.services.nextcloud;
in {
options.aa.services.nextcloud = with lib; {
2023-07-09 16:26:53 +00:00
enable = mkEnableOption "nextcloud";
acmeCertName = mkOption {
type = types.str;
default = "";
description = ''
If set to a non-empty string, forces SSL with the supplied acme
certificate.
'';
};
2023-07-09 16:26:53 +00:00
};
config = lib.mkIf cfg.enable {
2023-07-09 16:26:53 +00:00
age.secrets.nextcloud_admin = {
2023-11-18 16:29:25 +00:00
file = ../../../../secrets/nextcloud_admin.age;
2023-07-09 16:26:53 +00:00
owner = "nextcloud";
group = "nextcloud";
};
services.nextcloud = {
enable = true;
2024-05-27 02:39:32 +00:00
package = pkgs.nextcloud29;
2023-07-09 16:26:53 +00:00
hostName = "nextcloud.kilonull.com";
https = true;
database.createLocally = true;
datadir = "/tank/nextcloud";
2023-07-09 16:26:53 +00:00
# Arbitrary large size
maxUploadSize = "16G";
configureRedis = true;
2024-03-02 16:23:27 +00:00
settings.log_type = "file";
2023-07-14 01:26:57 +00:00
poolSettings = {
pm = "dynamic";
"pm.max_children" = "64";
"pm.max_requests" = "500";
"pm.max_spare_servers" = "25";
"pm.min_spare_servers" = "10";
"pm.start_servers" = "15";
};
2023-07-09 16:26:53 +00:00
config = {
dbtype = "pgsql";
adminuser = "alejandro";
adminpassFile = config.age.secrets.nextcloud_admin.path;
};
};
# nextcloud module configures nginx, just need to specify SSL stuffs here
services.nginx.virtualHosts.${config.services.nextcloud.hostName} = lib.mkIf (cfg.acmeCertName != "") {
2023-07-09 16:26:53 +00:00
forceSSL = true;
useACMEHost = cfg.acmeCertName;
2023-07-09 16:26:53 +00:00
};
networking.firewall.allowedTCPPorts = [80 443];
};
}