2022-10-02 20:54:26 +00:00
|
|
|
{ config, pkgs, lib, ... }:
|
|
|
|
|
|
|
|
let
|
|
|
|
adminpassFile = "/var/lib/nextcloud/creds";
|
|
|
|
s3SecretFile = "/var/lib/nextcloud/creds-s3";
|
|
|
|
|
|
|
|
in {
|
|
|
|
|
2022-10-03 04:05:07 +00:00
|
|
|
imports = [ ../shell/age.nix ];
|
|
|
|
|
2022-10-02 20:54:26 +00:00
|
|
|
options = {
|
|
|
|
|
|
|
|
nextcloudServer = lib.mkOption {
|
|
|
|
type = lib.types.str;
|
|
|
|
description = "Hostname for Nextcloud";
|
|
|
|
};
|
|
|
|
|
|
|
|
nextcloudS3 = {
|
|
|
|
bucket = lib.mkOption {
|
|
|
|
type = lib.types.str;
|
|
|
|
description = "S3 bucket name for Nextcloud storage";
|
|
|
|
};
|
|
|
|
hostname = lib.mkOption {
|
|
|
|
type = lib.types.str;
|
|
|
|
description = "S3 endpoint for Nextcloud storage";
|
|
|
|
};
|
|
|
|
key = lib.mkOption {
|
|
|
|
type = lib.types.str;
|
|
|
|
description = "S3 access key for Nextcloud storage";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
config = {
|
|
|
|
|
|
|
|
services.nextcloud = {
|
|
|
|
enable = true;
|
|
|
|
package = pkgs.nextcloud24; # Required to specify
|
|
|
|
https = true;
|
|
|
|
hostName = "localhost";
|
|
|
|
config = {
|
|
|
|
adminpassFile = adminpassFile;
|
|
|
|
extraTrustedDomains = [ config.nextcloudServer ];
|
|
|
|
objectstore.s3 = {
|
|
|
|
enable = true;
|
|
|
|
bucket = config.nextcloudS3.bucket;
|
|
|
|
hostname = config.nextcloudS3.hostname;
|
|
|
|
key = config.nextcloudS3.key;
|
|
|
|
autocreate = false;
|
|
|
|
secretFile = s3SecretFile;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
# Don't let Nginx use main ports (using Caddy instead)
|
|
|
|
services.nginx.virtualHosts."localhost".listen = [{
|
|
|
|
addr = "127.0.0.1";
|
|
|
|
port = 8080;
|
|
|
|
}];
|
|
|
|
|
|
|
|
caddyRoutes = [{
|
|
|
|
match = [{ host = [ config.nextcloudServer ]; }];
|
|
|
|
handle = [{
|
|
|
|
handler = "reverse_proxy";
|
|
|
|
upstreams = [{ dial = "localhost:8080"; }];
|
|
|
|
}];
|
|
|
|
}];
|
|
|
|
|
|
|
|
# Create credentials files
|
2022-10-03 04:05:07 +00:00
|
|
|
system.activationScripts.nextcloud = {
|
|
|
|
deps = [ "age" ];
|
|
|
|
text = ''
|
2022-10-02 20:54:26 +00:00
|
|
|
if [ ! -f "${adminpassFile}" ]; then
|
|
|
|
$DRY_RUN_CMD mkdir --parents $VERBOSE_ARG $(dirname ${adminpassFile})
|
|
|
|
$DRY_RUN_CMD ${pkgs.age}/bin/age --decrypt \
|
2022-10-03 04:05:07 +00:00
|
|
|
--identity ${config.identityFile} \
|
2022-10-02 20:54:26 +00:00
|
|
|
--output ${adminpassFile} \
|
|
|
|
${builtins.toString ../../private/nextcloud.age}
|
|
|
|
$DRY_RUN_CMD chown nextcloud:nextcloud ${adminpassFile}
|
|
|
|
fi
|
|
|
|
if [ ! -f "${s3SecretFile}" ]; then
|
|
|
|
$DRY_RUN_CMD mkdir --parents $VERBOSE_ARG $(dirname ${s3SecretFile})
|
|
|
|
$DRY_RUN_CMD ${pkgs.age}/bin/age --decrypt \
|
2022-10-03 04:05:07 +00:00
|
|
|
--identity ${config.identityFile} \
|
2022-10-02 20:54:26 +00:00
|
|
|
--output ${s3SecretFile} \
|
|
|
|
${builtins.toString ../../private/nextcloud-s3.age}
|
|
|
|
$DRY_RUN_CMD chown nextcloud:nextcloud ${s3SecretFile}
|
|
|
|
fi
|
|
|
|
'';
|
2022-10-03 04:05:07 +00:00
|
|
|
};
|
2022-10-02 20:54:26 +00:00
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
}
|