nixos/modules/services/nextcloud.nix

95 lines
3.2 KiB
Nix
Raw Normal View History

2023-10-04 15:40:28 +08:00
inputs:
{
2023-10-04 15:42:34 +08:00
options.nixos.services.nextcloud = let inherit (inputs.lib) mkOption types; in
2023-10-04 15:40:28 +08:00
{
2023-10-04 15:46:55 +08:00
enable = mkOption { type = types.bool; default = false; };
2023-10-04 15:40:28 +08:00
hostname = mkOption { type = types.str; default = "nextcloud.chn.moe"; };
};
config =
let
2023-10-04 15:42:34 +08:00
inherit (inputs.config.nixos.services) nextcloud;
2023-10-04 15:40:28 +08:00
inherit (inputs.localLib) attrsToList;
inherit (inputs.lib) mkIf mkMerge;
inherit (builtins) map listToAttrs toString replaceStrings filter toJSON;
2023-10-04 15:42:34 +08:00
in mkIf nextcloud.enable
2023-10-04 15:40:28 +08:00
{
services.nextcloud =
{
enable = true;
2023-10-04 15:42:34 +08:00
hostName = nextcloud.hostname;
appstoreEnable = false;
2023-10-04 15:40:28 +08:00
https = true;
package = inputs.pkgs.nextcloud27;
maxUploadSize = "10G";
config =
{
dbtype = "pgsql";
dbpassFile = inputs.config.sops.secrets."nextcloud/postgresql".path;
dbport = 5432;
adminuser = "admin";
adminpassFile = inputs.config.sops.secrets."nextcloud/admin".path;
overwriteProtocol = "https";
defaultPhoneRegion = "CN";
};
configureRedis = true;
2023-10-04 16:14:25 +08:00
extraOptions =
{
mail_domain = "chn.moe";
2023-10-04 20:06:45 +08:00
mail_from_address = "bot";
2023-10-04 16:14:25 +08:00
mail_smtphost = "mail.chn.moe";
mail_smtpport = 465;
mail_smtpsecure = "ssl";
mail_smtpauth = true;
mail_smtpname = "bot@chn.moe";
updatechecker = false;
2023-10-04 16:14:25 +08:00
};
2023-10-04 15:40:28 +08:00
secretFile = inputs.config.sops.templates."nextcloud/secret".path;
2023-10-04 20:59:17 +08:00
extraApps =
{
maps = inputs.pkgs.fetchNextcloudApp
{
url = "https://github.com/nextcloud/maps/releases/download/v1.1.1/maps-1.1.1.tar.gz";
sha256 = "1rcmqnm5364h5gaq1yy6b6d7k17napgn0yc9ymrnn75bps9s71v9";
};
phonetrack = inputs.pkgs.fetchNextcloudApp
{
url = "https://github.com/julien-nc/phonetrack/releases/download/v0.7.6/phonetrack-0.7.6.tar.gz";
sha256 = "1p15vw7c5c1h08czyxi1r6svjd5hjmnc0i6is4vl3xq2kfjmcyyx";
};
twofactor_webauthn = inputs.pkgs.fetchNextcloudApp
{
url = "https://github.com/nextcloud-releases/twofactor_webauthn/releases/download/v1.2.0/twofactor_webauthn-v1.2.0.tar.gz";
sha256 = "1lqcw74rsnl8c4sirw9208ra3c8zl8zp93scs7y8fv2n4n60l465";
};
};
2023-10-04 15:40:28 +08:00
};
nixos.services =
{
postgresql = { enable = true; instances.nextcloud = {}; };
redis.instances.nextcloud.port = 3499;
2023-11-09 20:32:13 +08:00
nginx =
{
enable = true;
2023-11-10 19:24:57 +08:00
https.${nextcloud.hostname}.global.configName = nextcloud.hostname;
2023-11-09 20:32:13 +08:00
};
2023-10-04 15:40:28 +08:00
};
sops =
{
2023-10-04 15:56:11 +08:00
templates."nextcloud/secret" =
{
2023-10-04 16:14:25 +08:00
content = toJSON
{
redis.password = inputs.config.sops.placeholder."redis/nextcloud";
mail_smtppassword = inputs.config.sops.placeholder."mail/bot";
};
2023-10-04 15:56:11 +08:00
owner = inputs.config.users.users.nextcloud.name;
};
2023-10-04 15:40:28 +08:00
secrets =
{
"nextcloud/postgresql" = { key = "postgresql/nextcloud"; owner = inputs.config.users.users.nextcloud.name; };
"nextcloud/admin".owner = inputs.config.users.users.nextcloud.name;
};
};
};
}