aboutsummaryrefslogtreecommitdiff
path: root/virtual/modules/websites/tools/cloud
diff options
context:
space:
mode:
Diffstat (limited to 'virtual/modules/websites/tools/cloud')
-rw-r--r--virtual/modules/websites/tools/cloud/default.nix6
-rw-r--r--virtual/modules/websites/tools/cloud/nextcloud.nix23
2 files changed, 12 insertions, 17 deletions
diff --git a/virtual/modules/websites/tools/cloud/default.nix b/virtual/modules/websites/tools/cloud/default.nix
index 7dd5c6e..241b982 100644
--- a/virtual/modules/websites/tools/cloud/default.nix
+++ b/virtual/modules/websites/tools/cloud/default.nix
@@ -1,6 +1,8 @@
1{ lib, pkgs, config, mylibs, ... }: 1{ lib, pkgs, config, myconfig, mylibs, ... }:
2let 2let
3 nextcloud = pkgs.callPackage ./nextcloud.nix { inherit (mylibs) checkEnv; }; 3 nextcloud = pkgs.callPackage ./nextcloud.nix {
4 env = myconfig.env.tools.nextcloud;
5 };
4 6
5 cfg = config.services.myWebsites.tools.cloud; 7 cfg = config.services.myWebsites.tools.cloud;
6in { 8in {
diff --git a/virtual/modules/websites/tools/cloud/nextcloud.nix b/virtual/modules/websites/tools/cloud/nextcloud.nix
index b9c8d04..815254b 100644
--- a/virtual/modules/websites/tools/cloud/nextcloud.nix
+++ b/virtual/modules/websites/tools/cloud/nextcloud.nix
@@ -1,4 +1,4 @@
1{ stdenv, fetchurl, checkEnv, writeText, lib, phpPackages, php }: 1{ stdenv, fetchurl, env, writeText, lib, phpPackages, php }:
2let 2let
3 nextcloud = let 3 nextcloud = let
4 buildApp = { appName, version, url, sha256, installPhase ? "mkdir -p $out && cp -R . $out/" }: 4 buildApp = { appName, version, url, sha256, installPhase ? "mkdir -p $out && cp -R . $out/" }:
@@ -96,27 +96,20 @@ let
96 }; 96 };
97 in rec { 97 in rec {
98 varDir = "/var/lib/nextcloud"; 98 varDir = "/var/lib/nextcloud";
99 config_php = 99 config_php = writeText "config.php" ''
100 assert checkEnv "NIXOPS_NEXTCLOUD_PASSWORD_SALT";
101 assert checkEnv "NIXOPS_NEXTCLOUD_DB_USER";
102 assert checkEnv "NIXOPS_NEXTCLOUD_DB_PASSWORD";
103 assert checkEnv "NIXOPS_NEXTCLOUD_INSTANCE_ID";
104 assert checkEnv "NIXOPS_NEXTCLOUD_SECRET";
105 assert checkEnv "NIXOPS_NEXTCLOUD_REDIS_DB_INDEX";
106 writeText "config.php" ''
107 <?php 100 <?php
108 $CONFIG = array ( 101 $CONFIG = array (
109 'instanceid' => '${builtins.getEnv "NIXOPS_NEXTCLOUD_INSTANCE_ID"}', 102 'instanceid' => '${env.instance_id}',
110 'datadirectory' => '/var/lib/nextcloud/', 103 'datadirectory' => '/var/lib/nextcloud/',
111 'passwordsalt' => '${builtins.getEnv "NIXOPS_NEXTCLOUD_PASSWORD_SALT"}', 104 'passwordsalt' => '${env.password_salt}',
112 'debug' => false, 105 'debug' => false,
113 'dbtype' => 'pgsql', 106 'dbtype' => 'pgsql',
114 'version' => '15.0.0.10', 107 'version' => '15.0.0.10',
115 'dbname' => 'webapps', 108 'dbname' => 'webapps',
116 'dbhost' => '/run/postgresql', 109 'dbhost' => '/run/postgresql',
117 'dbtableprefix' => 'oc_', 110 'dbtableprefix' => 'oc_',
118 'dbuser' => '${builtins.getEnv "NIXOPS_NEXTCLOUD_DB_USER"}', 111 'dbuser' => '${env.postgresql.user}',
119 'dbpassword' => '${builtins.getEnv "NIXOPS_NEXTCLOUD_DB_PASSWORD"}', 112 'dbpassword' => '${env.postgresql.password}',
120 'installed' => true, 113 'installed' => true,
121 'maxZipInputSize' => 0, 114 'maxZipInputSize' => 0,
122 'allowZipDownload' => true, 115 'allowZipDownload' => true,
@@ -127,7 +120,7 @@ let
127 array ( 120 array (
128 0 => 'cloud.immae.eu', 121 0 => 'cloud.immae.eu',
129 ), 122 ),
130 'secret' => '${builtins.getEnv "NIXOPS_NEXTCLOUD_SECRET"}', 123 'secret' => '${env.secret}',
131 'appstoreenabled' => false, 124 'appstoreenabled' => false,
132 'appstore.experimental.enabled' => true, 125 'appstore.experimental.enabled' => true,
133 'loglevel' => 0, 126 'loglevel' => 0,
@@ -147,7 +140,7 @@ let
147 array ( 140 array (
148 'host' => 'localhost', 141 'host' => 'localhost',
149 'port' => 6379, 142 'port' => 6379,
150 'dbindex' => ${builtins.getEnv "NIXOPS_NEXTCLOUD_REDIS_DB_INDEX"}, 143 'dbindex' => ${env.redis.db_index},
151 ), 144 ),
152 'overwrite.cli.url' => 'https://cloud.immae.eu', 145 'overwrite.cli.url' => 'https://cloud.immae.eu',
153 'ldapIgnoreNamingRules' => false, 146 'ldapIgnoreNamingRules' => false,