nix-config/microvms/nextcloud/default.nix

117 lines
3 KiB
Nix
Raw Normal View History

2022-06-26 21:17:20 +02:00
{ config, pkgs, ... }: {
imports = [
./oxaproxy.nix
./secrets.nix
];
# nextcloud goes here
networking.firewall.interfaces.oxaproxy.allowedTCPPorts = [ 8080 ];
services.postgresql = {
enable = true;
package = pkgs.postgresql_14;
ensureDatabases = [ "nextcloud" ];
ensureUsers = [{
name = "nextcloud";
ensurePermissions."DATABASE nextcloud" = "ALL PRIVILEGES";
}];
};
2022-07-13 15:42:33 +02:00
services.redis.servers.nextcloud.enable = true;
2022-06-26 21:17:20 +02:00
services.nginx = {
enable = true;
recommendedGzipSettings = true;
recommendedOptimisation = true;
virtualHosts."nc.oxapentane.com" = {
extraConfig = ''
2022-06-26 21:19:15 +02:00
# HTTP response headers borrowed from Nextcloud .htaccess
add_header Referrer-Policy "no-referrer" always;
#add_header X-Content-Type-Options "nosniff" always;
add_header X-Download-Options "noopen" always;
#add_header X-Frame-Options "SAMEORIGIN" always;
add_header X-Permitted-Cross-Domain-Policies "none" always;
add_header X-Robots-Tag "none" always;
add_header X-XSS-Protection "1; mode=block" always;
2023-01-14 13:21:12 +01:00
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;
2022-06-26 21:19:15 +02:00
# Remove X-Powered-By, which is an information leak
fastcgi_hide_header X-Powered-By;
2022-06-26 21:17:20 +02:00
'';
listen = [{
2022-06-26 21:19:15 +02:00
# We are listening on wireguard interface only
addr = "10.34.45.100";
port = 8080;
ssl = false;
}];
};
};
services.nextcloud = {
enable = true;
hostName = "nc.oxapentane.com";
home = "/var/lib/nextcloud-oxa";
2023-03-25 16:41:45 +01:00
package = pkgs.nextcloud26;
2022-06-26 21:19:15 +02:00
maxUploadSize = "5000M";
caching.redis = true;
autoUpdateApps = {
enable = true;
startAt = "07:00:00";
};
config = {
overwriteProtocol = "https";
trustedProxies = [ "10.34.45.1" ];
dbtype = "pgsql";
dbuser = "nextcloud";
dbhost = "/run/postgresql";
dbname = "nextcloud";
adminuser = "admin";
adminpassFile = config.sops.secrets."nextcloud/adminpass".path;
};
2023-05-28 17:48:51 +02:00
enableBrokenCiphersForSSE = false;
2022-06-26 21:19:15 +02:00
};
systemd.services."nextcloud-setup" = {
requires = [ "postgresql.service" ];
after = [ "postgresql.service" ];
};
microvm = {
hypervisor = "qemu";
mem = 4 * 1024;
2022-07-03 01:16:45 +02:00
vcpu = 3;
2022-06-26 21:19:15 +02:00
shares = [{
source = "/nix/store";
mountPoint = "/nix/.ro-store";
tag = "store";
proto = "virtiofs";
socket = "store.socket";
}] ++ map
(dir: {
source = "/var/lib/microvms/${config.networking.hostName}/${dir}";
mountPoint = "/${dir}";
tag = dir;
proto = "virtiofs";
socket = "${dir}.socket";
}) [ "etc" "var" "home" ];
interfaces = [{
type = "tap";
id = "vm-nextcloud";
2023-05-28 16:50:25 +02:00
mac = "02:00:00:00:00:00";
2022-06-26 21:19:15 +02:00
}];
};
networking = {
hostName = "nextcloud";
};
system.stateVersion = "22.05";
}