diff --git a/flake.lock b/flake.lock index 005c5a3..06d1c63 100644 --- a/flake.lock +++ b/flake.lock @@ -1193,11 +1193,11 @@ "locked": { "lastModified": 1, "narHash": "sha256-mrfMvef+tOYMK35horTWF43tQpES1zI7hb5RbzN3oIk=", - "path": "/nix/store/hpa0gcdys4xk1wif3ksp9yjkyd68lypx-source/home-manager", + "path": "/nix/store/d0zc8mjjmdva9rl39kdw697p1vd6kp11-source/home-manager", "type": "path" }, "original": { - "path": "/nix/store/hpa0gcdys4xk1wif3ksp9yjkyd68lypx-source/home-manager", + "path": "/nix/store/d0zc8mjjmdva9rl39kdw697p1vd6kp11-source/home-manager", "type": "path" } }, @@ -1807,11 +1807,11 @@ "locked": { "lastModified": 1, "narHash": "sha256-QahOuoQdXshu38W5uO7hLhG/yFkT7S2l8Dxicq0wdGk=", - "path": "/nix/store/1jlhs5z0fkw1z8jf5bb4s5bhdqhsw930-source/programs", + "path": "/nix/store/hdwra9h524gn8ag3i5akm0a9q0sb7qh8-source/programs", "type": "path" }, "original": { - "path": "/nix/store/1jlhs5z0fkw1z8jf5bb4s5bhdqhsw930-source/programs", + "path": "/nix/store/hdwra9h524gn8ag3i5akm0a9q0sb7qh8-source/programs", "type": "path" } }, @@ -1882,11 +1882,11 @@ "locked": { "lastModified": 1, "narHash": "sha256-0Ztx5DVQ2I7hvCK/qjGa4XTdRgbzM8rhf19m0al8lVM=", - "path": "/nix/store/1jlhs5z0fkw1z8jf5bb4s5bhdqhsw930-source/services/sddm", + "path": "/nix/store/hdwra9h524gn8ag3i5akm0a9q0sb7qh8-source/services/sddm", "type": "path" }, "original": { - "path": "/nix/store/1jlhs5z0fkw1z8jf5bb4s5bhdqhsw930-source/services/sddm", + "path": "/nix/store/hdwra9h524gn8ag3i5akm0a9q0sb7qh8-source/services/sddm", "type": "path" } }, @@ -1976,12 +1976,12 @@ }, "locked": { "lastModified": 1, - "narHash": "sha256-4OsKmVNgQ6yPD++McosqTdHNXPMfSk/ooTzxwWxDXug=", - "path": "/nix/store/hpa0gcdys4xk1wif3ksp9yjkyd68lypx-source/system-config", + "narHash": "sha256-xWEC+I3fCAhwzk52HJbltXC3t9pnFYSIPHIwv7RSxao=", + "path": "/nix/store/d0zc8mjjmdva9rl39kdw697p1vd6kp11-source/system-config", "type": "path" }, "original": { - "path": "/nix/store/hpa0gcdys4xk1wif3ksp9yjkyd68lypx-source/system-config", + "path": "/nix/store/d0zc8mjjmdva9rl39kdw697p1vd6kp11-source/system-config", "type": "path" } }, diff --git a/system-config/configuration/homebox/default.nix b/system-config/configuration/homebox/default.nix index a091111..314dca6 100644 --- a/system-config/configuration/homebox/default.nix +++ b/system-config/configuration/homebox/default.nix @@ -195,9 +195,7 @@ "pihole/pass" = {}; - "nextcloud/pass" = { - owner = "sshd"; - }; + "nextcloud/pass" = {}; }; }; @@ -257,7 +255,7 @@ pihole.enable = true; - nextcloud.enable = false; + nextcloud.enable = true; gitlab.enable = true; }; diff --git a/system-config/services/containers/nextcloud/default.nix b/system-config/services/containers/nextcloud/default.nix index 7c0ea88..000619c 100644 --- a/system-config/services/containers/nextcloud/default.nix +++ b/system-config/services/containers/nextcloud/default.nix @@ -47,7 +47,7 @@ bindMounts = { - "/etc/nextcloud" = { + "/var/lib/nextcloud" = { hostPath = "/ssd1/Nextcloud/data"; isReadOnly = false; }; @@ -80,11 +80,7 @@ }; networking.firewall.allowedTCPPorts = [ 80 443 ]; - services.nginx = { - virtualHosts."192.168.100.15".listen = [ { addr = "0.0.0.0"; port = 80; } ]; - user = "nextcloud"; - group = "nextcloud"; - }; + services.nginx.virtualHosts."192.168.100.15".listen = [ { addr = "0.0.0.0"; port = 80; } ]; services.nextcloud = { enable = true; package = pkgs.nextcloud30; @@ -95,8 +91,7 @@ dbtype = "mysql"; }; https = true; - #datadir = "/etc/nextcloud/data"; - #home = "/etc/nextcloud/nextcloud_home"; + home = "/var/lib/nextcloud"; #appstoreEnable = true; extraApps = with config.services.nextcloud.package.packages.apps; { inherit mail contacts calendar tasks user_oidc;