diff --git a/configurations/host/valkyrie/secrets/private/default.nix b/configurations/host/valkyrie/secrets/private/default.nix index 70660dc..4a7c438 100644 Binary files a/configurations/host/valkyrie/secrets/private/default.nix and b/configurations/host/valkyrie/secrets/private/default.nix differ diff --git a/configurations/host/waffentrager/services/auth/lldap.nix b/configurations/host/waffentrager/services/auth/lldap.nix index 652ca37..65c2f4f 100644 --- a/configurations/host/waffentrager/services/auth/lldap.nix +++ b/configurations/host/waffentrager/services/auth/lldap.nix @@ -32,7 +32,6 @@ }; systemd.services.lldap = { - partOf = [ "elements-mount.service" ]; requires = [ "elements-mount.service" ]; after = [ "elements-mount.service" ]; serviceConfig = { diff --git a/configurations/host/waffentrager/services/nextcloud.nix b/configurations/host/waffentrager/services/nextcloud.nix index 05d91fa..0fde56a 100644 --- a/configurations/host/waffentrager/services/nextcloud.nix +++ b/configurations/host/waffentrager/services/nextcloud.nix @@ -41,6 +41,7 @@ inherit notify_push previewgenerator; }; settings = { + log_type = "file"; "profile.enabled" = true; default_phone_region = "PL"; trusted_proxies = [ materusArg.ips.valkyrie materusArg.ips.wireguard.valkyrie materusArg.ips.wireguard.waffentrager ]; @@ -81,7 +82,7 @@ "opcache.fast_shutdown" = "1"; "opcache.save_comments" = "1"; }; - phpExtraExtensions = ex: [ ex.zip ex.zlib ex.tidy ex.smbclient ]; + phpExtraExtensions = ex: [ ex.zip ex.zlib ex.tidy ex.smbclient ex.sodium ]; }; services.nginx.virtualHosts.${config.services.nextcloud.hostName} = { forceSSL = true; @@ -91,6 +92,10 @@ sslCertificate = "/var/lib/mnt_acme/materus.pl/fullchain.pem"; extraConfig = '' proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + dav_methods PUT DELETE MKCOL COPY MOVE; + dav_ext_methods PROPFIND OPTIONS; + create_full_put_path on; + dav_access user:rw group:rw all:r; ''; }; }; diff --git a/configurations/host/waffentrager/services/postgresql.nix b/configurations/host/waffentrager/services/postgresql.nix index 418c94e..ae97fe4 100644 --- a/configurations/host/waffentrager/services/postgresql.nix +++ b/configurations/host/waffentrager/services/postgresql.nix @@ -20,7 +20,6 @@ host all all ::1/128 scram-sha-256 ''; systemd.services.postgresql = { - partOf = [ "elements-mount.service" ]; requires = [ "elements-mount.service" ]; after = [ "elements-mount.service" ]; }; diff --git a/configurations/host/waffentrager/services/samba.nix b/configurations/host/waffentrager/services/samba.nix index 69a12e0..d13e5eb 100644 --- a/configurations/host/waffentrager/services/samba.nix +++ b/configurations/host/waffentrager/services/samba.nix @@ -10,12 +10,10 @@ waffentragerService.elements.enable = true; systemd.services.samba-nmbd = { - partOf = [ "elements-mount.service" ]; requires = [ "elements-mount.service" ]; after = [ "elements-mount.service" ]; }; systemd.services.samba-wsdd = { - partOf = [ "elements-mount.service" ]; requires = [ "elements-mount.service" ]; after = [ "elements-mount.service" ]; }; diff --git a/configurations/host/waffentrager/services/syncthing.nix b/configurations/host/waffentrager/services/syncthing.nix index 3381b29..958abfd 100644 --- a/configurations/host/waffentrager/services/syncthing.nix +++ b/configurations/host/waffentrager/services/syncthing.nix @@ -10,7 +10,6 @@ waffentragerService.elements.enable = true; networking.firewall.allowedTCPPorts = [ 22000 config.services.syncthing.relay.statusPort config.services.syncthing.relay.port]; networking.firewall.allowedUDPPorts = [ 22000 21027 ]; systemd.services.syncthing = { - partOf = [ "elements-mount.service" ]; requires = [ "elements-mount.service" ]; after = [ "elements-mount.service" ]; };