diff --git a/arr/extensions/freshrss-comicsinfeed b/arr/extensions/freshrss-comicsinfeed
deleted file mode 160000
index bc46489..0000000
--- a/arr/extensions/freshrss-comicsinfeed
+++ /dev/null
@@ -1 +0,0 @@
-Subproject commit bc4648940633919d5a8b7d6713a074d2a197b0a3
diff --git a/botc/.gitignore b/botc/.gitignore
index 4f8f2b3..4846d12 100644
--- a/botc/.gitignore
+++ b/botc/.gitignore
@@ -1 +1,2 @@
backup/*
+wordpress/*
\ No newline at end of file
diff --git a/botc/docker-compose.yml b/botc/docker-compose.yml
index e9a0581..1660143 100644
--- a/botc/docker-compose.yml
+++ b/botc/docker-compose.yml
@@ -21,12 +21,12 @@ services:
WORDPRESS_DB_USER: wordpress
WORDPRESS_DB_PASSWORD: ${DBPASS}
WORDPRESS_DB_NAME: clocktower
- VIRTUAL_HOST: "botc.${DOMAIN}, *.phillybotc.com, phillybotc.com"
- LETSENCRYPT_HOST: "botc.${DOMAIN}, *.phillybotc.com, phillybotc.com"
+ VIRTUAL_HOST: "www.phillybotc.com, phillybotc.com"
+ LETSENCRYPT_HOST: "phillybotc.com, www.phillybotc.com"
LETSENCRYPT_EMAIL: ${EMAIL}
- LETSENCRYPT_TEST: true
+ # LETSENCRYPT_TEST: true
volumes:
- - wordpress:/var/www/html
+ - ./wordpress:/var/www/html
- ./backup:/var/www/html/wp-content/updraft
volumes:
wordpress:
diff --git a/games/.env.example b/games/.env.example
new file mode 100644
index 0000000..cdadcff
--- /dev/null
+++ b/games/.env.example
@@ -0,0 +1,10 @@
+DOMAIN=example.com
+UID=1000
+GID=1000
+TZ=Etc/UTC
+CONFIG_LOCATION=./config
+DATA_LOCATION=./data
+EMAIL=example@mail.com
+DBUSER=example
+DBPASS=password
+RAWG_API_KEY=
\ No newline at end of file
diff --git a/games/.gitignore b/games/.gitignore
new file mode 100644
index 0000000..07f43b8
--- /dev/null
+++ b/games/.gitignore
@@ -0,0 +1 @@
+data/*
\ No newline at end of file
diff --git a/games/docker-compose.yml b/games/docker-compose.yml
new file mode 100644
index 0000000..7584472
--- /dev/null
+++ b/games/docker-compose.yml
@@ -0,0 +1,40 @@
+services:
+ gamevault-backend:
+ image: phalcode/gamevault-backend:latest
+ restart: unless-stopped
+ environment:
+ - PUID=${UID}
+ - PGID=${GID}
+ - DB_HOST=games-db-1
+ - DB_USERNAME=${DBUSER}
+ - DB_PASSWORD=${DBPASS}
+ - VIRTUAL_HOST=gamevault.${DOMAIN}
+ - LETSENCRYPT_HOST=gamevault.${DOMAIN}
+ - LETSENCRYPT_EMAIL=${EMAIL}
+ # Uncomment and insert your RAWG API Key here if you have one (http://rawg.io/login?forward=developer)
+ - RAWG_API_KEY=${RAWG_API_KEY}
+ volumes:
+ # Mount the folder where your games are
+ - ${DATA_LOCATION}:/files
+ # Mount the folder where GameVault should store its images
+ - ${DATA_LOCATION}/images:/images
+ expose:
+ - "8080"
+ ports:
+ - 8080:8080
+ db:
+ image: postgres:16
+ restart: unless-stopped
+ environment:
+ POSTGRES_USER: ${DBUSER}
+ POSTGRES_PASSWORD: ${DBPASS}
+ POSTGRES_DB: gamevault
+ volumes:
+ # Mount the folder where your PostgreSQL database files should land
+ - db:/var/lib/postgresql/data
+volumes:
+ db:
+networks:
+ default:
+ name: nginx-proxy
+ external: true
diff --git a/nextcloud/config_bak/.htaccess b/nextcloud/config_bak/.htaccess
new file mode 100755
index 0000000..13ca287
--- /dev/null
+++ b/nextcloud/config_bak/.htaccess
@@ -0,0 +1,25 @@
+# Section for Apache 2.4 to 2.6
+
+ Require all denied
+
+
+ Order Allow,Deny
+ Deny from all
+ Satisfy All
+
+
+# Section for Apache 2.2
+
+
+
+ Order Allow,Deny
+ Deny from all
+
+ Satisfy All
+
+
+
+# Section for Apache 2.2 to 2.6
+
+ IndexIgnore *
+
diff --git a/nextcloud/config_bak/apache-pretty-urls.config.php b/nextcloud/config_bak/apache-pretty-urls.config.php
new file mode 100755
index 0000000..72da1d8
--- /dev/null
+++ b/nextcloud/config_bak/apache-pretty-urls.config.php
@@ -0,0 +1,4 @@
+ '/',
+);
diff --git a/nextcloud/config_bak/apcu.config.php b/nextcloud/config_bak/apcu.config.php
new file mode 100755
index 0000000..69fed87
--- /dev/null
+++ b/nextcloud/config_bak/apcu.config.php
@@ -0,0 +1,4 @@
+ '\OC\Memcache\APCu',
+);
diff --git a/nextcloud/config_bak/apps.config.php b/nextcloud/config_bak/apps.config.php
new file mode 100755
index 0000000..4c37f72
--- /dev/null
+++ b/nextcloud/config_bak/apps.config.php
@@ -0,0 +1,15 @@
+ array (
+ 0 => array (
+ 'path' => OC::$SERVERROOT.'/apps',
+ 'url' => '/apps',
+ 'writable' => false,
+ ),
+ 1 => array (
+ 'path' => OC::$SERVERROOT.'/custom_apps',
+ 'url' => '/custom_apps',
+ 'writable' => true,
+ ),
+ ),
+);
diff --git a/nextcloud/config_bak/config.php b/nextcloud/config_bak/config.php
new file mode 100755
index 0000000..608226a
--- /dev/null
+++ b/nextcloud/config_bak/config.php
@@ -0,0 +1,69 @@
+ '/',
+ 'memcache.local' => '\\OC\\Memcache\\Redis',
+ 'redis' =>
+ array (
+ 'host' => '/run/redis/redis-server.sock',
+ 'port' => 0,
+ 'dbindex' => 0,
+ ),
+ 'apps_paths' =>
+ array (
+ 0 =>
+ array (
+ 'path' => '/var/www/html/apps',
+ 'url' => '/apps',
+ 'writable' => false,
+ ),
+ 1 =>
+ array (
+ 'path' => '/var/www/html/custom_apps',
+ 'url' => '/custom_apps',
+ 'writable' => true,
+ ),
+ ),
+ 'upgrade.disable-web' => true,
+ 'instanceid' => 'occ4ad33l771',
+ 'passwordsalt' => 'kI051jlRvY6dJ04p/FyraeWb0J/ZLk',
+ 'secret' => 'lUz/rBnWrn3GFW35ajeLFvjL89A9Mgwg3O/DZZZdx09hN3m4',
+ 'trusted_domains' =>
+ array (
+ 0 => 'nextcloud.brodin.rocks',
+ ),
+ 'datadirectory' => '/var/www/html/data',
+ 'dbtype' => 'mysql',
+ 'version' => '29.0.0.19',
+ 'overwrite.cli.url' => 'https://nextcloud.brodin.rocks',
+ 'overwriteprotocol' => 'https',
+ 'dbname' => 'nextcloud',
+ 'dbhost' => 'db',
+ 'dbport' => '',
+ 'dbtableprefix' => 'oc_',
+ 'mysql.utf8mb4' => true,
+ 'dbuser' => 'nextcloud',
+ 'dbpassword' => 'whiskey-wango-woxtrot',
+ 'installed' => true,
+ 'memories.exiftool' => '/var/www/html/custom_apps/memories/bin-ext/exiftool-amd64-glibc',
+ 'memories.vod.path' => '/var/www/html/custom_apps/memories/bin-ext/go-vod-amd64',
+ 'maintenance' => false,
+ 'memories.vod.ffmpeg' => '/usr/bin/ffmpeg',
+ 'memories.vod.ffprobe' => '/usr/bin/ffprobe',
+ 'enabledPreviewProviders' =>
+ array (
+ 0 => 'OC\\Preview\\Image',
+ 1 => 'OC\\Preview\\Movie',
+ ),
+ 'preview_max_x' => 4096,
+ 'preview_max_y' => 4096,
+ 'memories.gis_type' => 1,
+ 'mail_smtpmode' => 'smtp',
+ 'mail_smtpauth' => 1,
+ 'mail_sendmailmode' => 'smtp',
+ 'mail_from_address' => 'admin',
+ 'mail_domain' => 'brodin.rocks',
+ 'mail_smtphost' => 'smtp.sendgrid.net',
+ 'mail_smtpname' => 'apikey',
+ 'mail_smtppassword' => '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',
+ 'mail_smtpport' => '587',
+);
diff --git a/nextcloud/config_bak/config.sample.php b/nextcloud/config_bak/config.sample.php
new file mode 100755
index 0000000..2803344
--- /dev/null
+++ b/nextcloud/config_bak/config.sample.php
@@ -0,0 +1,2434 @@
+ 'd3c944a9a',
+ */
+'instanceid' => '',
+
+ /**
+ * The salt used to hash all passwords, auto-generated by the Nextcloud
+ * installer. (There are also per-user salts.) If you lose this salt you lose
+ * all your passwords. This example is for documentation only, and you should
+ * never use it.
+ *
+ * @deprecated This salt is deprecated and only used for legacy-compatibility,
+ * developers should *NOT* use this value for anything nowadays.
+ *
+ * 'passwordsalt' => 'd3c944a9af095aa08f',
+ */
+'passwordsalt' => '',
+
+/**
+ * Secret used by Nextcloud for various purposes, e.g. to encrypt data. If you
+ * lose this string there will be data corruption.
+ */
+'secret' => '',
+
+/**
+ * Your list of trusted domains that users can log into. Specifying trusted
+ * domains prevents host header poisoning. Do not remove this, as it performs
+ * necessary security checks.
+ * You can specify:
+ *
+ * - the exact hostname of your host or virtual host, e.g. demo.example.org.
+ * - the exact hostname with permitted port, e.g. demo.example.org:443.
+ * This disallows all other ports on this host
+ * - use * as a wildcard, e.g. ubos-raspberry-pi*.local will allow
+ * ubos-raspberry-pi.local and ubos-raspberry-pi-2.local
+ * - the IP address with or without permitted port, e.g. [2001:db8::1]:8080
+ * Using TLS certificates where commonName= is deprecated
+ */
+'trusted_domains' =>
+ [
+ 'demo.example.org',
+ 'otherdomain.example.org',
+ '10.111.112.113',
+ '[2001:db8::1]'
+ ],
+
+
+/**
+ * Where user files are stored. The SQLite database is also stored here, when
+ * you use SQLite.
+ *
+ * Default to ``data/`` in the Nextcloud directory.
+ */
+'datadirectory' => '/var/www/nextcloud/data',
+
+/**
+ * The current version number of your Nextcloud installation. This is set up
+ * during installation and update, so you shouldn't need to change it.
+ */
+'version' => '',
+
+/**
+ * Identifies the database used with this installation. See also config option
+ * ``supportedDatabases``
+ *
+ * Available:
+ * - sqlite3 (SQLite3)
+ * - mysql (MySQL/MariaDB)
+ * - pgsql (PostgreSQL)
+ *
+ * Defaults to ``sqlite3``
+ */
+'dbtype' => 'sqlite3',
+
+/**
+ * Your host server name, for example ``localhost``, ``hostname``,
+ * ``hostname.example.com``, or the IP address.
+ * To specify a port use ``hostname:####``, for IPv6 addresses use the URI notation ``[ip]:port``.
+ * To specify a Unix socket use ``/path/to/directory/containing/socket``, e.g. ``/run/postgresql/``.
+ */
+'dbhost' => '',
+
+/**
+ * The name of the Nextcloud database, which is set during installation. You
+ * should not need to change this.
+ */
+'dbname' => 'nextcloud',
+
+/**
+ * The user that Nextcloud uses to write to the database. This must be unique
+ * across Nextcloud instances using the same SQL database. This is set up during
+ * installation, so you shouldn't need to change it.
+ */
+'dbuser' => '',
+
+/**
+ * The password for the database user. This is set up during installation, so
+ * you shouldn't need to change it.
+ */
+'dbpassword' => '',
+
+/**
+ * Prefix for the Nextcloud tables in the database.
+ *
+ * Default to ``oc_``
+ */
+'dbtableprefix' => 'oc_',
+
+/**
+ * Enable persistent connexions to the database.
+ * This setting uses the "persistent" option from doctrine dbal, which in turn
+ * uses the PDO::ATTR_PERSISTENT option from the pdo driver.
+ */
+'dbpersistent' => '',
+
+/**
+ * Specify read only replicas to be used by Nextcloud when querying the database
+ */
+'dbreplica' => [
+ ['user' => 'nextcloud', 'password' => 'password1', 'host' => 'replica1', 'dbname' => ''],
+ ['user' => 'nextcloud', 'password' => 'password2', 'host' => 'replica2', 'dbname' => ''],
+],
+
+/**
+ * Indicates whether the Nextcloud instance was installed successfully; ``true``
+ * indicates a successful installation, and ``false`` indicates an unsuccessful
+ * installation.
+ *
+ * Defaults to ``false``
+ */
+'installed' => false,
+
+
+/**
+ * User Experience
+ *
+ * These optional parameters control some aspects of the user interface. Default
+ * values, where present, are shown.
+ */
+
+/**
+ * This sets the default language on your Nextcloud server, using ISO_639-1
+ * language codes such as ``en`` for English, ``de`` for German, and ``fr`` for
+ * French. The default_language parameter is only used, when the browser does
+ * not send any language, and the user hasn’t configured own language
+ * preferences.
+ *
+ * Nextcloud has two distinguished language codes for German, 'de' and 'de_DE'.
+ * 'de' is used for informal German and 'de_DE' for formal German. By setting
+ * this value to 'de_DE' you can enforce the formal version of German unless
+ * the user has chosen something different explicitly.
+ *
+ * Defaults to ``en``
+ */
+'default_language' => 'en',
+
+/**
+ * With this setting a language can be forced for all users. If a language is
+ * forced, the users are also unable to change their language in the personal
+ * settings. If users shall be unable to change their language, but users have
+ * different languages, this value can be set to ``true`` instead of a language
+ * code.
+ *
+ * Defaults to ``false``
+ */
+'force_language' => 'en',
+
+/**
+ * This sets the default locale on your Nextcloud server, using ISO_639
+ * language codes such as ``en`` for English, ``de`` for German, and ``fr`` for
+ * French, and ISO-3166 country codes such as ``GB``, ``US``, ``CA``, as defined
+ * in RFC 5646. It overrides automatic locale detection on public pages like
+ * login or shared items. User's locale preferences configured under "personal
+ * -> locale" override this setting after they have logged in.
+ *
+ * Defaults to ``en``
+ */
+'default_locale' => 'en_US',
+
+/**
+ * This sets the default region for phone numbers on your Nextcloud server,
+ * using ISO 3166-1 country codes such as ``DE`` for Germany, ``FR`` for France, …
+ * It is required to allow inserting phone numbers in the user profiles starting
+ * without the country code (e.g. +49 for Germany).
+ *
+ * No default value!
+ */
+'default_phone_region' => 'GB',
+
+/**
+ * With this setting a locale can be forced for all users. If a locale is
+ * forced, the users are also unable to change their locale in the personal
+ * settings. If users shall be unable to change their locale, but users have
+ * different languages, this value can be set to ``true`` instead of a locale
+ * code.
+ *
+ * Defaults to ``false``
+ */
+'force_locale' => 'en_US',
+
+/**
+ * This sets the default timezone on your Nextcloud server, using IANA
+ * identifiers like ``Europe/Berlin`` or ``Pacific/Auckland``. The default
+ * timezone parameter is only used when the timezone of the user can't be
+ * determined.
+ *
+ * Defaults to ``UTC``
+ */
+'default_timezone' => 'Europe/Berlin',
+
+/**
+ * ``true`` enables the Help menu item in the user menu (top right of the
+ * Nextcloud Web interface). ``false`` removes the Help item.
+ */
+'knowledgebaseenabled' => true,
+
+/**
+ * ``true`` embeds the documentation in an iframe inside Nextcloud.
+ * ``false`` only shows buttons to the online documentation.
+ */
+'knowledgebase.embedded' => false,
+
+/**
+ * ``true`` allows users to change their display names (on their Personal
+ * pages), and ``false`` prevents them from changing their display names.
+ */
+'allow_user_to_change_display_name' => true,
+
+/**
+ * The directory where the skeleton files are located. These files will be
+ * copied to the data directory of new users. Leave empty to not copy any
+ * skeleton files.
+ * ``{lang}`` can be used as a placeholder for the language of the user.
+ * If the directory does not exist, it falls back to non dialect (from ``de_DE``
+ * to ``de``). If that does not exist either, it falls back to ``default``
+ *
+ * Defaults to ``core/skeleton`` in the Nextcloud directory.
+ */
+'skeletondirectory' => '/path/to/nextcloud/core/skeleton',
+
+
+/**
+ * The directory where the template files are located. These files will be
+ * copied to the template directory of new users. Leave empty to not copy any
+ * template files.
+ * ``{lang}`` can be used as a placeholder for the language of the user.
+ * If the directory does not exist, it falls back to non dialect (from ``de_DE``
+ * to ``de``). If that does not exist either, it falls back to ``default``
+ *
+ * If this is not set creating a template directory will only happen if no custom
+ * ``skeletondirectory`` is defined, otherwise the shipped templates will be used
+ * to create a template directory for the user.
+ */
+'templatedirectory' => '/path/to/nextcloud/templates',
+
+/**
+ * User session
+ */
+
+/**
+ * Lifetime of the remember login cookie. This should be larger than the
+ * session_lifetime. If it is set to 0 remember me is disabled.
+ *
+ * Defaults to ``60*60*24*15`` seconds (15 days)
+ */
+'remember_login_cookie_lifetime' => 60*60*24*15,
+
+/**
+ * The lifetime of a session after inactivity.
+ *
+ * The maximum possible time is limited by the session.gc_maxlifetime php.ini setting
+ * which would overwrite this option if it is less than the value in the config.php
+ *
+ * Defaults to ``60*60*24`` seconds (24 hours)
+ */
+'session_lifetime' => 60 * 60 * 24,
+
+/**
+ * The timeout in seconds for requests to servers made by the DAV component (e.g., needed for federated shares).
+ */
+'davstorage.request_timeout' => 30,
+
+/**
+ * `true` enabled a relaxed session timeout, where the session timeout would no longer be
+ * handled by Nextcloud but by either the PHP garbage collection or the expiration of
+ * potential other session backends like redis.
+ *
+ * This may lead to sessions being available for longer than what session_lifetime uses but
+ * comes with performance benefits as sessions are no longer a locking operation for concurrent
+ * requests.
+ */
+'session_relaxed_expiry' => false,
+
+/**
+ * Enable or disable session keep-alive when a user is logged in to the Web UI.
+ * Enabling this sends a "heartbeat" to the server to keep it from timing out.
+ *
+ * Defaults to ``true``
+ */
+'session_keepalive' => true,
+
+/**
+ * Enable or disable the automatic logout after session_lifetime, even if session
+ * keepalive is enabled. This will make sure that an inactive browser will be logged out
+ * even if requests to the server might extend the session lifetime.
+ *
+ * Defaults to ``false``
+ */
+'auto_logout' => false,
+
+/**
+ * Enforce token authentication for clients, which blocks requests using the user
+ * password for enhanced security. Users need to generate tokens in personal settings
+ * which can be used as passwords on their clients.
+ *
+ * Defaults to ``false``
+ */
+'token_auth_enforced' => false,
+
+/**
+ * The interval at which token activity should be updated.
+ * Increasing this value means that the last activity on the security page gets
+ * more outdated.
+ *
+ * Tokens are still checked every 5 minutes for validity
+ * max value: 300
+ *
+ * Defaults to ``300``
+ */
+'token_auth_activity_update' => 60,
+
+/**
+ * Whether the brute force protection shipped with Nextcloud should be enabled or not.
+ *
+ * Disabling this is discouraged for security reasons.
+ *
+ * Defaults to ``true``
+ */
+'auth.bruteforce.protection.enabled' => true,
+
+/**
+ * Whether the brute force protection shipped with Nextcloud should be set to testing mode.
+ *
+ * In testing mode brute force attempts are still recorded, but the requests do
+ * not sleep/wait for the specified time. They will still abort with
+ * "429 Too Many Requests" when the maximum delay is reached.
+ * Enabling this is discouraged for security reasons
+ * and should only be done for debugging and on CI when running tests.
+ *
+ * Defaults to ``false``
+ */
+'auth.bruteforce.protection.testing' => false,
+
+/**
+ * Whether the rate limit protection shipped with Nextcloud should be enabled or not.
+ *
+ * Disabling this is discouraged for security reasons.
+ *
+ * Defaults to ``true``
+ */
+'ratelimit.protection.enabled' => true,
+
+/**
+ * By default, WebAuthn is available, but it can be explicitly disabled by admins
+ */
+'auth.webauthn.enabled' => true,
+
+/**
+ * Whether encrypted password should be stored in the database
+ *
+ * The passwords are only decrypted using the login token stored uniquely in the
+ * clients and allow to connect to external storages, autoconfigure mail account in
+ * the mail app and periodically check if the password it still valid.
+ *
+ * This might be desirable to disable this functionality when using one time
+ * passwords or when having a password policy enforcing long passwords (> 300
+ * characters).
+ *
+ * By default, the passwords are stored encrypted in the database.
+ *
+ * WARNING: If disabled, password changes on the user back-end (e.g. on LDAP) no
+ * longer log connected clients out automatically. Users can still disconnect
+ * the clients by deleting the app token from the security settings.
+ */
+'auth.storeCryptedPassword' => true,
+
+/**
+ * By default, the login form is always available. There are cases (SSO) where an
+ * admin wants to avoid users entering their credentials to the system if the SSO
+ * app is unavailable.
+ *
+ * This will show an error. But the direct login still works with adding ?direct=1
+ */
+'hide_login_form' => false,
+
+/**
+ * If your user backend does not allow password resets (e.g. when it's a
+ * read-only user backend like LDAP), you can specify a custom link, where the
+ * user is redirected to, when clicking the "reset password" link after a failed
+ * login-attempt.
+ * In case you do not want to provide any link, replace the url with 'disabled'
+ */
+'lost_password_link' => 'https://example.org/link/to/password/reset',
+
+/**
+ * URL to use as target for the logo link in the header (top-left logo)
+ *
+ * Defaults to the base URL of your Nextcloud instance
+ */
+'logo_url' => 'https://example.org',
+
+/**
+ * Mail Parameters
+ *
+ * These configure the email settings for Nextcloud notifications and password
+ * resets.
+ */
+
+/**
+ * The return address that you want to appear on emails sent by the Nextcloud
+ * server, for example ``nc-admin@example.com``, substituting your own domain,
+ * of course.
+ */
+'mail_domain' => 'example.com',
+
+/**
+ * FROM address that overrides the built-in ``sharing-noreply`` and
+ * ``lostpassword-noreply`` FROM addresses.
+ *
+ * Defaults to different from addresses depending on the feature.
+ */
+'mail_from_address' => 'nextcloud',
+
+/**
+ * Enable SMTP class debugging.
+ *
+ * Defaults to ``false``
+ */
+'mail_smtpdebug' => false,
+
+/**
+ * Which mode to use for sending mail: ``sendmail``, ``smtp`` or ``qmail``.
+ *
+ * If you are using local or remote SMTP, set this to ``smtp``.
+ *
+ * For the ``sendmail`` option you need an installed and working email system on
+ * the server, with ``/usr/sbin/sendmail`` installed on your Unix system.
+ *
+ * For ``qmail`` the binary is /var/qmail/bin/sendmail, and it must be installed
+ * on your Unix system.
+ *
+ * Defaults to ``smtp``
+ */
+'mail_smtpmode' => 'smtp',
+
+/**
+ * This depends on ``mail_smtpmode``. Specify the IP address of your mail
+ * server host. This may contain multiple hosts separated by a semicolon. If
+ * you need to specify the port number append it to the IP address separated by
+ * a colon, like this: ``127.0.0.1:24``.
+ *
+ * Defaults to ``127.0.0.1``
+ */
+'mail_smtphost' => '127.0.0.1',
+
+/**
+ * This depends on ``mail_smtpmode``. Specify the port for sending mail.
+ *
+ * Defaults to ``25``
+ */
+'mail_smtpport' => 25,
+
+/**
+ * This depends on ``mail_smtpmode``. This sets the SMTP server timeout, in
+ * seconds. You may need to increase this if you are running an anti-malware or
+ * spam scanner.
+ *
+ * Defaults to ``10`` seconds
+ */
+'mail_smtptimeout' => 10,
+
+/**
+ * This depends on ``mail_smtpmode``. Specify ``ssl`` when you are using SSL/TLS. Any other value will be ignored.
+ *
+ * If the server advertises STARTTLS capabilities, they might be used, but they cannot be enforced by
+ * this config option.
+ *
+ * Defaults to ``''`` (empty string)
+ */
+'mail_smtpsecure' => '',
+
+/**
+ *
+ * This depends on ``mail_smtpmode``. Change this to ``true`` if your mail
+ * server requires authentication.
+ *
+ * Defaults to ``false``
+ */
+'mail_smtpauth' => false,
+
+/**
+ * This depends on ``mail_smtpauth``. Specify the username for authenticating to
+ * the SMTP server.
+ *
+ * Defaults to ``''`` (empty string)
+ */
+'mail_smtpname' => '',
+
+/**
+ * This depends on ``mail_smtpauth``. Specify the password for authenticating to
+ * the SMTP server.
+ *
+ * Default to ``''`` (empty string)
+ */
+'mail_smtppassword' => '',
+
+/**
+ * Replaces the default mail template layout. This can be utilized if the
+ * options to modify the mail texts with the theming app is not enough.
+ * The class must extend ``\OC\Mail\EMailTemplate``
+ */
+'mail_template_class' => '\OC\Mail\EMailTemplate',
+
+/**
+ * Email will be sent by default with an HTML and a plain text body. This option
+ * allows to only send plain text emails.
+ */
+'mail_send_plaintext_only' => false,
+
+/**
+ * This depends on ``mail_smtpmode``. Array of additional streams options that
+ * will be passed to underlying Swift mailer implementation.
+ * Defaults to an empty array.
+ */
+'mail_smtpstreamoptions' => [],
+
+/**
+ * Which mode is used for sendmail/qmail: ``smtp`` or ``pipe``.
+ *
+ * For ``smtp`` the sendmail binary is started with the parameter ``-bs``:
+ * - Use the SMTP protocol on standard input and output.
+ *
+ * For ``pipe`` the binary is started with the parameters ``-t``:
+ * - Read message from STDIN and extract recipients.
+ *
+ * Defaults to ``smtp``
+ */
+'mail_sendmailmode' => 'smtp',
+
+/**
+ * Proxy Configurations
+ */
+
+/**
+ * The automatic hostname detection of Nextcloud can fail in certain reverse
+ * proxy and CLI/cron situations. This option allows you to manually override
+ * the automatic detection; for example ``www.example.com``, or specify the port
+ * ``www.example.com:8080``.
+ */
+'overwritehost' => '',
+
+/**
+ * When generating URLs, Nextcloud attempts to detect whether the server is
+ * accessed via ``https`` or ``http``. However, if Nextcloud is behind a proxy
+ * and the proxy handles the ``https`` calls, Nextcloud would not know that
+ * ``ssl`` is in use, which would result in incorrect URLs being generated.
+ * Valid values are ``http`` and ``https``.
+ */
+'overwriteprotocol' => '',
+
+/**
+ * Nextcloud attempts to detect the webroot for generating URLs automatically.
+ * For example, if ``www.example.com/nextcloud`` is the URL pointing to the
+ * Nextcloud instance, the webroot is ``/nextcloud``. When proxies are in use,
+ * it may be difficult for Nextcloud to detect this parameter, resulting in
+ * invalid URLs.
+ */
+'overwritewebroot' => '',
+
+/**
+ * This option allows you to define a manual override condition as a regular
+ * expression for the remote IP address. For example, defining a range of IP
+ * addresses starting with ``10.0.0.`` and ending with 1 to 3:
+ * ``^10\.0\.0\.[1-3]$``
+ *
+ * Defaults to ``''`` (empty string)
+ */
+'overwritecondaddr' => '',
+
+/**
+ * Use this configuration parameter to specify the base URL for any URLs which
+ * are generated within Nextcloud using any kind of command line tools (cron or
+ * occ). The value should contain the full base URL:
+ * ``https://www.example.com/nextcloud``
+ *
+ * Defaults to ``''`` (empty string)
+ */
+'overwrite.cli.url' => '',
+
+/**
+ * To have clean URLs without `/index.php` this parameter needs to be configured.
+ *
+ * This parameter will be written as "RewriteBase" on update and installation of
+ * Nextcloud to your `.htaccess` file. While this value is often simply the URL
+ * path of the Nextcloud installation it cannot be set automatically properly in
+ * every scenario and needs thus some manual configuration.
+ *
+ * In a standard Apache setup this usually equals the folder that Nextcloud is
+ * accessible at. So if Nextcloud is accessible via "https://mycloud.org/nextcloud"
+ * the correct value would most likely be "/nextcloud". If Nextcloud is running
+ * under "https://mycloud.org/" then it would be "/".
+ *
+ * Note that the above rule is not valid in every case, as there are some rare setup
+ * cases where this may not apply. However, to avoid any update problems this
+ * configuration value is explicitly opt-in.
+ *
+ * After setting this value run `occ maintenance:update:htaccess`. Now, when the
+ * following conditions are met Nextcloud URLs won't contain `index.php`:
+ *
+ * - `mod_rewrite` is installed
+ * - `mod_env` is installed
+ *
+ * Defaults to ``''`` (empty string)
+ */
+'htaccess.RewriteBase' => '/',
+
+/**
+ * For server setups, that don't have `mod_env` enabled or restricted (e.g. suEXEC)
+ * this parameter has to be set to true and will assume mod_rewrite.
+ *
+ * Please check, if `mod_rewrite` is active and functional before setting this
+ * parameter, and you updated your .htaccess with `occ maintenance:update:htaccess`.
+ * Otherwise, your nextcloud installation might not be reachable anymore.
+ * For example, try accessing resources by leaving out `index.php` in the URL.
+ */
+'htaccess.IgnoreFrontController' => false,
+
+/**
+ * The URL of your proxy server, for example ``proxy.example.com:8081``.
+ *
+ * Note: Guzzle (the http library used by Nextcloud) is reading the environment
+ * variables HTTP_PROXY (only for cli request), HTTPS_PROXY, and NO_PROXY by default.
+ *
+ * If you configure proxy with Nextcloud any default configuration by Guzzle
+ * is overwritten. Make sure to set ``proxyexclude`` accordingly if necessary.
+ *
+ * Defaults to ``''`` (empty string)
+ */
+'proxy' => '',
+
+/**
+ * The optional authentication for the proxy to use to connect to the internet.
+ * The format is: ``username:password``.
+ *
+ * Defaults to ``''`` (empty string)
+ */
+'proxyuserpwd' => '',
+
+/**
+ * List of host names that should not be proxied to.
+ * For example: ``['.mit.edu', 'foo.com']``.
+ *
+ * Hint: Use something like ``explode(',', getenv('NO_PROXY'))`` to sync this
+ * value with the global NO_PROXY option.
+ *
+ * Defaults to empty array.
+ */
+'proxyexclude' => [],
+
+/**
+ * Allow remote servers with local addresses e.g. in federated shares, webcal services and more
+ *
+ * Defaults to false
+ */
+'allow_local_remote_servers' => true,
+
+/**
+ * Deleted Items (trash bin)
+ *
+ * These parameters control the Deleted files app.
+ */
+
+/**
+ * If the trash bin app is enabled (default), this setting defines the policy
+ * for when files and folders in the trash bin will be permanently deleted.
+ * The app allows for two settings, a minimum time for trash bin retention,
+ * and a maximum time for trash bin retention.
+ *
+ * Minimum time is the number of days a file will be kept, after which it
+ * *may be* deleted. A file may be deleted after the minimum number of days
+ * is expired if space is needed. The file will not be deleted if space is
+ * not needed.
+ *
+ * Whether "space is needed" depends on whether a user quota is defined or not:
+ *
+ * * If no user quota is defined, the available space on the Nextcloud data
+ * partition sets the limit for the trashbin
+ * (issues: see https://github.com/nextcloud/server/issues/28451).
+ * * If a user quota is defined, 50% of the user's remaining quota space sets
+ * the limit for the trashbin.
+ *
+ * Maximum time is the number of days at which it is *guaranteed
+ * to be* deleted. There is no further dependency on the available space.
+ *
+ * Both minimum and maximum times can be set together to explicitly define
+ * file and folder deletion. For migration purposes, this setting is installed
+ * initially set to "auto", which is equivalent to the default setting in
+ * Nextcloud.
+ *
+ * Available values (D1 and D2 are configurable numbers):
+ *
+ * * ``auto``
+ * default setting. keeps files and folders in the trash bin for 30 days
+ * and automatically deletes anytime after that if space is needed (note:
+ * files may not be deleted if space is not needed).
+ * * ``D1, auto``
+ * keeps files and folders in the trash bin for D1+ days, delete anytime if
+ * space needed (note: files may not be deleted if space is not needed)
+ * * ``auto, D2``
+ * delete all files in the trash bin that are older than D2 days
+ * automatically, delete other files anytime if space needed
+ * * ``D1, D2``
+ * keep files and folders in the trash bin for at least D1 days and
+ * delete when exceeds D2 days (note: files will not be deleted automatically if space is needed)
+ * * ``disabled``
+ * trash bin auto clean disabled, files and folders will be kept forever
+ *
+ * Defaults to ``auto``
+ */
+'trashbin_retention_obligation' => 'auto',
+
+
+/**
+ * File versions
+ *
+ * These parameters control the Versions app.
+ */
+
+/**
+ * If the versions app is enabled (default), this setting defines the policy
+ * for when versions will be permanently deleted.
+ * The app allows for two settings, a minimum time for version retention,
+ * and a maximum time for version retention.
+ * Minimum time is the number of days a version will be kept, after which it
+ * may be deleted. Maximum time is the number of days at which it is guaranteed
+ * to be deleted.
+ * Both minimum and maximum times can be set together to explicitly define
+ * version deletion. For migration purposes, this setting is installed
+ * initially set to "auto", which is equivalent to the default setting in
+ * Nextcloud.
+ *
+ * Available values:
+ *
+ * * ``auto``
+ * default setting. Automatically expire versions according to expire
+ * rules. Please refer to :doc:`../configuration_files/file_versioning` for
+ * more information.
+ * * ``D, auto``
+ * keep versions at least for D days, apply expiration rules to all versions
+ * that are older than D days
+ * * ``auto, D``
+ * delete all versions that are older than D days automatically, delete
+ * other versions according to expire rules
+ * * ``D1, D2``
+ * keep versions for at least D1 days and delete when exceeds D2 days
+ * * ``disabled``
+ * versions auto clean disabled, versions will be kept forever
+ *
+ * Defaults to ``auto``
+ */
+'versions_retention_obligation' => 'auto',
+
+/**
+ * Nextcloud Verifications
+ *
+ * Nextcloud performs several verification checks. There are two options,
+ * ``true`` and ``false``.
+ */
+
+/**
+ * Checks an app before install whether it uses private APIs instead of the
+ * proper public APIs. If this is set to true it will only allow to install or
+ * enable apps that pass this check.
+ *
+ * Defaults to ``false``
+ */
+'appcodechecker' => true,
+
+/**
+ * Check if Nextcloud is up-to-date and shows a notification if a new version is
+ * available. It sends current version, php version, installation and last update
+ * time and release channel to the updater server which responds with the latest
+ * available version based on those metrics.
+ *
+ * Defaults to ``true``
+ */
+'updatechecker' => true,
+
+/**
+ * URL that Nextcloud should use to look for updates
+ *
+ * Defaults to ``https://updates.nextcloud.com/updater_server/``
+ */
+'updater.server.url' => 'https://updates.nextcloud.com/updater_server/',
+
+/**
+ * The channel that Nextcloud should use to look for updates
+ *
+ * Supported values:
+ *
+ * - ``daily``
+ * - ``beta``
+ * - ``stable``
+ */
+'updater.release.channel' => 'stable',
+
+/**
+ * Is Nextcloud connected to the Internet or running in a closed network?
+ *
+ * Defaults to ``true``
+ */
+'has_internet_connection' => true,
+
+/**
+ * Which domains to request to determine the availability of an Internet
+ * connection. If none of these hosts are reachable, the administration panel
+ * will show a warning. Set to an empty list to not do any such checks (warning
+ * will still be shown).
+ * If no protocol is provided, both http and https will be tested.
+ * For example, 'http://www.nextcloud.com' and 'https://www.nextcloud.com'
+ * will be tested for 'www.nextcloud.com'
+ * If a protocol is provided, only this one will be tested.
+ *
+ * Defaults to the following domains:
+ *
+ * - www.nextcloud.com
+ * - www.startpage.com
+ * - www.eff.org
+ * - www.edri.org
+ */
+'connectivity_check_domains' => [
+ 'www.nextcloud.com',
+ 'www.startpage.com',
+ 'www.eff.org',
+ 'www.edri.org'
+],
+
+/**
+ * Allows Nextcloud to verify a working .well-known URL redirects. This is done
+ * by attempting to make a request from JS to
+ * https://your-domain.com/.well-known/caldav/
+ *
+ * Defaults to ``true``
+ */
+'check_for_working_wellknown_setup' => true,
+
+/**
+ * This is a crucial security check on Apache servers that should always be set
+ * to ``true``. This verifies that the ``.htaccess`` file is writable and works.
+ * If it is not, then any options controlled by ``.htaccess``, such as large
+ * file uploads, will not work. It also runs checks on the ``data/`` directory,
+ * which verifies that it can't be accessed directly through the Web server.
+ *
+ * Defaults to ``true``
+ */
+'check_for_working_htaccess' => true,
+
+/**
+ * In rare setups (e.g. on Openshift or Docker on Windows) the permissions check
+ * might block the installation while the underlying system offers no means to
+ * "correct" the permissions. In this case, set the value to false.
+ *
+ * In regular cases, if issues with permissions are encountered they should be
+ * adjusted accordingly. Changing the flag is discouraged.
+ *
+ * Defaults to ``true``
+ */
+'check_data_directory_permissions' => true,
+
+/**
+ * In certain environments it is desired to have a read-only configuration file.
+ * When this switch is set to ``true``, writing to the config file will be
+ * forbidden. Therefore, it will not be possible to configure all options via
+ * the Web interface. Furthermore, when updating Nextcloud it is required to
+ * make the configuration file writable again and to set this switch to ``false``
+ * for the update process.
+ *
+ * Defaults to ``false``
+ */
+'config_is_read_only' => false,
+
+/**
+ * Logging
+ */
+
+/**
+ * This parameter determines where the Nextcloud logs are sent.
+ * ``file``: the logs are written to file ``nextcloud.log`` in the default
+ * Nextcloud data directory. The log file can be changed with parameter
+ * ``logfile``.
+ * ``syslog``: the logs are sent to the system log. This requires a syslog daemon
+ * to be active.
+ * ``errorlog``: the logs are sent to the PHP ``error_log`` function.
+ * ``systemd``: the logs are sent to the Systemd journal. This requires a system
+ * that runs Systemd and the Systemd journal. The PHP extension ``systemd``
+ * must be installed and active.
+ *
+ * Defaults to ``file``
+ */
+'log_type' => 'file',
+
+/**
+ * This parameter determines where the audit logs are sent. See ``log_type`` for more information.
+ *
+ * Defaults to ``file``
+ */
+'log_type_audit' => 'file',
+
+/**
+ * Name of the file to which the Nextcloud logs are written if parameter
+ * ``log_type`` is set to ``file``.
+ *
+ * Defaults to ``[datadirectory]/nextcloud.log``
+ */
+'logfile' => '/var/log/nextcloud.log',
+
+/**
+ * Name of the file to which the audit logs are written if parameter
+ * ``log_type`` is set to ``file``.
+ *
+ * Defaults to ``[datadirectory]/audit.log``
+ */
+'logfile_audit' => '/var/log/audit.log',
+
+/**
+ * Log file mode for the Nextcloud logging type in octal notation.
+ *
+ * Defaults to 0640 (writeable by user, readable by group).
+ */
+'logfilemode' => 0640,
+
+/**
+ * Loglevel to start logging at. Valid values are: 0 = Debug, 1 = Info, 2 =
+ * Warning, 3 = Error, and 4 = Fatal. The default value is Warning.
+ *
+ * Defaults to ``2``
+ */
+'loglevel' => 2,
+
+/**
+ * Loglevel used by the frontend to start logging at. The same values as
+ * for ``loglevel`` can be used. If not set it defaults to the value
+ * configured for ``loglevel`` or Warning if that is not set either.
+ *
+ * Defaults to ``2``
+ */
+'loglevel_frontend' => 2,
+
+/**
+ * Loglevel used by the dirty database query detection. Useful to identify
+ * potential database bugs in production. Set this to loglevel or higher to
+ * see dirty queries in the logs.
+ *
+ * Defaults to ``0`` (debug)
+ */
+'loglevel_dirty_database_queries' => 0,
+
+/**
+ * If you maintain different instances and aggregate the logs, you may want
+ * to distinguish between them. ``syslog_tag`` can be set per instance
+ * with a unique id. Only available if ``log_type`` is set to ``syslog`` or
+ * ``systemd``.
+ *
+ * The default value is ``Nextcloud``.
+ */
+'syslog_tag' => 'Nextcloud',
+
+/**
+ * If you maintain different instances and aggregate the logs, you may want
+ * to distinguish between them. ``syslog_tag_audit`` can be set per instance
+ * with a unique id. Only available if ``log_type`` is set to ``syslog`` or
+ * ``systemd``.
+ *
+ * The default value is the value of ``syslog_tag``.
+ */
+'syslog_tag_audit' => 'Nextcloud',
+
+/**
+ * Log condition for log level increase based on conditions. Once one of these
+ * conditions is met, the required log level is set to debug. This allows to
+ * debug specific requests, users or apps
+ *
+ * Supported conditions:
+ * - ``shared_secret``: if a request parameter with the name `log_secret` is set to
+ * this value the condition is met
+ * - ``users``: if the current request is done by one of the specified users,
+ * this condition is met
+ * - ``apps``: if the log message is invoked by one of the specified apps,
+ * this condition is met
+ *
+ * Defaults to an empty array.
+ */
+'log.condition' => [
+ 'shared_secret' => '57b58edb6637fe3059b3595cf9c41b9',
+ 'users' => ['sample-user'],
+ 'apps' => ['files'],
+],
+
+/**
+ * Enables logging a backtrace with each log line. Normally, only Exceptions
+ * are carrying backtrace information which are logged automatically. This
+ * switch turns them on for any log message. Enabling this option will lead
+ * to increased log data size.
+ *
+ * Defaults to ``false``.
+ */
+'log.backtrace' => false,
+
+/**
+ * This uses PHP.date formatting; see https://www.php.net/manual/en/function.date.php
+ *
+ * Defaults to ISO 8601 ``2005-08-15T15:52:01+00:00`` - see \DateTime::ATOM
+ * (https://www.php.net/manual/en/class.datetime.php#datetime.constants.atom)
+ */
+'logdateformat' => 'F d, Y H:i:s',
+
+/**
+ * The timezone for logfiles. You may change this; see
+ * https://www.php.net/manual/en/timezones.php
+ *
+ * Defaults to ``UTC``
+ */
+'logtimezone' => 'Europe/Berlin',
+
+/**
+ * Append all database queries and parameters to the log file. Use this only for
+ * debugging, as your logfile will become huge.
+ */
+'log_query' => false,
+
+/**
+ * Enables log rotation and limits the total size of logfiles. Set it to 0 for
+ * no rotation. Specify a size in bytes, for example 104857600 (100 megabytes
+ * = 100 * 1024 * 1024 bytes). A new logfile is created with a new name when the
+ * old logfile reaches your limit. If a rotated log file is already present, it
+ * will be overwritten.
+ *
+ * Defaults to 100 MB
+ */
+'log_rotate_size' => 100 * 1024 * 1024,
+
+/**
+ * Enable built-in profiler. Helpful when trying to debug performance
+ * issues.
+ *
+ * Note that this has a performance impact and shouldn't be enabled
+ * on production.
+ */
+'profiler' => false,
+
+/**
+ * Alternate Code Locations
+ *
+ * Some Nextcloud code may be stored in alternate locations.
+ */
+
+/**
+ * This section is for configuring the download links for Nextcloud clients, as
+ * seen in the first-run wizard and on Personal pages.
+ *
+ * Defaults to:
+ *
+ * - Desktop client: ``https://nextcloud.com/install/#install-clients``
+ * - Android client: ``https://play.google.com/store/apps/details?id=com.nextcloud.client``
+ * - iOS client: ``https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8``
+ * - iOS client app id: ``1125420102``
+ */
+'customclient_desktop' =>
+ 'https://nextcloud.com/install/#install-clients',
+'customclient_android' =>
+ 'https://play.google.com/store/apps/details?id=com.nextcloud.client',
+'customclient_ios' =>
+ 'https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8',
+'customclient_ios_appid' =>
+ '1125420102',
+/**
+ * Apps
+ *
+ * Options for the Apps folder, Apps store, and App code checker.
+ */
+
+/**
+ * Set the default app to open on login. Use the app names as they appear in the
+ * URL after clicking them in the Apps menu, such as documents, calendar, and
+ * gallery. You can use a comma-separated list of app names, so if the first
+ * app is not enabled for a user then Nextcloud will try the second one, and so
+ * on. If no enabled apps are found it defaults to the dashboard app.
+ *
+ * Defaults to ``dashboard,files``
+ */
+'defaultapp' => 'dashboard,files',
+
+/**
+ * When enabled, admins may install apps from the Nextcloud app store.
+ *
+ * Defaults to ``true``
+ */
+'appstoreenabled' => true,
+
+/**
+ * Enables the installation of apps from a self-hosted apps store.
+ * Requires that at least one of the configured apps directories is writeable.
+ *
+ * Defaults to ``https://apps.nextcloud.com/api/v1``
+ */
+'appstoreurl' => 'https://apps.nextcloud.com/api/v1',
+
+/**
+ * Filters allowed installable apps from the appstore.
+ * Empty array will prevent all apps from the store to be found.
+ */
+'appsallowlist' => [],
+
+/**
+ * Use the ``apps_paths`` parameter to set the location of the Apps directory,
+ * which should be scanned for available apps, and where user-specific apps
+ * should be installed from the Apps store. The ``path`` defines the absolute
+ * file system path to the app folder. The key ``url`` defines the HTTP Web path
+ * to that folder, starting from the Nextcloud webroot. The key ``writable``
+ * indicates if a Web server can write files to that folder.
+ */
+'apps_paths' => [
+ [
+ 'path'=> '/var/www/nextcloud/apps',
+ 'url' => '/apps',
+ 'writable' => true,
+ ],
+],
+
+/**
+ * @see appcodechecker
+ */
+
+/**
+ * Previews
+ *
+ * Nextcloud supports previews of image files, the covers of MP3 files, and text
+ * files. These options control enabling and disabling previews, and thumbnail
+ * size.
+ */
+
+/**
+ * By default, Nextcloud can generate previews for the following filetypes:
+ *
+ * - Image files
+ * - Covers of MP3 files
+ * - Text documents
+ *
+ * Valid values are ``true``, to enable previews, or
+ * ``false``, to disable previews
+ *
+ * Defaults to ``true``
+ */
+'enable_previews' => true,
+
+/**
+ * Number of all preview requests being processed concurrently,
+ * including previews that need to be newly generated, and those that have
+ * been generated.
+ *
+ * This should be greater than 'preview_concurrency_new'.
+ * If unspecified, defaults to twice the value of 'preview_concurrency_new'.
+ */
+'preview_concurrency_all' => 8,
+
+/**
+ * Number of new previews that are being concurrently generated.
+ *
+ * Depending on the max preview size set by 'preview_max_x' and 'preview_max_y',
+ * the generation process can consume considerable CPU and memory resources.
+ * It's recommended to limit this to be no greater than the number of CPU cores.
+ * If unspecified, defaults to the number of CPU cores, or 4 if that cannot
+ * be determined.
+ */
+'preview_concurrency_new' => 4,
+
+/**
+ * The maximum width, in pixels, of a preview. A value of ``null`` means there
+ * is no limit.
+ *
+ * Defaults to ``4096``
+ */
+'preview_max_x' => 4096,
+/**
+ * The maximum height, in pixels, of a preview. A value of ``null`` means there
+ * is no limit.
+ *
+ * Defaults to ``4096``
+ */
+'preview_max_y' => 4096,
+
+/**
+ * Max file size for generating image previews with imagegd (default behavior).
+ * If the image is bigger, it'll try other preview generators, but will most
+ * likely either show the default mimetype icon or not display the image at all.
+ * Set to ``-1`` for no limit and try to generate image previews on all file sizes.
+ *
+ * Defaults to ``50`` megabytes
+ */
+'preview_max_filesize_image' => 50,
+
+/**
+ * max memory for generating image previews with imagegd (default behavior)
+ * Reads the image dimensions from the header and assumes 32 bits per pixel.
+ * If creating the image would allocate more memory, preview generation will
+ * be disabled and the default mimetype icon is shown. Set to -1 for no limit.
+ *
+ * Defaults to ``256`` megabytes
+ */
+'preview_max_memory' => 256,
+
+/**
+ * custom path for LibreOffice/OpenOffice binary
+ *
+ *
+ * Defaults to ``''`` (empty string)
+ */
+'preview_libreoffice_path' => '/usr/bin/libreoffice',
+
+/**
+ * custom path for ffmpeg binary
+ *
+ * Defaults to ``null`` and falls back to searching ``avconv`` and ``ffmpeg`` in the configured ``PATH`` environment
+ */
+'preview_ffmpeg_path' => '/usr/bin/ffmpeg',
+
+/**
+ * Set the URL of the Imaginary service to send image previews to.
+ * Also requires the ``OC\Preview\Imaginary`` provider to be enabled.
+ *
+ * See https://github.com/h2non/imaginary
+ */
+'preview_imaginary_url' => 'http://previews_hpb:8088/',
+
+/**
+ * If you want set a api key for imaginary.
+ */
+'preview_imaginary_key' => 'secret',
+
+/**
+ * Only register providers that have been explicitly enabled
+ *
+ * The following providers are disabled by default due to performance or privacy
+ * concerns:
+ *
+ * - ``OC\Preview\Font``
+ * - ``OC\Preview\HEIC``
+ * - ``OC\Preview\Illustrator``
+ * - ``OC\Preview\Movie``
+ * - ``OC\Preview\MSOffice2003``
+ * - ``OC\Preview\MSOffice2007``
+ * - ``OC\Preview\MSOfficeDoc``
+ * - ``OC\Preview\PDF``
+ * - ``OC\Preview\Photoshop``
+ * - ``OC\Preview\Postscript``
+ * - ``OC\Preview\StarOffice``
+ * - ``OC\Preview\SVG``
+ * - ``OC\Preview\TIFF``
+ * - ``OC\Preview\EMF``
+ *
+ *
+ * Defaults to the following providers:
+ *
+ * - ``OC\Preview\BMP``
+ * - ``OC\Preview\GIF``
+ * - ``OC\Preview\JPEG``
+ * - ``OC\Preview\Krita``
+ * - ``OC\Preview\MarkDown``
+ * - ``OC\Preview\MP3``
+ * - ``OC\Preview\OpenDocument``
+ * - ``OC\Preview\PNG``
+ * - ``OC\Preview\TXT``
+ * - ``OC\Preview\XBitmap``
+ */
+'enabledPreviewProviders' => [
+ 'OC\Preview\BMP',
+ 'OC\Preview\GIF',
+ 'OC\Preview\JPEG',
+ 'OC\Preview\Krita',
+ 'OC\Preview\MarkDown',
+ 'OC\Preview\MP3',
+ 'OC\Preview\OpenDocument',
+ 'OC\Preview\PNG',
+ 'OC\Preview\TXT',
+ 'OC\Preview\XBitmap',
+],
+
+/**
+ * LDAP
+ *
+ * Global settings used by LDAP User and Group Backend
+ */
+
+/**
+ * defines the interval in minutes for the background job that checks user
+ * existence and marks them as ready to be cleaned up. The number is always
+ * minutes. Setting it to 0 disables the feature.
+ * See command line (occ) methods ``ldap:show-remnants`` and ``user:delete``
+ *
+ * Defaults to ``51`` minutes
+ */
+'ldapUserCleanupInterval' => 51,
+
+/**
+ * Sort groups in the user settings by name instead of the user count
+ *
+ * By enabling this the user count beside the group name is disabled as well.
+ * @deprecated since Nextcloud 29 - Use the frontend instead or set the app config value `group.sortBy` for `core` to `2`
+ */
+'sort_groups_by_name' => false,
+
+/**
+ * Comments
+ *
+ * Global settings for the Comments infrastructure
+ */
+
+/**
+ * Replaces the default Comments Manager Factory. This can be utilized if an
+ * own or 3rdParty CommentsManager should be used that – for instance – uses the
+ * filesystem instead of the database to keep the comments.
+ *
+ * Defaults to ``\OC\Comments\ManagerFactory``
+ */
+'comments.managerFactory' => '\OC\Comments\ManagerFactory',
+
+/**
+ * Replaces the default System Tags Manager Factory. This can be utilized if an
+ * own or 3rdParty SystemTagsManager should be used that – for instance – uses the
+ * filesystem instead of the database to keep the tags.
+ *
+ * Defaults to ``\OC\SystemTag\ManagerFactory``
+ */
+'systemtags.managerFactory' => '\OC\SystemTag\ManagerFactory',
+
+/**
+ * Maintenance
+ *
+ * These options are for halting user activity when you are performing server
+ * maintenance.
+ */
+
+/**
+ * Enable maintenance mode to disable Nextcloud
+ *
+ * If you want to prevent users from logging in to Nextcloud before you start
+ * doing some maintenance work, you need to set the value of the maintenance
+ * parameter to true. Please keep in mind that users who are already logged-in
+ * are kicked out of Nextcloud instantly.
+ *
+ * Defaults to ``false``
+ */
+'maintenance' => false,
+
+/**
+ * UTC Hour for maintenance windows
+ *
+ * Some background jobs only run once a day. When an hour is defined for this config,
+ * the background jobs which advertise themselves as not time sensitive will be
+ * delayed during the "working" hours and only run in the 4 hours after the given time.
+ * This is e.g. used for activity expiration, suspicious login training and update checks.
+ *
+ * A value of 1 e.g. will only run these background jobs between 01:00am UTC and 05:00am UTC.
+ *
+ * Defaults to ``100`` which disables the feature
+ */
+'maintenance_window_start' => 1,
+
+/**
+ * Log all LDAP requests into a file
+ *
+ * Warning: This heavily decreases the performance of the server and is only
+ * meant to debug/profile the LDAP interaction manually.
+ * Also, it might log sensitive data into a plain text file.
+ */
+'ldap_log_file' => '',
+
+/**
+ * SSL
+ */
+
+/**
+ * Extra SSL options to be used for configuration.
+ *
+ * Defaults to an empty array.
+ */
+'openssl' => [
+ 'config' => '/absolute/location/of/openssl.cnf',
+],
+
+/**
+ * Memory caching backend configuration
+ *
+ * Available cache backends:
+ *
+ * * ``\OC\Memcache\APCu`` APC user backend
+ * * ``\OC\Memcache\ArrayCache`` In-memory array-based backend (not recommended)
+ * * ``\OC\Memcache\Memcached`` Memcached backend
+ * * ``\OC\Memcache\Redis`` Redis backend
+ *
+ * Advice on choosing between the various backends:
+ *
+ * * APCu should be easiest to install. Almost all distributions have packages.
+ * Use this for single user environment for all caches.
+ * * Use Redis or Memcached for distributed environments.
+ * For the local cache (you can configure two) take APCu.
+ */
+
+/**
+ * Memory caching backend for locally stored data
+ *
+ * * Used for host-specific data, e.g. file paths
+ *
+ * Defaults to ``none``
+ */
+'memcache.local' => '\OC\Memcache\APCu',
+
+/**
+ * Memory caching backend for distributed data
+ *
+ * * Used for installation-specific data, e.g. database caching
+ * * If unset, defaults to the value of memcache.local
+ *
+ * Defaults to ``none``
+ */
+'memcache.distributed' => '\OC\Memcache\Memcached',
+
+/**
+ * Connection details for redis to use for memory caching in a single server configuration.
+ *
+ * For enhanced security it is recommended to configure Redis
+ * to require a password. See http://redis.io/topics/security
+ * for more information.
+ *
+ * We also support redis SSL/TLS encryption as of version 6.
+ * See https://redis.io/topics/encryption for more information.
+ */
+'redis' => [
+ 'host' => 'localhost', // can also be a unix domain socket: '/tmp/redis.sock'
+ 'port' => 6379,
+ 'timeout' => 0.0,
+ 'read_timeout' => 0.0,
+ 'user' => '', // Optional: if not defined, no password will be used.
+ 'password' => '', // Optional: if not defined, no password will be used.
+ 'dbindex' => 0, // Optional: if undefined SELECT will not run and will use Redis Server's default DB Index.
+ // If redis in-transit encryption is enabled, provide certificates
+ // SSL context https://www.php.net/manual/en/context.ssl.php
+ 'ssl_context' => [
+ 'local_cert' => '/certs/redis.crt',
+ 'local_pk' => '/certs/redis.key',
+ 'cafile' => '/certs/ca.crt'
+ ]
+],
+
+/**
+ * Connection details for a Redis Cluster.
+ *
+ * Redis Cluster support requires the php module phpredis in version 3.0.0 or
+ * higher.
+ *
+ * Available failover modes:
+ * - \RedisCluster::FAILOVER_NONE - only send commands to master nodes (default)
+ * - \RedisCluster::FAILOVER_ERROR - failover to slaves for read commands if master is unavailable (recommended)
+ * - \RedisCluster::FAILOVER_DISTRIBUTE - randomly distribute read commands across master and slaves
+ *
+ * WARNING: FAILOVER_DISTRIBUTE is a not recommended setting, and we strongly
+ * suggest to not use it if you use Redis for file locking. Due to the way Redis
+ * is synchronized it could happen, that the read for an existing lock is
+ * scheduled to a slave that is not fully synchronized with the connected master
+ * which then causes a FileLocked exception.
+ *
+ * See https://redis.io/topics/cluster-spec for details about the Redis cluster
+ *
+ * Authentication works with phpredis version 4.2.1+. See
+ * https://github.com/phpredis/phpredis/commit/c5994f2a42b8a348af92d3acb4edff1328ad8ce1
+ */
+'redis.cluster' => [
+ 'seeds' => [ // provide some or all of the cluster servers to bootstrap discovery, port required
+ 'localhost:7000',
+ 'localhost:7001',
+ ],
+ 'timeout' => 0.0,
+ 'read_timeout' => 0.0,
+ 'failover_mode' => \RedisCluster::FAILOVER_ERROR,
+ 'user' => '', // Optional: if not defined, no password will be used.
+ 'password' => '', // Optional: if not defined, no password will be used.
+ // If redis in-transit encryption is enabled, provide certificates
+ // SSL context https://www.php.net/manual/en/context.ssl.php
+ 'ssl_context' => [
+ 'local_cert' => '/certs/redis.crt',
+ 'local_pk' => '/certs/redis.key',
+ 'cafile' => '/certs/ca.crt'
+ ]
+],
+
+
+/**
+ * Server details for one or more memcached servers to use for memory caching.
+ */
+'memcached_servers' => [
+ // hostname, port and optional weight
+ // or path and port 0 for unix socket. Also see:
+ // https://www.php.net/manual/en/memcached.addservers.php
+ // https://www.php.net/manual/en/memcached.addserver.php
+ ['localhost', 11211],
+ //array('other.host.local', 11211),
+],
+
+/**
+ * Connection options for memcached
+ */
+'memcached_options' => [
+ // Set timeouts to 50ms
+ \Memcached::OPT_CONNECT_TIMEOUT => 50,
+ \Memcached::OPT_RETRY_TIMEOUT => 50,
+ \Memcached::OPT_SEND_TIMEOUT => 50,
+ \Memcached::OPT_RECV_TIMEOUT => 50,
+ \Memcached::OPT_POLL_TIMEOUT => 50,
+
+ // Enable compression
+ \Memcached::OPT_COMPRESSION => true,
+
+ // Turn on consistent hashing
+ \Memcached::OPT_LIBKETAMA_COMPATIBLE => true,
+
+ // Enable Binary Protocol
+ \Memcached::OPT_BINARY_PROTOCOL => true,
+
+ // Binary serializer vill be enabled if the igbinary PECL module is available
+ //\Memcached::OPT_SERIALIZER => \Memcached::SERIALIZER_IGBINARY,
+],
+
+
+/**
+ * Location of the cache folder, defaults to ``data/$user/cache`` where
+ * ``$user`` is the current user. When specified, the format will change to
+ * ``$cache_path/$user`` where ``$cache_path`` is the configured cache directory
+ * and ``$user`` is the user.
+ *
+ * Defaults to ``''`` (empty string)
+ */
+'cache_path' => '',
+
+/**
+ * TTL of chunks located in the cache folder before they're removed by
+ * garbage collection (in seconds). Increase this value if users have
+ * issues uploading very large files via the Nextcloud Client as upload isn't
+ * completed within one day.
+ *
+ * Defaults to ``60*60*24`` (1 day)
+ */
+'cache_chunk_gc_ttl' => 60*60*24,
+
+/**
+ * Using Object Store with Nextcloud
+ */
+
+/**
+ * This example shows how to configure Nextcloud to store all files in a
+ * swift object storage.
+ *
+ * It is important to note that Nextcloud in object store mode will expect
+ * exclusive access to the object store container because it only stores the
+ * binary data for each file. The metadata is currently kept in the local
+ * database for performance reasons.
+ *
+ * WARNING: The current implementation is incompatible with any app that uses
+ * direct file IO and circumvents our virtual filesystem. That includes
+ * Encryption and Gallery. Gallery will store thumbnails directly in the
+ * filesystem and encryption will cause severe overhead because key files need
+ * to be fetched in addition to any requested file.
+ *
+ */
+'objectstore' => [
+ 'class' => 'OC\\Files\\ObjectStore\\Swift',
+ 'arguments' => [
+ // trystack will use your facebook id as the username
+ 'username' => 'facebook100000123456789',
+ // in the trystack dashboard go to user -> settings -> API Password to
+ // generate a password
+ 'password' => 'Secr3tPaSSWoRdt7',
+ // must already exist in the objectstore, name can be different
+ 'container' => 'nextcloud',
+ // prefix to prepend to the fileid, default is 'oid:urn:'
+ 'objectPrefix' => 'oid:urn:',
+ // create the container if it does not exist. default is false
+ 'autocreate' => true,
+ // required, dev-/trystack defaults to 'RegionOne'
+ 'region' => 'RegionOne',
+ // The Identity / Keystone endpoint
+ 'url' => 'http://8.21.28.222:5000/v2.0',
+ // uploadPartSize: size of the uploaded chunks, defaults to 524288000
+ 'uploadPartSize' => 524288000,
+ // required on dev-/trystack
+ 'tenantName' => 'facebook100000123456789',
+ // dev-/trystack uses swift by default, the lib defaults to 'cloudFiles'
+ // if omitted
+ 'serviceName' => 'swift',
+ // The Interface / url Type, optional
+ 'urlType' => 'internal'
+ ],
+],
+
+/**
+ * To use swift V3
+ */
+'objectstore' => [
+ 'class' => 'OC\\Files\\ObjectStore\\Swift',
+ 'arguments' => [
+ 'autocreate' => true,
+ 'user' => [
+ 'name' => 'swift',
+ 'password' => 'swift',
+ 'domain' => [
+ 'name' => 'default',
+ ],
+ ],
+ 'scope' => [
+ 'project' => [
+ 'name' => 'service',
+ 'domain' => [
+ 'name' => 'default',
+ ],
+ ],
+ ],
+ 'tenantName' => 'service',
+ 'serviceName' => 'swift',
+ 'region' => 'regionOne',
+ 'url' => 'http://yourswifthost:5000/v3',
+ 'bucket' => 'nextcloud',
+ ],
+],
+
+/**
+ * If this is set to true and a multibucket object store is configured then
+ * newly created previews are put into 256 dedicated buckets.
+ *
+ * Those buckets are named like the mulibucket version but with the postfix
+ * ``-preview-NUMBER`` where NUMBER is between 0 and 255.
+ *
+ * Keep in mind that only previews of files are put in there that don't have
+ * some already. Otherwise, the old bucket will be used.
+ *
+ * To migrate existing previews to this new multibucket distribution of previews
+ * use the occ command ``preview:repair``. For now this will only migrate
+ * previews that were generated before Nextcloud 19 in the flat
+ * ``appdata_INSTANCEID/previews/FILEID`` folder structure.
+ */
+'objectstore.multibucket.preview-distribution' => false,
+
+
+/**
+ * Sharing
+ *
+ * Global settings for Sharing
+ */
+
+/**
+ * Replaces the default Share Provider Factory. This can be utilized if
+ * own or 3rdParty Share Providers are used that – for instance – use the
+ * filesystem instead of the database to keep the share information.
+ *
+ * Defaults to ``\OC\Share20\ProviderFactory``
+ */
+'sharing.managerFactory' => '\OC\Share20\ProviderFactory',
+
+/**
+ * Enables expiration for link share passwords sent by email (sharebymail).
+ * The passwords will expire after the configured interval, the users can
+ * still request a new one in the public link page.
+ */
+'sharing.enable_mail_link_password_expiration' => false,
+
+/**
+ * Expiration interval for passwords, in seconds.
+ */
+'sharing.mail_link_password_expiration_interval' => 3600,
+
+/**
+ * Define max number of results returned by the search for auto-completion of
+ * users, groups, etc. The value must not be lower than 0 (for unlimited).
+ *
+ * If more, different sources are requested (e.g. different user backends; or
+ * both users and groups), the value is applied per source and might not be
+ * truncated after collecting the results. I.e. more results can appear than
+ * configured here.
+ *
+ * Default is 25.
+ */
+'sharing.maxAutocompleteResults' => 25,
+
+/**
+ * Define the minimum length of the search string before we start auto-completion
+ * Default is no limit (value set to 0)
+ */
+'sharing.minSearchStringLength' => 0,
+
+/**
+ * Set to true to enable that internal shares need to be accepted by the users by default.
+ * Users can change this for their account in their personal sharing settings
+ */
+'sharing.enable_share_accept' => false,
+
+/**
+ * Set to true to enforce that internal shares need to be accepted
+ */
+'sharing.force_share_accept' => false,
+
+/**
+ * Set to ``false``, to prevent users from setting a custom share_folder
+ */
+'sharing.allow_custom_share_folder' => true,
+
+/**
+ * Define a default folder for shared files and folders other than root.
+ * Changes to this value will only have effect on new shares.
+ *
+ * Defaults to ``/``
+ */
+'share_folder' => '/',
+
+/**
+ * Set to ``false``, to stop sending a mail when users receive a share
+ */
+'sharing.enable_share_mail' => true,
+
+/**
+ * Set to true to enable the feature to add exceptions for share password enforcement
+ */
+'sharing.allow_disabled_password_enforcement_groups' => false,
+
+/**
+ * Set to true to always transfer incoming shares by default
+ * when running "occ files:transfer-ownership".
+ * Defaults to false, so incoming shares are not transferred if not specifically requested
+ * by a command line argument.
+ */
+'transferIncomingShares' => false,
+
+/**
+ * Hashing
+ */
+
+/**
+ * By default, Nextcloud will use the Argon2 password hashing if available.
+ * However, if for whatever reason you want to stick with the PASSWORD_DEFAULT
+ * of your php version. Then set the setting to true.
+ *
+ * Nextcloud uses the Argon2 algorithm (with PHP >= 7.2) to create hashes by its
+ * own and exposes its configuration options as following. More information can
+ * be found at: https://www.php.net/manual/en/function.password-hash.php
+ */
+'hashing_default_password' => false,
+
+/**
+ * The number of CPU threads to be used by the algorithm for computing a hash.
+ * The value must be an integer, and the minimum value is 1. Rationally it does
+ * not help to provide a number higher than the available threads on the machine.
+ * Values that undershoot the minimum will be ignored in favor of the minimum.
+ */
+'hashingThreads' => PASSWORD_ARGON2_DEFAULT_THREADS,
+
+/**
+ * The memory in KiB to be used by the algorithm for computing a hash. The value
+ * must be an integer, and the minimum value is 8 times the number of CPU threads.
+ * Values that undershoot the minimum will be ignored in favor of the minimum.
+ */
+'hashingMemoryCost' => PASSWORD_ARGON2_DEFAULT_MEMORY_COST,
+
+/**
+ * The number of iterations that are used by the algorithm for computing a hash.
+ * The value must be an integer, and the minimum value is 1. Values that
+ * undershoot the minimum will be ignored in favor of the minimum.
+ */
+'hashingTimeCost' => PASSWORD_ARGON2_DEFAULT_TIME_COST,
+
+/**
+ * The hashing cost used by hashes generated by Nextcloud
+ * Using a higher value requires more time and CPU power to calculate the hashes
+ */
+'hashingCost' => 10,
+
+/**
+ * All other configuration options
+ */
+
+/**
+ * Additional driver options for the database connection, e.g. to enable SSL
+ * encryption in MySQL or specify a custom wait timeout on a cheap hoster.
+ *
+ * When setting up TLS/SSL for encrypting the connections, you need to ensure that
+ * the passed keys and certificates are readable by the PHP process. In addition,
+ * PDO::MYSQL_ATTR_SSL_VERIFY_SERVER_CERT might need to be set to false, if the
+ * database servers certificates CN does not match with the hostname used to connect.
+ * The standard behavior here is different from the MySQL/MariaDB CLI client, which
+ * does not verify the server cert except --ssl-verify-server-cert is passed manually.
+ */
+'dbdriveroptions' => [
+ PDO::MYSQL_ATTR_SSL_CA => '/file/path/to/ca_cert.pem',
+ PDO::MYSQL_ATTR_SSL_KEY => '/file/path/to/mysql-client-key.pem',
+ PDO::MYSQL_ATTR_SSL_CERT => '/file/path/to/mysql-client-cert.pem',
+ PDO::MYSQL_ATTR_SSL_VERIFY_SERVER_CERT => false,
+ PDO::MYSQL_ATTR_INIT_COMMAND => 'SET wait_timeout = 28800'
+],
+
+/**
+ * sqlite3 journal mode can be specified using this configuration parameter -
+ * can be 'WAL' or 'DELETE' see for more details https://www.sqlite.org/wal.html
+ */
+'sqlite.journal_mode' => 'DELETE',
+
+/**
+ * During setup, if requirements are met (see below), this setting is set to true
+ * and MySQL can handle 4 byte characters instead of 3 byte characters.
+ *
+ * If you want to convert an existing 3-byte setup into a 4-byte setup please
+ * set the parameters in MySQL as mentioned below and run the migration command:
+ * ./occ db:convert-mysql-charset
+ * The config setting will be set automatically after a successful run.
+ *
+ * Consult the documentation for more details.
+ *
+ * MySQL requires a special setup for longer indexes (> 767 bytes) which are
+ * needed:
+ *
+ * [mysqld]
+ * innodb_large_prefix=ON
+ * innodb_file_format=Barracuda
+ * innodb_file_per_table=ON
+ *
+ * Tables will be created with
+ * * character set: utf8mb4
+ * * collation: utf8mb4_bin
+ * * row_format: dynamic
+ *
+ * See:
+ * https://dev.mysql.com/doc/refman/5.7/en/charset-unicode-utf8mb4.html
+ * https://dev.mysql.com/doc/refman/5.7/en/innodb-parameters.html#sysvar_innodb_large_prefix
+ * https://mariadb.com/kb/en/mariadb/xtradbinnodb-server-system-variables/#innodb_large_prefix
+ * http://www.tocker.ca/2013/10/31/benchmarking-innodb-page-compression-performance.html
+ * http://mechanics.flite.com/blog/2014/07/29/using-innodb-large-prefix-to-avoid-error-1071/
+ */
+'mysql.utf8mb4' => false,
+
+/**
+ * For search queries in the database, a default collation – depending on the
+ * character set – is chosen. In some cases a different behaviour is desired,
+ * for instances when an accent sensitive search is desired.
+ *
+ * MariaDB and MySQL have an overlap in available collations, but also
+ * incompatible ones, also depending on the version of the database server.
+ *
+ * This option allows to override the automatic choice. Example:
+ *
+ * 'mysql.collation' => 'utf8mb4_0900_as_ci',
+ *
+ * This setting has no effect on setup or creating tables. In those cases
+ * always utf8[mb4]_bin is being used. This setting is only taken into
+ * consideration in SQL queries that utilize LIKE comparison operators.
+ */
+'mysql.collation' => null,
+
+/**
+ * Database types that are supported for installation.
+ *
+ * Available:
+ * - sqlite (SQLite3)
+ * - mysql (MySQL)
+ * - pgsql (PostgreSQL)
+ * - oci (Oracle)
+ *
+ * Defaults to the following databases:
+ * - sqlite (SQLite3)
+ * - mysql (MySQL)
+ * - pgsql (PostgreSQL)
+ */
+'supportedDatabases' => [
+ 'sqlite',
+ 'mysql',
+ 'pgsql',
+ 'oci',
+],
+
+/**
+ * Override where Nextcloud stores temporary files. Useful in situations where
+ * the system temporary directory is on a limited space ramdisk or is otherwise
+ * restricted, or if external storage which do not support streaming are in
+ * use.
+ *
+ * The Web server user/PHP must have write access to this directory.
+ * Additionally you have to make sure that your PHP configuration considers this a valid
+ * tmp directory, by setting the TMP, TMPDIR, and TEMP variables to the required directories.
+ * On top of that you might be required to grant additional permissions in AppArmor or SELinux.
+ */
+'tempdirectory' => '/tmp/nextcloudtemp',
+
+/**
+ * Override where Nextcloud stores update files while updating. Useful in situations
+ * where the default `datadirectory` is on network disk like NFS, or is otherwise
+ * restricted. Defaults to the value of `datadirectory` if unset.
+ *
+ * If set, the value MUST be located _outside_ of the installation directory of Nextcloud and
+ * writable by the Web server user.
+ *
+ */
+'updatedirectory' => '',
+
+/**
+ * Blacklist a specific file or files and disallow the upload of files
+ * with this name. ``.htaccess`` is blocked by default.
+ * WARNING: USE THIS ONLY IF YOU KNOW WHAT YOU ARE DOING.
+ *
+ * Defaults to ``array('.htaccess')``
+ */
+'blacklisted_files' => ['.htaccess'],
+
+/**
+ * Blacklist characters from being used in filenames. This is useful if you
+ * have a filesystem or OS which does not support certain characters like windows.
+ *
+ * The '/' and '\' characters are always forbidden.
+ *
+ * Example for windows systems: ``array('?', '<', '>', ':', '*', '|', '"', chr(0), "\n", "\r")``
+ * see https://en.wikipedia.org/wiki/Comparison_of_file_systems#Limits
+ *
+ * Defaults to ``array()``
+ */
+'forbidden_chars' => [],
+
+/**
+ * If you are applying a theme to Nextcloud, enter the name of the theme here.
+ * The default location for themes is ``nextcloud/themes/``.
+ *
+ * Defaults to the theming app which is shipped since Nextcloud 9
+ */
+'theme' => '',
+
+/**
+ * Enforce the user theme. This will disable the user theming settings
+ * This must be a valid ITheme ID.
+ * E.g. dark, dark-highcontrast, default, light, light-highcontrast, opendyslexic
+ */
+'enforce_theme' => '',
+
+/**
+ * The default cipher for encrypting files. Currently supported are:
+ * - AES-256-CTR
+ * - AES-128-CTR
+ * - AES-256-CFB
+ * - AES-128-CFB
+ *
+ * Defaults to ``AES-256-CTR``
+ */
+'cipher' => 'AES-256-CTR',
+
+/**
+ * Use the legacy base64 format for encrypted files instead of the more space-efficient
+ * binary format. The option affects only newly written files, existing encrypted files
+ * will not be touched and will remain readable whether they use the new format or not.
+ *
+ * Defaults to ``false``
+ */
+'encryption.use_legacy_base64_encoding' => false,
+
+/**
+ * The minimum Nextcloud desktop client version that will be allowed to sync with
+ * this server instance. All connections made from earlier clients will be denied
+ * by the server. Defaults to the minimum officially supported Nextcloud desktop
+ * client version at the time of release of this server version.
+ *
+ * When changing this, note that older unsupported versions of the Nextcloud desktop
+ * client may not function as expected, and could lead to permanent data loss for
+ * clients or other unexpected results.
+ *
+ * Defaults to ``2.3.0``
+ */
+'minimum.supported.desktop.version' => '2.3.0',
+
+/**
+ * Option to allow local storage to contain symlinks.
+ * WARNING: Not recommended. This would make it possible for Nextcloud to access
+ * files outside the data directory and could be considered a security risk.
+ *
+ * Defaults to ``false``
+ */
+'localstorage.allowsymlinks' => false,
+
+/**
+ * Nextcloud overrides umask to ensure suitable access permissions
+ * regardless of webserver/php-fpm configuration and worker state.
+ * WARNING: Modifying this value has security implications and
+ * may soft-break the installation.
+ *
+ * Most installs shall not modify this value.
+ *
+ * Defaults to ``0022``
+ */
+'localstorage.umask' => 0022,
+
+/**
+ * This options allows storage systems that don't allow to modify existing files
+ * to overcome this limitation by removing the files before overwriting.
+ *
+ * Defaults to ``false``
+ */
+'localstorage.unlink_on_truncate' => false,
+
+/**
+ * EXPERIMENTAL: option whether to include external storage in quota
+ * calculation, defaults to false.
+ *
+ * Defaults to ``false``
+ */
+'quota_include_external_storage' => false,
+
+/**
+ * When an external storage is unavailable for some reasons, it will be flagged
+ * as such for 10 minutes. When the trigger is a failed authentication attempt
+ * the delay is higher and can be controlled with this option. The motivation
+ * is to make account lock outs at Active Directories (and compatible) more
+ * unlikely.
+ *
+ * Defaults to ``1800`` (seconds)
+ */
+'external_storage.auth_availability_delay' => 1800,
+
+/**
+ * Allows to create external storages of type "Local" in the web interface and APIs.
+ *
+ * When disabled, it is still possible to create local storages with occ using
+ * the following command:
+ *
+ * % php occ files_external:create /mountpoint local null::null -c datadir=/path/to/data
+ *
+ * Defaults to ``true``
+ *
+ */
+'files_external_allow_create_new_local' => true,
+
+/**
+ * Specifies how often the local filesystem (the Nextcloud data/ directory, and
+ * NFS mounts in data/) is checked for changes made outside Nextcloud. This
+ * does not apply to external storage.
+ *
+ * 0 -> Never check the filesystem for outside changes, provides a performance
+ * increase when it's certain that no changes are made directly to the
+ * filesystem
+ *
+ * 1 -> Check each file or folder at most once per request, recommended for
+ * general use if outside changes might happen.
+ *
+ * Defaults to ``0``
+ */
+'filesystem_check_changes' => 0,
+
+/**
+ * By default, Nextcloud will store the part files created during upload in the
+ * same storage as the upload target. Setting this to false will store the part
+ * files in the root of the users folder which might be required to work with certain
+ * external storage setups that have limited rename capabilities.
+ *
+ * Defaults to ``true``
+ */
+'part_file_in_storage' => true,
+
+/**
+ * Where ``mount.json`` file should be stored, defaults to ``data/mount.json``
+ * in the Nextcloud directory.
+ *
+ * Defaults to ``data/mount.json`` in the Nextcloud directory.
+ */
+'mount_file' => '/var/www/nextcloud/data/mount.json',
+
+/**
+ * When ``true``, prevent Nextcloud from changing the cache due to changes in
+ * the filesystem for all storage.
+ *
+ * Defaults to ``false``
+ */
+'filesystem_cache_readonly' => false,
+
+/**
+ * List of trusted proxy servers
+ *
+ * You may set this to an array containing a combination of
+ * - IPv4 addresses, e.g. `192.168.2.123`
+ * - IPv4 ranges in CIDR notation, e.g. `192.168.2.0/24`
+ * - IPv6 addresses, e.g. `fd9e:21a7:a92c:2323::1`
+ * - IPv6 ranges in CIDR notation, e.g. `2001:db8:85a3:8d3:1319:8a20::/95`
+ *
+ * When an incoming request's `REMOTE_ADDR` matches any of the IP addresses
+ * specified here, it is assumed to be a proxy instead of a client. Thus, the
+ * client IP will be read from the HTTP header specified in
+ * `forwarded_for_headers` instead of from `REMOTE_ADDR`.
+ *
+ * So if you configure `trusted_proxies`, also consider setting
+ * `forwarded_for_headers` which otherwise defaults to `HTTP_X_FORWARDED_FOR`
+ * (the `X-Forwarded-For` header).
+ *
+ * Defaults to an empty array.
+ */
+'trusted_proxies' => ['203.0.113.45', '198.51.100.128', '192.168.2.0/24'],
+
+/**
+ * Headers that should be trusted as client IP address in combination with
+ * `trusted_proxies`. If the HTTP header looks like 'X-Forwarded-For', then use
+ * 'HTTP_X_FORWARDED_FOR' here.
+ *
+ * If set incorrectly, a client can spoof their IP address as visible to
+ * Nextcloud, bypassing access controls and making logs useless!
+ *
+ * Defaults to ``'HTTP_X_FORWARDED_FOR'``
+ */
+'forwarded_for_headers' => ['HTTP_X_FORWARDED', 'HTTP_FORWARDED_FOR'],
+
+/**
+ * max file size for animating gifs on public-sharing-site.
+ * If the gif is bigger, it'll show a static preview
+ *
+ * Value represents the maximum filesize in megabytes. Set to ``-1`` for
+ * no limit.
+ *
+ * Defaults to ``10`` megabytes
+ */
+'max_filesize_animated_gifs_public_sharing' => 10,
+
+
+/**
+ * Enables transactional file locking.
+ * This is enabled by default.
+ *
+ * Prevents concurrent processes from accessing the same files
+ * at the same time. Can help prevent side effects that would
+ * be caused by concurrent operations. Mainly relevant for
+ * very large installations with many users working with
+ * shared files.
+ *
+ * Defaults to ``true``
+ */
+'filelocking.enabled' => true,
+
+/**
+ * Set the lock's time-to-live in seconds.
+ *
+ * Any lock older than this will be automatically cleaned up.
+ *
+ * Defaults to ``60*60`` seconds (1 hour) or the php
+ * max_execution_time, whichever is higher.
+ */
+'filelocking.ttl' => 60*60,
+
+/**
+ * Memory caching backend for file locking
+ *
+ * Because most memcache backends can clean values without warning using redis
+ * is highly recommended to *avoid data loss*.
+ *
+ * Defaults to ``none``
+ */
+'memcache.locking' => '\\OC\\Memcache\\Redis',
+
+/**
+ * Enable locking debug logging
+ *
+ * Note that this can lead to a very large volume of log items being written which can lead
+ * to performance degradation and large log files on busy instance.
+ *
+ * Thus enabling this in production for longer periods of time is not recommended
+ * or should be used together with the ``log.condition`` setting.
+ */
+'filelocking.debug' => false,
+
+/**
+ * Disable the web based updater
+ */
+'upgrade.disable-web' => false,
+
+/**
+ * Allows to modify the cli-upgrade link in order to link to a different documentation
+ */
+'upgrade.cli-upgrade-link' => '',
+
+/**
+ * Set this Nextcloud instance to debugging mode
+ *
+ * Only enable this for local development and not in production environments
+ * This will disable the minifier and outputs some additional debug information
+ *
+ * Defaults to ``false``
+ */
+'debug' => false,
+
+/**
+ * Sets the data-fingerprint of the current data served
+ *
+ * This is a property used by the clients to find out if a backup has been
+ * restored on the server. Once a backup is restored run
+ * ./occ maintenance:data-fingerprint
+ * To set this to a new value.
+ *
+ * Updating/Deleting this value can make connected clients stall until
+ * the user has resolved conflicts.
+ *
+ * Defaults to ``''`` (empty string)
+ */
+'data-fingerprint' => '',
+
+/**
+ * This entry is just here to show a warning in case somebody copied the sample
+ * configuration. DO NOT ADD THIS SWITCH TO YOUR CONFIGURATION!
+ *
+ * If you, brave person, have read until here be aware that you should not
+ * modify *ANY* settings in this file without reading the documentation.
+ */
+'copied_sample_config' => true,
+
+/**
+ * use a custom lookup server to publish user data
+ */
+'lookup_server' => 'https://lookup.nextcloud.com',
+
+/**
+ * set to true if the server is used in a setup based on Nextcloud's Global Scale architecture
+ */
+'gs.enabled' => false,
+
+/**
+ * by default federation is only used internally in a Global Scale setup
+ * If you want to allow federation outside your environment set it to 'global'
+ */
+'gs.federation' => 'internal',
+
+/**
+ * List of incompatible user agents opted out from Same Site Cookie Protection.
+ * Some user agents are notorious and don't really properly follow HTTP
+ * specifications. For those, have an opt-out.
+ *
+ * WARNING: only use this if you know what you are doing
+ */
+'csrf.optout' => [
+ '/^WebDAVFS/', // OS X Finder
+ '/^Microsoft-WebDAV-MiniRedir/', // Windows webdav drive
+],
+
+/**
+ * By default, there is on public pages a link shown that allows users to
+ * learn about the "simple sign up" - see https://nextcloud.com/signup/
+ *
+ * If this is set to "false" it will not show the link.
+ */
+'simpleSignUpLink.shown' => true,
+
+/**
+ * By default, autocompletion is enabled for the login form on Nextcloud's login page.
+ * While this is enabled, browsers are allowed to "remember" login names and such.
+ * Some companies require it to be disabled to comply with their security policy.
+ *
+ * Simply set this property to "false", if you want to turn this feature off.
+ */
+
+'login_form_autocomplete' => true,
+
+/**
+ * Timeout for the login form, after this time the login form is reset.
+ * This prevents password leaks on public devices if the user forgots to clear the form.
+ *
+ * Default is 5 minutes (300 seconds), a value of 0 means no timeout.
+ */
+'login_form_timeout' => 300,
+
+/**
+ * If your user is using an outdated or unsupported browser, a warning will be shown
+ * to offer some guidance to upgrade or switch and ensure a proper Nextcloud experience.
+ * They can still bypass it after they have read the warning.
+ *
+ * Simply set this property to "true", if you want to turn this feature off.
+ */
+
+'no_unsupported_browser_warning' => false,
+
+/**
+ * Disable background scanning of files
+ *
+ * By default, a background job runs every 10 minutes and execute a background
+ * scan to sync filesystem and database. Only users with unscanned files
+ * (size < 0 in filecache) are included. Maximum 500 users per job.
+ *
+ * Defaults to ``false``
+ */
+'files_no_background_scan' => false,
+
+/**
+ * Log all queries into a file
+ *
+ * Warning: This heavily decreases the performance of the server and is only
+ * meant to debug/profile the query interaction manually.
+ * Also, it might log sensitive data into a plain text file.
+ */
+'query_log_file' => '',
+
+/**
+ * Log all redis requests into a file
+ *
+ * Warning: This heavily decreases the performance of the server and is only
+ * meant to debug/profile the redis interaction manually.
+ * Also, it might log sensitive data into a plain text file.
+ */
+'redis_log_file' => '',
+
+/**
+ * Enable diagnostics event logging
+ *
+ * If enabled the timings of common execution steps will be logged to the
+ * Nextcloud log at debug level. log.condition is useful to enable this on
+ * production systems to only log under some conditions
+ */
+'diagnostics.logging' => true,
+
+/**
+ * Limit diagnostics event logging to events longer than the configured threshold in ms
+ *
+ * when set to 0 no diagnostics events will be logged
+ */
+'diagnostics.logging.threshold' => 0,
+
+/**
+ * Enable profile globally
+ *
+ * Defaults to ``true``
+ */
+'profile.enabled' => true,
+
+/**
+ * Allows to override the default scopes for Account data.
+ * The list of overridable properties and valid values for scopes are in
+ * ``OCP\Accounts\IAccountManager``. Values added here are merged with
+ * default values, which are in ``OC\Accounts\AccountManager``.
+ *
+ * For instance, if the phone property should default to the private scope
+ * instead of the local one:
+ *
+ * ::
+ *
+ * [
+ * \OCP\Accounts\IAccountManager::PROPERTY_PHONE => \OCP\Accounts\IAccountManager::SCOPE_PRIVATE
+ * ]
+ *
+ */
+'account_manager.default_property_scope' => [],
+
+/**
+ * Enable the deprecated Projects feature,
+ * superseded by Related resources as of Nextcloud 25
+ *
+ * Defaults to ``false``
+ */
+'projects.enabled' => false,
+
+/**
+ * Enable the bulk upload feature.
+ *
+ * Defaults to ``true``
+ */
+'bulkupload.enabled' => true,
+
+/**
+ * Enables fetching open graph metadata from remote urls
+ *
+ * Defaults to ``true``
+ */
+'reference_opengraph' => true,
+
+/**
+ * Enable use of old unified search
+ *
+ * Defaults to ``false``
+ */
+'unified_search.enabled' => false,
+
+/**
+ * Enable features that are do respect accessibility standards yet.
+ *
+ * Defaults to ``true``
+ */
+'enable_non-accessible_features' => true,
+];
diff --git a/nextcloud/config_bak/redis.config.php b/nextcloud/config_bak/redis.config.php
new file mode 100755
index 0000000..a5fde3c
--- /dev/null
+++ b/nextcloud/config_bak/redis.config.php
@@ -0,0 +1,17 @@
+ '\OC\Memcache\Redis',
+ 'memcache.locking' => '\OC\Memcache\Redis',
+ 'redis' => array(
+ 'host' => getenv('REDIS_HOST'),
+ 'password' => (string) getenv('REDIS_HOST_PASSWORD'),
+ ),
+ );
+
+ if (getenv('REDIS_HOST_PORT') !== false) {
+ $CONFIG['redis']['port'] = (int) getenv('REDIS_HOST_PORT');
+ } elseif (getenv('REDIS_HOST')[0] != '/') {
+ $CONFIG['redis']['port'] = 6379;
+ }
+}
diff --git a/nextcloud/config_bak/reverse-proxy.config.php b/nextcloud/config_bak/reverse-proxy.config.php
new file mode 100755
index 0000000..7df0415
--- /dev/null
+++ b/nextcloud/config_bak/reverse-proxy.config.php
@@ -0,0 +1,30 @@
+ array(
+ 'class' => '\OC\Files\ObjectStore\S3',
+ 'arguments' => array(
+ 'bucket' => getenv('OBJECTSTORE_S3_BUCKET'),
+ 'region' => getenv('OBJECTSTORE_S3_REGION') ?: '',
+ 'hostname' => getenv('OBJECTSTORE_S3_HOST') ?: '',
+ 'port' => getenv('OBJECTSTORE_S3_PORT') ?: '',
+ 'storageClass' => getenv('OBJECTSTORE_S3_STORAGE_CLASS') ?: '',
+ 'objectPrefix' => getenv("OBJECTSTORE_S3_OBJECT_PREFIX") ? getenv("OBJECTSTORE_S3_OBJECT_PREFIX") : "urn:oid:",
+ 'autocreate' => (strtolower($autocreate) === 'false' || $autocreate == false) ? false : true,
+ 'use_ssl' => (strtolower($use_ssl) === 'false' || $use_ssl == false) ? false : true,
+ // required for some non Amazon S3 implementations
+ 'use_path_style' => $use_path == true && strtolower($use_path) !== 'false',
+ // required for older protocol versions
+ 'legacy_auth' => $use_legacyauth == true && strtolower($use_legacyauth) !== 'false'
+ )
+ )
+ );
+
+ if (getenv('OBJECTSTORE_S3_KEY_FILE') && file_exists(getenv('OBJECTSTORE_S3_KEY_FILE'))) {
+ $CONFIG['objectstore']['arguments']['key'] = trim(file_get_contents(getenv('OBJECTSTORE_S3_KEY_FILE')));
+ } elseif (getenv('OBJECTSTORE_S3_KEY')) {
+ $CONFIG['objectstore']['arguments']['key'] = getenv('OBJECTSTORE_S3_KEY');
+ } else {
+ $CONFIG['objectstore']['arguments']['key'] = '';
+ }
+
+ if (getenv('OBJECTSTORE_S3_SECRET_FILE') && file_exists(getenv('OBJECTSTORE_S3_SECRET_FILE'))) {
+ $CONFIG['objectstore']['arguments']['secret'] = trim(file_get_contents(getenv('OBJECTSTORE_S3_SECRET_FILE')));
+ } elseif (getenv('OBJECTSTORE_S3_SECRET')) {
+ $CONFIG['objectstore']['arguments']['secret'] = getenv('OBJECTSTORE_S3_SECRET');
+ } else {
+ $CONFIG['objectstore']['arguments']['secret'] = '';
+ }
+
+ if (getenv('OBJECTSTORE_S3_SSE_C_KEY_FILE') && file_exists(getenv('OBJECTSTORE_S3_SSE_C_KEY_FILE'))) {
+ $CONFIG['objectstore']['arguments']['sse_c_key'] = trim(file_get_contents(getenv('OBJECTSTORE_S3_SSE_C_KEY_FILE')));
+ } elseif (getenv('OBJECTSTORE_S3_SSE_C_KEY')) {
+ $CONFIG['objectstore']['arguments']['sse_c_key'] = getenv('OBJECTSTORE_S3_SSE_C_KEY');
+ }
+}
diff --git a/nextcloud/config_bak/smtp.config.php b/nextcloud/config_bak/smtp.config.php
new file mode 100755
index 0000000..5006fe4
--- /dev/null
+++ b/nextcloud/config_bak/smtp.config.php
@@ -0,0 +1,22 @@
+ 'smtp',
+ 'mail_smtphost' => getenv('SMTP_HOST'),
+ 'mail_smtpport' => getenv('SMTP_PORT') ?: (getenv('SMTP_SECURE') ? 465 : 25),
+ 'mail_smtpsecure' => getenv('SMTP_SECURE') ?: '',
+ 'mail_smtpauth' => getenv('SMTP_NAME') && (getenv('SMTP_PASSWORD') || (getenv('SMTP_PASSWORD_FILE') && file_exists(getenv('SMTP_PASSWORD_FILE')))),
+ 'mail_smtpauthtype' => getenv('SMTP_AUTHTYPE') ?: 'LOGIN',
+ 'mail_smtpname' => getenv('SMTP_NAME') ?: '',
+ 'mail_from_address' => getenv('MAIL_FROM_ADDRESS'),
+ 'mail_domain' => getenv('MAIL_DOMAIN'),
+ );
+
+ if (getenv('SMTP_PASSWORD_FILE') && file_exists(getenv('SMTP_PASSWORD_FILE'))) {
+ $CONFIG['mail_smtppassword'] = trim(file_get_contents(getenv('SMTP_PASSWORD_FILE')));
+ } elseif (getenv('SMTP_PASSWORD')) {
+ $CONFIG['mail_smtppassword'] = getenv('SMTP_PASSWORD');
+ } else {
+ $CONFIG['mail_smtppassword'] = '';
+ }
+}
diff --git a/nextcloud/config_bak/swift.config.php b/nextcloud/config_bak/swift.config.php
new file mode 100755
index 0000000..47ada56
--- /dev/null
+++ b/nextcloud/config_bak/swift.config.php
@@ -0,0 +1,31 @@
+ [
+ 'class' => 'OC\\Files\\ObjectStore\\Swift',
+ 'arguments' => [
+ 'autocreate' => $autocreate == true && strtolower($autocreate) !== 'false',
+ 'user' => [
+ 'name' => getenv('OBJECTSTORE_SWIFT_USER_NAME'),
+ 'password' => getenv('OBJECTSTORE_SWIFT_USER_PASSWORD'),
+ 'domain' => [
+ 'name' => (getenv('OBJECTSTORE_SWIFT_USER_DOMAIN')) ?: 'Default',
+ ],
+ ],
+ 'scope' => [
+ 'project' => [
+ 'name' => getenv('OBJECTSTORE_SWIFT_PROJECT_NAME'),
+ 'domain' => [
+ 'name' => (getenv('OBJECTSTORE_SWIFT_PROJECT_DOMAIN')) ?: 'Default',
+ ],
+ ],
+ ],
+ 'serviceName' => (getenv('OBJECTSTORE_SWIFT_SERVICE_NAME')) ?: 'swift',
+ 'region' => getenv('OBJECTSTORE_SWIFT_REGION'),
+ 'url' => getenv('OBJECTSTORE_SWIFT_URL'),
+ 'bucket' => getenv('OBJECTSTORE_SWIFT_CONTAINER_NAME'),
+ ]
+ ]
+ );
+}
diff --git a/nextcloud/config_bak/upgrade-disable-web.config.php b/nextcloud/config_bak/upgrade-disable-web.config.php
new file mode 100755
index 0000000..cb00b43
--- /dev/null
+++ b/nextcloud/config_bak/upgrade-disable-web.config.php
@@ -0,0 +1,4 @@
+ true,
+);
diff --git a/nextcloud/docker-compose.yml b/nextcloud/docker-compose.yml
index fd52d57..91803e7 100644
--- a/nextcloud/docker-compose.yml
+++ b/nextcloud/docker-compose.yml
@@ -1,38 +1,43 @@
services:
redis:
+ # user: "${UID}:${GID}"
image: redis:alpine
container_name: redis-dbcache
restart: unless-stopped
db:
image: mysql:latest
restart: always
- command: --transaction-isolation=READ-COMMITTED --log-bin=binlog --binlog-format=ROW
+ command: --transaction-isolation=READ-COMMITTED --log-bin=binlog --binlog-format=ROW --log_bin_trust_function_creators=true
+ # user: ${UID}:${GID}
volumes:
- db:/var/lib/mysql
environment:
- - MYSQL_ROOT_PASSWORD=${DBPASS}
+ - MYSQL_ROOT_PASSWORD=ROOT_ACCESS_PASSWORD
- MYSQL_PASSWORD=${DBPASS}
- MYSQL_DATABASE=nextcloud
- - MYSQL_USER=root
+ - MYSQL_USER=nextcloud
nextcloud:
- image: lscr.io/linuxserver/nextcloud:latest
+ image: nextcloud:29.0.0
container_name: nextcloud
+ # user: "${UID}:${GID}"
+ depends_on:
+ - db
+ links:
+ - db
environment:
- PUID: "1000"
- PGID: "1000"
TZ: "${TZ}"
VIRTUAL_HOST: "nextcloud.${DOMAIN}"
MYSQL_HOST: db
MYSQL_DATABASE: nextcloud
- MYSQL_USER: root
+ MYSQL_USER: nextcloud
MYSQL_PASSWORD: ${DBPASS}
REDIS_HOST: redis
LETSENCRYPT_HOST: nextcloud.${DOMAIN}
LETSENCRYPT_EMAIL: ${EMAIL}
- #LETSENCRYPT_TEST: true
+ # LETSENCRYPT_TEST: true
volumes:
- - ${CONFIG_LOCATION}/nextcloud:/config
- - ${DATA_LOCATION}/Cloud/Nextcloud:/data
+ - ${CONFIG_LOCATION}:/var/www/html/config:rw
+ - ${DATA_LOCATION}/Cloud/Nextcloud:/var/www/html/data:rw
restart: unless-stopped
volumes:
db:
diff --git a/nginx-proxy/.env.example b/nginx-proxy/.env.example
index c8fbe59..492ed35 100644
--- a/nginx-proxy/.env.example
+++ b/nginx-proxy/.env.example
@@ -1 +1,2 @@
EMAIL=example@mail.com
+TZ=America/New_York
\ No newline at end of file
diff --git a/nginx-proxy/docker-compose.yml b/nginx-proxy/docker-compose.yml
index e62446d..2735643 100644
--- a/nginx-proxy/docker-compose.yml
+++ b/nginx-proxy/docker-compose.yml
@@ -20,6 +20,7 @@ services:
- /var/run/docker.sock:/var/run/docker.sock:ro
environment:
- DEFAULT_EMAIL=${EMAIL}
+ - TZ=${TZ}
networks:
default:
name: nginx-proxy
diff --git a/nginx-proxy/nginx/html/.well-known/acme-challenge/0nvqKzz1EohOVB6bht1uUCmvcSSi7dBiG8jmzVdNjy4 b/nginx-proxy/nginx/html/.well-known/acme-challenge/0nvqKzz1EohOVB6bht1uUCmvcSSi7dBiG8jmzVdNjy4
new file mode 100644
index 0000000..42465a9
--- /dev/null
+++ b/nginx-proxy/nginx/html/.well-known/acme-challenge/0nvqKzz1EohOVB6bht1uUCmvcSSi7dBiG8jmzVdNjy4
@@ -0,0 +1 @@
+0nvqKzz1EohOVB6bht1uUCmvcSSi7dBiG8jmzVdNjy4.-pySGwa5vVkj_cOXnCDnd-dGPAV2kVXglGIYiUrWeT8
\ No newline at end of file