From 30128d505df977bfb5f0876c12ac2ab5c42e4f4e Mon Sep 17 00:00:00 2001 From: Brodin Date: Sun, 23 Jun 2024 12:21:53 -0400 Subject: [PATCH 1/4] bunches --- botc/.gitignore | 3 +- botc/docker-compose.yml | 3 +- docker-compose.yml | 376 --- fusiondance/.env.example | 3 + fusiondance/.gitignore | 2 + fusiondance/docker-compose.yml | 37 + games/.gitignore | 2 +- games/docker-compose.yml | 4 +- nextcloud/.gitignore | 1 + nextcloud/config_bak/.htaccess | 25 + .../config_bak/apache-pretty-urls.config.php | 4 + nextcloud/config_bak/apcu.config.php | 4 + nextcloud/config_bak/apps.config.php | 15 + nextcloud/config_bak/config.php | 69 + nextcloud/config_bak/config.sample.php | 2434 +++++++++++++++++ nextcloud/config_bak/redis.config.php | 17 + nextcloud/config_bak/reverse-proxy.config.php | 30 + nextcloud/config_bak/s3.config.php | 48 + nextcloud/config_bak/smtp.config.php | 22 + nextcloud/config_bak/swift.config.php | 31 + .../config_bak/upgrade-disable-web.config.php | 4 + nextcloud/docker-compose.yml | 4 +- .../provision/mysql/init/01-databases.sql | 9 - nextcloud/update.sh | 1 + ...nvqKzz1EohOVB6bht1uUCmvcSSi7dBiG8jmzVdNjy4 | 1 + nginx-proxy/nginx/vhost.d/default | 10 - readers/docker-compose.yml | 4 + run_all.sh | 19 + vnc/data/db_v2.sqlite3 | Bin 0 -> 24576 bytes vnc/data/db_v2.sqlite3-shm | Bin 0 -> 32768 bytes vnc/data/db_v2.sqlite3-wal | Bin 0 -> 123632 bytes vnc/data/id_ed25519 | 1 + vnc/data/id_ed25519.pub | 1 + vnc/data/id_ed25519_minineuro | 1 + vnc/data/id_ed25519_minineuro.pub | 1 + vnc/docker-compose.yml | 21 + 36 files changed, 2802 insertions(+), 405 deletions(-) delete mode 100644 docker-compose.yml create mode 100644 fusiondance/.env.example create mode 100644 fusiondance/.gitignore create mode 100644 fusiondance/docker-compose.yml create mode 100644 nextcloud/.gitignore create mode 100644 nextcloud/config_bak/.htaccess create mode 100644 nextcloud/config_bak/apache-pretty-urls.config.php create mode 100644 nextcloud/config_bak/apcu.config.php create mode 100644 nextcloud/config_bak/apps.config.php create mode 100755 nextcloud/config_bak/config.php create mode 100644 nextcloud/config_bak/config.sample.php create mode 100644 nextcloud/config_bak/redis.config.php create mode 100644 nextcloud/config_bak/reverse-proxy.config.php create mode 100644 nextcloud/config_bak/s3.config.php create mode 100644 nextcloud/config_bak/smtp.config.php create mode 100644 nextcloud/config_bak/swift.config.php create mode 100644 nextcloud/config_bak/upgrade-disable-web.config.php delete mode 100644 nextcloud/docker/provision/mysql/init/01-databases.sql create mode 100644 nextcloud/update.sh create mode 100644 nginx-proxy/nginx/html_bak/.well-known/acme-challenge/0nvqKzz1EohOVB6bht1uUCmvcSSi7dBiG8jmzVdNjy4 create mode 100755 run_all.sh create mode 100644 vnc/data/db_v2.sqlite3 create mode 100644 vnc/data/db_v2.sqlite3-shm create mode 100644 vnc/data/db_v2.sqlite3-wal create mode 100644 vnc/data/id_ed25519 create mode 100644 vnc/data/id_ed25519.pub create mode 100644 vnc/data/id_ed25519_minineuro create mode 100644 vnc/data/id_ed25519_minineuro.pub create mode 100644 vnc/docker-compose.yml diff --git a/botc/.gitignore b/botc/.gitignore index 4846d12..5487749 100644 --- a/botc/.gitignore +++ b/botc/.gitignore @@ -1,2 +1,3 @@ backup/* -wordpress/* \ No newline at end of file +wordpress/* +data/* \ No newline at end of file diff --git a/botc/docker-compose.yml b/botc/docker-compose.yml index 1660143..f43651b 100644 --- a/botc/docker-compose.yml +++ b/botc/docker-compose.yml @@ -8,7 +8,7 @@ services: MYSQL_PASSWORD: ${DBPASS} MYSQL_RANDOM_ROOT_PASSWORD: '1' volumes: - - db:/var/lib/mysql + - ./db:/var/lib/mysql wordpress: depends_on: - db @@ -29,7 +29,6 @@ services: - ./wordpress:/var/www/html - ./backup:/var/www/html/wp-content/updraft volumes: - wordpress: db: networks: default: diff --git a/docker-compose.yml b/docker-compose.yml deleted file mode 100644 index 08dc6c1..0000000 --- a/docker-compose.yml +++ /dev/null @@ -1,376 +0,0 @@ -services: - nginx-proxy: - image: jwilder/nginx-proxy - ports: - - "80:80" - - "443:443" - volumes: - - /var/run/docker.sock:/tmp/docker.sock:ro - - ./nginx/certs:/etc/nginx/certs - - ./nginx/html:/usr/share/nginx/html - - ./nginx/vhost.d:/etc/nginx/vhost.d - - ./client_max_body_size.conf:/etc/nginx/conf.d/client_max_body_size.conf:ro - nginx-letsencrypt: - image: jrcs/letsencrypt-nginx-proxy-companion - container_name: nginx-letsencrypt - restart: always - volumes_from: - - nginx-proxy - volumes: - - /var/run/docker.sock:/var/run/docker.sock:ro - environment: - - DEFAULT_EMAIL=${EMAIL} - redis: - image: redis:alpine - container_name: redis-dbcache - restart: unless-stopped - homarr: - container_name: homarr - image: ghcr.io/ajnart/homarr:latest - restart: unless-stopped - volumes: - - /var/run/docker.sock:/var/run/docker.sock # Optional, only if you want docker integration - - ${CONFIG_LOCATION}/homarr:/app/data/configs - - ${DATA_LOCATION}/homarr/icons:/app/public/icons - - ${DATA_LOCATION}/homarr:/data - environment: - - VIRTUAL_HOST=homarr.${DOMAIN}, ${DOMAIN}, www.${DOMAIN} - - LETSENCRYPT_HOST="homarr.${DOMAIN}, ${DOMAIN}, www.${DOMAIN}" - - LETSENCRYPT_EMAIL=${EMAIL} - expose: - - "7575" - ports: - - '7575:7575' - dashdot: - image: mauricenino/dashdot - container_name: dashdot - restart: unless-stopped - privileged: true - environment: - - VIRTUAL_HOST=dash.${DOMAIN} - - DASHDOT_ENABLE_CPU_TEMPS=true - - DASHDOT_FS_DEVICE_FILTER=sda,sdb,sdc,sdd,sde,sdf - - DASHDOT_FS_VIRTUAL_MOUNTS=tank/storage/media, psb29404@psb29404.seedbox.io:/files - expose: - - "3001" - ports: - - 3001:3001 - volumes: - - /:/mnt/host:ro - plex: - image: plexinc/pms-docker:latest - container_name: plex - environment: - - PUID=${UID} - - PGID=${GID} - - TZ=${TZ} - - VIRTUAL_HOST=plex.${DOMAIN} - - VERSION=docker - - PLEX_CLAIM=${PLEX_CLAIM} - volumes: - - ${CONFIG_LOCATION}/plex:/config - - ${DATA_LOCATION}/TV:/tv - - ${DATA_LOCATION}/Movies:/movies - - ${DATA_LOCATION}/Music:/music - expose: - - "32400" - ports: - - 32400:32400 - restart: unless-stopped - tautulli: - image: lscr.io/linuxserver/tautulli:latest - container_name: tautulli - environment: - - PUID=1000 - - PGID=1000 - - TZ=Etc/UTC - - VIRTUAL_HOST=tautulli.${DOMAIN},plex-stats.${DOMAIN} - - LETSENCRYPT_HOST=tautulli.${DOMAIN} - - LETSENCRYPT_EMAIL=${EMAIL} - volumes: - - ${CONFIG_LOCATION}/tautulli:/config - ports: - - 8181:8181 - restart: unless-stopped - radarr: - image: lscr.io/linuxserver/radarr:latest - container_name: radarr - environment: - - PUID=${UID} - - PGID=${GID} - - TZ=${TZ} - - VIRTUAL_HOST=radarr.${DOMAIN},radar.${DOMAIN} - - LETSENCRYPT_HOST=radarr.${DOMAIN},radar.${DOMAIN} - - LETSENCRYPT_EMAIL=${EMAIL} - volumes: - - ${CONFIG_LOCATION}/radarr:/config - - ${DATA_LOCATION}/Movies:/movies - - /media/seedbox:/downloads - expose: - - "7878" - ports: - - 7878:7878 - restart: unless-stopped - sonarr: - image: lscr.io/linuxserver/sonarr:latest - container_name: sonarr - environment: - - PUID=${UID} - - PGID=${GID} - - TZ=${TZ} - - VIRTUAL_HOST=sonarr.${DOMAIN},sonar.${DOMAIN} - - LETSENCRYPT_HOST=sonarr.${DOMAIN},sonar.${DOMAIN} - - LETSENCRYPT_EMAIL=${EMAIL} - volumes: - - ${CONFIG_LOCATION}/sonarr:/config - - ${DATA_LOCATION}/TV:/tv - - /media/seedbox:/downloads - expose: - - "8989" - ports: - - 8989:8989 - restart: unless-stopped - prowlarr: - image: lscr.io/linuxserver/prowlarr:latest - container_name: prowlarr - environment: - - PUID=${UID} - - PGID=${GID} - - TZ=${TZ} - - VIRTUAL_HOST=prowlarr.${DOMAIN} - - LETSENCRYPT_HOST=prowlarr.${DOMAIN} - - LETSENCRYPT_EMAIL=${EMAIL} - volumes: - - ${CONFIG_LOCATION}/prowlarr:/config - expose: - - "9696" - ports: - - 9696:9696 - restart: unless-stopped - bazarr: - image: lscr.io/linuxserver/bazarr:latest - container_name: bazarr - environment: - - PUID=1000 - - PGID=1000 - - TZ=Etc/UTC - - VIRTUAL_HOST=bazarr.${DOMAIN} - - LETSENCRYPT_HOST=bazarr.${DOMAIN} - - LETSENCRYPT_EMAIL=${EMAIL} - volumes: - - ${CONFIG_LOCATION}/bazarr:/config - - ${DATA_LOCATION}/Movies:/movies #optional - - ${DATA_LOCATION}/TV:/tv #optional - expose: - - "6767" - ports: - - 6767:6767 - restart: unless-stopped - overseerr: - image: lscr.io/linuxserver/overseerr:latest - container_name: overseerr - environment: - - PUID=${UID} - - PGID=${GID} - - TZ=${TZ} - - VIRTUAL_HOST=overseerr.${DOMAIN},overseer.${DOMAIN} - - LETSENCRYPT_HOST=overseerr.${DOMAIN},overseer.${DOMAIN} - - LETSENCRYPT_EMAIL=${EMAIL} - volumes: - - ${CONFIG_LOCATION}/overseerr:/config - expose: - - "5055" - ports: - - 5055:5055 - restart: unless-stopped - lidarr: - image: lscr.io/linuxserver/lidarr:latest - container_name: lidarr - environment: - - PUID=${UID} - - PGID=${GID} - - TZ=${TZ} - - VIRTUAL_HOST=lidarr.${DOMAIN},lidar.${DOMAIN} - - LETSENCRYPT_HOST=lidarr.${DOMAIN},lidar.${DOMAIN} - - LETSENCRYPT_EMAIL=${EMAIL} - volumes: - - ${CONFIG_LOCATION}/lidarr:/config - - ${DATA_LOCATION}/Music:/music - - /media/seedbox:/downloads - expose: - - "8686" - ports: - - 8686:8686 - restart: unless-stopped - mylar3: - image: lscr.io/linuxserver/mylar3:latest - container_name: mylar3 - environment: - - PUID=${UID} - - PGID=${GID} - - TZ=${TZ} - - VIRTUAL_HOST=mylar.${DOMAIN},mylar3.${DOMAIN} - - LETSENCRYPT_HOST=mylar.${DOMAIN},mylar3.${DOMAIN} - - LETSENCRYPT_EMAIL=${EMAIL} - volumes: - - ${CONFIG_LOCATION}/mylar3:/config - - ${DATA_LOCATION}/Comics:/comics - - /media/seedbox:/downloads - ports: - - 8090:8090 - restart: unless-stopped - navidrome: - image: deluan/navidrome:latest - user: 1000:1000 # should be owner of volumes - ports: - - "4533:4533" - expose: - - "4533" - restart: unless-stopped - environment: - # Optional: put your config options customization here. Examples: - ND_SCANSCHEDULE: 1h - ND_LOGLEVEL: info - ND_SESSIONTIMEOUT: 24h - ND_BASEURL: "" - VIRTUAL_HOST: "navidrome.${DOMAIN}" - LETSENCRYPT_HOST: "navidrome.${DOMAIN}" - LETSENCRYPT_EMAIL: ${EMAIL} - volumes: - - "${DATA_LOCATION}:/data" - - "${DATA_LOCATION}/Music:/music:ro" - ubooquity: - image: lscr.io/linuxserver/ubooquity:latest - container_name: ubooquity - environment: - - PUID=${UID} - - PGID=${GID} - - TZ=${TZ} - - VIRTUAL_HOST=ubooquity.${DOMAIN} - - VIRTUAL_PORT=2202 - # - MAXMEM= #optional - volumes: - - ${CONFIG_LOCATION}/ubooquity:/config - - ${DATA_LOCATION}/Books:/books - - ${DATA_LOCATION}/Comics:/comics - # - /path/to/raw/files:/files - expose: - - "2202" - - "2203" - ports: - - 2202:2202 #:2202/ubooquity - - 2203:2203 #:2203/ubooquity/admin - restart: unless-stopped - audiobookshelf: - image: ghcr.io/advplyr/audiobookshelf:latest - ports: - - 13378:80 - volumes: - - ${CONFIG_LOCATION}/audiobookshelf:/config - - ${DATA_LOCATION}/Audiobooks:/audiobooks - # - :/podcasts - - ${DATA_LOCATION}/Audiobooks/metadata:/metadata - environment: - - TZ=${TZ} - - VIRTUAL_HOST=audiobookshelf.${DOMAIN} - readarr: - image: lscr.io/linuxserver/readarr:develop - container_name: readarr - environment: - - PUID=${UID} - - PGID=${GID} - - TZ=${TZ} - - VIRTUAL_HOST=readarr.${DOMAIN},readar.${DOMAIN} - - LETSENCRYPT_HOST=readarr.${DOMAIN},readar.${DOMAIN} - - LETSENCRYPT_EMAIL=${EMAIL} - volumes: - - ${CONFIG_LOCATION}/readarr:/config - - ${DATA_LOCATION}/Books:/books - - /media/seedbox:/downloads - expose: - - "8787" - ports: - - 8787:8787 - restart: unless-stopped - readarraudio: - image: lscr.io/linuxserver/readarr:develop - container_name: readarraudio - environment: - - PUID=${UID} - - PGID=${GID} - - TZ=${TZ} - - VIRTUAL_HOST=readarraudio.${DOMAIN},readaraudio.${DOMAIN} - - LETSENCRYPT_HOST=readarraudio.${DOMAIN},readaraudio.${DOMAIN} - - LETSENCRYPT_EMAIL=${EMAIL} - volumes: - - ${CONFIG_LOCATION}/readarr-audio:/config - - ${DATA_LOCATION}/Audiobooks:/audiobooks - - /media/seedbox:/downloads - restart: unless-stopped - wordpress-botc: - depends_on: - - db - image: wordpress - restart: always - environment: - WORDPRESS_DB_HOST: db - WORDPRESS_DB_USER: root - WORDPRESS_DB_PASSWORD: ${DBPASS} - WORDPRESS_DB_NAME: clocktower - VIRTUAL_HOST: "botc.${DOMAIN}, *.phillybotc.com" - LETSENCRYPT_HOST: "botc.${DOMAIN}, *.phillybotc.com" - LETSENCRYPT_EMAIL: ${EMAIL} - volumes: - - wordpress-botc:/var/www/html - # wordpress-home: - # depends_on: - # - db - # image: wordpress - # restart: always - # environment: - # WORDPRESS_DB_HOST: db - # WORDPRESS_DB_USER: root - # WORDPRESS_DB_PASSWORD: ${DBPASS} - # WORDPRESS_DB_NAME: homepage - # VIRTUAL_HOST: "${DOMAIN}, www.${DOMAIN}" - # LETSENCRYPT_HOST: "www.brodin.rocks" - # LETSENCRYPT_EMAIL: "bjageman@gmail.com" - # volumes: - # - wordpress-home:/var/www/html - db: - image: mysql:latest - restart: always - environment: - MYSQL_ROOT_PASSWORD: ${DBPASS} - volumes: - - db:/var/lib/mysql - - ./docker/provision/mysql/init:/docker-entrypoint-initdb.d - #Nextcloud - nextcloud: - depends_on: - - db - image: lscr.io/linuxserver/nextcloud:latest - container_name: nextcloud - environment: - PUID: "1000" - PGID: "1000" - TZ: "${TZ}" - VIRTUAL_HOST: "nextcloud.${DOMAIN}" - MYSQL_HOST: db - MYSQL_DATABASE: nextcloud - MYSQL_USER: root - MYSQL_PASSWORD: ${DBPASS} - REDIS_HOST: redis - LETSENCRYPT_HOST: nextcloud.${DOMAIN} - LETSENCRYPT_EMAIL: ${EMAIL} - # LETSENCRYPT_TEST: true - volumes: - - ${CONFIG_LOCATION}/nextcloud:/config - - ${DATA_LOCATION}/Cloud/Nextcloud:/data - restart: unless-stopped -volumes: - # wordpress-home: - wordpress-botc: - db: - - diff --git a/fusiondance/.env.example b/fusiondance/.env.example new file mode 100644 index 0000000..7df0b83 --- /dev/null +++ b/fusiondance/.env.example @@ -0,0 +1,3 @@ +DOMAIN=example.com +DBPASS=password +EMAIL=example@mail.com diff --git a/fusiondance/.gitignore b/fusiondance/.gitignore new file mode 100644 index 0000000..4846d12 --- /dev/null +++ b/fusiondance/.gitignore @@ -0,0 +1,2 @@ +backup/* +wordpress/* \ No newline at end of file diff --git a/fusiondance/docker-compose.yml b/fusiondance/docker-compose.yml new file mode 100644 index 0000000..cbd5cc0 --- /dev/null +++ b/fusiondance/docker-compose.yml @@ -0,0 +1,37 @@ +services: + db: + image: mysql:8.0 + restart: always + environment: + MYSQL_DATABASE: fusiondance + MYSQL_USER: wordpress + MYSQL_PASSWORD: ${DBPASS} + MYSQL_RANDOM_ROOT_PASSWORD: '1' + volumes: + - db:/var/lib/mysql + wordpress: + depends_on: + - db + image: wordpress + restart: always + environment: + # PUID: ${UID} + # PGID: ${GID} + WORDPRESS_DB_HOST: fusiondance-db-1 + WORDPRESS_DB_USER: wordpress + WORDPRESS_DB_PASSWORD: ${DBPASS} + WORDPRESS_DB_NAME: fusiondance + VIRTUAL_HOST: "www.phillyfusiondance.com, phillyfusiondance.com" + LETSENCRYPT_HOST: "phillyfusiondance.com, www.phillyfusiondance.com" + LETSENCRYPT_EMAIL: ${EMAIL} + # LETSENCRYPT_TEST: true + volumes: + - ./wordpress:/var/www/html + - ./backup:/var/www/html/wp-content/updraft +volumes: + wordpress: + db: +networks: + default: + name: nginx-proxy + external: true diff --git a/games/.gitignore b/games/.gitignore index 07f43b8..4227bcf 100644 --- a/games/.gitignore +++ b/games/.gitignore @@ -1 +1 @@ -data/* \ No newline at end of file +db/* \ No newline at end of file diff --git a/games/docker-compose.yml b/games/docker-compose.yml index 7584472..0f243f3 100644 --- a/games/docker-compose.yml +++ b/games/docker-compose.yml @@ -31,9 +31,7 @@ services: POSTGRES_DB: gamevault volumes: # Mount the folder where your PostgreSQL database files should land - - db:/var/lib/postgresql/data -volumes: - db: + - ./db:/var/lib/postgresql/data networks: default: name: nginx-proxy diff --git a/nextcloud/.gitignore b/nextcloud/.gitignore new file mode 100644 index 0000000..07f43b8 --- /dev/null +++ b/nextcloud/.gitignore @@ -0,0 +1 @@ +data/* \ No newline at end of file diff --git a/nextcloud/config_bak/.htaccess b/nextcloud/config_bak/.htaccess new file mode 100644 index 0000000..13ca287 --- /dev/null +++ b/nextcloud/config_bak/.htaccess @@ -0,0 +1,25 @@ +# Section for Apache 2.4 to 2.6 + + Require all denied + + + Order Allow,Deny + Deny from all + Satisfy All + + +# Section for Apache 2.2 + + + + Order Allow,Deny + Deny from all + + Satisfy All + + + +# Section for Apache 2.2 to 2.6 + + IndexIgnore * + diff --git a/nextcloud/config_bak/apache-pretty-urls.config.php b/nextcloud/config_bak/apache-pretty-urls.config.php new file mode 100644 index 0000000..72da1d8 --- /dev/null +++ b/nextcloud/config_bak/apache-pretty-urls.config.php @@ -0,0 +1,4 @@ + '/', +); diff --git a/nextcloud/config_bak/apcu.config.php b/nextcloud/config_bak/apcu.config.php new file mode 100644 index 0000000..69fed87 --- /dev/null +++ b/nextcloud/config_bak/apcu.config.php @@ -0,0 +1,4 @@ + '\OC\Memcache\APCu', +); diff --git a/nextcloud/config_bak/apps.config.php b/nextcloud/config_bak/apps.config.php new file mode 100644 index 0000000..4c37f72 --- /dev/null +++ b/nextcloud/config_bak/apps.config.php @@ -0,0 +1,15 @@ + array ( + 0 => array ( + 'path' => OC::$SERVERROOT.'/apps', + 'url' => '/apps', + 'writable' => false, + ), + 1 => array ( + 'path' => OC::$SERVERROOT.'/custom_apps', + 'url' => '/custom_apps', + 'writable' => true, + ), + ), +); diff --git a/nextcloud/config_bak/config.php b/nextcloud/config_bak/config.php new file mode 100755 index 0000000..23cf6ed --- /dev/null +++ b/nextcloud/config_bak/config.php @@ -0,0 +1,69 @@ + '/', + 'memcache.local' => '\\OC\\Memcache\\APCu', + 'apps_paths' => + array ( + 0 => + array ( + 'path' => '/var/www/html/apps', + 'url' => '/apps', + 'writable' => false, + ), + 1 => + array ( + 'path' => '/var/www/html/custom_apps', + 'url' => '/custom_apps', + 'writable' => true, + ), + ), + 'memcache.distributed' => '\\OC\\Memcache\\Redis', + 'memcache.locking' => '\\OC\\Memcache\\Redis', + 'redis' => + array ( + 'host' => 'redis', + 'password' => '', + 'port' => 6379, + ), + 'upgrade.disable-web' => true, + 'instanceid' => 'ocj30zib09xz', + 'passwordsalt' => 'stITL4J+mfSFbwH1Dau7jBxDTMSgi8', + 'secret' => '4JhczCjrPiJy0PlFgbiUQxBR8kSJcaXBZE3KOuBkpdfe4c6/', + 'trusted_domains' => + array ( + 0 => 'nextcloud.brodin.rocks', + ), + 'datadirectory' => '/var/www/html/data', + 'dbtype' => 'mysql', + 'version' => '29.0.0.19', + 'overwrite.cli.url' => 'https://nextcloud.brodin.rocks', + 'overwriteprotocol' => 'https', + 'ratelimit.protection.enabled' => false, + 'auth.bruteforce.protection.enabled' => false, + 'dbname' => 'nextcloud', + 'dbhost' => 'db', + 'dbport' => '', + 'dbtableprefix' => 'oc_', + 'mysql.utf8mb4' => true, + 'dbuser' => 'nextcloud', + 'dbpassword' => 'whiskey-wango-woxtrot', + 'installed' => true, + 'memories.db.triggers.fcu' => true, + 'memories.exiftool' => '/var/www/html/custom_apps/memories/bin-ext/exiftool-amd64-glibc', + 'memories.vod.path' => '/var/www/html/custom_apps/memories/bin-ext/go-vod-amd64', + 'mail_from_address' => 'admin', + 'mail_smtpmode' => 'smtp', + 'mail_sendmailmode' => 'smtp', + 'mail_domain' => 'brodin.rocks', + 'mail_smtphost' => 'smtp.sendgrid.net', + 'mail_smtpport' => '587', + 'mail_smtpauth' => 1, + 'mail_smtpname' => 'apikey', + 'mail_smtppassword' => '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', + 'enabledPreviewProviders' => + array ( + 0 => 'OC\\Preview\\Image', + 1 => 'OC\\Preview\\Movie', + ), + 'memories.vod.disable' => false, +); diff --git a/nextcloud/config_bak/config.sample.php b/nextcloud/config_bak/config.sample.php new file mode 100644 index 0000000..2803344 --- /dev/null +++ b/nextcloud/config_bak/config.sample.php @@ -0,0 +1,2434 @@ + 'd3c944a9a', + */ +'instanceid' => '', + + /** + * The salt used to hash all passwords, auto-generated by the Nextcloud + * installer. (There are also per-user salts.) If you lose this salt you lose + * all your passwords. This example is for documentation only, and you should + * never use it. + * + * @deprecated This salt is deprecated and only used for legacy-compatibility, + * developers should *NOT* use this value for anything nowadays. + * + * 'passwordsalt' => 'd3c944a9af095aa08f', + */ +'passwordsalt' => '', + +/** + * Secret used by Nextcloud for various purposes, e.g. to encrypt data. If you + * lose this string there will be data corruption. + */ +'secret' => '', + +/** + * Your list of trusted domains that users can log into. Specifying trusted + * domains prevents host header poisoning. Do not remove this, as it performs + * necessary security checks. + * You can specify: + * + * - the exact hostname of your host or virtual host, e.g. demo.example.org. + * - the exact hostname with permitted port, e.g. demo.example.org:443. + * This disallows all other ports on this host + * - use * as a wildcard, e.g. ubos-raspberry-pi*.local will allow + * ubos-raspberry-pi.local and ubos-raspberry-pi-2.local + * - the IP address with or without permitted port, e.g. [2001:db8::1]:8080 + * Using TLS certificates where commonName= is deprecated + */ +'trusted_domains' => + [ + 'demo.example.org', + 'otherdomain.example.org', + '10.111.112.113', + '[2001:db8::1]' + ], + + +/** + * Where user files are stored. The SQLite database is also stored here, when + * you use SQLite. + * + * Default to ``data/`` in the Nextcloud directory. + */ +'datadirectory' => '/var/www/nextcloud/data', + +/** + * The current version number of your Nextcloud installation. This is set up + * during installation and update, so you shouldn't need to change it. + */ +'version' => '', + +/** + * Identifies the database used with this installation. See also config option + * ``supportedDatabases`` + * + * Available: + * - sqlite3 (SQLite3) + * - mysql (MySQL/MariaDB) + * - pgsql (PostgreSQL) + * + * Defaults to ``sqlite3`` + */ +'dbtype' => 'sqlite3', + +/** + * Your host server name, for example ``localhost``, ``hostname``, + * ``hostname.example.com``, or the IP address. + * To specify a port use ``hostname:####``, for IPv6 addresses use the URI notation ``[ip]:port``. + * To specify a Unix socket use ``/path/to/directory/containing/socket``, e.g. ``/run/postgresql/``. + */ +'dbhost' => '', + +/** + * The name of the Nextcloud database, which is set during installation. You + * should not need to change this. + */ +'dbname' => 'nextcloud', + +/** + * The user that Nextcloud uses to write to the database. This must be unique + * across Nextcloud instances using the same SQL database. This is set up during + * installation, so you shouldn't need to change it. + */ +'dbuser' => '', + +/** + * The password for the database user. This is set up during installation, so + * you shouldn't need to change it. + */ +'dbpassword' => '', + +/** + * Prefix for the Nextcloud tables in the database. + * + * Default to ``oc_`` + */ +'dbtableprefix' => 'oc_', + +/** + * Enable persistent connexions to the database. + * This setting uses the "persistent" option from doctrine dbal, which in turn + * uses the PDO::ATTR_PERSISTENT option from the pdo driver. + */ +'dbpersistent' => '', + +/** + * Specify read only replicas to be used by Nextcloud when querying the database + */ +'dbreplica' => [ + ['user' => 'nextcloud', 'password' => 'password1', 'host' => 'replica1', 'dbname' => ''], + ['user' => 'nextcloud', 'password' => 'password2', 'host' => 'replica2', 'dbname' => ''], +], + +/** + * Indicates whether the Nextcloud instance was installed successfully; ``true`` + * indicates a successful installation, and ``false`` indicates an unsuccessful + * installation. + * + * Defaults to ``false`` + */ +'installed' => false, + + +/** + * User Experience + * + * These optional parameters control some aspects of the user interface. Default + * values, where present, are shown. + */ + +/** + * This sets the default language on your Nextcloud server, using ISO_639-1 + * language codes such as ``en`` for English, ``de`` for German, and ``fr`` for + * French. The default_language parameter is only used, when the browser does + * not send any language, and the user hasn’t configured own language + * preferences. + * + * Nextcloud has two distinguished language codes for German, 'de' and 'de_DE'. + * 'de' is used for informal German and 'de_DE' for formal German. By setting + * this value to 'de_DE' you can enforce the formal version of German unless + * the user has chosen something different explicitly. + * + * Defaults to ``en`` + */ +'default_language' => 'en', + +/** + * With this setting a language can be forced for all users. If a language is + * forced, the users are also unable to change their language in the personal + * settings. If users shall be unable to change their language, but users have + * different languages, this value can be set to ``true`` instead of a language + * code. + * + * Defaults to ``false`` + */ +'force_language' => 'en', + +/** + * This sets the default locale on your Nextcloud server, using ISO_639 + * language codes such as ``en`` for English, ``de`` for German, and ``fr`` for + * French, and ISO-3166 country codes such as ``GB``, ``US``, ``CA``, as defined + * in RFC 5646. It overrides automatic locale detection on public pages like + * login or shared items. User's locale preferences configured under "personal + * -> locale" override this setting after they have logged in. + * + * Defaults to ``en`` + */ +'default_locale' => 'en_US', + +/** + * This sets the default region for phone numbers on your Nextcloud server, + * using ISO 3166-1 country codes such as ``DE`` for Germany, ``FR`` for France, … + * It is required to allow inserting phone numbers in the user profiles starting + * without the country code (e.g. +49 for Germany). + * + * No default value! + */ +'default_phone_region' => 'GB', + +/** + * With this setting a locale can be forced for all users. If a locale is + * forced, the users are also unable to change their locale in the personal + * settings. If users shall be unable to change their locale, but users have + * different languages, this value can be set to ``true`` instead of a locale + * code. + * + * Defaults to ``false`` + */ +'force_locale' => 'en_US', + +/** + * This sets the default timezone on your Nextcloud server, using IANA + * identifiers like ``Europe/Berlin`` or ``Pacific/Auckland``. The default + * timezone parameter is only used when the timezone of the user can't be + * determined. + * + * Defaults to ``UTC`` + */ +'default_timezone' => 'Europe/Berlin', + +/** + * ``true`` enables the Help menu item in the user menu (top right of the + * Nextcloud Web interface). ``false`` removes the Help item. + */ +'knowledgebaseenabled' => true, + +/** + * ``true`` embeds the documentation in an iframe inside Nextcloud. + * ``false`` only shows buttons to the online documentation. + */ +'knowledgebase.embedded' => false, + +/** + * ``true`` allows users to change their display names (on their Personal + * pages), and ``false`` prevents them from changing their display names. + */ +'allow_user_to_change_display_name' => true, + +/** + * The directory where the skeleton files are located. These files will be + * copied to the data directory of new users. Leave empty to not copy any + * skeleton files. + * ``{lang}`` can be used as a placeholder for the language of the user. + * If the directory does not exist, it falls back to non dialect (from ``de_DE`` + * to ``de``). If that does not exist either, it falls back to ``default`` + * + * Defaults to ``core/skeleton`` in the Nextcloud directory. + */ +'skeletondirectory' => '/path/to/nextcloud/core/skeleton', + + +/** + * The directory where the template files are located. These files will be + * copied to the template directory of new users. Leave empty to not copy any + * template files. + * ``{lang}`` can be used as a placeholder for the language of the user. + * If the directory does not exist, it falls back to non dialect (from ``de_DE`` + * to ``de``). If that does not exist either, it falls back to ``default`` + * + * If this is not set creating a template directory will only happen if no custom + * ``skeletondirectory`` is defined, otherwise the shipped templates will be used + * to create a template directory for the user. + */ +'templatedirectory' => '/path/to/nextcloud/templates', + +/** + * User session + */ + +/** + * Lifetime of the remember login cookie. This should be larger than the + * session_lifetime. If it is set to 0 remember me is disabled. + * + * Defaults to ``60*60*24*15`` seconds (15 days) + */ +'remember_login_cookie_lifetime' => 60*60*24*15, + +/** + * The lifetime of a session after inactivity. + * + * The maximum possible time is limited by the session.gc_maxlifetime php.ini setting + * which would overwrite this option if it is less than the value in the config.php + * + * Defaults to ``60*60*24`` seconds (24 hours) + */ +'session_lifetime' => 60 * 60 * 24, + +/** + * The timeout in seconds for requests to servers made by the DAV component (e.g., needed for federated shares). + */ +'davstorage.request_timeout' => 30, + +/** + * `true` enabled a relaxed session timeout, where the session timeout would no longer be + * handled by Nextcloud but by either the PHP garbage collection or the expiration of + * potential other session backends like redis. + * + * This may lead to sessions being available for longer than what session_lifetime uses but + * comes with performance benefits as sessions are no longer a locking operation for concurrent + * requests. + */ +'session_relaxed_expiry' => false, + +/** + * Enable or disable session keep-alive when a user is logged in to the Web UI. + * Enabling this sends a "heartbeat" to the server to keep it from timing out. + * + * Defaults to ``true`` + */ +'session_keepalive' => true, + +/** + * Enable or disable the automatic logout after session_lifetime, even if session + * keepalive is enabled. This will make sure that an inactive browser will be logged out + * even if requests to the server might extend the session lifetime. + * + * Defaults to ``false`` + */ +'auto_logout' => false, + +/** + * Enforce token authentication for clients, which blocks requests using the user + * password for enhanced security. Users need to generate tokens in personal settings + * which can be used as passwords on their clients. + * + * Defaults to ``false`` + */ +'token_auth_enforced' => false, + +/** + * The interval at which token activity should be updated. + * Increasing this value means that the last activity on the security page gets + * more outdated. + * + * Tokens are still checked every 5 minutes for validity + * max value: 300 + * + * Defaults to ``300`` + */ +'token_auth_activity_update' => 60, + +/** + * Whether the brute force protection shipped with Nextcloud should be enabled or not. + * + * Disabling this is discouraged for security reasons. + * + * Defaults to ``true`` + */ +'auth.bruteforce.protection.enabled' => true, + +/** + * Whether the brute force protection shipped with Nextcloud should be set to testing mode. + * + * In testing mode brute force attempts are still recorded, but the requests do + * not sleep/wait for the specified time. They will still abort with + * "429 Too Many Requests" when the maximum delay is reached. + * Enabling this is discouraged for security reasons + * and should only be done for debugging and on CI when running tests. + * + * Defaults to ``false`` + */ +'auth.bruteforce.protection.testing' => false, + +/** + * Whether the rate limit protection shipped with Nextcloud should be enabled or not. + * + * Disabling this is discouraged for security reasons. + * + * Defaults to ``true`` + */ +'ratelimit.protection.enabled' => true, + +/** + * By default, WebAuthn is available, but it can be explicitly disabled by admins + */ +'auth.webauthn.enabled' => true, + +/** + * Whether encrypted password should be stored in the database + * + * The passwords are only decrypted using the login token stored uniquely in the + * clients and allow to connect to external storages, autoconfigure mail account in + * the mail app and periodically check if the password it still valid. + * + * This might be desirable to disable this functionality when using one time + * passwords or when having a password policy enforcing long passwords (> 300 + * characters). + * + * By default, the passwords are stored encrypted in the database. + * + * WARNING: If disabled, password changes on the user back-end (e.g. on LDAP) no + * longer log connected clients out automatically. Users can still disconnect + * the clients by deleting the app token from the security settings. + */ +'auth.storeCryptedPassword' => true, + +/** + * By default, the login form is always available. There are cases (SSO) where an + * admin wants to avoid users entering their credentials to the system if the SSO + * app is unavailable. + * + * This will show an error. But the direct login still works with adding ?direct=1 + */ +'hide_login_form' => false, + +/** + * If your user backend does not allow password resets (e.g. when it's a + * read-only user backend like LDAP), you can specify a custom link, where the + * user is redirected to, when clicking the "reset password" link after a failed + * login-attempt. + * In case you do not want to provide any link, replace the url with 'disabled' + */ +'lost_password_link' => 'https://example.org/link/to/password/reset', + +/** + * URL to use as target for the logo link in the header (top-left logo) + * + * Defaults to the base URL of your Nextcloud instance + */ +'logo_url' => 'https://example.org', + +/** + * Mail Parameters + * + * These configure the email settings for Nextcloud notifications and password + * resets. + */ + +/** + * The return address that you want to appear on emails sent by the Nextcloud + * server, for example ``nc-admin@example.com``, substituting your own domain, + * of course. + */ +'mail_domain' => 'example.com', + +/** + * FROM address that overrides the built-in ``sharing-noreply`` and + * ``lostpassword-noreply`` FROM addresses. + * + * Defaults to different from addresses depending on the feature. + */ +'mail_from_address' => 'nextcloud', + +/** + * Enable SMTP class debugging. + * + * Defaults to ``false`` + */ +'mail_smtpdebug' => false, + +/** + * Which mode to use for sending mail: ``sendmail``, ``smtp`` or ``qmail``. + * + * If you are using local or remote SMTP, set this to ``smtp``. + * + * For the ``sendmail`` option you need an installed and working email system on + * the server, with ``/usr/sbin/sendmail`` installed on your Unix system. + * + * For ``qmail`` the binary is /var/qmail/bin/sendmail, and it must be installed + * on your Unix system. + * + * Defaults to ``smtp`` + */ +'mail_smtpmode' => 'smtp', + +/** + * This depends on ``mail_smtpmode``. Specify the IP address of your mail + * server host. This may contain multiple hosts separated by a semicolon. If + * you need to specify the port number append it to the IP address separated by + * a colon, like this: ``127.0.0.1:24``. + * + * Defaults to ``127.0.0.1`` + */ +'mail_smtphost' => '127.0.0.1', + +/** + * This depends on ``mail_smtpmode``. Specify the port for sending mail. + * + * Defaults to ``25`` + */ +'mail_smtpport' => 25, + +/** + * This depends on ``mail_smtpmode``. This sets the SMTP server timeout, in + * seconds. You may need to increase this if you are running an anti-malware or + * spam scanner. + * + * Defaults to ``10`` seconds + */ +'mail_smtptimeout' => 10, + +/** + * This depends on ``mail_smtpmode``. Specify ``ssl`` when you are using SSL/TLS. Any other value will be ignored. + * + * If the server advertises STARTTLS capabilities, they might be used, but they cannot be enforced by + * this config option. + * + * Defaults to ``''`` (empty string) + */ +'mail_smtpsecure' => '', + +/** + * + * This depends on ``mail_smtpmode``. Change this to ``true`` if your mail + * server requires authentication. + * + * Defaults to ``false`` + */ +'mail_smtpauth' => false, + +/** + * This depends on ``mail_smtpauth``. Specify the username for authenticating to + * the SMTP server. + * + * Defaults to ``''`` (empty string) + */ +'mail_smtpname' => '', + +/** + * This depends on ``mail_smtpauth``. Specify the password for authenticating to + * the SMTP server. + * + * Default to ``''`` (empty string) + */ +'mail_smtppassword' => '', + +/** + * Replaces the default mail template layout. This can be utilized if the + * options to modify the mail texts with the theming app is not enough. + * The class must extend ``\OC\Mail\EMailTemplate`` + */ +'mail_template_class' => '\OC\Mail\EMailTemplate', + +/** + * Email will be sent by default with an HTML and a plain text body. This option + * allows to only send plain text emails. + */ +'mail_send_plaintext_only' => false, + +/** + * This depends on ``mail_smtpmode``. Array of additional streams options that + * will be passed to underlying Swift mailer implementation. + * Defaults to an empty array. + */ +'mail_smtpstreamoptions' => [], + +/** + * Which mode is used for sendmail/qmail: ``smtp`` or ``pipe``. + * + * For ``smtp`` the sendmail binary is started with the parameter ``-bs``: + * - Use the SMTP protocol on standard input and output. + * + * For ``pipe`` the binary is started with the parameters ``-t``: + * - Read message from STDIN and extract recipients. + * + * Defaults to ``smtp`` + */ +'mail_sendmailmode' => 'smtp', + +/** + * Proxy Configurations + */ + +/** + * The automatic hostname detection of Nextcloud can fail in certain reverse + * proxy and CLI/cron situations. This option allows you to manually override + * the automatic detection; for example ``www.example.com``, or specify the port + * ``www.example.com:8080``. + */ +'overwritehost' => '', + +/** + * When generating URLs, Nextcloud attempts to detect whether the server is + * accessed via ``https`` or ``http``. However, if Nextcloud is behind a proxy + * and the proxy handles the ``https`` calls, Nextcloud would not know that + * ``ssl`` is in use, which would result in incorrect URLs being generated. + * Valid values are ``http`` and ``https``. + */ +'overwriteprotocol' => '', + +/** + * Nextcloud attempts to detect the webroot for generating URLs automatically. + * For example, if ``www.example.com/nextcloud`` is the URL pointing to the + * Nextcloud instance, the webroot is ``/nextcloud``. When proxies are in use, + * it may be difficult for Nextcloud to detect this parameter, resulting in + * invalid URLs. + */ +'overwritewebroot' => '', + +/** + * This option allows you to define a manual override condition as a regular + * expression for the remote IP address. For example, defining a range of IP + * addresses starting with ``10.0.0.`` and ending with 1 to 3: + * ``^10\.0\.0\.[1-3]$`` + * + * Defaults to ``''`` (empty string) + */ +'overwritecondaddr' => '', + +/** + * Use this configuration parameter to specify the base URL for any URLs which + * are generated within Nextcloud using any kind of command line tools (cron or + * occ). The value should contain the full base URL: + * ``https://www.example.com/nextcloud`` + * + * Defaults to ``''`` (empty string) + */ +'overwrite.cli.url' => '', + +/** + * To have clean URLs without `/index.php` this parameter needs to be configured. + * + * This parameter will be written as "RewriteBase" on update and installation of + * Nextcloud to your `.htaccess` file. While this value is often simply the URL + * path of the Nextcloud installation it cannot be set automatically properly in + * every scenario and needs thus some manual configuration. + * + * In a standard Apache setup this usually equals the folder that Nextcloud is + * accessible at. So if Nextcloud is accessible via "https://mycloud.org/nextcloud" + * the correct value would most likely be "/nextcloud". If Nextcloud is running + * under "https://mycloud.org/" then it would be "/". + * + * Note that the above rule is not valid in every case, as there are some rare setup + * cases where this may not apply. However, to avoid any update problems this + * configuration value is explicitly opt-in. + * + * After setting this value run `occ maintenance:update:htaccess`. Now, when the + * following conditions are met Nextcloud URLs won't contain `index.php`: + * + * - `mod_rewrite` is installed + * - `mod_env` is installed + * + * Defaults to ``''`` (empty string) + */ +'htaccess.RewriteBase' => '/', + +/** + * For server setups, that don't have `mod_env` enabled or restricted (e.g. suEXEC) + * this parameter has to be set to true and will assume mod_rewrite. + * + * Please check, if `mod_rewrite` is active and functional before setting this + * parameter, and you updated your .htaccess with `occ maintenance:update:htaccess`. + * Otherwise, your nextcloud installation might not be reachable anymore. + * For example, try accessing resources by leaving out `index.php` in the URL. + */ +'htaccess.IgnoreFrontController' => false, + +/** + * The URL of your proxy server, for example ``proxy.example.com:8081``. + * + * Note: Guzzle (the http library used by Nextcloud) is reading the environment + * variables HTTP_PROXY (only for cli request), HTTPS_PROXY, and NO_PROXY by default. + * + * If you configure proxy with Nextcloud any default configuration by Guzzle + * is overwritten. Make sure to set ``proxyexclude`` accordingly if necessary. + * + * Defaults to ``''`` (empty string) + */ +'proxy' => '', + +/** + * The optional authentication for the proxy to use to connect to the internet. + * The format is: ``username:password``. + * + * Defaults to ``''`` (empty string) + */ +'proxyuserpwd' => '', + +/** + * List of host names that should not be proxied to. + * For example: ``['.mit.edu', 'foo.com']``. + * + * Hint: Use something like ``explode(',', getenv('NO_PROXY'))`` to sync this + * value with the global NO_PROXY option. + * + * Defaults to empty array. + */ +'proxyexclude' => [], + +/** + * Allow remote servers with local addresses e.g. in federated shares, webcal services and more + * + * Defaults to false + */ +'allow_local_remote_servers' => true, + +/** + * Deleted Items (trash bin) + * + * These parameters control the Deleted files app. + */ + +/** + * If the trash bin app is enabled (default), this setting defines the policy + * for when files and folders in the trash bin will be permanently deleted. + * The app allows for two settings, a minimum time for trash bin retention, + * and a maximum time for trash bin retention. + * + * Minimum time is the number of days a file will be kept, after which it + * *may be* deleted. A file may be deleted after the minimum number of days + * is expired if space is needed. The file will not be deleted if space is + * not needed. + * + * Whether "space is needed" depends on whether a user quota is defined or not: + * + * * If no user quota is defined, the available space on the Nextcloud data + * partition sets the limit for the trashbin + * (issues: see https://github.com/nextcloud/server/issues/28451). + * * If a user quota is defined, 50% of the user's remaining quota space sets + * the limit for the trashbin. + * + * Maximum time is the number of days at which it is *guaranteed + * to be* deleted. There is no further dependency on the available space. + * + * Both minimum and maximum times can be set together to explicitly define + * file and folder deletion. For migration purposes, this setting is installed + * initially set to "auto", which is equivalent to the default setting in + * Nextcloud. + * + * Available values (D1 and D2 are configurable numbers): + * + * * ``auto`` + * default setting. keeps files and folders in the trash bin for 30 days + * and automatically deletes anytime after that if space is needed (note: + * files may not be deleted if space is not needed). + * * ``D1, auto`` + * keeps files and folders in the trash bin for D1+ days, delete anytime if + * space needed (note: files may not be deleted if space is not needed) + * * ``auto, D2`` + * delete all files in the trash bin that are older than D2 days + * automatically, delete other files anytime if space needed + * * ``D1, D2`` + * keep files and folders in the trash bin for at least D1 days and + * delete when exceeds D2 days (note: files will not be deleted automatically if space is needed) + * * ``disabled`` + * trash bin auto clean disabled, files and folders will be kept forever + * + * Defaults to ``auto`` + */ +'trashbin_retention_obligation' => 'auto', + + +/** + * File versions + * + * These parameters control the Versions app. + */ + +/** + * If the versions app is enabled (default), this setting defines the policy + * for when versions will be permanently deleted. + * The app allows for two settings, a minimum time for version retention, + * and a maximum time for version retention. + * Minimum time is the number of days a version will be kept, after which it + * may be deleted. Maximum time is the number of days at which it is guaranteed + * to be deleted. + * Both minimum and maximum times can be set together to explicitly define + * version deletion. For migration purposes, this setting is installed + * initially set to "auto", which is equivalent to the default setting in + * Nextcloud. + * + * Available values: + * + * * ``auto`` + * default setting. Automatically expire versions according to expire + * rules. Please refer to :doc:`../configuration_files/file_versioning` for + * more information. + * * ``D, auto`` + * keep versions at least for D days, apply expiration rules to all versions + * that are older than D days + * * ``auto, D`` + * delete all versions that are older than D days automatically, delete + * other versions according to expire rules + * * ``D1, D2`` + * keep versions for at least D1 days and delete when exceeds D2 days + * * ``disabled`` + * versions auto clean disabled, versions will be kept forever + * + * Defaults to ``auto`` + */ +'versions_retention_obligation' => 'auto', + +/** + * Nextcloud Verifications + * + * Nextcloud performs several verification checks. There are two options, + * ``true`` and ``false``. + */ + +/** + * Checks an app before install whether it uses private APIs instead of the + * proper public APIs. If this is set to true it will only allow to install or + * enable apps that pass this check. + * + * Defaults to ``false`` + */ +'appcodechecker' => true, + +/** + * Check if Nextcloud is up-to-date and shows a notification if a new version is + * available. It sends current version, php version, installation and last update + * time and release channel to the updater server which responds with the latest + * available version based on those metrics. + * + * Defaults to ``true`` + */ +'updatechecker' => true, + +/** + * URL that Nextcloud should use to look for updates + * + * Defaults to ``https://updates.nextcloud.com/updater_server/`` + */ +'updater.server.url' => 'https://updates.nextcloud.com/updater_server/', + +/** + * The channel that Nextcloud should use to look for updates + * + * Supported values: + * + * - ``daily`` + * - ``beta`` + * - ``stable`` + */ +'updater.release.channel' => 'stable', + +/** + * Is Nextcloud connected to the Internet or running in a closed network? + * + * Defaults to ``true`` + */ +'has_internet_connection' => true, + +/** + * Which domains to request to determine the availability of an Internet + * connection. If none of these hosts are reachable, the administration panel + * will show a warning. Set to an empty list to not do any such checks (warning + * will still be shown). + * If no protocol is provided, both http and https will be tested. + * For example, 'http://www.nextcloud.com' and 'https://www.nextcloud.com' + * will be tested for 'www.nextcloud.com' + * If a protocol is provided, only this one will be tested. + * + * Defaults to the following domains: + * + * - www.nextcloud.com + * - www.startpage.com + * - www.eff.org + * - www.edri.org + */ +'connectivity_check_domains' => [ + 'www.nextcloud.com', + 'www.startpage.com', + 'www.eff.org', + 'www.edri.org' +], + +/** + * Allows Nextcloud to verify a working .well-known URL redirects. This is done + * by attempting to make a request from JS to + * https://your-domain.com/.well-known/caldav/ + * + * Defaults to ``true`` + */ +'check_for_working_wellknown_setup' => true, + +/** + * This is a crucial security check on Apache servers that should always be set + * to ``true``. This verifies that the ``.htaccess`` file is writable and works. + * If it is not, then any options controlled by ``.htaccess``, such as large + * file uploads, will not work. It also runs checks on the ``data/`` directory, + * which verifies that it can't be accessed directly through the Web server. + * + * Defaults to ``true`` + */ +'check_for_working_htaccess' => true, + +/** + * In rare setups (e.g. on Openshift or Docker on Windows) the permissions check + * might block the installation while the underlying system offers no means to + * "correct" the permissions. In this case, set the value to false. + * + * In regular cases, if issues with permissions are encountered they should be + * adjusted accordingly. Changing the flag is discouraged. + * + * Defaults to ``true`` + */ +'check_data_directory_permissions' => true, + +/** + * In certain environments it is desired to have a read-only configuration file. + * When this switch is set to ``true``, writing to the config file will be + * forbidden. Therefore, it will not be possible to configure all options via + * the Web interface. Furthermore, when updating Nextcloud it is required to + * make the configuration file writable again and to set this switch to ``false`` + * for the update process. + * + * Defaults to ``false`` + */ +'config_is_read_only' => false, + +/** + * Logging + */ + +/** + * This parameter determines where the Nextcloud logs are sent. + * ``file``: the logs are written to file ``nextcloud.log`` in the default + * Nextcloud data directory. The log file can be changed with parameter + * ``logfile``. + * ``syslog``: the logs are sent to the system log. This requires a syslog daemon + * to be active. + * ``errorlog``: the logs are sent to the PHP ``error_log`` function. + * ``systemd``: the logs are sent to the Systemd journal. This requires a system + * that runs Systemd and the Systemd journal. The PHP extension ``systemd`` + * must be installed and active. + * + * Defaults to ``file`` + */ +'log_type' => 'file', + +/** + * This parameter determines where the audit logs are sent. See ``log_type`` for more information. + * + * Defaults to ``file`` + */ +'log_type_audit' => 'file', + +/** + * Name of the file to which the Nextcloud logs are written if parameter + * ``log_type`` is set to ``file``. + * + * Defaults to ``[datadirectory]/nextcloud.log`` + */ +'logfile' => '/var/log/nextcloud.log', + +/** + * Name of the file to which the audit logs are written if parameter + * ``log_type`` is set to ``file``. + * + * Defaults to ``[datadirectory]/audit.log`` + */ +'logfile_audit' => '/var/log/audit.log', + +/** + * Log file mode for the Nextcloud logging type in octal notation. + * + * Defaults to 0640 (writeable by user, readable by group). + */ +'logfilemode' => 0640, + +/** + * Loglevel to start logging at. Valid values are: 0 = Debug, 1 = Info, 2 = + * Warning, 3 = Error, and 4 = Fatal. The default value is Warning. + * + * Defaults to ``2`` + */ +'loglevel' => 2, + +/** + * Loglevel used by the frontend to start logging at. The same values as + * for ``loglevel`` can be used. If not set it defaults to the value + * configured for ``loglevel`` or Warning if that is not set either. + * + * Defaults to ``2`` + */ +'loglevel_frontend' => 2, + +/** + * Loglevel used by the dirty database query detection. Useful to identify + * potential database bugs in production. Set this to loglevel or higher to + * see dirty queries in the logs. + * + * Defaults to ``0`` (debug) + */ +'loglevel_dirty_database_queries' => 0, + +/** + * If you maintain different instances and aggregate the logs, you may want + * to distinguish between them. ``syslog_tag`` can be set per instance + * with a unique id. Only available if ``log_type`` is set to ``syslog`` or + * ``systemd``. + * + * The default value is ``Nextcloud``. + */ +'syslog_tag' => 'Nextcloud', + +/** + * If you maintain different instances and aggregate the logs, you may want + * to distinguish between them. ``syslog_tag_audit`` can be set per instance + * with a unique id. Only available if ``log_type`` is set to ``syslog`` or + * ``systemd``. + * + * The default value is the value of ``syslog_tag``. + */ +'syslog_tag_audit' => 'Nextcloud', + +/** + * Log condition for log level increase based on conditions. Once one of these + * conditions is met, the required log level is set to debug. This allows to + * debug specific requests, users or apps + * + * Supported conditions: + * - ``shared_secret``: if a request parameter with the name `log_secret` is set to + * this value the condition is met + * - ``users``: if the current request is done by one of the specified users, + * this condition is met + * - ``apps``: if the log message is invoked by one of the specified apps, + * this condition is met + * + * Defaults to an empty array. + */ +'log.condition' => [ + 'shared_secret' => '57b58edb6637fe3059b3595cf9c41b9', + 'users' => ['sample-user'], + 'apps' => ['files'], +], + +/** + * Enables logging a backtrace with each log line. Normally, only Exceptions + * are carrying backtrace information which are logged automatically. This + * switch turns them on for any log message. Enabling this option will lead + * to increased log data size. + * + * Defaults to ``false``. + */ +'log.backtrace' => false, + +/** + * This uses PHP.date formatting; see https://www.php.net/manual/en/function.date.php + * + * Defaults to ISO 8601 ``2005-08-15T15:52:01+00:00`` - see \DateTime::ATOM + * (https://www.php.net/manual/en/class.datetime.php#datetime.constants.atom) + */ +'logdateformat' => 'F d, Y H:i:s', + +/** + * The timezone for logfiles. You may change this; see + * https://www.php.net/manual/en/timezones.php + * + * Defaults to ``UTC`` + */ +'logtimezone' => 'Europe/Berlin', + +/** + * Append all database queries and parameters to the log file. Use this only for + * debugging, as your logfile will become huge. + */ +'log_query' => false, + +/** + * Enables log rotation and limits the total size of logfiles. Set it to 0 for + * no rotation. Specify a size in bytes, for example 104857600 (100 megabytes + * = 100 * 1024 * 1024 bytes). A new logfile is created with a new name when the + * old logfile reaches your limit. If a rotated log file is already present, it + * will be overwritten. + * + * Defaults to 100 MB + */ +'log_rotate_size' => 100 * 1024 * 1024, + +/** + * Enable built-in profiler. Helpful when trying to debug performance + * issues. + * + * Note that this has a performance impact and shouldn't be enabled + * on production. + */ +'profiler' => false, + +/** + * Alternate Code Locations + * + * Some Nextcloud code may be stored in alternate locations. + */ + +/** + * This section is for configuring the download links for Nextcloud clients, as + * seen in the first-run wizard and on Personal pages. + * + * Defaults to: + * + * - Desktop client: ``https://nextcloud.com/install/#install-clients`` + * - Android client: ``https://play.google.com/store/apps/details?id=com.nextcloud.client`` + * - iOS client: ``https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8`` + * - iOS client app id: ``1125420102`` + */ +'customclient_desktop' => + 'https://nextcloud.com/install/#install-clients', +'customclient_android' => + 'https://play.google.com/store/apps/details?id=com.nextcloud.client', +'customclient_ios' => + 'https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8', +'customclient_ios_appid' => + '1125420102', +/** + * Apps + * + * Options for the Apps folder, Apps store, and App code checker. + */ + +/** + * Set the default app to open on login. Use the app names as they appear in the + * URL after clicking them in the Apps menu, such as documents, calendar, and + * gallery. You can use a comma-separated list of app names, so if the first + * app is not enabled for a user then Nextcloud will try the second one, and so + * on. If no enabled apps are found it defaults to the dashboard app. + * + * Defaults to ``dashboard,files`` + */ +'defaultapp' => 'dashboard,files', + +/** + * When enabled, admins may install apps from the Nextcloud app store. + * + * Defaults to ``true`` + */ +'appstoreenabled' => true, + +/** + * Enables the installation of apps from a self-hosted apps store. + * Requires that at least one of the configured apps directories is writeable. + * + * Defaults to ``https://apps.nextcloud.com/api/v1`` + */ +'appstoreurl' => 'https://apps.nextcloud.com/api/v1', + +/** + * Filters allowed installable apps from the appstore. + * Empty array will prevent all apps from the store to be found. + */ +'appsallowlist' => [], + +/** + * Use the ``apps_paths`` parameter to set the location of the Apps directory, + * which should be scanned for available apps, and where user-specific apps + * should be installed from the Apps store. The ``path`` defines the absolute + * file system path to the app folder. The key ``url`` defines the HTTP Web path + * to that folder, starting from the Nextcloud webroot. The key ``writable`` + * indicates if a Web server can write files to that folder. + */ +'apps_paths' => [ + [ + 'path'=> '/var/www/nextcloud/apps', + 'url' => '/apps', + 'writable' => true, + ], +], + +/** + * @see appcodechecker + */ + +/** + * Previews + * + * Nextcloud supports previews of image files, the covers of MP3 files, and text + * files. These options control enabling and disabling previews, and thumbnail + * size. + */ + +/** + * By default, Nextcloud can generate previews for the following filetypes: + * + * - Image files + * - Covers of MP3 files + * - Text documents + * + * Valid values are ``true``, to enable previews, or + * ``false``, to disable previews + * + * Defaults to ``true`` + */ +'enable_previews' => true, + +/** + * Number of all preview requests being processed concurrently, + * including previews that need to be newly generated, and those that have + * been generated. + * + * This should be greater than 'preview_concurrency_new'. + * If unspecified, defaults to twice the value of 'preview_concurrency_new'. + */ +'preview_concurrency_all' => 8, + +/** + * Number of new previews that are being concurrently generated. + * + * Depending on the max preview size set by 'preview_max_x' and 'preview_max_y', + * the generation process can consume considerable CPU and memory resources. + * It's recommended to limit this to be no greater than the number of CPU cores. + * If unspecified, defaults to the number of CPU cores, or 4 if that cannot + * be determined. + */ +'preview_concurrency_new' => 4, + +/** + * The maximum width, in pixels, of a preview. A value of ``null`` means there + * is no limit. + * + * Defaults to ``4096`` + */ +'preview_max_x' => 4096, +/** + * The maximum height, in pixels, of a preview. A value of ``null`` means there + * is no limit. + * + * Defaults to ``4096`` + */ +'preview_max_y' => 4096, + +/** + * Max file size for generating image previews with imagegd (default behavior). + * If the image is bigger, it'll try other preview generators, but will most + * likely either show the default mimetype icon or not display the image at all. + * Set to ``-1`` for no limit and try to generate image previews on all file sizes. + * + * Defaults to ``50`` megabytes + */ +'preview_max_filesize_image' => 50, + +/** + * max memory for generating image previews with imagegd (default behavior) + * Reads the image dimensions from the header and assumes 32 bits per pixel. + * If creating the image would allocate more memory, preview generation will + * be disabled and the default mimetype icon is shown. Set to -1 for no limit. + * + * Defaults to ``256`` megabytes + */ +'preview_max_memory' => 256, + +/** + * custom path for LibreOffice/OpenOffice binary + * + * + * Defaults to ``''`` (empty string) + */ +'preview_libreoffice_path' => '/usr/bin/libreoffice', + +/** + * custom path for ffmpeg binary + * + * Defaults to ``null`` and falls back to searching ``avconv`` and ``ffmpeg`` in the configured ``PATH`` environment + */ +'preview_ffmpeg_path' => '/usr/bin/ffmpeg', + +/** + * Set the URL of the Imaginary service to send image previews to. + * Also requires the ``OC\Preview\Imaginary`` provider to be enabled. + * + * See https://github.com/h2non/imaginary + */ +'preview_imaginary_url' => 'http://previews_hpb:8088/', + +/** + * If you want set a api key for imaginary. + */ +'preview_imaginary_key' => 'secret', + +/** + * Only register providers that have been explicitly enabled + * + * The following providers are disabled by default due to performance or privacy + * concerns: + * + * - ``OC\Preview\Font`` + * - ``OC\Preview\HEIC`` + * - ``OC\Preview\Illustrator`` + * - ``OC\Preview\Movie`` + * - ``OC\Preview\MSOffice2003`` + * - ``OC\Preview\MSOffice2007`` + * - ``OC\Preview\MSOfficeDoc`` + * - ``OC\Preview\PDF`` + * - ``OC\Preview\Photoshop`` + * - ``OC\Preview\Postscript`` + * - ``OC\Preview\StarOffice`` + * - ``OC\Preview\SVG`` + * - ``OC\Preview\TIFF`` + * - ``OC\Preview\EMF`` + * + * + * Defaults to the following providers: + * + * - ``OC\Preview\BMP`` + * - ``OC\Preview\GIF`` + * - ``OC\Preview\JPEG`` + * - ``OC\Preview\Krita`` + * - ``OC\Preview\MarkDown`` + * - ``OC\Preview\MP3`` + * - ``OC\Preview\OpenDocument`` + * - ``OC\Preview\PNG`` + * - ``OC\Preview\TXT`` + * - ``OC\Preview\XBitmap`` + */ +'enabledPreviewProviders' => [ + 'OC\Preview\BMP', + 'OC\Preview\GIF', + 'OC\Preview\JPEG', + 'OC\Preview\Krita', + 'OC\Preview\MarkDown', + 'OC\Preview\MP3', + 'OC\Preview\OpenDocument', + 'OC\Preview\PNG', + 'OC\Preview\TXT', + 'OC\Preview\XBitmap', +], + +/** + * LDAP + * + * Global settings used by LDAP User and Group Backend + */ + +/** + * defines the interval in minutes for the background job that checks user + * existence and marks them as ready to be cleaned up. The number is always + * minutes. Setting it to 0 disables the feature. + * See command line (occ) methods ``ldap:show-remnants`` and ``user:delete`` + * + * Defaults to ``51`` minutes + */ +'ldapUserCleanupInterval' => 51, + +/** + * Sort groups in the user settings by name instead of the user count + * + * By enabling this the user count beside the group name is disabled as well. + * @deprecated since Nextcloud 29 - Use the frontend instead or set the app config value `group.sortBy` for `core` to `2` + */ +'sort_groups_by_name' => false, + +/** + * Comments + * + * Global settings for the Comments infrastructure + */ + +/** + * Replaces the default Comments Manager Factory. This can be utilized if an + * own or 3rdParty CommentsManager should be used that – for instance – uses the + * filesystem instead of the database to keep the comments. + * + * Defaults to ``\OC\Comments\ManagerFactory`` + */ +'comments.managerFactory' => '\OC\Comments\ManagerFactory', + +/** + * Replaces the default System Tags Manager Factory. This can be utilized if an + * own or 3rdParty SystemTagsManager should be used that – for instance – uses the + * filesystem instead of the database to keep the tags. + * + * Defaults to ``\OC\SystemTag\ManagerFactory`` + */ +'systemtags.managerFactory' => '\OC\SystemTag\ManagerFactory', + +/** + * Maintenance + * + * These options are for halting user activity when you are performing server + * maintenance. + */ + +/** + * Enable maintenance mode to disable Nextcloud + * + * If you want to prevent users from logging in to Nextcloud before you start + * doing some maintenance work, you need to set the value of the maintenance + * parameter to true. Please keep in mind that users who are already logged-in + * are kicked out of Nextcloud instantly. + * + * Defaults to ``false`` + */ +'maintenance' => false, + +/** + * UTC Hour for maintenance windows + * + * Some background jobs only run once a day. When an hour is defined for this config, + * the background jobs which advertise themselves as not time sensitive will be + * delayed during the "working" hours and only run in the 4 hours after the given time. + * This is e.g. used for activity expiration, suspicious login training and update checks. + * + * A value of 1 e.g. will only run these background jobs between 01:00am UTC and 05:00am UTC. + * + * Defaults to ``100`` which disables the feature + */ +'maintenance_window_start' => 1, + +/** + * Log all LDAP requests into a file + * + * Warning: This heavily decreases the performance of the server and is only + * meant to debug/profile the LDAP interaction manually. + * Also, it might log sensitive data into a plain text file. + */ +'ldap_log_file' => '', + +/** + * SSL + */ + +/** + * Extra SSL options to be used for configuration. + * + * Defaults to an empty array. + */ +'openssl' => [ + 'config' => '/absolute/location/of/openssl.cnf', +], + +/** + * Memory caching backend configuration + * + * Available cache backends: + * + * * ``\OC\Memcache\APCu`` APC user backend + * * ``\OC\Memcache\ArrayCache`` In-memory array-based backend (not recommended) + * * ``\OC\Memcache\Memcached`` Memcached backend + * * ``\OC\Memcache\Redis`` Redis backend + * + * Advice on choosing between the various backends: + * + * * APCu should be easiest to install. Almost all distributions have packages. + * Use this for single user environment for all caches. + * * Use Redis or Memcached for distributed environments. + * For the local cache (you can configure two) take APCu. + */ + +/** + * Memory caching backend for locally stored data + * + * * Used for host-specific data, e.g. file paths + * + * Defaults to ``none`` + */ +'memcache.local' => '\OC\Memcache\APCu', + +/** + * Memory caching backend for distributed data + * + * * Used for installation-specific data, e.g. database caching + * * If unset, defaults to the value of memcache.local + * + * Defaults to ``none`` + */ +'memcache.distributed' => '\OC\Memcache\Memcached', + +/** + * Connection details for redis to use for memory caching in a single server configuration. + * + * For enhanced security it is recommended to configure Redis + * to require a password. See http://redis.io/topics/security + * for more information. + * + * We also support redis SSL/TLS encryption as of version 6. + * See https://redis.io/topics/encryption for more information. + */ +'redis' => [ + 'host' => 'localhost', // can also be a unix domain socket: '/tmp/redis.sock' + 'port' => 6379, + 'timeout' => 0.0, + 'read_timeout' => 0.0, + 'user' => '', // Optional: if not defined, no password will be used. + 'password' => '', // Optional: if not defined, no password will be used. + 'dbindex' => 0, // Optional: if undefined SELECT will not run and will use Redis Server's default DB Index. + // If redis in-transit encryption is enabled, provide certificates + // SSL context https://www.php.net/manual/en/context.ssl.php + 'ssl_context' => [ + 'local_cert' => '/certs/redis.crt', + 'local_pk' => '/certs/redis.key', + 'cafile' => '/certs/ca.crt' + ] +], + +/** + * Connection details for a Redis Cluster. + * + * Redis Cluster support requires the php module phpredis in version 3.0.0 or + * higher. + * + * Available failover modes: + * - \RedisCluster::FAILOVER_NONE - only send commands to master nodes (default) + * - \RedisCluster::FAILOVER_ERROR - failover to slaves for read commands if master is unavailable (recommended) + * - \RedisCluster::FAILOVER_DISTRIBUTE - randomly distribute read commands across master and slaves + * + * WARNING: FAILOVER_DISTRIBUTE is a not recommended setting, and we strongly + * suggest to not use it if you use Redis for file locking. Due to the way Redis + * is synchronized it could happen, that the read for an existing lock is + * scheduled to a slave that is not fully synchronized with the connected master + * which then causes a FileLocked exception. + * + * See https://redis.io/topics/cluster-spec for details about the Redis cluster + * + * Authentication works with phpredis version 4.2.1+. See + * https://github.com/phpredis/phpredis/commit/c5994f2a42b8a348af92d3acb4edff1328ad8ce1 + */ +'redis.cluster' => [ + 'seeds' => [ // provide some or all of the cluster servers to bootstrap discovery, port required + 'localhost:7000', + 'localhost:7001', + ], + 'timeout' => 0.0, + 'read_timeout' => 0.0, + 'failover_mode' => \RedisCluster::FAILOVER_ERROR, + 'user' => '', // Optional: if not defined, no password will be used. + 'password' => '', // Optional: if not defined, no password will be used. + // If redis in-transit encryption is enabled, provide certificates + // SSL context https://www.php.net/manual/en/context.ssl.php + 'ssl_context' => [ + 'local_cert' => '/certs/redis.crt', + 'local_pk' => '/certs/redis.key', + 'cafile' => '/certs/ca.crt' + ] +], + + +/** + * Server details for one or more memcached servers to use for memory caching. + */ +'memcached_servers' => [ + // hostname, port and optional weight + // or path and port 0 for unix socket. Also see: + // https://www.php.net/manual/en/memcached.addservers.php + // https://www.php.net/manual/en/memcached.addserver.php + ['localhost', 11211], + //array('other.host.local', 11211), +], + +/** + * Connection options for memcached + */ +'memcached_options' => [ + // Set timeouts to 50ms + \Memcached::OPT_CONNECT_TIMEOUT => 50, + \Memcached::OPT_RETRY_TIMEOUT => 50, + \Memcached::OPT_SEND_TIMEOUT => 50, + \Memcached::OPT_RECV_TIMEOUT => 50, + \Memcached::OPT_POLL_TIMEOUT => 50, + + // Enable compression + \Memcached::OPT_COMPRESSION => true, + + // Turn on consistent hashing + \Memcached::OPT_LIBKETAMA_COMPATIBLE => true, + + // Enable Binary Protocol + \Memcached::OPT_BINARY_PROTOCOL => true, + + // Binary serializer vill be enabled if the igbinary PECL module is available + //\Memcached::OPT_SERIALIZER => \Memcached::SERIALIZER_IGBINARY, +], + + +/** + * Location of the cache folder, defaults to ``data/$user/cache`` where + * ``$user`` is the current user. When specified, the format will change to + * ``$cache_path/$user`` where ``$cache_path`` is the configured cache directory + * and ``$user`` is the user. + * + * Defaults to ``''`` (empty string) + */ +'cache_path' => '', + +/** + * TTL of chunks located in the cache folder before they're removed by + * garbage collection (in seconds). Increase this value if users have + * issues uploading very large files via the Nextcloud Client as upload isn't + * completed within one day. + * + * Defaults to ``60*60*24`` (1 day) + */ +'cache_chunk_gc_ttl' => 60*60*24, + +/** + * Using Object Store with Nextcloud + */ + +/** + * This example shows how to configure Nextcloud to store all files in a + * swift object storage. + * + * It is important to note that Nextcloud in object store mode will expect + * exclusive access to the object store container because it only stores the + * binary data for each file. The metadata is currently kept in the local + * database for performance reasons. + * + * WARNING: The current implementation is incompatible with any app that uses + * direct file IO and circumvents our virtual filesystem. That includes + * Encryption and Gallery. Gallery will store thumbnails directly in the + * filesystem and encryption will cause severe overhead because key files need + * to be fetched in addition to any requested file. + * + */ +'objectstore' => [ + 'class' => 'OC\\Files\\ObjectStore\\Swift', + 'arguments' => [ + // trystack will use your facebook id as the username + 'username' => 'facebook100000123456789', + // in the trystack dashboard go to user -> settings -> API Password to + // generate a password + 'password' => 'Secr3tPaSSWoRdt7', + // must already exist in the objectstore, name can be different + 'container' => 'nextcloud', + // prefix to prepend to the fileid, default is 'oid:urn:' + 'objectPrefix' => 'oid:urn:', + // create the container if it does not exist. default is false + 'autocreate' => true, + // required, dev-/trystack defaults to 'RegionOne' + 'region' => 'RegionOne', + // The Identity / Keystone endpoint + 'url' => 'http://8.21.28.222:5000/v2.0', + // uploadPartSize: size of the uploaded chunks, defaults to 524288000 + 'uploadPartSize' => 524288000, + // required on dev-/trystack + 'tenantName' => 'facebook100000123456789', + // dev-/trystack uses swift by default, the lib defaults to 'cloudFiles' + // if omitted + 'serviceName' => 'swift', + // The Interface / url Type, optional + 'urlType' => 'internal' + ], +], + +/** + * To use swift V3 + */ +'objectstore' => [ + 'class' => 'OC\\Files\\ObjectStore\\Swift', + 'arguments' => [ + 'autocreate' => true, + 'user' => [ + 'name' => 'swift', + 'password' => 'swift', + 'domain' => [ + 'name' => 'default', + ], + ], + 'scope' => [ + 'project' => [ + 'name' => 'service', + 'domain' => [ + 'name' => 'default', + ], + ], + ], + 'tenantName' => 'service', + 'serviceName' => 'swift', + 'region' => 'regionOne', + 'url' => 'http://yourswifthost:5000/v3', + 'bucket' => 'nextcloud', + ], +], + +/** + * If this is set to true and a multibucket object store is configured then + * newly created previews are put into 256 dedicated buckets. + * + * Those buckets are named like the mulibucket version but with the postfix + * ``-preview-NUMBER`` where NUMBER is between 0 and 255. + * + * Keep in mind that only previews of files are put in there that don't have + * some already. Otherwise, the old bucket will be used. + * + * To migrate existing previews to this new multibucket distribution of previews + * use the occ command ``preview:repair``. For now this will only migrate + * previews that were generated before Nextcloud 19 in the flat + * ``appdata_INSTANCEID/previews/FILEID`` folder structure. + */ +'objectstore.multibucket.preview-distribution' => false, + + +/** + * Sharing + * + * Global settings for Sharing + */ + +/** + * Replaces the default Share Provider Factory. This can be utilized if + * own or 3rdParty Share Providers are used that – for instance – use the + * filesystem instead of the database to keep the share information. + * + * Defaults to ``\OC\Share20\ProviderFactory`` + */ +'sharing.managerFactory' => '\OC\Share20\ProviderFactory', + +/** + * Enables expiration for link share passwords sent by email (sharebymail). + * The passwords will expire after the configured interval, the users can + * still request a new one in the public link page. + */ +'sharing.enable_mail_link_password_expiration' => false, + +/** + * Expiration interval for passwords, in seconds. + */ +'sharing.mail_link_password_expiration_interval' => 3600, + +/** + * Define max number of results returned by the search for auto-completion of + * users, groups, etc. The value must not be lower than 0 (for unlimited). + * + * If more, different sources are requested (e.g. different user backends; or + * both users and groups), the value is applied per source and might not be + * truncated after collecting the results. I.e. more results can appear than + * configured here. + * + * Default is 25. + */ +'sharing.maxAutocompleteResults' => 25, + +/** + * Define the minimum length of the search string before we start auto-completion + * Default is no limit (value set to 0) + */ +'sharing.minSearchStringLength' => 0, + +/** + * Set to true to enable that internal shares need to be accepted by the users by default. + * Users can change this for their account in their personal sharing settings + */ +'sharing.enable_share_accept' => false, + +/** + * Set to true to enforce that internal shares need to be accepted + */ +'sharing.force_share_accept' => false, + +/** + * Set to ``false``, to prevent users from setting a custom share_folder + */ +'sharing.allow_custom_share_folder' => true, + +/** + * Define a default folder for shared files and folders other than root. + * Changes to this value will only have effect on new shares. + * + * Defaults to ``/`` + */ +'share_folder' => '/', + +/** + * Set to ``false``, to stop sending a mail when users receive a share + */ +'sharing.enable_share_mail' => true, + +/** + * Set to true to enable the feature to add exceptions for share password enforcement + */ +'sharing.allow_disabled_password_enforcement_groups' => false, + +/** + * Set to true to always transfer incoming shares by default + * when running "occ files:transfer-ownership". + * Defaults to false, so incoming shares are not transferred if not specifically requested + * by a command line argument. + */ +'transferIncomingShares' => false, + +/** + * Hashing + */ + +/** + * By default, Nextcloud will use the Argon2 password hashing if available. + * However, if for whatever reason you want to stick with the PASSWORD_DEFAULT + * of your php version. Then set the setting to true. + * + * Nextcloud uses the Argon2 algorithm (with PHP >= 7.2) to create hashes by its + * own and exposes its configuration options as following. More information can + * be found at: https://www.php.net/manual/en/function.password-hash.php + */ +'hashing_default_password' => false, + +/** + * The number of CPU threads to be used by the algorithm for computing a hash. + * The value must be an integer, and the minimum value is 1. Rationally it does + * not help to provide a number higher than the available threads on the machine. + * Values that undershoot the minimum will be ignored in favor of the minimum. + */ +'hashingThreads' => PASSWORD_ARGON2_DEFAULT_THREADS, + +/** + * The memory in KiB to be used by the algorithm for computing a hash. The value + * must be an integer, and the minimum value is 8 times the number of CPU threads. + * Values that undershoot the minimum will be ignored in favor of the minimum. + */ +'hashingMemoryCost' => PASSWORD_ARGON2_DEFAULT_MEMORY_COST, + +/** + * The number of iterations that are used by the algorithm for computing a hash. + * The value must be an integer, and the minimum value is 1. Values that + * undershoot the minimum will be ignored in favor of the minimum. + */ +'hashingTimeCost' => PASSWORD_ARGON2_DEFAULT_TIME_COST, + +/** + * The hashing cost used by hashes generated by Nextcloud + * Using a higher value requires more time and CPU power to calculate the hashes + */ +'hashingCost' => 10, + +/** + * All other configuration options + */ + +/** + * Additional driver options for the database connection, e.g. to enable SSL + * encryption in MySQL or specify a custom wait timeout on a cheap hoster. + * + * When setting up TLS/SSL for encrypting the connections, you need to ensure that + * the passed keys and certificates are readable by the PHP process. In addition, + * PDO::MYSQL_ATTR_SSL_VERIFY_SERVER_CERT might need to be set to false, if the + * database servers certificates CN does not match with the hostname used to connect. + * The standard behavior here is different from the MySQL/MariaDB CLI client, which + * does not verify the server cert except --ssl-verify-server-cert is passed manually. + */ +'dbdriveroptions' => [ + PDO::MYSQL_ATTR_SSL_CA => '/file/path/to/ca_cert.pem', + PDO::MYSQL_ATTR_SSL_KEY => '/file/path/to/mysql-client-key.pem', + PDO::MYSQL_ATTR_SSL_CERT => '/file/path/to/mysql-client-cert.pem', + PDO::MYSQL_ATTR_SSL_VERIFY_SERVER_CERT => false, + PDO::MYSQL_ATTR_INIT_COMMAND => 'SET wait_timeout = 28800' +], + +/** + * sqlite3 journal mode can be specified using this configuration parameter - + * can be 'WAL' or 'DELETE' see for more details https://www.sqlite.org/wal.html + */ +'sqlite.journal_mode' => 'DELETE', + +/** + * During setup, if requirements are met (see below), this setting is set to true + * and MySQL can handle 4 byte characters instead of 3 byte characters. + * + * If you want to convert an existing 3-byte setup into a 4-byte setup please + * set the parameters in MySQL as mentioned below and run the migration command: + * ./occ db:convert-mysql-charset + * The config setting will be set automatically after a successful run. + * + * Consult the documentation for more details. + * + * MySQL requires a special setup for longer indexes (> 767 bytes) which are + * needed: + * + * [mysqld] + * innodb_large_prefix=ON + * innodb_file_format=Barracuda + * innodb_file_per_table=ON + * + * Tables will be created with + * * character set: utf8mb4 + * * collation: utf8mb4_bin + * * row_format: dynamic + * + * See: + * https://dev.mysql.com/doc/refman/5.7/en/charset-unicode-utf8mb4.html + * https://dev.mysql.com/doc/refman/5.7/en/innodb-parameters.html#sysvar_innodb_large_prefix + * https://mariadb.com/kb/en/mariadb/xtradbinnodb-server-system-variables/#innodb_large_prefix + * http://www.tocker.ca/2013/10/31/benchmarking-innodb-page-compression-performance.html + * http://mechanics.flite.com/blog/2014/07/29/using-innodb-large-prefix-to-avoid-error-1071/ + */ +'mysql.utf8mb4' => false, + +/** + * For search queries in the database, a default collation – depending on the + * character set – is chosen. In some cases a different behaviour is desired, + * for instances when an accent sensitive search is desired. + * + * MariaDB and MySQL have an overlap in available collations, but also + * incompatible ones, also depending on the version of the database server. + * + * This option allows to override the automatic choice. Example: + * + * 'mysql.collation' => 'utf8mb4_0900_as_ci', + * + * This setting has no effect on setup or creating tables. In those cases + * always utf8[mb4]_bin is being used. This setting is only taken into + * consideration in SQL queries that utilize LIKE comparison operators. + */ +'mysql.collation' => null, + +/** + * Database types that are supported for installation. + * + * Available: + * - sqlite (SQLite3) + * - mysql (MySQL) + * - pgsql (PostgreSQL) + * - oci (Oracle) + * + * Defaults to the following databases: + * - sqlite (SQLite3) + * - mysql (MySQL) + * - pgsql (PostgreSQL) + */ +'supportedDatabases' => [ + 'sqlite', + 'mysql', + 'pgsql', + 'oci', +], + +/** + * Override where Nextcloud stores temporary files. Useful in situations where + * the system temporary directory is on a limited space ramdisk or is otherwise + * restricted, or if external storage which do not support streaming are in + * use. + * + * The Web server user/PHP must have write access to this directory. + * Additionally you have to make sure that your PHP configuration considers this a valid + * tmp directory, by setting the TMP, TMPDIR, and TEMP variables to the required directories. + * On top of that you might be required to grant additional permissions in AppArmor or SELinux. + */ +'tempdirectory' => '/tmp/nextcloudtemp', + +/** + * Override where Nextcloud stores update files while updating. Useful in situations + * where the default `datadirectory` is on network disk like NFS, or is otherwise + * restricted. Defaults to the value of `datadirectory` if unset. + * + * If set, the value MUST be located _outside_ of the installation directory of Nextcloud and + * writable by the Web server user. + * + */ +'updatedirectory' => '', + +/** + * Blacklist a specific file or files and disallow the upload of files + * with this name. ``.htaccess`` is blocked by default. + * WARNING: USE THIS ONLY IF YOU KNOW WHAT YOU ARE DOING. + * + * Defaults to ``array('.htaccess')`` + */ +'blacklisted_files' => ['.htaccess'], + +/** + * Blacklist characters from being used in filenames. This is useful if you + * have a filesystem or OS which does not support certain characters like windows. + * + * The '/' and '\' characters are always forbidden. + * + * Example for windows systems: ``array('?', '<', '>', ':', '*', '|', '"', chr(0), "\n", "\r")`` + * see https://en.wikipedia.org/wiki/Comparison_of_file_systems#Limits + * + * Defaults to ``array()`` + */ +'forbidden_chars' => [], + +/** + * If you are applying a theme to Nextcloud, enter the name of the theme here. + * The default location for themes is ``nextcloud/themes/``. + * + * Defaults to the theming app which is shipped since Nextcloud 9 + */ +'theme' => '', + +/** + * Enforce the user theme. This will disable the user theming settings + * This must be a valid ITheme ID. + * E.g. dark, dark-highcontrast, default, light, light-highcontrast, opendyslexic + */ +'enforce_theme' => '', + +/** + * The default cipher for encrypting files. Currently supported are: + * - AES-256-CTR + * - AES-128-CTR + * - AES-256-CFB + * - AES-128-CFB + * + * Defaults to ``AES-256-CTR`` + */ +'cipher' => 'AES-256-CTR', + +/** + * Use the legacy base64 format for encrypted files instead of the more space-efficient + * binary format. The option affects only newly written files, existing encrypted files + * will not be touched and will remain readable whether they use the new format or not. + * + * Defaults to ``false`` + */ +'encryption.use_legacy_base64_encoding' => false, + +/** + * The minimum Nextcloud desktop client version that will be allowed to sync with + * this server instance. All connections made from earlier clients will be denied + * by the server. Defaults to the minimum officially supported Nextcloud desktop + * client version at the time of release of this server version. + * + * When changing this, note that older unsupported versions of the Nextcloud desktop + * client may not function as expected, and could lead to permanent data loss for + * clients or other unexpected results. + * + * Defaults to ``2.3.0`` + */ +'minimum.supported.desktop.version' => '2.3.0', + +/** + * Option to allow local storage to contain symlinks. + * WARNING: Not recommended. This would make it possible for Nextcloud to access + * files outside the data directory and could be considered a security risk. + * + * Defaults to ``false`` + */ +'localstorage.allowsymlinks' => false, + +/** + * Nextcloud overrides umask to ensure suitable access permissions + * regardless of webserver/php-fpm configuration and worker state. + * WARNING: Modifying this value has security implications and + * may soft-break the installation. + * + * Most installs shall not modify this value. + * + * Defaults to ``0022`` + */ +'localstorage.umask' => 0022, + +/** + * This options allows storage systems that don't allow to modify existing files + * to overcome this limitation by removing the files before overwriting. + * + * Defaults to ``false`` + */ +'localstorage.unlink_on_truncate' => false, + +/** + * EXPERIMENTAL: option whether to include external storage in quota + * calculation, defaults to false. + * + * Defaults to ``false`` + */ +'quota_include_external_storage' => false, + +/** + * When an external storage is unavailable for some reasons, it will be flagged + * as such for 10 minutes. When the trigger is a failed authentication attempt + * the delay is higher and can be controlled with this option. The motivation + * is to make account lock outs at Active Directories (and compatible) more + * unlikely. + * + * Defaults to ``1800`` (seconds) + */ +'external_storage.auth_availability_delay' => 1800, + +/** + * Allows to create external storages of type "Local" in the web interface and APIs. + * + * When disabled, it is still possible to create local storages with occ using + * the following command: + * + * % php occ files_external:create /mountpoint local null::null -c datadir=/path/to/data + * + * Defaults to ``true`` + * + */ +'files_external_allow_create_new_local' => true, + +/** + * Specifies how often the local filesystem (the Nextcloud data/ directory, and + * NFS mounts in data/) is checked for changes made outside Nextcloud. This + * does not apply to external storage. + * + * 0 -> Never check the filesystem for outside changes, provides a performance + * increase when it's certain that no changes are made directly to the + * filesystem + * + * 1 -> Check each file or folder at most once per request, recommended for + * general use if outside changes might happen. + * + * Defaults to ``0`` + */ +'filesystem_check_changes' => 0, + +/** + * By default, Nextcloud will store the part files created during upload in the + * same storage as the upload target. Setting this to false will store the part + * files in the root of the users folder which might be required to work with certain + * external storage setups that have limited rename capabilities. + * + * Defaults to ``true`` + */ +'part_file_in_storage' => true, + +/** + * Where ``mount.json`` file should be stored, defaults to ``data/mount.json`` + * in the Nextcloud directory. + * + * Defaults to ``data/mount.json`` in the Nextcloud directory. + */ +'mount_file' => '/var/www/nextcloud/data/mount.json', + +/** + * When ``true``, prevent Nextcloud from changing the cache due to changes in + * the filesystem for all storage. + * + * Defaults to ``false`` + */ +'filesystem_cache_readonly' => false, + +/** + * List of trusted proxy servers + * + * You may set this to an array containing a combination of + * - IPv4 addresses, e.g. `192.168.2.123` + * - IPv4 ranges in CIDR notation, e.g. `192.168.2.0/24` + * - IPv6 addresses, e.g. `fd9e:21a7:a92c:2323::1` + * - IPv6 ranges in CIDR notation, e.g. `2001:db8:85a3:8d3:1319:8a20::/95` + * + * When an incoming request's `REMOTE_ADDR` matches any of the IP addresses + * specified here, it is assumed to be a proxy instead of a client. Thus, the + * client IP will be read from the HTTP header specified in + * `forwarded_for_headers` instead of from `REMOTE_ADDR`. + * + * So if you configure `trusted_proxies`, also consider setting + * `forwarded_for_headers` which otherwise defaults to `HTTP_X_FORWARDED_FOR` + * (the `X-Forwarded-For` header). + * + * Defaults to an empty array. + */ +'trusted_proxies' => ['203.0.113.45', '198.51.100.128', '192.168.2.0/24'], + +/** + * Headers that should be trusted as client IP address in combination with + * `trusted_proxies`. If the HTTP header looks like 'X-Forwarded-For', then use + * 'HTTP_X_FORWARDED_FOR' here. + * + * If set incorrectly, a client can spoof their IP address as visible to + * Nextcloud, bypassing access controls and making logs useless! + * + * Defaults to ``'HTTP_X_FORWARDED_FOR'`` + */ +'forwarded_for_headers' => ['HTTP_X_FORWARDED', 'HTTP_FORWARDED_FOR'], + +/** + * max file size for animating gifs on public-sharing-site. + * If the gif is bigger, it'll show a static preview + * + * Value represents the maximum filesize in megabytes. Set to ``-1`` for + * no limit. + * + * Defaults to ``10`` megabytes + */ +'max_filesize_animated_gifs_public_sharing' => 10, + + +/** + * Enables transactional file locking. + * This is enabled by default. + * + * Prevents concurrent processes from accessing the same files + * at the same time. Can help prevent side effects that would + * be caused by concurrent operations. Mainly relevant for + * very large installations with many users working with + * shared files. + * + * Defaults to ``true`` + */ +'filelocking.enabled' => true, + +/** + * Set the lock's time-to-live in seconds. + * + * Any lock older than this will be automatically cleaned up. + * + * Defaults to ``60*60`` seconds (1 hour) or the php + * max_execution_time, whichever is higher. + */ +'filelocking.ttl' => 60*60, + +/** + * Memory caching backend for file locking + * + * Because most memcache backends can clean values without warning using redis + * is highly recommended to *avoid data loss*. + * + * Defaults to ``none`` + */ +'memcache.locking' => '\\OC\\Memcache\\Redis', + +/** + * Enable locking debug logging + * + * Note that this can lead to a very large volume of log items being written which can lead + * to performance degradation and large log files on busy instance. + * + * Thus enabling this in production for longer periods of time is not recommended + * or should be used together with the ``log.condition`` setting. + */ +'filelocking.debug' => false, + +/** + * Disable the web based updater + */ +'upgrade.disable-web' => false, + +/** + * Allows to modify the cli-upgrade link in order to link to a different documentation + */ +'upgrade.cli-upgrade-link' => '', + +/** + * Set this Nextcloud instance to debugging mode + * + * Only enable this for local development and not in production environments + * This will disable the minifier and outputs some additional debug information + * + * Defaults to ``false`` + */ +'debug' => false, + +/** + * Sets the data-fingerprint of the current data served + * + * This is a property used by the clients to find out if a backup has been + * restored on the server. Once a backup is restored run + * ./occ maintenance:data-fingerprint + * To set this to a new value. + * + * Updating/Deleting this value can make connected clients stall until + * the user has resolved conflicts. + * + * Defaults to ``''`` (empty string) + */ +'data-fingerprint' => '', + +/** + * This entry is just here to show a warning in case somebody copied the sample + * configuration. DO NOT ADD THIS SWITCH TO YOUR CONFIGURATION! + * + * If you, brave person, have read until here be aware that you should not + * modify *ANY* settings in this file without reading the documentation. + */ +'copied_sample_config' => true, + +/** + * use a custom lookup server to publish user data + */ +'lookup_server' => 'https://lookup.nextcloud.com', + +/** + * set to true if the server is used in a setup based on Nextcloud's Global Scale architecture + */ +'gs.enabled' => false, + +/** + * by default federation is only used internally in a Global Scale setup + * If you want to allow federation outside your environment set it to 'global' + */ +'gs.federation' => 'internal', + +/** + * List of incompatible user agents opted out from Same Site Cookie Protection. + * Some user agents are notorious and don't really properly follow HTTP + * specifications. For those, have an opt-out. + * + * WARNING: only use this if you know what you are doing + */ +'csrf.optout' => [ + '/^WebDAVFS/', // OS X Finder + '/^Microsoft-WebDAV-MiniRedir/', // Windows webdav drive +], + +/** + * By default, there is on public pages a link shown that allows users to + * learn about the "simple sign up" - see https://nextcloud.com/signup/ + * + * If this is set to "false" it will not show the link. + */ +'simpleSignUpLink.shown' => true, + +/** + * By default, autocompletion is enabled for the login form on Nextcloud's login page. + * While this is enabled, browsers are allowed to "remember" login names and such. + * Some companies require it to be disabled to comply with their security policy. + * + * Simply set this property to "false", if you want to turn this feature off. + */ + +'login_form_autocomplete' => true, + +/** + * Timeout for the login form, after this time the login form is reset. + * This prevents password leaks on public devices if the user forgots to clear the form. + * + * Default is 5 minutes (300 seconds), a value of 0 means no timeout. + */ +'login_form_timeout' => 300, + +/** + * If your user is using an outdated or unsupported browser, a warning will be shown + * to offer some guidance to upgrade or switch and ensure a proper Nextcloud experience. + * They can still bypass it after they have read the warning. + * + * Simply set this property to "true", if you want to turn this feature off. + */ + +'no_unsupported_browser_warning' => false, + +/** + * Disable background scanning of files + * + * By default, a background job runs every 10 minutes and execute a background + * scan to sync filesystem and database. Only users with unscanned files + * (size < 0 in filecache) are included. Maximum 500 users per job. + * + * Defaults to ``false`` + */ +'files_no_background_scan' => false, + +/** + * Log all queries into a file + * + * Warning: This heavily decreases the performance of the server and is only + * meant to debug/profile the query interaction manually. + * Also, it might log sensitive data into a plain text file. + */ +'query_log_file' => '', + +/** + * Log all redis requests into a file + * + * Warning: This heavily decreases the performance of the server and is only + * meant to debug/profile the redis interaction manually. + * Also, it might log sensitive data into a plain text file. + */ +'redis_log_file' => '', + +/** + * Enable diagnostics event logging + * + * If enabled the timings of common execution steps will be logged to the + * Nextcloud log at debug level. log.condition is useful to enable this on + * production systems to only log under some conditions + */ +'diagnostics.logging' => true, + +/** + * Limit diagnostics event logging to events longer than the configured threshold in ms + * + * when set to 0 no diagnostics events will be logged + */ +'diagnostics.logging.threshold' => 0, + +/** + * Enable profile globally + * + * Defaults to ``true`` + */ +'profile.enabled' => true, + +/** + * Allows to override the default scopes for Account data. + * The list of overridable properties and valid values for scopes are in + * ``OCP\Accounts\IAccountManager``. Values added here are merged with + * default values, which are in ``OC\Accounts\AccountManager``. + * + * For instance, if the phone property should default to the private scope + * instead of the local one: + * + * :: + * + * [ + * \OCP\Accounts\IAccountManager::PROPERTY_PHONE => \OCP\Accounts\IAccountManager::SCOPE_PRIVATE + * ] + * + */ +'account_manager.default_property_scope' => [], + +/** + * Enable the deprecated Projects feature, + * superseded by Related resources as of Nextcloud 25 + * + * Defaults to ``false`` + */ +'projects.enabled' => false, + +/** + * Enable the bulk upload feature. + * + * Defaults to ``true`` + */ +'bulkupload.enabled' => true, + +/** + * Enables fetching open graph metadata from remote urls + * + * Defaults to ``true`` + */ +'reference_opengraph' => true, + +/** + * Enable use of old unified search + * + * Defaults to ``false`` + */ +'unified_search.enabled' => false, + +/** + * Enable features that are do respect accessibility standards yet. + * + * Defaults to ``true`` + */ +'enable_non-accessible_features' => true, +]; diff --git a/nextcloud/config_bak/redis.config.php b/nextcloud/config_bak/redis.config.php new file mode 100644 index 0000000..a5fde3c --- /dev/null +++ b/nextcloud/config_bak/redis.config.php @@ -0,0 +1,17 @@ + '\OC\Memcache\Redis', + 'memcache.locking' => '\OC\Memcache\Redis', + 'redis' => array( + 'host' => getenv('REDIS_HOST'), + 'password' => (string) getenv('REDIS_HOST_PASSWORD'), + ), + ); + + if (getenv('REDIS_HOST_PORT') !== false) { + $CONFIG['redis']['port'] = (int) getenv('REDIS_HOST_PORT'); + } elseif (getenv('REDIS_HOST')[0] != '/') { + $CONFIG['redis']['port'] = 6379; + } +} diff --git a/nextcloud/config_bak/reverse-proxy.config.php b/nextcloud/config_bak/reverse-proxy.config.php new file mode 100644 index 0000000..7df0415 --- /dev/null +++ b/nextcloud/config_bak/reverse-proxy.config.php @@ -0,0 +1,30 @@ + array( + 'class' => '\OC\Files\ObjectStore\S3', + 'arguments' => array( + 'bucket' => getenv('OBJECTSTORE_S3_BUCKET'), + 'region' => getenv('OBJECTSTORE_S3_REGION') ?: '', + 'hostname' => getenv('OBJECTSTORE_S3_HOST') ?: '', + 'port' => getenv('OBJECTSTORE_S3_PORT') ?: '', + 'storageClass' => getenv('OBJECTSTORE_S3_STORAGE_CLASS') ?: '', + 'objectPrefix' => getenv("OBJECTSTORE_S3_OBJECT_PREFIX") ? getenv("OBJECTSTORE_S3_OBJECT_PREFIX") : "urn:oid:", + 'autocreate' => (strtolower($autocreate) === 'false' || $autocreate == false) ? false : true, + 'use_ssl' => (strtolower($use_ssl) === 'false' || $use_ssl == false) ? false : true, + // required for some non Amazon S3 implementations + 'use_path_style' => $use_path == true && strtolower($use_path) !== 'false', + // required for older protocol versions + 'legacy_auth' => $use_legacyauth == true && strtolower($use_legacyauth) !== 'false' + ) + ) + ); + + if (getenv('OBJECTSTORE_S3_KEY_FILE') && file_exists(getenv('OBJECTSTORE_S3_KEY_FILE'))) { + $CONFIG['objectstore']['arguments']['key'] = trim(file_get_contents(getenv('OBJECTSTORE_S3_KEY_FILE'))); + } elseif (getenv('OBJECTSTORE_S3_KEY')) { + $CONFIG['objectstore']['arguments']['key'] = getenv('OBJECTSTORE_S3_KEY'); + } else { + $CONFIG['objectstore']['arguments']['key'] = ''; + } + + if (getenv('OBJECTSTORE_S3_SECRET_FILE') && file_exists(getenv('OBJECTSTORE_S3_SECRET_FILE'))) { + $CONFIG['objectstore']['arguments']['secret'] = trim(file_get_contents(getenv('OBJECTSTORE_S3_SECRET_FILE'))); + } elseif (getenv('OBJECTSTORE_S3_SECRET')) { + $CONFIG['objectstore']['arguments']['secret'] = getenv('OBJECTSTORE_S3_SECRET'); + } else { + $CONFIG['objectstore']['arguments']['secret'] = ''; + } + + if (getenv('OBJECTSTORE_S3_SSE_C_KEY_FILE') && file_exists(getenv('OBJECTSTORE_S3_SSE_C_KEY_FILE'))) { + $CONFIG['objectstore']['arguments']['sse_c_key'] = trim(file_get_contents(getenv('OBJECTSTORE_S3_SSE_C_KEY_FILE'))); + } elseif (getenv('OBJECTSTORE_S3_SSE_C_KEY')) { + $CONFIG['objectstore']['arguments']['sse_c_key'] = getenv('OBJECTSTORE_S3_SSE_C_KEY'); + } +} diff --git a/nextcloud/config_bak/smtp.config.php b/nextcloud/config_bak/smtp.config.php new file mode 100644 index 0000000..5006fe4 --- /dev/null +++ b/nextcloud/config_bak/smtp.config.php @@ -0,0 +1,22 @@ + 'smtp', + 'mail_smtphost' => getenv('SMTP_HOST'), + 'mail_smtpport' => getenv('SMTP_PORT') ?: (getenv('SMTP_SECURE') ? 465 : 25), + 'mail_smtpsecure' => getenv('SMTP_SECURE') ?: '', + 'mail_smtpauth' => getenv('SMTP_NAME') && (getenv('SMTP_PASSWORD') || (getenv('SMTP_PASSWORD_FILE') && file_exists(getenv('SMTP_PASSWORD_FILE')))), + 'mail_smtpauthtype' => getenv('SMTP_AUTHTYPE') ?: 'LOGIN', + 'mail_smtpname' => getenv('SMTP_NAME') ?: '', + 'mail_from_address' => getenv('MAIL_FROM_ADDRESS'), + 'mail_domain' => getenv('MAIL_DOMAIN'), + ); + + if (getenv('SMTP_PASSWORD_FILE') && file_exists(getenv('SMTP_PASSWORD_FILE'))) { + $CONFIG['mail_smtppassword'] = trim(file_get_contents(getenv('SMTP_PASSWORD_FILE'))); + } elseif (getenv('SMTP_PASSWORD')) { + $CONFIG['mail_smtppassword'] = getenv('SMTP_PASSWORD'); + } else { + $CONFIG['mail_smtppassword'] = ''; + } +} diff --git a/nextcloud/config_bak/swift.config.php b/nextcloud/config_bak/swift.config.php new file mode 100644 index 0000000..47ada56 --- /dev/null +++ b/nextcloud/config_bak/swift.config.php @@ -0,0 +1,31 @@ + [ + 'class' => 'OC\\Files\\ObjectStore\\Swift', + 'arguments' => [ + 'autocreate' => $autocreate == true && strtolower($autocreate) !== 'false', + 'user' => [ + 'name' => getenv('OBJECTSTORE_SWIFT_USER_NAME'), + 'password' => getenv('OBJECTSTORE_SWIFT_USER_PASSWORD'), + 'domain' => [ + 'name' => (getenv('OBJECTSTORE_SWIFT_USER_DOMAIN')) ?: 'Default', + ], + ], + 'scope' => [ + 'project' => [ + 'name' => getenv('OBJECTSTORE_SWIFT_PROJECT_NAME'), + 'domain' => [ + 'name' => (getenv('OBJECTSTORE_SWIFT_PROJECT_DOMAIN')) ?: 'Default', + ], + ], + ], + 'serviceName' => (getenv('OBJECTSTORE_SWIFT_SERVICE_NAME')) ?: 'swift', + 'region' => getenv('OBJECTSTORE_SWIFT_REGION'), + 'url' => getenv('OBJECTSTORE_SWIFT_URL'), + 'bucket' => getenv('OBJECTSTORE_SWIFT_CONTAINER_NAME'), + ] + ] + ); +} diff --git a/nextcloud/config_bak/upgrade-disable-web.config.php b/nextcloud/config_bak/upgrade-disable-web.config.php new file mode 100644 index 0000000..cb00b43 --- /dev/null +++ b/nextcloud/config_bak/upgrade-disable-web.config.php @@ -0,0 +1,4 @@ + true, +); diff --git a/nextcloud/docker-compose.yml b/nextcloud/docker-compose.yml index 91803e7..d40d1ec 100644 --- a/nextcloud/docker-compose.yml +++ b/nextcloud/docker-compose.yml @@ -10,7 +10,7 @@ services: command: --transaction-isolation=READ-COMMITTED --log-bin=binlog --binlog-format=ROW --log_bin_trust_function_creators=true # user: ${UID}:${GID} volumes: - - db:/var/lib/mysql + - ${DB_LOCATION}:/var/lib/mysql environment: - MYSQL_ROOT_PASSWORD=ROOT_ACCESS_PASSWORD - MYSQL_PASSWORD=${DBPASS} @@ -39,8 +39,6 @@ services: - ${CONFIG_LOCATION}:/var/www/html/config:rw - ${DATA_LOCATION}/Cloud/Nextcloud:/var/www/html/data:rw restart: unless-stopped -volumes: - db: networks: default: name: nginx-proxy diff --git a/nextcloud/docker/provision/mysql/init/01-databases.sql b/nextcloud/docker/provision/mysql/init/01-databases.sql deleted file mode 100644 index b234fc6..0000000 --- a/nextcloud/docker/provision/mysql/init/01-databases.sql +++ /dev/null @@ -1,9 +0,0 @@ -# create databases -CREATE DATABASE IF NOT EXISTS `nextcloud`; -CREATE DATABASE IF NOT EXISTS `homepage`; -CREATE DATABASE IF NOT EXISTS `clocktower`; - --- # create root user and grant rights --- CREATE USER 'brodin'@'%' IDENTIFIED BY 'whiskey-wango-woxtrot'; --- GRANT ALL PRIVILEGES ON *.* TO 'brodin'@'%' WITH GRANT OPTION; --- FLUSH PRIVILEGES; \ No newline at end of file diff --git a/nextcloud/update.sh b/nextcloud/update.sh new file mode 100644 index 0000000..999ef14 --- /dev/null +++ b/nextcloud/update.sh @@ -0,0 +1 @@ +docker exec --user root nextcloud bash -c "apt update && apt -y install libmagickcore-6.q16-6-extra smbclient iputils-ping nmap mc btop net-tools ncdu java-common default-jre graphicsmagick ffmpeg ghostscript" \ No newline at end of file diff --git a/nginx-proxy/nginx/html_bak/.well-known/acme-challenge/0nvqKzz1EohOVB6bht1uUCmvcSSi7dBiG8jmzVdNjy4 b/nginx-proxy/nginx/html_bak/.well-known/acme-challenge/0nvqKzz1EohOVB6bht1uUCmvcSSi7dBiG8jmzVdNjy4 new file mode 100644 index 0000000..e32723e --- /dev/null +++ b/nginx-proxy/nginx/html_bak/.well-known/acme-challenge/0nvqKzz1EohOVB6bht1uUCmvcSSi7dBiG8jmzVdNjy4 @@ -0,0 +1 @@ +0nvqKzz1EohOVB6bht1uUCmvcSSi7dBiG8jmzVdNjy4.-pySGwa5vVkj_cOXnCDnd-dGPAV2kVXglGIYiUrWeT8 diff --git a/nginx-proxy/nginx/vhost.d/default b/nginx-proxy/nginx/vhost.d/default index bcc5f96..6753e51 100644 --- a/nginx-proxy/nginx/vhost.d/default +++ b/nginx-proxy/nginx/vhost.d/default @@ -1,13 +1,3 @@ -## Start of configuration add by letsencrypt container -location ^~ /.well-known/acme-challenge/ { - auth_basic off; - auth_request off; - allow all; - root /usr/share/nginx/html; - try_files $uri =404; - break; -} -## End of configuration add by letsencrypt container location /tt-rss/ { proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; diff --git a/readers/docker-compose.yml b/readers/docker-compose.yml index 80a3956..20a9a1f 100644 --- a/readers/docker-compose.yml +++ b/readers/docker-compose.yml @@ -28,6 +28,8 @@ services: - TZ=${TZ} - VIRTUAL_HOST=ubooquity.${DOMAIN} - VIRTUAL_PORT=2202 + - LETSENCRYPT_HOST=ubooquity.${DOMAIN} + - LETSENCRYPT_EMAIL= ${EMAIL} # - MAXMEM= #optional volumes: - ${CONFIG_LOCATION}/ubooquity:/config @@ -53,6 +55,8 @@ services: environment: - TZ=${TZ} - VIRTUAL_HOST=audiobookshelf.${DOMAIN} + - LETSENCRYPT_HOST=audiobookshelf.${DOMAIN} + - LETSENCRYPT_EMAIL= ${EMAIL} networks: default: name: nginx-proxy diff --git a/run_all.sh b/run_all.sh new file mode 100755 index 0000000..3dfd04a --- /dev/null +++ b/run_all.sh @@ -0,0 +1,19 @@ +#!/bin/bash + +cd arr +sudo docker compose up -d +cd ../botc +sudo docker compose up -d +cd ../dashboard +sudo docker compose up -d +cd ../fusiondance +sudo docker compose up -d +cd ../games +sudo docker compose up -d +cd ../nextcloud +sudo docker compose up -d +cd ../plex +sudo docker compose up -d +cd ../readers +sudo docker compose up -d +cd ../rss-reader diff --git a/vnc/data/db_v2.sqlite3 b/vnc/data/db_v2.sqlite3 new file mode 100644 index 0000000000000000000000000000000000000000..ee424be1940e2a893034dbca3d53c768887dce17 GIT binary patch literal 24576 zcmeI(PiWIn90%|;-8vX<6{QqZ@KI1#ZEF6tO#|ZJGXD(c+yq5oq{*ub>p!wo9b*R- zMG)~Of}kj#Ja`x?2p+|QBHnZgJLy3|FM{Aj@nx&6>mLz3Y=`fIq%V2D{_@@@xx5!L zJTzdtl;lcI!ElMft>k!~+d&A&aXi}sZ2Mh0S*7Fm0sHm+QEyk}x%hFphqZS01i0S8 zUcTp1&rw!IfdB*`009U<00Izz00bbgL;{C81L3V9-?&}0=$ZN5Xqi%Hbiy^<%7j-9 z>^_{?Ig%m!4(`buB~2luR3u&)>09_q^h8G>oC^7-8Z(*>HC$?q8m<@K*)D56te&}k zF1p_z2yY4b%*O1M3F>%xJKE*-0_qvPqv!!X5Z)B>*^Rku%gf}iW;$|k-_Vg3!?&$^ zI@^k#kNdj9p^)$5cGt+}sh7dq_-dAsox27yRj6*#P)=4@vTVMTC1uAh7|tXar<0^u za!Ik0&&QhLS@bExF~G-BGWVJqm?#w7KK+H^CcdbJN1pLtMK!X&2q*cGf#u8@0kl-5g>Ub0y-^GmNcD zw@5BZPTTHSsp1l+blSGMgJT@uo8)?5u^kEoAOHafKmY;|fB*y_009Up50*DJ{pPq!!nbaaoH@|JkwG@{i%WYX=|S8@%*-u7CFjRZgbTio*J) zDOocor3Fc~OhJ_lP0-{d6-*K1wW@@ryF-+C@`xe&QJ{rw90_@H0$ zb3d2B6BKKP6azGpiW2tWV=5P$##AOHaf zKmY;|fB*!RvA{b2`dDpwqjBBCYpgBGG_E}?%>QS(;B4^oG9Dnh1_1~_00Izz00bZa z0SG_<0uX>e3xU;sF4njZ;GJtd|DWN4Z-X-}(%=*XAOHafKmY;|fB*y_009U<00K)Q zu+gu?T6}%bIN5IwoBw*E_52_2|Ci)e;-V0M00bZa0SG_<0uX=z1Rwx`{}lMw_y4~D D>tNr& literal 0 HcmV?d00001 diff --git a/vnc/data/db_v2.sqlite3-shm b/vnc/data/db_v2.sqlite3-shm new file mode 100644 index 0000000000000000000000000000000000000000..1c8c8371c0baf22c4345184d171675b52f023e6c GIT binary patch literal 32768 zcmeI)Pc8&O6bInnjG6JDnZXzgYZl@vgd7mUJf%$`96^# z&=!F~HZy5Uv-%{kAh43H>@QRd2((3DE!&y4rCEIvAV7cs0RjXF5FkK+009C72oNAZ jfB*pk1PBlyK!5-N0t5&UAV7cs0RjXF5FkL{p9uT_DA*(_ literal 0 HcmV?d00001 diff --git a/vnc/data/db_v2.sqlite3-wal b/vnc/data/db_v2.sqlite3-wal new file mode 100644 index 0000000000000000000000000000000000000000..d98da4a7c7ad767cacff32add0929f1921fd90cf GIT binary patch literal 123632 zcmeI*eQXo=9mnyrorftaF&$0A%G1fCkfd?2@BFOM6Bg{>2^&*$LbJj}6| z28LQdP}=UH(yFNgty4Pwfc?QFL@B6g*G+9T!8XPwtuP5~f@ljZ)gDx|RRXl%`3c)e z8eoCM@ct=weD?W#_p%eo-{0qcKkri&J0$!0*^)FH5g?Khm#tc6QDgIT06k zney*{;ivyP`17l)hTGP)MiaUm>4|p*6S69vZ8l4f$+B42oVgfJGn(=Ived2gRcd>A z%VXU%OHE%>W{5{j)oUd2Lqh-o1Q0*~0R#|0009ILxH|-PHkm4GYidlpzmN!qVtTKx z$Bm15#pBJ(+MDI}Wy@QeW#b;Xu1YRyoylle4#j#xa&J7^6^swaoAm*?yC)%cCu6b3 zQR|DfzZHyYn}YE=r^8YI32P>ETONOFy_?goJ^mV6Tn{Gn@J8`HIV^4@qFs9KHRZ4# z2_|ESIxQKG>)nZs#-n|SU{`Pb=p9e?iQ_j8bo4{wDT!pCoQQT0M7tBC9~XP4=Z;zx zM?HF#Xm_MXPUuexwhUc?T)o^MO>F8(CggZee>5yUcB$|A*?Pfm9sPN_x4v0kx%!LE9df~1a!+?A0T2z>lNTtxynyi?-;&J>)NVQC>3`vuI(dO9`g7!E z5kLR|1Q0*~0R#|0009ILxU&KUd4Y59e{^8eV|Aw{$P47>1B|*t{_;(YFJPH*G?f<+ zzi0>`fB*srAbHA{ z@&c)G4({FY1&r_XW!b#I;@NA<&aBySki5VR|1q*60tg_000IagfB*srAbzS{NE_pjeqPhLRu@iQO6O+7KJZr+5~xlioDGkb%k3V zU!Z(OMJ_KOZqg7y009ILKmY**5I_KdDH2#)UQxTG#6dYjbAyf~wSM{drfNNs#~u#d<<=Z#>!+j1S10^#QrN zCn0wyW3k3j>ysCloV zxS+jN6;IQzeyFvbdG$-zhCbt1+Hm~vpPhb(%kOk}l#s5wHLvQnN3>AL?o$0hyI=Ea zcGah-il&6!E}yDB)aJN6eBxqd!^vHT&UqKVcb`)EaP5YDLq}d7oHY^{R2+)S?(osypEJY_&yuZ2_C&aX14mulVss0%1Mu3b>u_fKwGqes?4k2s(YXZDRk7c?NTJ zfvs=s{i>GJt^AsMd|DE-Fzy3iuT^C^7!Q8va4FnKC009IL zKmY**5I_I{1WHq2qHzZc@&eCkuigK_{J)K)>jKPESekD+dyN1B2q1s}0tg_000Iag zFx3JjHcw$LFA%Eh^X{*aj*%Cb>Q4}_j{pJ)AbCs0)~@-;%1|vUW_$Ua%1a5I_I{1Q0*~0R#|0009JUgTVF&b0_XMpXt5Ywtvo= z<3C%o=TGNaRt&ookJqoNey78yhO~&&Z+E)Fn%(6L`s_Z%quaHh*X{HvA*brsU)lN- z`R(8S+kGyuWQXnfF5CCF{r9`_$dMM+B3=98?xU|1j_vPq1zf(ZwrH;{U>kknzSFj? z#PR}CcAmnaeSiP_;p48;sk(smUCDYuT+t9f009ILKmY**5I_I{1Q0-A8VeYafLs-% zxI8jZUZBi4uxwqRf6v>G41RO@ymVdQjAT7yy)=yvoLxfz0R#|0009ILKmY**5I_Kd zF$9b`35yE^4G94Q9q2+%zdW#6}Q6009IL zKmY**5I_I{1Q56l0@HQeL2;-v7qqvk;|b=xCa zC}el3{-E8jc{RK0Q&dG$!fuyO)gEedTpm7gv9jUhu0!X%i{HCXseHJ0!@i*-FAvTd z2@DoS2~rt>PZ}Rl?4Lzka(RJETLw?xzcdzM+(Ds2LjVB;5I_I{1Q0*~0R#|0pd(|as)di|gN!6#Uv@6y0bsSg)Bpeg literal 0 HcmV?d00001 diff --git a/vnc/data/id_ed25519 b/vnc/data/id_ed25519 new file mode 100644 index 0000000..105d769 --- /dev/null +++ b/vnc/data/id_ed25519 @@ -0,0 +1 @@ +6KaueJVZIh+2r1mEATATVzwrd0R3wd2mZPbsXypgoVNyoh8ft6M8AQ/HV5TfQbym6EpO0sGTb7sKJsiz4Do2KA== \ No newline at end of file diff --git a/vnc/data/id_ed25519.pub b/vnc/data/id_ed25519.pub new file mode 100644 index 0000000..e22809a --- /dev/null +++ b/vnc/data/id_ed25519.pub @@ -0,0 +1 @@ +cqIfH7ejPAEPx1eU30G8puhKTtLBk2+7CibIs+A6Nig= \ No newline at end of file diff --git a/vnc/data/id_ed25519_minineuro b/vnc/data/id_ed25519_minineuro new file mode 100644 index 0000000..562f410 --- /dev/null +++ b/vnc/data/id_ed25519_minineuro @@ -0,0 +1 @@ +XYDXfHz/zm3QtKeHQkUyb4Ka5KMP6JRnhVs1bqTFlHR900zna7bzOlxrZhbaKPeeDOCK7EeYM+CiITg8B0qAEw== \ No newline at end of file diff --git a/vnc/data/id_ed25519_minineuro.pub b/vnc/data/id_ed25519_minineuro.pub new file mode 100644 index 0000000..852c262 --- /dev/null +++ b/vnc/data/id_ed25519_minineuro.pub @@ -0,0 +1 @@ +fdNM52u28zpca2YW2ij3ngzgiuxHmDPgoiE4PAdKgBM= \ No newline at end of file diff --git a/vnc/docker-compose.yml b/vnc/docker-compose.yml new file mode 100644 index 0000000..912a9d9 --- /dev/null +++ b/vnc/docker-compose.yml @@ -0,0 +1,21 @@ +services: + hbbs: + container_name: hbbs + image: rustdesk/rustdesk-server:latest + command: hbbs + volumes: + - ./data:/root + network_mode: "host" + + depends_on: + - hbbr + restart: unless-stopped + + hbbr: + container_name: hbbr + image: rustdesk/rustdesk-server:latest + command: hbbr + volumes: + - ./data:/root + network_mode: "host" + restart: unless-stopped From 05cbfcc8935951ed218b6b5d3bf802bcfccc2059 Mon Sep 17 00:00:00 2001 From: Brodin Date: Sun, 23 Jun 2024 12:25:42 -0400 Subject: [PATCH 2/4] removing sensitive files hopefully --- nextcloud/config_bak/.htaccess | 25 - .../config_bak/apache-pretty-urls.config.php | 4 - nextcloud/config_bak/apcu.config.php | 4 - nextcloud/config_bak/apps.config.php | 15 - nextcloud/config_bak/config.php | 69 - nextcloud/config_bak/config.sample.php | 2434 ----------------- nextcloud/config_bak/redis.config.php | 17 - nextcloud/config_bak/reverse-proxy.config.php | 30 - nextcloud/config_bak/s3.config.php | 48 - nextcloud/config_bak/smtp.config.php | 22 - nextcloud/config_bak/swift.config.php | 31 - .../config_bak/upgrade-disable-web.config.php | 4 - vnc/.gitignore | 1 + 13 files changed, 1 insertion(+), 2703 deletions(-) delete mode 100644 nextcloud/config_bak/.htaccess delete mode 100644 nextcloud/config_bak/apache-pretty-urls.config.php delete mode 100644 nextcloud/config_bak/apcu.config.php delete mode 100644 nextcloud/config_bak/apps.config.php delete mode 100755 nextcloud/config_bak/config.php delete mode 100644 nextcloud/config_bak/config.sample.php delete mode 100644 nextcloud/config_bak/redis.config.php delete mode 100644 nextcloud/config_bak/reverse-proxy.config.php delete mode 100644 nextcloud/config_bak/s3.config.php delete mode 100644 nextcloud/config_bak/smtp.config.php delete mode 100644 nextcloud/config_bak/swift.config.php delete mode 100644 nextcloud/config_bak/upgrade-disable-web.config.php create mode 100644 vnc/.gitignore diff --git a/nextcloud/config_bak/.htaccess b/nextcloud/config_bak/.htaccess deleted file mode 100644 index 13ca287..0000000 --- a/nextcloud/config_bak/.htaccess +++ /dev/null @@ -1,25 +0,0 @@ -# Section for Apache 2.4 to 2.6 - - Require all denied - - - Order Allow,Deny - Deny from all - Satisfy All - - -# Section for Apache 2.2 - - - - Order Allow,Deny - Deny from all - - Satisfy All - - - -# Section for Apache 2.2 to 2.6 - - IndexIgnore * - diff --git a/nextcloud/config_bak/apache-pretty-urls.config.php b/nextcloud/config_bak/apache-pretty-urls.config.php deleted file mode 100644 index 72da1d8..0000000 --- a/nextcloud/config_bak/apache-pretty-urls.config.php +++ /dev/null @@ -1,4 +0,0 @@ - '/', -); diff --git a/nextcloud/config_bak/apcu.config.php b/nextcloud/config_bak/apcu.config.php deleted file mode 100644 index 69fed87..0000000 --- a/nextcloud/config_bak/apcu.config.php +++ /dev/null @@ -1,4 +0,0 @@ - '\OC\Memcache\APCu', -); diff --git a/nextcloud/config_bak/apps.config.php b/nextcloud/config_bak/apps.config.php deleted file mode 100644 index 4c37f72..0000000 --- a/nextcloud/config_bak/apps.config.php +++ /dev/null @@ -1,15 +0,0 @@ - array ( - 0 => array ( - 'path' => OC::$SERVERROOT.'/apps', - 'url' => '/apps', - 'writable' => false, - ), - 1 => array ( - 'path' => OC::$SERVERROOT.'/custom_apps', - 'url' => '/custom_apps', - 'writable' => true, - ), - ), -); diff --git a/nextcloud/config_bak/config.php b/nextcloud/config_bak/config.php deleted file mode 100755 index 23cf6ed..0000000 --- a/nextcloud/config_bak/config.php +++ /dev/null @@ -1,69 +0,0 @@ - '/', - 'memcache.local' => '\\OC\\Memcache\\APCu', - 'apps_paths' => - array ( - 0 => - array ( - 'path' => '/var/www/html/apps', - 'url' => '/apps', - 'writable' => false, - ), - 1 => - array ( - 'path' => '/var/www/html/custom_apps', - 'url' => '/custom_apps', - 'writable' => true, - ), - ), - 'memcache.distributed' => '\\OC\\Memcache\\Redis', - 'memcache.locking' => '\\OC\\Memcache\\Redis', - 'redis' => - array ( - 'host' => 'redis', - 'password' => '', - 'port' => 6379, - ), - 'upgrade.disable-web' => true, - 'instanceid' => 'ocj30zib09xz', - 'passwordsalt' => 'stITL4J+mfSFbwH1Dau7jBxDTMSgi8', - 'secret' => '4JhczCjrPiJy0PlFgbiUQxBR8kSJcaXBZE3KOuBkpdfe4c6/', - 'trusted_domains' => - array ( - 0 => 'nextcloud.brodin.rocks', - ), - 'datadirectory' => '/var/www/html/data', - 'dbtype' => 'mysql', - 'version' => '29.0.0.19', - 'overwrite.cli.url' => 'https://nextcloud.brodin.rocks', - 'overwriteprotocol' => 'https', - 'ratelimit.protection.enabled' => false, - 'auth.bruteforce.protection.enabled' => false, - 'dbname' => 'nextcloud', - 'dbhost' => 'db', - 'dbport' => '', - 'dbtableprefix' => 'oc_', - 'mysql.utf8mb4' => true, - 'dbuser' => 'nextcloud', - 'dbpassword' => 'whiskey-wango-woxtrot', - 'installed' => true, - 'memories.db.triggers.fcu' => true, - 'memories.exiftool' => '/var/www/html/custom_apps/memories/bin-ext/exiftool-amd64-glibc', - 'memories.vod.path' => '/var/www/html/custom_apps/memories/bin-ext/go-vod-amd64', - 'mail_from_address' => 'admin', - 'mail_smtpmode' => 'smtp', - 'mail_sendmailmode' => 'smtp', - 'mail_domain' => 'brodin.rocks', - 'mail_smtphost' => 'smtp.sendgrid.net', - 'mail_smtpport' => '587', - 'mail_smtpauth' => 1, - 'mail_smtpname' => 'apikey', - 'mail_smtppassword' => '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', - 'enabledPreviewProviders' => - array ( - 0 => 'OC\\Preview\\Image', - 1 => 'OC\\Preview\\Movie', - ), - 'memories.vod.disable' => false, -); diff --git a/nextcloud/config_bak/config.sample.php b/nextcloud/config_bak/config.sample.php deleted file mode 100644 index 2803344..0000000 --- a/nextcloud/config_bak/config.sample.php +++ /dev/null @@ -1,2434 +0,0 @@ - 'd3c944a9a', - */ -'instanceid' => '', - - /** - * The salt used to hash all passwords, auto-generated by the Nextcloud - * installer. (There are also per-user salts.) If you lose this salt you lose - * all your passwords. This example is for documentation only, and you should - * never use it. - * - * @deprecated This salt is deprecated and only used for legacy-compatibility, - * developers should *NOT* use this value for anything nowadays. - * - * 'passwordsalt' => 'd3c944a9af095aa08f', - */ -'passwordsalt' => '', - -/** - * Secret used by Nextcloud for various purposes, e.g. to encrypt data. If you - * lose this string there will be data corruption. - */ -'secret' => '', - -/** - * Your list of trusted domains that users can log into. Specifying trusted - * domains prevents host header poisoning. Do not remove this, as it performs - * necessary security checks. - * You can specify: - * - * - the exact hostname of your host or virtual host, e.g. demo.example.org. - * - the exact hostname with permitted port, e.g. demo.example.org:443. - * This disallows all other ports on this host - * - use * as a wildcard, e.g. ubos-raspberry-pi*.local will allow - * ubos-raspberry-pi.local and ubos-raspberry-pi-2.local - * - the IP address with or without permitted port, e.g. [2001:db8::1]:8080 - * Using TLS certificates where commonName= is deprecated - */ -'trusted_domains' => - [ - 'demo.example.org', - 'otherdomain.example.org', - '10.111.112.113', - '[2001:db8::1]' - ], - - -/** - * Where user files are stored. The SQLite database is also stored here, when - * you use SQLite. - * - * Default to ``data/`` in the Nextcloud directory. - */ -'datadirectory' => '/var/www/nextcloud/data', - -/** - * The current version number of your Nextcloud installation. This is set up - * during installation and update, so you shouldn't need to change it. - */ -'version' => '', - -/** - * Identifies the database used with this installation. See also config option - * ``supportedDatabases`` - * - * Available: - * - sqlite3 (SQLite3) - * - mysql (MySQL/MariaDB) - * - pgsql (PostgreSQL) - * - * Defaults to ``sqlite3`` - */ -'dbtype' => 'sqlite3', - -/** - * Your host server name, for example ``localhost``, ``hostname``, - * ``hostname.example.com``, or the IP address. - * To specify a port use ``hostname:####``, for IPv6 addresses use the URI notation ``[ip]:port``. - * To specify a Unix socket use ``/path/to/directory/containing/socket``, e.g. ``/run/postgresql/``. - */ -'dbhost' => '', - -/** - * The name of the Nextcloud database, which is set during installation. You - * should not need to change this. - */ -'dbname' => 'nextcloud', - -/** - * The user that Nextcloud uses to write to the database. This must be unique - * across Nextcloud instances using the same SQL database. This is set up during - * installation, so you shouldn't need to change it. - */ -'dbuser' => '', - -/** - * The password for the database user. This is set up during installation, so - * you shouldn't need to change it. - */ -'dbpassword' => '', - -/** - * Prefix for the Nextcloud tables in the database. - * - * Default to ``oc_`` - */ -'dbtableprefix' => 'oc_', - -/** - * Enable persistent connexions to the database. - * This setting uses the "persistent" option from doctrine dbal, which in turn - * uses the PDO::ATTR_PERSISTENT option from the pdo driver. - */ -'dbpersistent' => '', - -/** - * Specify read only replicas to be used by Nextcloud when querying the database - */ -'dbreplica' => [ - ['user' => 'nextcloud', 'password' => 'password1', 'host' => 'replica1', 'dbname' => ''], - ['user' => 'nextcloud', 'password' => 'password2', 'host' => 'replica2', 'dbname' => ''], -], - -/** - * Indicates whether the Nextcloud instance was installed successfully; ``true`` - * indicates a successful installation, and ``false`` indicates an unsuccessful - * installation. - * - * Defaults to ``false`` - */ -'installed' => false, - - -/** - * User Experience - * - * These optional parameters control some aspects of the user interface. Default - * values, where present, are shown. - */ - -/** - * This sets the default language on your Nextcloud server, using ISO_639-1 - * language codes such as ``en`` for English, ``de`` for German, and ``fr`` for - * French. The default_language parameter is only used, when the browser does - * not send any language, and the user hasn’t configured own language - * preferences. - * - * Nextcloud has two distinguished language codes for German, 'de' and 'de_DE'. - * 'de' is used for informal German and 'de_DE' for formal German. By setting - * this value to 'de_DE' you can enforce the formal version of German unless - * the user has chosen something different explicitly. - * - * Defaults to ``en`` - */ -'default_language' => 'en', - -/** - * With this setting a language can be forced for all users. If a language is - * forced, the users are also unable to change their language in the personal - * settings. If users shall be unable to change their language, but users have - * different languages, this value can be set to ``true`` instead of a language - * code. - * - * Defaults to ``false`` - */ -'force_language' => 'en', - -/** - * This sets the default locale on your Nextcloud server, using ISO_639 - * language codes such as ``en`` for English, ``de`` for German, and ``fr`` for - * French, and ISO-3166 country codes such as ``GB``, ``US``, ``CA``, as defined - * in RFC 5646. It overrides automatic locale detection on public pages like - * login or shared items. User's locale preferences configured under "personal - * -> locale" override this setting after they have logged in. - * - * Defaults to ``en`` - */ -'default_locale' => 'en_US', - -/** - * This sets the default region for phone numbers on your Nextcloud server, - * using ISO 3166-1 country codes such as ``DE`` for Germany, ``FR`` for France, … - * It is required to allow inserting phone numbers in the user profiles starting - * without the country code (e.g. +49 for Germany). - * - * No default value! - */ -'default_phone_region' => 'GB', - -/** - * With this setting a locale can be forced for all users. If a locale is - * forced, the users are also unable to change their locale in the personal - * settings. If users shall be unable to change their locale, but users have - * different languages, this value can be set to ``true`` instead of a locale - * code. - * - * Defaults to ``false`` - */ -'force_locale' => 'en_US', - -/** - * This sets the default timezone on your Nextcloud server, using IANA - * identifiers like ``Europe/Berlin`` or ``Pacific/Auckland``. The default - * timezone parameter is only used when the timezone of the user can't be - * determined. - * - * Defaults to ``UTC`` - */ -'default_timezone' => 'Europe/Berlin', - -/** - * ``true`` enables the Help menu item in the user menu (top right of the - * Nextcloud Web interface). ``false`` removes the Help item. - */ -'knowledgebaseenabled' => true, - -/** - * ``true`` embeds the documentation in an iframe inside Nextcloud. - * ``false`` only shows buttons to the online documentation. - */ -'knowledgebase.embedded' => false, - -/** - * ``true`` allows users to change their display names (on their Personal - * pages), and ``false`` prevents them from changing their display names. - */ -'allow_user_to_change_display_name' => true, - -/** - * The directory where the skeleton files are located. These files will be - * copied to the data directory of new users. Leave empty to not copy any - * skeleton files. - * ``{lang}`` can be used as a placeholder for the language of the user. - * If the directory does not exist, it falls back to non dialect (from ``de_DE`` - * to ``de``). If that does not exist either, it falls back to ``default`` - * - * Defaults to ``core/skeleton`` in the Nextcloud directory. - */ -'skeletondirectory' => '/path/to/nextcloud/core/skeleton', - - -/** - * The directory where the template files are located. These files will be - * copied to the template directory of new users. Leave empty to not copy any - * template files. - * ``{lang}`` can be used as a placeholder for the language of the user. - * If the directory does not exist, it falls back to non dialect (from ``de_DE`` - * to ``de``). If that does not exist either, it falls back to ``default`` - * - * If this is not set creating a template directory will only happen if no custom - * ``skeletondirectory`` is defined, otherwise the shipped templates will be used - * to create a template directory for the user. - */ -'templatedirectory' => '/path/to/nextcloud/templates', - -/** - * User session - */ - -/** - * Lifetime of the remember login cookie. This should be larger than the - * session_lifetime. If it is set to 0 remember me is disabled. - * - * Defaults to ``60*60*24*15`` seconds (15 days) - */ -'remember_login_cookie_lifetime' => 60*60*24*15, - -/** - * The lifetime of a session after inactivity. - * - * The maximum possible time is limited by the session.gc_maxlifetime php.ini setting - * which would overwrite this option if it is less than the value in the config.php - * - * Defaults to ``60*60*24`` seconds (24 hours) - */ -'session_lifetime' => 60 * 60 * 24, - -/** - * The timeout in seconds for requests to servers made by the DAV component (e.g., needed for federated shares). - */ -'davstorage.request_timeout' => 30, - -/** - * `true` enabled a relaxed session timeout, where the session timeout would no longer be - * handled by Nextcloud but by either the PHP garbage collection or the expiration of - * potential other session backends like redis. - * - * This may lead to sessions being available for longer than what session_lifetime uses but - * comes with performance benefits as sessions are no longer a locking operation for concurrent - * requests. - */ -'session_relaxed_expiry' => false, - -/** - * Enable or disable session keep-alive when a user is logged in to the Web UI. - * Enabling this sends a "heartbeat" to the server to keep it from timing out. - * - * Defaults to ``true`` - */ -'session_keepalive' => true, - -/** - * Enable or disable the automatic logout after session_lifetime, even if session - * keepalive is enabled. This will make sure that an inactive browser will be logged out - * even if requests to the server might extend the session lifetime. - * - * Defaults to ``false`` - */ -'auto_logout' => false, - -/** - * Enforce token authentication for clients, which blocks requests using the user - * password for enhanced security. Users need to generate tokens in personal settings - * which can be used as passwords on their clients. - * - * Defaults to ``false`` - */ -'token_auth_enforced' => false, - -/** - * The interval at which token activity should be updated. - * Increasing this value means that the last activity on the security page gets - * more outdated. - * - * Tokens are still checked every 5 minutes for validity - * max value: 300 - * - * Defaults to ``300`` - */ -'token_auth_activity_update' => 60, - -/** - * Whether the brute force protection shipped with Nextcloud should be enabled or not. - * - * Disabling this is discouraged for security reasons. - * - * Defaults to ``true`` - */ -'auth.bruteforce.protection.enabled' => true, - -/** - * Whether the brute force protection shipped with Nextcloud should be set to testing mode. - * - * In testing mode brute force attempts are still recorded, but the requests do - * not sleep/wait for the specified time. They will still abort with - * "429 Too Many Requests" when the maximum delay is reached. - * Enabling this is discouraged for security reasons - * and should only be done for debugging and on CI when running tests. - * - * Defaults to ``false`` - */ -'auth.bruteforce.protection.testing' => false, - -/** - * Whether the rate limit protection shipped with Nextcloud should be enabled or not. - * - * Disabling this is discouraged for security reasons. - * - * Defaults to ``true`` - */ -'ratelimit.protection.enabled' => true, - -/** - * By default, WebAuthn is available, but it can be explicitly disabled by admins - */ -'auth.webauthn.enabled' => true, - -/** - * Whether encrypted password should be stored in the database - * - * The passwords are only decrypted using the login token stored uniquely in the - * clients and allow to connect to external storages, autoconfigure mail account in - * the mail app and periodically check if the password it still valid. - * - * This might be desirable to disable this functionality when using one time - * passwords or when having a password policy enforcing long passwords (> 300 - * characters). - * - * By default, the passwords are stored encrypted in the database. - * - * WARNING: If disabled, password changes on the user back-end (e.g. on LDAP) no - * longer log connected clients out automatically. Users can still disconnect - * the clients by deleting the app token from the security settings. - */ -'auth.storeCryptedPassword' => true, - -/** - * By default, the login form is always available. There are cases (SSO) where an - * admin wants to avoid users entering their credentials to the system if the SSO - * app is unavailable. - * - * This will show an error. But the direct login still works with adding ?direct=1 - */ -'hide_login_form' => false, - -/** - * If your user backend does not allow password resets (e.g. when it's a - * read-only user backend like LDAP), you can specify a custom link, where the - * user is redirected to, when clicking the "reset password" link after a failed - * login-attempt. - * In case you do not want to provide any link, replace the url with 'disabled' - */ -'lost_password_link' => 'https://example.org/link/to/password/reset', - -/** - * URL to use as target for the logo link in the header (top-left logo) - * - * Defaults to the base URL of your Nextcloud instance - */ -'logo_url' => 'https://example.org', - -/** - * Mail Parameters - * - * These configure the email settings for Nextcloud notifications and password - * resets. - */ - -/** - * The return address that you want to appear on emails sent by the Nextcloud - * server, for example ``nc-admin@example.com``, substituting your own domain, - * of course. - */ -'mail_domain' => 'example.com', - -/** - * FROM address that overrides the built-in ``sharing-noreply`` and - * ``lostpassword-noreply`` FROM addresses. - * - * Defaults to different from addresses depending on the feature. - */ -'mail_from_address' => 'nextcloud', - -/** - * Enable SMTP class debugging. - * - * Defaults to ``false`` - */ -'mail_smtpdebug' => false, - -/** - * Which mode to use for sending mail: ``sendmail``, ``smtp`` or ``qmail``. - * - * If you are using local or remote SMTP, set this to ``smtp``. - * - * For the ``sendmail`` option you need an installed and working email system on - * the server, with ``/usr/sbin/sendmail`` installed on your Unix system. - * - * For ``qmail`` the binary is /var/qmail/bin/sendmail, and it must be installed - * on your Unix system. - * - * Defaults to ``smtp`` - */ -'mail_smtpmode' => 'smtp', - -/** - * This depends on ``mail_smtpmode``. Specify the IP address of your mail - * server host. This may contain multiple hosts separated by a semicolon. If - * you need to specify the port number append it to the IP address separated by - * a colon, like this: ``127.0.0.1:24``. - * - * Defaults to ``127.0.0.1`` - */ -'mail_smtphost' => '127.0.0.1', - -/** - * This depends on ``mail_smtpmode``. Specify the port for sending mail. - * - * Defaults to ``25`` - */ -'mail_smtpport' => 25, - -/** - * This depends on ``mail_smtpmode``. This sets the SMTP server timeout, in - * seconds. You may need to increase this if you are running an anti-malware or - * spam scanner. - * - * Defaults to ``10`` seconds - */ -'mail_smtptimeout' => 10, - -/** - * This depends on ``mail_smtpmode``. Specify ``ssl`` when you are using SSL/TLS. Any other value will be ignored. - * - * If the server advertises STARTTLS capabilities, they might be used, but they cannot be enforced by - * this config option. - * - * Defaults to ``''`` (empty string) - */ -'mail_smtpsecure' => '', - -/** - * - * This depends on ``mail_smtpmode``. Change this to ``true`` if your mail - * server requires authentication. - * - * Defaults to ``false`` - */ -'mail_smtpauth' => false, - -/** - * This depends on ``mail_smtpauth``. Specify the username for authenticating to - * the SMTP server. - * - * Defaults to ``''`` (empty string) - */ -'mail_smtpname' => '', - -/** - * This depends on ``mail_smtpauth``. Specify the password for authenticating to - * the SMTP server. - * - * Default to ``''`` (empty string) - */ -'mail_smtppassword' => '', - -/** - * Replaces the default mail template layout. This can be utilized if the - * options to modify the mail texts with the theming app is not enough. - * The class must extend ``\OC\Mail\EMailTemplate`` - */ -'mail_template_class' => '\OC\Mail\EMailTemplate', - -/** - * Email will be sent by default with an HTML and a plain text body. This option - * allows to only send plain text emails. - */ -'mail_send_plaintext_only' => false, - -/** - * This depends on ``mail_smtpmode``. Array of additional streams options that - * will be passed to underlying Swift mailer implementation. - * Defaults to an empty array. - */ -'mail_smtpstreamoptions' => [], - -/** - * Which mode is used for sendmail/qmail: ``smtp`` or ``pipe``. - * - * For ``smtp`` the sendmail binary is started with the parameter ``-bs``: - * - Use the SMTP protocol on standard input and output. - * - * For ``pipe`` the binary is started with the parameters ``-t``: - * - Read message from STDIN and extract recipients. - * - * Defaults to ``smtp`` - */ -'mail_sendmailmode' => 'smtp', - -/** - * Proxy Configurations - */ - -/** - * The automatic hostname detection of Nextcloud can fail in certain reverse - * proxy and CLI/cron situations. This option allows you to manually override - * the automatic detection; for example ``www.example.com``, or specify the port - * ``www.example.com:8080``. - */ -'overwritehost' => '', - -/** - * When generating URLs, Nextcloud attempts to detect whether the server is - * accessed via ``https`` or ``http``. However, if Nextcloud is behind a proxy - * and the proxy handles the ``https`` calls, Nextcloud would not know that - * ``ssl`` is in use, which would result in incorrect URLs being generated. - * Valid values are ``http`` and ``https``. - */ -'overwriteprotocol' => '', - -/** - * Nextcloud attempts to detect the webroot for generating URLs automatically. - * For example, if ``www.example.com/nextcloud`` is the URL pointing to the - * Nextcloud instance, the webroot is ``/nextcloud``. When proxies are in use, - * it may be difficult for Nextcloud to detect this parameter, resulting in - * invalid URLs. - */ -'overwritewebroot' => '', - -/** - * This option allows you to define a manual override condition as a regular - * expression for the remote IP address. For example, defining a range of IP - * addresses starting with ``10.0.0.`` and ending with 1 to 3: - * ``^10\.0\.0\.[1-3]$`` - * - * Defaults to ``''`` (empty string) - */ -'overwritecondaddr' => '', - -/** - * Use this configuration parameter to specify the base URL for any URLs which - * are generated within Nextcloud using any kind of command line tools (cron or - * occ). The value should contain the full base URL: - * ``https://www.example.com/nextcloud`` - * - * Defaults to ``''`` (empty string) - */ -'overwrite.cli.url' => '', - -/** - * To have clean URLs without `/index.php` this parameter needs to be configured. - * - * This parameter will be written as "RewriteBase" on update and installation of - * Nextcloud to your `.htaccess` file. While this value is often simply the URL - * path of the Nextcloud installation it cannot be set automatically properly in - * every scenario and needs thus some manual configuration. - * - * In a standard Apache setup this usually equals the folder that Nextcloud is - * accessible at. So if Nextcloud is accessible via "https://mycloud.org/nextcloud" - * the correct value would most likely be "/nextcloud". If Nextcloud is running - * under "https://mycloud.org/" then it would be "/". - * - * Note that the above rule is not valid in every case, as there are some rare setup - * cases where this may not apply. However, to avoid any update problems this - * configuration value is explicitly opt-in. - * - * After setting this value run `occ maintenance:update:htaccess`. Now, when the - * following conditions are met Nextcloud URLs won't contain `index.php`: - * - * - `mod_rewrite` is installed - * - `mod_env` is installed - * - * Defaults to ``''`` (empty string) - */ -'htaccess.RewriteBase' => '/', - -/** - * For server setups, that don't have `mod_env` enabled or restricted (e.g. suEXEC) - * this parameter has to be set to true and will assume mod_rewrite. - * - * Please check, if `mod_rewrite` is active and functional before setting this - * parameter, and you updated your .htaccess with `occ maintenance:update:htaccess`. - * Otherwise, your nextcloud installation might not be reachable anymore. - * For example, try accessing resources by leaving out `index.php` in the URL. - */ -'htaccess.IgnoreFrontController' => false, - -/** - * The URL of your proxy server, for example ``proxy.example.com:8081``. - * - * Note: Guzzle (the http library used by Nextcloud) is reading the environment - * variables HTTP_PROXY (only for cli request), HTTPS_PROXY, and NO_PROXY by default. - * - * If you configure proxy with Nextcloud any default configuration by Guzzle - * is overwritten. Make sure to set ``proxyexclude`` accordingly if necessary. - * - * Defaults to ``''`` (empty string) - */ -'proxy' => '', - -/** - * The optional authentication for the proxy to use to connect to the internet. - * The format is: ``username:password``. - * - * Defaults to ``''`` (empty string) - */ -'proxyuserpwd' => '', - -/** - * List of host names that should not be proxied to. - * For example: ``['.mit.edu', 'foo.com']``. - * - * Hint: Use something like ``explode(',', getenv('NO_PROXY'))`` to sync this - * value with the global NO_PROXY option. - * - * Defaults to empty array. - */ -'proxyexclude' => [], - -/** - * Allow remote servers with local addresses e.g. in federated shares, webcal services and more - * - * Defaults to false - */ -'allow_local_remote_servers' => true, - -/** - * Deleted Items (trash bin) - * - * These parameters control the Deleted files app. - */ - -/** - * If the trash bin app is enabled (default), this setting defines the policy - * for when files and folders in the trash bin will be permanently deleted. - * The app allows for two settings, a minimum time for trash bin retention, - * and a maximum time for trash bin retention. - * - * Minimum time is the number of days a file will be kept, after which it - * *may be* deleted. A file may be deleted after the minimum number of days - * is expired if space is needed. The file will not be deleted if space is - * not needed. - * - * Whether "space is needed" depends on whether a user quota is defined or not: - * - * * If no user quota is defined, the available space on the Nextcloud data - * partition sets the limit for the trashbin - * (issues: see https://github.com/nextcloud/server/issues/28451). - * * If a user quota is defined, 50% of the user's remaining quota space sets - * the limit for the trashbin. - * - * Maximum time is the number of days at which it is *guaranteed - * to be* deleted. There is no further dependency on the available space. - * - * Both minimum and maximum times can be set together to explicitly define - * file and folder deletion. For migration purposes, this setting is installed - * initially set to "auto", which is equivalent to the default setting in - * Nextcloud. - * - * Available values (D1 and D2 are configurable numbers): - * - * * ``auto`` - * default setting. keeps files and folders in the trash bin for 30 days - * and automatically deletes anytime after that if space is needed (note: - * files may not be deleted if space is not needed). - * * ``D1, auto`` - * keeps files and folders in the trash bin for D1+ days, delete anytime if - * space needed (note: files may not be deleted if space is not needed) - * * ``auto, D2`` - * delete all files in the trash bin that are older than D2 days - * automatically, delete other files anytime if space needed - * * ``D1, D2`` - * keep files and folders in the trash bin for at least D1 days and - * delete when exceeds D2 days (note: files will not be deleted automatically if space is needed) - * * ``disabled`` - * trash bin auto clean disabled, files and folders will be kept forever - * - * Defaults to ``auto`` - */ -'trashbin_retention_obligation' => 'auto', - - -/** - * File versions - * - * These parameters control the Versions app. - */ - -/** - * If the versions app is enabled (default), this setting defines the policy - * for when versions will be permanently deleted. - * The app allows for two settings, a minimum time for version retention, - * and a maximum time for version retention. - * Minimum time is the number of days a version will be kept, after which it - * may be deleted. Maximum time is the number of days at which it is guaranteed - * to be deleted. - * Both minimum and maximum times can be set together to explicitly define - * version deletion. For migration purposes, this setting is installed - * initially set to "auto", which is equivalent to the default setting in - * Nextcloud. - * - * Available values: - * - * * ``auto`` - * default setting. Automatically expire versions according to expire - * rules. Please refer to :doc:`../configuration_files/file_versioning` for - * more information. - * * ``D, auto`` - * keep versions at least for D days, apply expiration rules to all versions - * that are older than D days - * * ``auto, D`` - * delete all versions that are older than D days automatically, delete - * other versions according to expire rules - * * ``D1, D2`` - * keep versions for at least D1 days and delete when exceeds D2 days - * * ``disabled`` - * versions auto clean disabled, versions will be kept forever - * - * Defaults to ``auto`` - */ -'versions_retention_obligation' => 'auto', - -/** - * Nextcloud Verifications - * - * Nextcloud performs several verification checks. There are two options, - * ``true`` and ``false``. - */ - -/** - * Checks an app before install whether it uses private APIs instead of the - * proper public APIs. If this is set to true it will only allow to install or - * enable apps that pass this check. - * - * Defaults to ``false`` - */ -'appcodechecker' => true, - -/** - * Check if Nextcloud is up-to-date and shows a notification if a new version is - * available. It sends current version, php version, installation and last update - * time and release channel to the updater server which responds with the latest - * available version based on those metrics. - * - * Defaults to ``true`` - */ -'updatechecker' => true, - -/** - * URL that Nextcloud should use to look for updates - * - * Defaults to ``https://updates.nextcloud.com/updater_server/`` - */ -'updater.server.url' => 'https://updates.nextcloud.com/updater_server/', - -/** - * The channel that Nextcloud should use to look for updates - * - * Supported values: - * - * - ``daily`` - * - ``beta`` - * - ``stable`` - */ -'updater.release.channel' => 'stable', - -/** - * Is Nextcloud connected to the Internet or running in a closed network? - * - * Defaults to ``true`` - */ -'has_internet_connection' => true, - -/** - * Which domains to request to determine the availability of an Internet - * connection. If none of these hosts are reachable, the administration panel - * will show a warning. Set to an empty list to not do any such checks (warning - * will still be shown). - * If no protocol is provided, both http and https will be tested. - * For example, 'http://www.nextcloud.com' and 'https://www.nextcloud.com' - * will be tested for 'www.nextcloud.com' - * If a protocol is provided, only this one will be tested. - * - * Defaults to the following domains: - * - * - www.nextcloud.com - * - www.startpage.com - * - www.eff.org - * - www.edri.org - */ -'connectivity_check_domains' => [ - 'www.nextcloud.com', - 'www.startpage.com', - 'www.eff.org', - 'www.edri.org' -], - -/** - * Allows Nextcloud to verify a working .well-known URL redirects. This is done - * by attempting to make a request from JS to - * https://your-domain.com/.well-known/caldav/ - * - * Defaults to ``true`` - */ -'check_for_working_wellknown_setup' => true, - -/** - * This is a crucial security check on Apache servers that should always be set - * to ``true``. This verifies that the ``.htaccess`` file is writable and works. - * If it is not, then any options controlled by ``.htaccess``, such as large - * file uploads, will not work. It also runs checks on the ``data/`` directory, - * which verifies that it can't be accessed directly through the Web server. - * - * Defaults to ``true`` - */ -'check_for_working_htaccess' => true, - -/** - * In rare setups (e.g. on Openshift or Docker on Windows) the permissions check - * might block the installation while the underlying system offers no means to - * "correct" the permissions. In this case, set the value to false. - * - * In regular cases, if issues with permissions are encountered they should be - * adjusted accordingly. Changing the flag is discouraged. - * - * Defaults to ``true`` - */ -'check_data_directory_permissions' => true, - -/** - * In certain environments it is desired to have a read-only configuration file. - * When this switch is set to ``true``, writing to the config file will be - * forbidden. Therefore, it will not be possible to configure all options via - * the Web interface. Furthermore, when updating Nextcloud it is required to - * make the configuration file writable again and to set this switch to ``false`` - * for the update process. - * - * Defaults to ``false`` - */ -'config_is_read_only' => false, - -/** - * Logging - */ - -/** - * This parameter determines where the Nextcloud logs are sent. - * ``file``: the logs are written to file ``nextcloud.log`` in the default - * Nextcloud data directory. The log file can be changed with parameter - * ``logfile``. - * ``syslog``: the logs are sent to the system log. This requires a syslog daemon - * to be active. - * ``errorlog``: the logs are sent to the PHP ``error_log`` function. - * ``systemd``: the logs are sent to the Systemd journal. This requires a system - * that runs Systemd and the Systemd journal. The PHP extension ``systemd`` - * must be installed and active. - * - * Defaults to ``file`` - */ -'log_type' => 'file', - -/** - * This parameter determines where the audit logs are sent. See ``log_type`` for more information. - * - * Defaults to ``file`` - */ -'log_type_audit' => 'file', - -/** - * Name of the file to which the Nextcloud logs are written if parameter - * ``log_type`` is set to ``file``. - * - * Defaults to ``[datadirectory]/nextcloud.log`` - */ -'logfile' => '/var/log/nextcloud.log', - -/** - * Name of the file to which the audit logs are written if parameter - * ``log_type`` is set to ``file``. - * - * Defaults to ``[datadirectory]/audit.log`` - */ -'logfile_audit' => '/var/log/audit.log', - -/** - * Log file mode for the Nextcloud logging type in octal notation. - * - * Defaults to 0640 (writeable by user, readable by group). - */ -'logfilemode' => 0640, - -/** - * Loglevel to start logging at. Valid values are: 0 = Debug, 1 = Info, 2 = - * Warning, 3 = Error, and 4 = Fatal. The default value is Warning. - * - * Defaults to ``2`` - */ -'loglevel' => 2, - -/** - * Loglevel used by the frontend to start logging at. The same values as - * for ``loglevel`` can be used. If not set it defaults to the value - * configured for ``loglevel`` or Warning if that is not set either. - * - * Defaults to ``2`` - */ -'loglevel_frontend' => 2, - -/** - * Loglevel used by the dirty database query detection. Useful to identify - * potential database bugs in production. Set this to loglevel or higher to - * see dirty queries in the logs. - * - * Defaults to ``0`` (debug) - */ -'loglevel_dirty_database_queries' => 0, - -/** - * If you maintain different instances and aggregate the logs, you may want - * to distinguish between them. ``syslog_tag`` can be set per instance - * with a unique id. Only available if ``log_type`` is set to ``syslog`` or - * ``systemd``. - * - * The default value is ``Nextcloud``. - */ -'syslog_tag' => 'Nextcloud', - -/** - * If you maintain different instances and aggregate the logs, you may want - * to distinguish between them. ``syslog_tag_audit`` can be set per instance - * with a unique id. Only available if ``log_type`` is set to ``syslog`` or - * ``systemd``. - * - * The default value is the value of ``syslog_tag``. - */ -'syslog_tag_audit' => 'Nextcloud', - -/** - * Log condition for log level increase based on conditions. Once one of these - * conditions is met, the required log level is set to debug. This allows to - * debug specific requests, users or apps - * - * Supported conditions: - * - ``shared_secret``: if a request parameter with the name `log_secret` is set to - * this value the condition is met - * - ``users``: if the current request is done by one of the specified users, - * this condition is met - * - ``apps``: if the log message is invoked by one of the specified apps, - * this condition is met - * - * Defaults to an empty array. - */ -'log.condition' => [ - 'shared_secret' => '57b58edb6637fe3059b3595cf9c41b9', - 'users' => ['sample-user'], - 'apps' => ['files'], -], - -/** - * Enables logging a backtrace with each log line. Normally, only Exceptions - * are carrying backtrace information which are logged automatically. This - * switch turns them on for any log message. Enabling this option will lead - * to increased log data size. - * - * Defaults to ``false``. - */ -'log.backtrace' => false, - -/** - * This uses PHP.date formatting; see https://www.php.net/manual/en/function.date.php - * - * Defaults to ISO 8601 ``2005-08-15T15:52:01+00:00`` - see \DateTime::ATOM - * (https://www.php.net/manual/en/class.datetime.php#datetime.constants.atom) - */ -'logdateformat' => 'F d, Y H:i:s', - -/** - * The timezone for logfiles. You may change this; see - * https://www.php.net/manual/en/timezones.php - * - * Defaults to ``UTC`` - */ -'logtimezone' => 'Europe/Berlin', - -/** - * Append all database queries and parameters to the log file. Use this only for - * debugging, as your logfile will become huge. - */ -'log_query' => false, - -/** - * Enables log rotation and limits the total size of logfiles. Set it to 0 for - * no rotation. Specify a size in bytes, for example 104857600 (100 megabytes - * = 100 * 1024 * 1024 bytes). A new logfile is created with a new name when the - * old logfile reaches your limit. If a rotated log file is already present, it - * will be overwritten. - * - * Defaults to 100 MB - */ -'log_rotate_size' => 100 * 1024 * 1024, - -/** - * Enable built-in profiler. Helpful when trying to debug performance - * issues. - * - * Note that this has a performance impact and shouldn't be enabled - * on production. - */ -'profiler' => false, - -/** - * Alternate Code Locations - * - * Some Nextcloud code may be stored in alternate locations. - */ - -/** - * This section is for configuring the download links for Nextcloud clients, as - * seen in the first-run wizard and on Personal pages. - * - * Defaults to: - * - * - Desktop client: ``https://nextcloud.com/install/#install-clients`` - * - Android client: ``https://play.google.com/store/apps/details?id=com.nextcloud.client`` - * - iOS client: ``https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8`` - * - iOS client app id: ``1125420102`` - */ -'customclient_desktop' => - 'https://nextcloud.com/install/#install-clients', -'customclient_android' => - 'https://play.google.com/store/apps/details?id=com.nextcloud.client', -'customclient_ios' => - 'https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8', -'customclient_ios_appid' => - '1125420102', -/** - * Apps - * - * Options for the Apps folder, Apps store, and App code checker. - */ - -/** - * Set the default app to open on login. Use the app names as they appear in the - * URL after clicking them in the Apps menu, such as documents, calendar, and - * gallery. You can use a comma-separated list of app names, so if the first - * app is not enabled for a user then Nextcloud will try the second one, and so - * on. If no enabled apps are found it defaults to the dashboard app. - * - * Defaults to ``dashboard,files`` - */ -'defaultapp' => 'dashboard,files', - -/** - * When enabled, admins may install apps from the Nextcloud app store. - * - * Defaults to ``true`` - */ -'appstoreenabled' => true, - -/** - * Enables the installation of apps from a self-hosted apps store. - * Requires that at least one of the configured apps directories is writeable. - * - * Defaults to ``https://apps.nextcloud.com/api/v1`` - */ -'appstoreurl' => 'https://apps.nextcloud.com/api/v1', - -/** - * Filters allowed installable apps from the appstore. - * Empty array will prevent all apps from the store to be found. - */ -'appsallowlist' => [], - -/** - * Use the ``apps_paths`` parameter to set the location of the Apps directory, - * which should be scanned for available apps, and where user-specific apps - * should be installed from the Apps store. The ``path`` defines the absolute - * file system path to the app folder. The key ``url`` defines the HTTP Web path - * to that folder, starting from the Nextcloud webroot. The key ``writable`` - * indicates if a Web server can write files to that folder. - */ -'apps_paths' => [ - [ - 'path'=> '/var/www/nextcloud/apps', - 'url' => '/apps', - 'writable' => true, - ], -], - -/** - * @see appcodechecker - */ - -/** - * Previews - * - * Nextcloud supports previews of image files, the covers of MP3 files, and text - * files. These options control enabling and disabling previews, and thumbnail - * size. - */ - -/** - * By default, Nextcloud can generate previews for the following filetypes: - * - * - Image files - * - Covers of MP3 files - * - Text documents - * - * Valid values are ``true``, to enable previews, or - * ``false``, to disable previews - * - * Defaults to ``true`` - */ -'enable_previews' => true, - -/** - * Number of all preview requests being processed concurrently, - * including previews that need to be newly generated, and those that have - * been generated. - * - * This should be greater than 'preview_concurrency_new'. - * If unspecified, defaults to twice the value of 'preview_concurrency_new'. - */ -'preview_concurrency_all' => 8, - -/** - * Number of new previews that are being concurrently generated. - * - * Depending on the max preview size set by 'preview_max_x' and 'preview_max_y', - * the generation process can consume considerable CPU and memory resources. - * It's recommended to limit this to be no greater than the number of CPU cores. - * If unspecified, defaults to the number of CPU cores, or 4 if that cannot - * be determined. - */ -'preview_concurrency_new' => 4, - -/** - * The maximum width, in pixels, of a preview. A value of ``null`` means there - * is no limit. - * - * Defaults to ``4096`` - */ -'preview_max_x' => 4096, -/** - * The maximum height, in pixels, of a preview. A value of ``null`` means there - * is no limit. - * - * Defaults to ``4096`` - */ -'preview_max_y' => 4096, - -/** - * Max file size for generating image previews with imagegd (default behavior). - * If the image is bigger, it'll try other preview generators, but will most - * likely either show the default mimetype icon or not display the image at all. - * Set to ``-1`` for no limit and try to generate image previews on all file sizes. - * - * Defaults to ``50`` megabytes - */ -'preview_max_filesize_image' => 50, - -/** - * max memory for generating image previews with imagegd (default behavior) - * Reads the image dimensions from the header and assumes 32 bits per pixel. - * If creating the image would allocate more memory, preview generation will - * be disabled and the default mimetype icon is shown. Set to -1 for no limit. - * - * Defaults to ``256`` megabytes - */ -'preview_max_memory' => 256, - -/** - * custom path for LibreOffice/OpenOffice binary - * - * - * Defaults to ``''`` (empty string) - */ -'preview_libreoffice_path' => '/usr/bin/libreoffice', - -/** - * custom path for ffmpeg binary - * - * Defaults to ``null`` and falls back to searching ``avconv`` and ``ffmpeg`` in the configured ``PATH`` environment - */ -'preview_ffmpeg_path' => '/usr/bin/ffmpeg', - -/** - * Set the URL of the Imaginary service to send image previews to. - * Also requires the ``OC\Preview\Imaginary`` provider to be enabled. - * - * See https://github.com/h2non/imaginary - */ -'preview_imaginary_url' => 'http://previews_hpb:8088/', - -/** - * If you want set a api key for imaginary. - */ -'preview_imaginary_key' => 'secret', - -/** - * Only register providers that have been explicitly enabled - * - * The following providers are disabled by default due to performance or privacy - * concerns: - * - * - ``OC\Preview\Font`` - * - ``OC\Preview\HEIC`` - * - ``OC\Preview\Illustrator`` - * - ``OC\Preview\Movie`` - * - ``OC\Preview\MSOffice2003`` - * - ``OC\Preview\MSOffice2007`` - * - ``OC\Preview\MSOfficeDoc`` - * - ``OC\Preview\PDF`` - * - ``OC\Preview\Photoshop`` - * - ``OC\Preview\Postscript`` - * - ``OC\Preview\StarOffice`` - * - ``OC\Preview\SVG`` - * - ``OC\Preview\TIFF`` - * - ``OC\Preview\EMF`` - * - * - * Defaults to the following providers: - * - * - ``OC\Preview\BMP`` - * - ``OC\Preview\GIF`` - * - ``OC\Preview\JPEG`` - * - ``OC\Preview\Krita`` - * - ``OC\Preview\MarkDown`` - * - ``OC\Preview\MP3`` - * - ``OC\Preview\OpenDocument`` - * - ``OC\Preview\PNG`` - * - ``OC\Preview\TXT`` - * - ``OC\Preview\XBitmap`` - */ -'enabledPreviewProviders' => [ - 'OC\Preview\BMP', - 'OC\Preview\GIF', - 'OC\Preview\JPEG', - 'OC\Preview\Krita', - 'OC\Preview\MarkDown', - 'OC\Preview\MP3', - 'OC\Preview\OpenDocument', - 'OC\Preview\PNG', - 'OC\Preview\TXT', - 'OC\Preview\XBitmap', -], - -/** - * LDAP - * - * Global settings used by LDAP User and Group Backend - */ - -/** - * defines the interval in minutes for the background job that checks user - * existence and marks them as ready to be cleaned up. The number is always - * minutes. Setting it to 0 disables the feature. - * See command line (occ) methods ``ldap:show-remnants`` and ``user:delete`` - * - * Defaults to ``51`` minutes - */ -'ldapUserCleanupInterval' => 51, - -/** - * Sort groups in the user settings by name instead of the user count - * - * By enabling this the user count beside the group name is disabled as well. - * @deprecated since Nextcloud 29 - Use the frontend instead or set the app config value `group.sortBy` for `core` to `2` - */ -'sort_groups_by_name' => false, - -/** - * Comments - * - * Global settings for the Comments infrastructure - */ - -/** - * Replaces the default Comments Manager Factory. This can be utilized if an - * own or 3rdParty CommentsManager should be used that – for instance – uses the - * filesystem instead of the database to keep the comments. - * - * Defaults to ``\OC\Comments\ManagerFactory`` - */ -'comments.managerFactory' => '\OC\Comments\ManagerFactory', - -/** - * Replaces the default System Tags Manager Factory. This can be utilized if an - * own or 3rdParty SystemTagsManager should be used that – for instance – uses the - * filesystem instead of the database to keep the tags. - * - * Defaults to ``\OC\SystemTag\ManagerFactory`` - */ -'systemtags.managerFactory' => '\OC\SystemTag\ManagerFactory', - -/** - * Maintenance - * - * These options are for halting user activity when you are performing server - * maintenance. - */ - -/** - * Enable maintenance mode to disable Nextcloud - * - * If you want to prevent users from logging in to Nextcloud before you start - * doing some maintenance work, you need to set the value of the maintenance - * parameter to true. Please keep in mind that users who are already logged-in - * are kicked out of Nextcloud instantly. - * - * Defaults to ``false`` - */ -'maintenance' => false, - -/** - * UTC Hour for maintenance windows - * - * Some background jobs only run once a day. When an hour is defined for this config, - * the background jobs which advertise themselves as not time sensitive will be - * delayed during the "working" hours and only run in the 4 hours after the given time. - * This is e.g. used for activity expiration, suspicious login training and update checks. - * - * A value of 1 e.g. will only run these background jobs between 01:00am UTC and 05:00am UTC. - * - * Defaults to ``100`` which disables the feature - */ -'maintenance_window_start' => 1, - -/** - * Log all LDAP requests into a file - * - * Warning: This heavily decreases the performance of the server and is only - * meant to debug/profile the LDAP interaction manually. - * Also, it might log sensitive data into a plain text file. - */ -'ldap_log_file' => '', - -/** - * SSL - */ - -/** - * Extra SSL options to be used for configuration. - * - * Defaults to an empty array. - */ -'openssl' => [ - 'config' => '/absolute/location/of/openssl.cnf', -], - -/** - * Memory caching backend configuration - * - * Available cache backends: - * - * * ``\OC\Memcache\APCu`` APC user backend - * * ``\OC\Memcache\ArrayCache`` In-memory array-based backend (not recommended) - * * ``\OC\Memcache\Memcached`` Memcached backend - * * ``\OC\Memcache\Redis`` Redis backend - * - * Advice on choosing between the various backends: - * - * * APCu should be easiest to install. Almost all distributions have packages. - * Use this for single user environment for all caches. - * * Use Redis or Memcached for distributed environments. - * For the local cache (you can configure two) take APCu. - */ - -/** - * Memory caching backend for locally stored data - * - * * Used for host-specific data, e.g. file paths - * - * Defaults to ``none`` - */ -'memcache.local' => '\OC\Memcache\APCu', - -/** - * Memory caching backend for distributed data - * - * * Used for installation-specific data, e.g. database caching - * * If unset, defaults to the value of memcache.local - * - * Defaults to ``none`` - */ -'memcache.distributed' => '\OC\Memcache\Memcached', - -/** - * Connection details for redis to use for memory caching in a single server configuration. - * - * For enhanced security it is recommended to configure Redis - * to require a password. See http://redis.io/topics/security - * for more information. - * - * We also support redis SSL/TLS encryption as of version 6. - * See https://redis.io/topics/encryption for more information. - */ -'redis' => [ - 'host' => 'localhost', // can also be a unix domain socket: '/tmp/redis.sock' - 'port' => 6379, - 'timeout' => 0.0, - 'read_timeout' => 0.0, - 'user' => '', // Optional: if not defined, no password will be used. - 'password' => '', // Optional: if not defined, no password will be used. - 'dbindex' => 0, // Optional: if undefined SELECT will not run and will use Redis Server's default DB Index. - // If redis in-transit encryption is enabled, provide certificates - // SSL context https://www.php.net/manual/en/context.ssl.php - 'ssl_context' => [ - 'local_cert' => '/certs/redis.crt', - 'local_pk' => '/certs/redis.key', - 'cafile' => '/certs/ca.crt' - ] -], - -/** - * Connection details for a Redis Cluster. - * - * Redis Cluster support requires the php module phpredis in version 3.0.0 or - * higher. - * - * Available failover modes: - * - \RedisCluster::FAILOVER_NONE - only send commands to master nodes (default) - * - \RedisCluster::FAILOVER_ERROR - failover to slaves for read commands if master is unavailable (recommended) - * - \RedisCluster::FAILOVER_DISTRIBUTE - randomly distribute read commands across master and slaves - * - * WARNING: FAILOVER_DISTRIBUTE is a not recommended setting, and we strongly - * suggest to not use it if you use Redis for file locking. Due to the way Redis - * is synchronized it could happen, that the read for an existing lock is - * scheduled to a slave that is not fully synchronized with the connected master - * which then causes a FileLocked exception. - * - * See https://redis.io/topics/cluster-spec for details about the Redis cluster - * - * Authentication works with phpredis version 4.2.1+. See - * https://github.com/phpredis/phpredis/commit/c5994f2a42b8a348af92d3acb4edff1328ad8ce1 - */ -'redis.cluster' => [ - 'seeds' => [ // provide some or all of the cluster servers to bootstrap discovery, port required - 'localhost:7000', - 'localhost:7001', - ], - 'timeout' => 0.0, - 'read_timeout' => 0.0, - 'failover_mode' => \RedisCluster::FAILOVER_ERROR, - 'user' => '', // Optional: if not defined, no password will be used. - 'password' => '', // Optional: if not defined, no password will be used. - // If redis in-transit encryption is enabled, provide certificates - // SSL context https://www.php.net/manual/en/context.ssl.php - 'ssl_context' => [ - 'local_cert' => '/certs/redis.crt', - 'local_pk' => '/certs/redis.key', - 'cafile' => '/certs/ca.crt' - ] -], - - -/** - * Server details for one or more memcached servers to use for memory caching. - */ -'memcached_servers' => [ - // hostname, port and optional weight - // or path and port 0 for unix socket. Also see: - // https://www.php.net/manual/en/memcached.addservers.php - // https://www.php.net/manual/en/memcached.addserver.php - ['localhost', 11211], - //array('other.host.local', 11211), -], - -/** - * Connection options for memcached - */ -'memcached_options' => [ - // Set timeouts to 50ms - \Memcached::OPT_CONNECT_TIMEOUT => 50, - \Memcached::OPT_RETRY_TIMEOUT => 50, - \Memcached::OPT_SEND_TIMEOUT => 50, - \Memcached::OPT_RECV_TIMEOUT => 50, - \Memcached::OPT_POLL_TIMEOUT => 50, - - // Enable compression - \Memcached::OPT_COMPRESSION => true, - - // Turn on consistent hashing - \Memcached::OPT_LIBKETAMA_COMPATIBLE => true, - - // Enable Binary Protocol - \Memcached::OPT_BINARY_PROTOCOL => true, - - // Binary serializer vill be enabled if the igbinary PECL module is available - //\Memcached::OPT_SERIALIZER => \Memcached::SERIALIZER_IGBINARY, -], - - -/** - * Location of the cache folder, defaults to ``data/$user/cache`` where - * ``$user`` is the current user. When specified, the format will change to - * ``$cache_path/$user`` where ``$cache_path`` is the configured cache directory - * and ``$user`` is the user. - * - * Defaults to ``''`` (empty string) - */ -'cache_path' => '', - -/** - * TTL of chunks located in the cache folder before they're removed by - * garbage collection (in seconds). Increase this value if users have - * issues uploading very large files via the Nextcloud Client as upload isn't - * completed within one day. - * - * Defaults to ``60*60*24`` (1 day) - */ -'cache_chunk_gc_ttl' => 60*60*24, - -/** - * Using Object Store with Nextcloud - */ - -/** - * This example shows how to configure Nextcloud to store all files in a - * swift object storage. - * - * It is important to note that Nextcloud in object store mode will expect - * exclusive access to the object store container because it only stores the - * binary data for each file. The metadata is currently kept in the local - * database for performance reasons. - * - * WARNING: The current implementation is incompatible with any app that uses - * direct file IO and circumvents our virtual filesystem. That includes - * Encryption and Gallery. Gallery will store thumbnails directly in the - * filesystem and encryption will cause severe overhead because key files need - * to be fetched in addition to any requested file. - * - */ -'objectstore' => [ - 'class' => 'OC\\Files\\ObjectStore\\Swift', - 'arguments' => [ - // trystack will use your facebook id as the username - 'username' => 'facebook100000123456789', - // in the trystack dashboard go to user -> settings -> API Password to - // generate a password - 'password' => 'Secr3tPaSSWoRdt7', - // must already exist in the objectstore, name can be different - 'container' => 'nextcloud', - // prefix to prepend to the fileid, default is 'oid:urn:' - 'objectPrefix' => 'oid:urn:', - // create the container if it does not exist. default is false - 'autocreate' => true, - // required, dev-/trystack defaults to 'RegionOne' - 'region' => 'RegionOne', - // The Identity / Keystone endpoint - 'url' => 'http://8.21.28.222:5000/v2.0', - // uploadPartSize: size of the uploaded chunks, defaults to 524288000 - 'uploadPartSize' => 524288000, - // required on dev-/trystack - 'tenantName' => 'facebook100000123456789', - // dev-/trystack uses swift by default, the lib defaults to 'cloudFiles' - // if omitted - 'serviceName' => 'swift', - // The Interface / url Type, optional - 'urlType' => 'internal' - ], -], - -/** - * To use swift V3 - */ -'objectstore' => [ - 'class' => 'OC\\Files\\ObjectStore\\Swift', - 'arguments' => [ - 'autocreate' => true, - 'user' => [ - 'name' => 'swift', - 'password' => 'swift', - 'domain' => [ - 'name' => 'default', - ], - ], - 'scope' => [ - 'project' => [ - 'name' => 'service', - 'domain' => [ - 'name' => 'default', - ], - ], - ], - 'tenantName' => 'service', - 'serviceName' => 'swift', - 'region' => 'regionOne', - 'url' => 'http://yourswifthost:5000/v3', - 'bucket' => 'nextcloud', - ], -], - -/** - * If this is set to true and a multibucket object store is configured then - * newly created previews are put into 256 dedicated buckets. - * - * Those buckets are named like the mulibucket version but with the postfix - * ``-preview-NUMBER`` where NUMBER is between 0 and 255. - * - * Keep in mind that only previews of files are put in there that don't have - * some already. Otherwise, the old bucket will be used. - * - * To migrate existing previews to this new multibucket distribution of previews - * use the occ command ``preview:repair``. For now this will only migrate - * previews that were generated before Nextcloud 19 in the flat - * ``appdata_INSTANCEID/previews/FILEID`` folder structure. - */ -'objectstore.multibucket.preview-distribution' => false, - - -/** - * Sharing - * - * Global settings for Sharing - */ - -/** - * Replaces the default Share Provider Factory. This can be utilized if - * own or 3rdParty Share Providers are used that – for instance – use the - * filesystem instead of the database to keep the share information. - * - * Defaults to ``\OC\Share20\ProviderFactory`` - */ -'sharing.managerFactory' => '\OC\Share20\ProviderFactory', - -/** - * Enables expiration for link share passwords sent by email (sharebymail). - * The passwords will expire after the configured interval, the users can - * still request a new one in the public link page. - */ -'sharing.enable_mail_link_password_expiration' => false, - -/** - * Expiration interval for passwords, in seconds. - */ -'sharing.mail_link_password_expiration_interval' => 3600, - -/** - * Define max number of results returned by the search for auto-completion of - * users, groups, etc. The value must not be lower than 0 (for unlimited). - * - * If more, different sources are requested (e.g. different user backends; or - * both users and groups), the value is applied per source and might not be - * truncated after collecting the results. I.e. more results can appear than - * configured here. - * - * Default is 25. - */ -'sharing.maxAutocompleteResults' => 25, - -/** - * Define the minimum length of the search string before we start auto-completion - * Default is no limit (value set to 0) - */ -'sharing.minSearchStringLength' => 0, - -/** - * Set to true to enable that internal shares need to be accepted by the users by default. - * Users can change this for their account in their personal sharing settings - */ -'sharing.enable_share_accept' => false, - -/** - * Set to true to enforce that internal shares need to be accepted - */ -'sharing.force_share_accept' => false, - -/** - * Set to ``false``, to prevent users from setting a custom share_folder - */ -'sharing.allow_custom_share_folder' => true, - -/** - * Define a default folder for shared files and folders other than root. - * Changes to this value will only have effect on new shares. - * - * Defaults to ``/`` - */ -'share_folder' => '/', - -/** - * Set to ``false``, to stop sending a mail when users receive a share - */ -'sharing.enable_share_mail' => true, - -/** - * Set to true to enable the feature to add exceptions for share password enforcement - */ -'sharing.allow_disabled_password_enforcement_groups' => false, - -/** - * Set to true to always transfer incoming shares by default - * when running "occ files:transfer-ownership". - * Defaults to false, so incoming shares are not transferred if not specifically requested - * by a command line argument. - */ -'transferIncomingShares' => false, - -/** - * Hashing - */ - -/** - * By default, Nextcloud will use the Argon2 password hashing if available. - * However, if for whatever reason you want to stick with the PASSWORD_DEFAULT - * of your php version. Then set the setting to true. - * - * Nextcloud uses the Argon2 algorithm (with PHP >= 7.2) to create hashes by its - * own and exposes its configuration options as following. More information can - * be found at: https://www.php.net/manual/en/function.password-hash.php - */ -'hashing_default_password' => false, - -/** - * The number of CPU threads to be used by the algorithm for computing a hash. - * The value must be an integer, and the minimum value is 1. Rationally it does - * not help to provide a number higher than the available threads on the machine. - * Values that undershoot the minimum will be ignored in favor of the minimum. - */ -'hashingThreads' => PASSWORD_ARGON2_DEFAULT_THREADS, - -/** - * The memory in KiB to be used by the algorithm for computing a hash. The value - * must be an integer, and the minimum value is 8 times the number of CPU threads. - * Values that undershoot the minimum will be ignored in favor of the minimum. - */ -'hashingMemoryCost' => PASSWORD_ARGON2_DEFAULT_MEMORY_COST, - -/** - * The number of iterations that are used by the algorithm for computing a hash. - * The value must be an integer, and the minimum value is 1. Values that - * undershoot the minimum will be ignored in favor of the minimum. - */ -'hashingTimeCost' => PASSWORD_ARGON2_DEFAULT_TIME_COST, - -/** - * The hashing cost used by hashes generated by Nextcloud - * Using a higher value requires more time and CPU power to calculate the hashes - */ -'hashingCost' => 10, - -/** - * All other configuration options - */ - -/** - * Additional driver options for the database connection, e.g. to enable SSL - * encryption in MySQL or specify a custom wait timeout on a cheap hoster. - * - * When setting up TLS/SSL for encrypting the connections, you need to ensure that - * the passed keys and certificates are readable by the PHP process. In addition, - * PDO::MYSQL_ATTR_SSL_VERIFY_SERVER_CERT might need to be set to false, if the - * database servers certificates CN does not match with the hostname used to connect. - * The standard behavior here is different from the MySQL/MariaDB CLI client, which - * does not verify the server cert except --ssl-verify-server-cert is passed manually. - */ -'dbdriveroptions' => [ - PDO::MYSQL_ATTR_SSL_CA => '/file/path/to/ca_cert.pem', - PDO::MYSQL_ATTR_SSL_KEY => '/file/path/to/mysql-client-key.pem', - PDO::MYSQL_ATTR_SSL_CERT => '/file/path/to/mysql-client-cert.pem', - PDO::MYSQL_ATTR_SSL_VERIFY_SERVER_CERT => false, - PDO::MYSQL_ATTR_INIT_COMMAND => 'SET wait_timeout = 28800' -], - -/** - * sqlite3 journal mode can be specified using this configuration parameter - - * can be 'WAL' or 'DELETE' see for more details https://www.sqlite.org/wal.html - */ -'sqlite.journal_mode' => 'DELETE', - -/** - * During setup, if requirements are met (see below), this setting is set to true - * and MySQL can handle 4 byte characters instead of 3 byte characters. - * - * If you want to convert an existing 3-byte setup into a 4-byte setup please - * set the parameters in MySQL as mentioned below and run the migration command: - * ./occ db:convert-mysql-charset - * The config setting will be set automatically after a successful run. - * - * Consult the documentation for more details. - * - * MySQL requires a special setup for longer indexes (> 767 bytes) which are - * needed: - * - * [mysqld] - * innodb_large_prefix=ON - * innodb_file_format=Barracuda - * innodb_file_per_table=ON - * - * Tables will be created with - * * character set: utf8mb4 - * * collation: utf8mb4_bin - * * row_format: dynamic - * - * See: - * https://dev.mysql.com/doc/refman/5.7/en/charset-unicode-utf8mb4.html - * https://dev.mysql.com/doc/refman/5.7/en/innodb-parameters.html#sysvar_innodb_large_prefix - * https://mariadb.com/kb/en/mariadb/xtradbinnodb-server-system-variables/#innodb_large_prefix - * http://www.tocker.ca/2013/10/31/benchmarking-innodb-page-compression-performance.html - * http://mechanics.flite.com/blog/2014/07/29/using-innodb-large-prefix-to-avoid-error-1071/ - */ -'mysql.utf8mb4' => false, - -/** - * For search queries in the database, a default collation – depending on the - * character set – is chosen. In some cases a different behaviour is desired, - * for instances when an accent sensitive search is desired. - * - * MariaDB and MySQL have an overlap in available collations, but also - * incompatible ones, also depending on the version of the database server. - * - * This option allows to override the automatic choice. Example: - * - * 'mysql.collation' => 'utf8mb4_0900_as_ci', - * - * This setting has no effect on setup or creating tables. In those cases - * always utf8[mb4]_bin is being used. This setting is only taken into - * consideration in SQL queries that utilize LIKE comparison operators. - */ -'mysql.collation' => null, - -/** - * Database types that are supported for installation. - * - * Available: - * - sqlite (SQLite3) - * - mysql (MySQL) - * - pgsql (PostgreSQL) - * - oci (Oracle) - * - * Defaults to the following databases: - * - sqlite (SQLite3) - * - mysql (MySQL) - * - pgsql (PostgreSQL) - */ -'supportedDatabases' => [ - 'sqlite', - 'mysql', - 'pgsql', - 'oci', -], - -/** - * Override where Nextcloud stores temporary files. Useful in situations where - * the system temporary directory is on a limited space ramdisk or is otherwise - * restricted, or if external storage which do not support streaming are in - * use. - * - * The Web server user/PHP must have write access to this directory. - * Additionally you have to make sure that your PHP configuration considers this a valid - * tmp directory, by setting the TMP, TMPDIR, and TEMP variables to the required directories. - * On top of that you might be required to grant additional permissions in AppArmor or SELinux. - */ -'tempdirectory' => '/tmp/nextcloudtemp', - -/** - * Override where Nextcloud stores update files while updating. Useful in situations - * where the default `datadirectory` is on network disk like NFS, or is otherwise - * restricted. Defaults to the value of `datadirectory` if unset. - * - * If set, the value MUST be located _outside_ of the installation directory of Nextcloud and - * writable by the Web server user. - * - */ -'updatedirectory' => '', - -/** - * Blacklist a specific file or files and disallow the upload of files - * with this name. ``.htaccess`` is blocked by default. - * WARNING: USE THIS ONLY IF YOU KNOW WHAT YOU ARE DOING. - * - * Defaults to ``array('.htaccess')`` - */ -'blacklisted_files' => ['.htaccess'], - -/** - * Blacklist characters from being used in filenames. This is useful if you - * have a filesystem or OS which does not support certain characters like windows. - * - * The '/' and '\' characters are always forbidden. - * - * Example for windows systems: ``array('?', '<', '>', ':', '*', '|', '"', chr(0), "\n", "\r")`` - * see https://en.wikipedia.org/wiki/Comparison_of_file_systems#Limits - * - * Defaults to ``array()`` - */ -'forbidden_chars' => [], - -/** - * If you are applying a theme to Nextcloud, enter the name of the theme here. - * The default location for themes is ``nextcloud/themes/``. - * - * Defaults to the theming app which is shipped since Nextcloud 9 - */ -'theme' => '', - -/** - * Enforce the user theme. This will disable the user theming settings - * This must be a valid ITheme ID. - * E.g. dark, dark-highcontrast, default, light, light-highcontrast, opendyslexic - */ -'enforce_theme' => '', - -/** - * The default cipher for encrypting files. Currently supported are: - * - AES-256-CTR - * - AES-128-CTR - * - AES-256-CFB - * - AES-128-CFB - * - * Defaults to ``AES-256-CTR`` - */ -'cipher' => 'AES-256-CTR', - -/** - * Use the legacy base64 format for encrypted files instead of the more space-efficient - * binary format. The option affects only newly written files, existing encrypted files - * will not be touched and will remain readable whether they use the new format or not. - * - * Defaults to ``false`` - */ -'encryption.use_legacy_base64_encoding' => false, - -/** - * The minimum Nextcloud desktop client version that will be allowed to sync with - * this server instance. All connections made from earlier clients will be denied - * by the server. Defaults to the minimum officially supported Nextcloud desktop - * client version at the time of release of this server version. - * - * When changing this, note that older unsupported versions of the Nextcloud desktop - * client may not function as expected, and could lead to permanent data loss for - * clients or other unexpected results. - * - * Defaults to ``2.3.0`` - */ -'minimum.supported.desktop.version' => '2.3.0', - -/** - * Option to allow local storage to contain symlinks. - * WARNING: Not recommended. This would make it possible for Nextcloud to access - * files outside the data directory and could be considered a security risk. - * - * Defaults to ``false`` - */ -'localstorage.allowsymlinks' => false, - -/** - * Nextcloud overrides umask to ensure suitable access permissions - * regardless of webserver/php-fpm configuration and worker state. - * WARNING: Modifying this value has security implications and - * may soft-break the installation. - * - * Most installs shall not modify this value. - * - * Defaults to ``0022`` - */ -'localstorage.umask' => 0022, - -/** - * This options allows storage systems that don't allow to modify existing files - * to overcome this limitation by removing the files before overwriting. - * - * Defaults to ``false`` - */ -'localstorage.unlink_on_truncate' => false, - -/** - * EXPERIMENTAL: option whether to include external storage in quota - * calculation, defaults to false. - * - * Defaults to ``false`` - */ -'quota_include_external_storage' => false, - -/** - * When an external storage is unavailable for some reasons, it will be flagged - * as such for 10 minutes. When the trigger is a failed authentication attempt - * the delay is higher and can be controlled with this option. The motivation - * is to make account lock outs at Active Directories (and compatible) more - * unlikely. - * - * Defaults to ``1800`` (seconds) - */ -'external_storage.auth_availability_delay' => 1800, - -/** - * Allows to create external storages of type "Local" in the web interface and APIs. - * - * When disabled, it is still possible to create local storages with occ using - * the following command: - * - * % php occ files_external:create /mountpoint local null::null -c datadir=/path/to/data - * - * Defaults to ``true`` - * - */ -'files_external_allow_create_new_local' => true, - -/** - * Specifies how often the local filesystem (the Nextcloud data/ directory, and - * NFS mounts in data/) is checked for changes made outside Nextcloud. This - * does not apply to external storage. - * - * 0 -> Never check the filesystem for outside changes, provides a performance - * increase when it's certain that no changes are made directly to the - * filesystem - * - * 1 -> Check each file or folder at most once per request, recommended for - * general use if outside changes might happen. - * - * Defaults to ``0`` - */ -'filesystem_check_changes' => 0, - -/** - * By default, Nextcloud will store the part files created during upload in the - * same storage as the upload target. Setting this to false will store the part - * files in the root of the users folder which might be required to work with certain - * external storage setups that have limited rename capabilities. - * - * Defaults to ``true`` - */ -'part_file_in_storage' => true, - -/** - * Where ``mount.json`` file should be stored, defaults to ``data/mount.json`` - * in the Nextcloud directory. - * - * Defaults to ``data/mount.json`` in the Nextcloud directory. - */ -'mount_file' => '/var/www/nextcloud/data/mount.json', - -/** - * When ``true``, prevent Nextcloud from changing the cache due to changes in - * the filesystem for all storage. - * - * Defaults to ``false`` - */ -'filesystem_cache_readonly' => false, - -/** - * List of trusted proxy servers - * - * You may set this to an array containing a combination of - * - IPv4 addresses, e.g. `192.168.2.123` - * - IPv4 ranges in CIDR notation, e.g. `192.168.2.0/24` - * - IPv6 addresses, e.g. `fd9e:21a7:a92c:2323::1` - * - IPv6 ranges in CIDR notation, e.g. `2001:db8:85a3:8d3:1319:8a20::/95` - * - * When an incoming request's `REMOTE_ADDR` matches any of the IP addresses - * specified here, it is assumed to be a proxy instead of a client. Thus, the - * client IP will be read from the HTTP header specified in - * `forwarded_for_headers` instead of from `REMOTE_ADDR`. - * - * So if you configure `trusted_proxies`, also consider setting - * `forwarded_for_headers` which otherwise defaults to `HTTP_X_FORWARDED_FOR` - * (the `X-Forwarded-For` header). - * - * Defaults to an empty array. - */ -'trusted_proxies' => ['203.0.113.45', '198.51.100.128', '192.168.2.0/24'], - -/** - * Headers that should be trusted as client IP address in combination with - * `trusted_proxies`. If the HTTP header looks like 'X-Forwarded-For', then use - * 'HTTP_X_FORWARDED_FOR' here. - * - * If set incorrectly, a client can spoof their IP address as visible to - * Nextcloud, bypassing access controls and making logs useless! - * - * Defaults to ``'HTTP_X_FORWARDED_FOR'`` - */ -'forwarded_for_headers' => ['HTTP_X_FORWARDED', 'HTTP_FORWARDED_FOR'], - -/** - * max file size for animating gifs on public-sharing-site. - * If the gif is bigger, it'll show a static preview - * - * Value represents the maximum filesize in megabytes. Set to ``-1`` for - * no limit. - * - * Defaults to ``10`` megabytes - */ -'max_filesize_animated_gifs_public_sharing' => 10, - - -/** - * Enables transactional file locking. - * This is enabled by default. - * - * Prevents concurrent processes from accessing the same files - * at the same time. Can help prevent side effects that would - * be caused by concurrent operations. Mainly relevant for - * very large installations with many users working with - * shared files. - * - * Defaults to ``true`` - */ -'filelocking.enabled' => true, - -/** - * Set the lock's time-to-live in seconds. - * - * Any lock older than this will be automatically cleaned up. - * - * Defaults to ``60*60`` seconds (1 hour) or the php - * max_execution_time, whichever is higher. - */ -'filelocking.ttl' => 60*60, - -/** - * Memory caching backend for file locking - * - * Because most memcache backends can clean values without warning using redis - * is highly recommended to *avoid data loss*. - * - * Defaults to ``none`` - */ -'memcache.locking' => '\\OC\\Memcache\\Redis', - -/** - * Enable locking debug logging - * - * Note that this can lead to a very large volume of log items being written which can lead - * to performance degradation and large log files on busy instance. - * - * Thus enabling this in production for longer periods of time is not recommended - * or should be used together with the ``log.condition`` setting. - */ -'filelocking.debug' => false, - -/** - * Disable the web based updater - */ -'upgrade.disable-web' => false, - -/** - * Allows to modify the cli-upgrade link in order to link to a different documentation - */ -'upgrade.cli-upgrade-link' => '', - -/** - * Set this Nextcloud instance to debugging mode - * - * Only enable this for local development and not in production environments - * This will disable the minifier and outputs some additional debug information - * - * Defaults to ``false`` - */ -'debug' => false, - -/** - * Sets the data-fingerprint of the current data served - * - * This is a property used by the clients to find out if a backup has been - * restored on the server. Once a backup is restored run - * ./occ maintenance:data-fingerprint - * To set this to a new value. - * - * Updating/Deleting this value can make connected clients stall until - * the user has resolved conflicts. - * - * Defaults to ``''`` (empty string) - */ -'data-fingerprint' => '', - -/** - * This entry is just here to show a warning in case somebody copied the sample - * configuration. DO NOT ADD THIS SWITCH TO YOUR CONFIGURATION! - * - * If you, brave person, have read until here be aware that you should not - * modify *ANY* settings in this file without reading the documentation. - */ -'copied_sample_config' => true, - -/** - * use a custom lookup server to publish user data - */ -'lookup_server' => 'https://lookup.nextcloud.com', - -/** - * set to true if the server is used in a setup based on Nextcloud's Global Scale architecture - */ -'gs.enabled' => false, - -/** - * by default federation is only used internally in a Global Scale setup - * If you want to allow federation outside your environment set it to 'global' - */ -'gs.federation' => 'internal', - -/** - * List of incompatible user agents opted out from Same Site Cookie Protection. - * Some user agents are notorious and don't really properly follow HTTP - * specifications. For those, have an opt-out. - * - * WARNING: only use this if you know what you are doing - */ -'csrf.optout' => [ - '/^WebDAVFS/', // OS X Finder - '/^Microsoft-WebDAV-MiniRedir/', // Windows webdav drive -], - -/** - * By default, there is on public pages a link shown that allows users to - * learn about the "simple sign up" - see https://nextcloud.com/signup/ - * - * If this is set to "false" it will not show the link. - */ -'simpleSignUpLink.shown' => true, - -/** - * By default, autocompletion is enabled for the login form on Nextcloud's login page. - * While this is enabled, browsers are allowed to "remember" login names and such. - * Some companies require it to be disabled to comply with their security policy. - * - * Simply set this property to "false", if you want to turn this feature off. - */ - -'login_form_autocomplete' => true, - -/** - * Timeout for the login form, after this time the login form is reset. - * This prevents password leaks on public devices if the user forgots to clear the form. - * - * Default is 5 minutes (300 seconds), a value of 0 means no timeout. - */ -'login_form_timeout' => 300, - -/** - * If your user is using an outdated or unsupported browser, a warning will be shown - * to offer some guidance to upgrade or switch and ensure a proper Nextcloud experience. - * They can still bypass it after they have read the warning. - * - * Simply set this property to "true", if you want to turn this feature off. - */ - -'no_unsupported_browser_warning' => false, - -/** - * Disable background scanning of files - * - * By default, a background job runs every 10 minutes and execute a background - * scan to sync filesystem and database. Only users with unscanned files - * (size < 0 in filecache) are included. Maximum 500 users per job. - * - * Defaults to ``false`` - */ -'files_no_background_scan' => false, - -/** - * Log all queries into a file - * - * Warning: This heavily decreases the performance of the server and is only - * meant to debug/profile the query interaction manually. - * Also, it might log sensitive data into a plain text file. - */ -'query_log_file' => '', - -/** - * Log all redis requests into a file - * - * Warning: This heavily decreases the performance of the server and is only - * meant to debug/profile the redis interaction manually. - * Also, it might log sensitive data into a plain text file. - */ -'redis_log_file' => '', - -/** - * Enable diagnostics event logging - * - * If enabled the timings of common execution steps will be logged to the - * Nextcloud log at debug level. log.condition is useful to enable this on - * production systems to only log under some conditions - */ -'diagnostics.logging' => true, - -/** - * Limit diagnostics event logging to events longer than the configured threshold in ms - * - * when set to 0 no diagnostics events will be logged - */ -'diagnostics.logging.threshold' => 0, - -/** - * Enable profile globally - * - * Defaults to ``true`` - */ -'profile.enabled' => true, - -/** - * Allows to override the default scopes for Account data. - * The list of overridable properties and valid values for scopes are in - * ``OCP\Accounts\IAccountManager``. Values added here are merged with - * default values, which are in ``OC\Accounts\AccountManager``. - * - * For instance, if the phone property should default to the private scope - * instead of the local one: - * - * :: - * - * [ - * \OCP\Accounts\IAccountManager::PROPERTY_PHONE => \OCP\Accounts\IAccountManager::SCOPE_PRIVATE - * ] - * - */ -'account_manager.default_property_scope' => [], - -/** - * Enable the deprecated Projects feature, - * superseded by Related resources as of Nextcloud 25 - * - * Defaults to ``false`` - */ -'projects.enabled' => false, - -/** - * Enable the bulk upload feature. - * - * Defaults to ``true`` - */ -'bulkupload.enabled' => true, - -/** - * Enables fetching open graph metadata from remote urls - * - * Defaults to ``true`` - */ -'reference_opengraph' => true, - -/** - * Enable use of old unified search - * - * Defaults to ``false`` - */ -'unified_search.enabled' => false, - -/** - * Enable features that are do respect accessibility standards yet. - * - * Defaults to ``true`` - */ -'enable_non-accessible_features' => true, -]; diff --git a/nextcloud/config_bak/redis.config.php b/nextcloud/config_bak/redis.config.php deleted file mode 100644 index a5fde3c..0000000 --- a/nextcloud/config_bak/redis.config.php +++ /dev/null @@ -1,17 +0,0 @@ - '\OC\Memcache\Redis', - 'memcache.locking' => '\OC\Memcache\Redis', - 'redis' => array( - 'host' => getenv('REDIS_HOST'), - 'password' => (string) getenv('REDIS_HOST_PASSWORD'), - ), - ); - - if (getenv('REDIS_HOST_PORT') !== false) { - $CONFIG['redis']['port'] = (int) getenv('REDIS_HOST_PORT'); - } elseif (getenv('REDIS_HOST')[0] != '/') { - $CONFIG['redis']['port'] = 6379; - } -} diff --git a/nextcloud/config_bak/reverse-proxy.config.php b/nextcloud/config_bak/reverse-proxy.config.php deleted file mode 100644 index 7df0415..0000000 --- a/nextcloud/config_bak/reverse-proxy.config.php +++ /dev/null @@ -1,30 +0,0 @@ - array( - 'class' => '\OC\Files\ObjectStore\S3', - 'arguments' => array( - 'bucket' => getenv('OBJECTSTORE_S3_BUCKET'), - 'region' => getenv('OBJECTSTORE_S3_REGION') ?: '', - 'hostname' => getenv('OBJECTSTORE_S3_HOST') ?: '', - 'port' => getenv('OBJECTSTORE_S3_PORT') ?: '', - 'storageClass' => getenv('OBJECTSTORE_S3_STORAGE_CLASS') ?: '', - 'objectPrefix' => getenv("OBJECTSTORE_S3_OBJECT_PREFIX") ? getenv("OBJECTSTORE_S3_OBJECT_PREFIX") : "urn:oid:", - 'autocreate' => (strtolower($autocreate) === 'false' || $autocreate == false) ? false : true, - 'use_ssl' => (strtolower($use_ssl) === 'false' || $use_ssl == false) ? false : true, - // required for some non Amazon S3 implementations - 'use_path_style' => $use_path == true && strtolower($use_path) !== 'false', - // required for older protocol versions - 'legacy_auth' => $use_legacyauth == true && strtolower($use_legacyauth) !== 'false' - ) - ) - ); - - if (getenv('OBJECTSTORE_S3_KEY_FILE') && file_exists(getenv('OBJECTSTORE_S3_KEY_FILE'))) { - $CONFIG['objectstore']['arguments']['key'] = trim(file_get_contents(getenv('OBJECTSTORE_S3_KEY_FILE'))); - } elseif (getenv('OBJECTSTORE_S3_KEY')) { - $CONFIG['objectstore']['arguments']['key'] = getenv('OBJECTSTORE_S3_KEY'); - } else { - $CONFIG['objectstore']['arguments']['key'] = ''; - } - - if (getenv('OBJECTSTORE_S3_SECRET_FILE') && file_exists(getenv('OBJECTSTORE_S3_SECRET_FILE'))) { - $CONFIG['objectstore']['arguments']['secret'] = trim(file_get_contents(getenv('OBJECTSTORE_S3_SECRET_FILE'))); - } elseif (getenv('OBJECTSTORE_S3_SECRET')) { - $CONFIG['objectstore']['arguments']['secret'] = getenv('OBJECTSTORE_S3_SECRET'); - } else { - $CONFIG['objectstore']['arguments']['secret'] = ''; - } - - if (getenv('OBJECTSTORE_S3_SSE_C_KEY_FILE') && file_exists(getenv('OBJECTSTORE_S3_SSE_C_KEY_FILE'))) { - $CONFIG['objectstore']['arguments']['sse_c_key'] = trim(file_get_contents(getenv('OBJECTSTORE_S3_SSE_C_KEY_FILE'))); - } elseif (getenv('OBJECTSTORE_S3_SSE_C_KEY')) { - $CONFIG['objectstore']['arguments']['sse_c_key'] = getenv('OBJECTSTORE_S3_SSE_C_KEY'); - } -} diff --git a/nextcloud/config_bak/smtp.config.php b/nextcloud/config_bak/smtp.config.php deleted file mode 100644 index 5006fe4..0000000 --- a/nextcloud/config_bak/smtp.config.php +++ /dev/null @@ -1,22 +0,0 @@ - 'smtp', - 'mail_smtphost' => getenv('SMTP_HOST'), - 'mail_smtpport' => getenv('SMTP_PORT') ?: (getenv('SMTP_SECURE') ? 465 : 25), - 'mail_smtpsecure' => getenv('SMTP_SECURE') ?: '', - 'mail_smtpauth' => getenv('SMTP_NAME') && (getenv('SMTP_PASSWORD') || (getenv('SMTP_PASSWORD_FILE') && file_exists(getenv('SMTP_PASSWORD_FILE')))), - 'mail_smtpauthtype' => getenv('SMTP_AUTHTYPE') ?: 'LOGIN', - 'mail_smtpname' => getenv('SMTP_NAME') ?: '', - 'mail_from_address' => getenv('MAIL_FROM_ADDRESS'), - 'mail_domain' => getenv('MAIL_DOMAIN'), - ); - - if (getenv('SMTP_PASSWORD_FILE') && file_exists(getenv('SMTP_PASSWORD_FILE'))) { - $CONFIG['mail_smtppassword'] = trim(file_get_contents(getenv('SMTP_PASSWORD_FILE'))); - } elseif (getenv('SMTP_PASSWORD')) { - $CONFIG['mail_smtppassword'] = getenv('SMTP_PASSWORD'); - } else { - $CONFIG['mail_smtppassword'] = ''; - } -} diff --git a/nextcloud/config_bak/swift.config.php b/nextcloud/config_bak/swift.config.php deleted file mode 100644 index 47ada56..0000000 --- a/nextcloud/config_bak/swift.config.php +++ /dev/null @@ -1,31 +0,0 @@ - [ - 'class' => 'OC\\Files\\ObjectStore\\Swift', - 'arguments' => [ - 'autocreate' => $autocreate == true && strtolower($autocreate) !== 'false', - 'user' => [ - 'name' => getenv('OBJECTSTORE_SWIFT_USER_NAME'), - 'password' => getenv('OBJECTSTORE_SWIFT_USER_PASSWORD'), - 'domain' => [ - 'name' => (getenv('OBJECTSTORE_SWIFT_USER_DOMAIN')) ?: 'Default', - ], - ], - 'scope' => [ - 'project' => [ - 'name' => getenv('OBJECTSTORE_SWIFT_PROJECT_NAME'), - 'domain' => [ - 'name' => (getenv('OBJECTSTORE_SWIFT_PROJECT_DOMAIN')) ?: 'Default', - ], - ], - ], - 'serviceName' => (getenv('OBJECTSTORE_SWIFT_SERVICE_NAME')) ?: 'swift', - 'region' => getenv('OBJECTSTORE_SWIFT_REGION'), - 'url' => getenv('OBJECTSTORE_SWIFT_URL'), - 'bucket' => getenv('OBJECTSTORE_SWIFT_CONTAINER_NAME'), - ] - ] - ); -} diff --git a/nextcloud/config_bak/upgrade-disable-web.config.php b/nextcloud/config_bak/upgrade-disable-web.config.php deleted file mode 100644 index cb00b43..0000000 --- a/nextcloud/config_bak/upgrade-disable-web.config.php +++ /dev/null @@ -1,4 +0,0 @@ - true, -); diff --git a/vnc/.gitignore b/vnc/.gitignore new file mode 100644 index 0000000..60baa9c --- /dev/null +++ b/vnc/.gitignore @@ -0,0 +1 @@ +data/* From ed7daac5cb15c0660c3bf3e382c3a2206419483c Mon Sep 17 00:00:00 2001 From: Brodin Date: Sun, 23 Jun 2024 12:28:11 -0400 Subject: [PATCH 3/4] removing backups --- .../acme-challenge/0nvqKzz1EohOVB6bht1uUCmvcSSi7dBiG8jmzVdNjy4 | 1 - 1 file changed, 1 deletion(-) delete mode 100644 nginx-proxy/nginx/html_bak/.well-known/acme-challenge/0nvqKzz1EohOVB6bht1uUCmvcSSi7dBiG8jmzVdNjy4 diff --git a/nginx-proxy/nginx/html_bak/.well-known/acme-challenge/0nvqKzz1EohOVB6bht1uUCmvcSSi7dBiG8jmzVdNjy4 b/nginx-proxy/nginx/html_bak/.well-known/acme-challenge/0nvqKzz1EohOVB6bht1uUCmvcSSi7dBiG8jmzVdNjy4 deleted file mode 100644 index e32723e..0000000 --- a/nginx-proxy/nginx/html_bak/.well-known/acme-challenge/0nvqKzz1EohOVB6bht1uUCmvcSSi7dBiG8jmzVdNjy4 +++ /dev/null @@ -1 +0,0 @@ -0nvqKzz1EohOVB6bht1uUCmvcSSi7dBiG8jmzVdNjy4.-pySGwa5vVkj_cOXnCDnd-dGPAV2kVXglGIYiUrWeT8 From 714689b0483182288fd89fb5e5a74d2bd93627a2 Mon Sep 17 00:00:00 2001 From: Brodin Date: Sun, 23 Jun 2024 12:31:13 -0400 Subject: [PATCH 4/4] REMOVE --- vnc/data/db_v2.sqlite3 | Bin 24576 -> 0 bytes vnc/data/db_v2.sqlite3-shm | Bin 32768 -> 0 bytes vnc/data/db_v2.sqlite3-wal | Bin 123632 -> 0 bytes vnc/data/id_ed25519 | 1 - vnc/data/id_ed25519.pub | 1 - vnc/data/id_ed25519_minineuro | 1 - vnc/data/id_ed25519_minineuro.pub | 1 - 7 files changed, 4 deletions(-) delete mode 100644 vnc/data/db_v2.sqlite3 delete mode 100644 vnc/data/db_v2.sqlite3-shm delete mode 100644 vnc/data/db_v2.sqlite3-wal delete mode 100644 vnc/data/id_ed25519 delete mode 100644 vnc/data/id_ed25519.pub delete mode 100644 vnc/data/id_ed25519_minineuro delete mode 100644 vnc/data/id_ed25519_minineuro.pub diff --git a/vnc/data/db_v2.sqlite3 b/vnc/data/db_v2.sqlite3 deleted file mode 100644 index ee424be1940e2a893034dbca3d53c768887dce17..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 24576 zcmeI(PiWIn90%|;-8vX<6{QqZ@KI1#ZEF6tO#|ZJGXD(c+yq5oq{*ub>p!wo9b*R- zMG)~Of}kj#Ja`x?2p+|QBHnZgJLy3|FM{Aj@nx&6>mLz3Y=`fIq%V2D{_@@@xx5!L zJTzdtl;lcI!ElMft>k!~+d&A&aXi}sZ2Mh0S*7Fm0sHm+QEyk}x%hFphqZS01i0S8 zUcTp1&rw!IfdB*`009U<00Izz00bbgL;{C81L3V9-?&}0=$ZN5Xqi%Hbiy^<%7j-9 z>^_{?Ig%m!4(`buB~2luR3u&)>09_q^h8G>oC^7-8Z(*>HC$?q8m<@K*)D56te&}k zF1p_z2yY4b%*O1M3F>%xJKE*-0_qvPqv!!X5Z)B>*^Rku%gf}iW;$|k-_Vg3!?&$^ zI@^k#kNdj9p^)$5cGt+}sh7dq_-dAsox27yRj6*#P)=4@vTVMTC1uAh7|tXar<0^u za!Ik0&&QhLS@bExF~G-BGWVJqm?#w7KK+H^CcdbJN1pLtMK!X&2q*cGf#u8@0kl-5g>Ub0y-^GmNcD zw@5BZPTTHSsp1l+blSGMgJT@uo8)?5u^kEoAOHafKmY;|fB*y_009Up50*DJ{pPq!!nbaaoH@|JkwG@{i%WYX=|S8@%*-u7CFjRZgbTio*J) zDOocor3Fc~OhJ_lP0-{d6-*K1wW@@ryF-+C@`xe&QJ{rw90_@H0$ zb3d2B6BKKP6azGpiW2tWV=5P$##AOHaf zKmY;|fB*!RvA{b2`dDpwqjBBCYpgBGG_E}?%>QS(;B4^oG9Dnh1_1~_00Izz00bZa z0SG_<0uX>e3xU;sF4njZ;GJtd|DWN4Z-X-}(%=*XAOHafKmY;|fB*y_009U<00K)Q zu+gu?T6}%bIN5IwoBw*E_52_2|Ci)e;-V0M00bZa0SG_<0uX=z1Rwx`{}lMw_y4~D D>tNr& diff --git a/vnc/data/db_v2.sqlite3-shm b/vnc/data/db_v2.sqlite3-shm deleted file mode 100644 index 1c8c8371c0baf22c4345184d171675b52f023e6c..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 32768 zcmeI)Pc8&O6bInnjG6JDnZXzgYZl@vgd7mUJf%$`96^# z&=!F~HZy5Uv-%{kAh43H>@QRd2((3DE!&y4rCEIvAV7cs0RjXF5FkK+009C72oNAZ jfB*pk1PBlyK!5-N0t5&UAV7cs0RjXF5FkL{p9uT_DA*(_ diff --git a/vnc/data/db_v2.sqlite3-wal b/vnc/data/db_v2.sqlite3-wal deleted file mode 100644 index d98da4a7c7ad767cacff32add0929f1921fd90cf..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 123632 zcmeI*eQXo=9mnyrorftaF&$0A%G1fCkfd?2@BFOM6Bg{>2^&*$LbJj}6| z28LQdP}=UH(yFNgty4Pwfc?QFL@B6g*G+9T!8XPwtuP5~f@ljZ)gDx|RRXl%`3c)e z8eoCM@ct=weD?W#_p%eo-{0qcKkri&J0$!0*^)FH5g?Khm#tc6QDgIT06k zney*{;ivyP`17l)hTGP)MiaUm>4|p*6S69vZ8l4f$+B42oVgfJGn(=Ived2gRcd>A z%VXU%OHE%>W{5{j)oUd2Lqh-o1Q0*~0R#|0009ILxH|-PHkm4GYidlpzmN!qVtTKx z$Bm15#pBJ(+MDI}Wy@QeW#b;Xu1YRyoylle4#j#xa&J7^6^swaoAm*?yC)%cCu6b3 zQR|DfzZHyYn}YE=r^8YI32P>ETONOFy_?goJ^mV6Tn{Gn@J8`HIV^4@qFs9KHRZ4# z2_|ESIxQKG>)nZs#-n|SU{`Pb=p9e?iQ_j8bo4{wDT!pCoQQT0M7tBC9~XP4=Z;zx zM?HF#Xm_MXPUuexwhUc?T)o^MO>F8(CggZee>5yUcB$|A*?Pfm9sPN_x4v0kx%!LE9df~1a!+?A0T2z>lNTtxynyi?-;&J>)NVQC>3`vuI(dO9`g7!E z5kLR|1Q0*~0R#|0009ILxU&KUd4Y59e{^8eV|Aw{$P47>1B|*t{_;(YFJPH*G?f<+ zzi0>`fB*srAbHA{ z@&c)G4({FY1&r_XW!b#I;@NA<&aBySki5VR|1q*60tg_000IagfB*srAbzS{NE_pjeqPhLRu@iQO6O+7KJZr+5~xlioDGkb%k3V zU!Z(OMJ_KOZqg7y009ILKmY**5I_KdDH2#)UQxTG#6dYjbAyf~wSM{drfNNs#~u#d<<=Z#>!+j1S10^#QrN zCn0wyW3k3j>ysCloV zxS+jN6;IQzeyFvbdG$-zhCbt1+Hm~vpPhb(%kOk}l#s5wHLvQnN3>AL?o$0hyI=Ea zcGah-il&6!E}yDB)aJN6eBxqd!^vHT&UqKVcb`)EaP5YDLq}d7oHY^{R2+)S?(osypEJY_&yuZ2_C&aX14mulVss0%1Mu3b>u_fKwGqes?4k2s(YXZDRk7c?NTJ zfvs=s{i>GJt^AsMd|DE-Fzy3iuT^C^7!Q8va4FnKC009IL zKmY**5I_I{1WHq2qHzZc@&eCkuigK_{J)K)>jKPESekD+dyN1B2q1s}0tg_000Iag zFx3JjHcw$LFA%Eh^X{*aj*%Cb>Q4}_j{pJ)AbCs0)~@-;%1|vUW_$Ua%1a5I_I{1Q0*~0R#|0009JUgTVF&b0_XMpXt5Ywtvo= z<3C%o=TGNaRt&ookJqoNey78yhO~&&Z+E)Fn%(6L`s_Z%quaHh*X{HvA*brsU)lN- z`R(8S+kGyuWQXnfF5CCF{r9`_$dMM+B3=98?xU|1j_vPq1zf(ZwrH;{U>kknzSFj? z#PR}CcAmnaeSiP_;p48;sk(smUCDYuT+t9f009ILKmY**5I_I{1Q0-A8VeYafLs-% zxI8jZUZBi4uxwqRf6v>G41RO@ymVdQjAT7yy)=yvoLxfz0R#|0009ILKmY**5I_Kd zF$9b`35yE^4G94Q9q2+%zdW#6}Q6009IL zKmY**5I_I{1Q56l0@HQeL2;-v7qqvk;|b=xCa zC}el3{-E8jc{RK0Q&dG$!fuyO)gEedTpm7gv9jUhu0!X%i{HCXseHJ0!@i*-FAvTd z2@DoS2~rt>PZ}Rl?4Lzka(RJETLw?xzcdzM+(Ds2LjVB;5I_I{1Q0*~0R#|0pd(|as)di|gN!6#Uv@6y0bsSg)Bpeg diff --git a/vnc/data/id_ed25519 b/vnc/data/id_ed25519 deleted file mode 100644 index 105d769..0000000 --- a/vnc/data/id_ed25519 +++ /dev/null @@ -1 +0,0 @@ -6KaueJVZIh+2r1mEATATVzwrd0R3wd2mZPbsXypgoVNyoh8ft6M8AQ/HV5TfQbym6EpO0sGTb7sKJsiz4Do2KA== \ No newline at end of file diff --git a/vnc/data/id_ed25519.pub b/vnc/data/id_ed25519.pub deleted file mode 100644 index e22809a..0000000 --- a/vnc/data/id_ed25519.pub +++ /dev/null @@ -1 +0,0 @@ -cqIfH7ejPAEPx1eU30G8puhKTtLBk2+7CibIs+A6Nig= \ No newline at end of file diff --git a/vnc/data/id_ed25519_minineuro b/vnc/data/id_ed25519_minineuro deleted file mode 100644 index 562f410..0000000 --- a/vnc/data/id_ed25519_minineuro +++ /dev/null @@ -1 +0,0 @@ -XYDXfHz/zm3QtKeHQkUyb4Ka5KMP6JRnhVs1bqTFlHR900zna7bzOlxrZhbaKPeeDOCK7EeYM+CiITg8B0qAEw== \ No newline at end of file diff --git a/vnc/data/id_ed25519_minineuro.pub b/vnc/data/id_ed25519_minineuro.pub deleted file mode 100644 index 852c262..0000000 --- a/vnc/data/id_ed25519_minineuro.pub +++ /dev/null @@ -1 +0,0 @@ -fdNM52u28zpca2YW2ij3ngzgiuxHmDPgoiE4PAdKgBM= \ No newline at end of file