adding better nextcloud tweaks
This commit is contained in:
parent
eacb03e3ac
commit
062417719b
|
@ -389,12 +389,14 @@
|
||||||
encode gzip
|
encode gzip
|
||||||
redir /.well-known/carddav /remote.php/dav 301
|
redir /.well-known/carddav /remote.php/dav 301
|
||||||
redir /.well-known/caldav /remote.php/dav 301
|
redir /.well-known/caldav /remote.php/dav 301
|
||||||
header Strict-Transport-Security "max-age=15768000; includeSubDomains; reload;"
|
header { Strict-Transport-Security "max-age=15768000; includeSubDomains; reload;" Access-Control-Allow-Origin * Referrer-Policy no-referrer-when-downgrade }
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
systemd.services = {
|
systemd.services = {
|
||||||
|
nextcloud-cron = { enable = true; serviceConfig = { Type = "oneshot"; ExecStart = "${pkgs.docker}/bin/docker exec -u www-data -d nextcloud-app-1 php cron.php"; }; };
|
||||||
|
nextcloud-previews = { enable = true; serviceConfig = { Type = "oneshot"; ExecStart = "${pkgs.docker}/bin/docker exec -u www-data -d nextcloud-app-1 php occ preview:pre-generate"; }; };
|
||||||
# mail-cert-renew = {
|
# mail-cert-renew = {
|
||||||
# enable = true;
|
# enable = true;
|
||||||
# serviceConfig = {
|
# serviceConfig = {
|
||||||
|
@ -404,6 +406,11 @@
|
||||||
# };
|
# };
|
||||||
};
|
};
|
||||||
|
|
||||||
|
systemd.timers = {
|
||||||
|
nextcloud-cron = { enable = true; partOf = ["nextcloud-cron.service"]; timerConfig = { OnStartupSec = "2min"; OnUnitActiveSec = "5min"; Unit = "nextcloud-cron.service"; }; wantedBy = [ "timers.target" ]; }; nextcloud-previews = { enable = true; partOf = ["nextcloud-previews.service"]; timerConfig = { OnStartupSec = "2min"; OnUnitActiveSec = "10min";
|
||||||
|
Unit = "nextcloud-previews.service"; }; wantedBy = [ "timers.target" ]; };
|
||||||
|
};
|
||||||
|
|
||||||
# Open ports in the firewall.
|
# Open ports in the firewall.
|
||||||
# networking.firewall.allowedTCPPorts = [ ... ];
|
# networking.firewall.allowedTCPPorts = [ ... ];
|
||||||
# networking.firewall.allowedUDPPorts = [ ... ];
|
# networking.firewall.allowedUDPPorts = [ ... ];
|
||||||
|
|
Loading…
Reference in a new issue