Compare commits

...

218 Commits

Author SHA1 Message Date
Simon L.
1fea550764 Merge pull request #6022 from nextcloud/Anvil5465-patch-2
Allow Jellyfin write access to NEXTCLOUD_MOUNT
2025-02-17 17:21:29 +01:00
Anvil5465
c684ce206c Allow Jellyfin write access to NEXTCLOUD_MOUNT
Signed-off-by: Anvil5465 <119350594+Anvil5465@users.noreply.github.com>
2025-02-17 17:20:27 +01:00
Simon L.
62c4cd4188 increase to 10.6.0
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-02-17 11:53:14 +01:00
Simon L.
c9a0cd4f7e Merge pull request #6054 from nextcloud/enh/noid/hub-10
aio-interface: show checkbox for hub 10
2025-02-17 11:52:21 +01:00
Simon L.
b60db87321 aio-interface: show checkbox for hub 10
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-02-17 11:50:52 +01:00
Simon L.
37b7e22851 Merge pull request #6009 from nextcloud/enh/4751/allow-to-exclude-datadir
borg: allow to exclude datadir and preview folder from backup via `.noaiobackup` file
2025-02-17 11:25:33 +01:00
Simon L.
dd4031c761 Merge pull request #6005 from nextcloud/enh/5311/allow-adjust-es-java-options
FTS: allow to adjust the ES_JAVA_OPTS
2025-02-17 11:20:35 +01:00
Simon L.
cca7eef06b FTS: allow to adjust the ES_JAVA_OPTS
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-02-17 11:19:10 +01:00
Simon L.
7849d06b3e Merge pull request #6051 from nextcloud/dependabot/docker/Containers/watchtower/alpine-3.21.3
build(deps): bump alpine from 3.21.2 to 3.21.3 in /Containers/watchtower
2025-02-17 11:10:06 +01:00
Simon L.
c41ed2b31f Merge pull request #6050 from nextcloud/dependabot/docker/Containers/talk/alpine-3.21.3
build(deps): bump alpine from 3.21.2 to 3.21.3 in /Containers/talk
2025-02-17 11:09:50 +01:00
Simon L.
b83a772060 Merge pull request #6049 from nextcloud/dependabot/docker/Containers/notify-push/alpine-3.21.3
build(deps): bump alpine from 3.21.2 to 3.21.3 in /Containers/notify-push
2025-02-17 11:09:34 +01:00
Simon L.
e3984f87a1 Merge pull request #6048 from nextcloud/dependabot/docker/Containers/nextcloud/php-8.3.17-fpm-alpine3.21
build(deps): bump php from 8.3.16-fpm-alpine3.21 to 8.3.17-fpm-alpine3.21 in /Containers/nextcloud
2025-02-17 11:09:14 +01:00
Simon L.
a817b8b903 Merge pull request #6047 from nextcloud/dependabot/docker/Containers/mastercontainer/php-8.3.17-fpm-alpine3.21
build(deps): bump php from 8.3.16-fpm-alpine3.21 to 8.3.17-fpm-alpine3.21 in /Containers/mastercontainer
2025-02-17 11:09:00 +01:00
Simon L.
da2d6f9a16 Merge pull request #6046 from nextcloud/dependabot/docker/Containers/imaginary/alpine-3.21.3
build(deps): bump alpine from 3.21.2 to 3.21.3 in /Containers/imaginary
2025-02-17 11:08:45 +01:00
Simon L.
280114b7c1 Merge pull request #6045 from nextcloud/dependabot/docker/Containers/domaincheck/alpine-3.21.3
build(deps): bump alpine from 3.21.2 to 3.21.3 in /Containers/domaincheck
2025-02-17 11:08:29 +01:00
Simon L.
8db30147ab Merge pull request #6044 from nextcloud/dependabot/docker/Containers/clamav/clamav/clamav-1.4.2-27
build(deps): bump clamav/clamav from 1.4.2-26 to 1.4.2-27 in /Containers/clamav
2025-02-17 11:08:15 +01:00
Simon L.
5533ea7d13 Merge pull request #6043 from nextcloud/dependabot/docker/Containers/borgbackup/alpine-3.21.3
build(deps): bump alpine from 3.21.2 to 3.21.3 in /Containers/borgbackup
2025-02-17 11:07:58 +01:00
dependabot[bot]
50050574c7 build(deps): bump alpine from 3.21.2 to 3.21.3 in /Containers/watchtower
Bumps alpine from 3.21.2 to 3.21.3.

---
updated-dependencies:
- dependency-name: alpine
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-02-17 05:01:02 +00:00
dependabot[bot]
dd74c9b3af build(deps): bump alpine from 3.21.2 to 3.21.3 in /Containers/talk
Bumps alpine from 3.21.2 to 3.21.3.

---
updated-dependencies:
- dependency-name: alpine
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-02-17 05:00:45 +00:00
dependabot[bot]
c58c789f58 build(deps): bump alpine in /Containers/notify-push
Bumps alpine from 3.21.2 to 3.21.3.

---
updated-dependencies:
- dependency-name: alpine
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-02-17 05:00:28 +00:00
dependabot[bot]
c4a332eab1 build(deps): bump php in /Containers/nextcloud
Bumps php from 8.3.16-fpm-alpine3.21 to 8.3.17-fpm-alpine3.21.

---
updated-dependencies:
- dependency-name: php
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-02-17 05:00:25 +00:00
dependabot[bot]
07bfea3b6c build(deps): bump php in /Containers/mastercontainer
Bumps php from 8.3.16-fpm-alpine3.21 to 8.3.17-fpm-alpine3.21.

---
updated-dependencies:
- dependency-name: php
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-02-17 05:00:04 +00:00
dependabot[bot]
7cf6486c52 build(deps): bump alpine from 3.21.2 to 3.21.3 in /Containers/imaginary
Bumps alpine from 3.21.2 to 3.21.3.

---
updated-dependencies:
- dependency-name: alpine
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-02-17 04:59:54 +00:00
dependabot[bot]
847fe97e47 build(deps): bump alpine in /Containers/domaincheck
Bumps alpine from 3.21.2 to 3.21.3.

---
updated-dependencies:
- dependency-name: alpine
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-02-17 04:59:49 +00:00
dependabot[bot]
da23586441 build(deps): bump clamav/clamav in /Containers/clamav
Bumps clamav/clamav from 1.4.2-26 to 1.4.2-27.

---
updated-dependencies:
- dependency-name: clamav/clamav
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-02-17 04:59:43 +00:00
dependabot[bot]
db77606f55 build(deps): bump alpine from 3.21.2 to 3.21.3 in /Containers/borgbackup
Bumps alpine from 3.21.2 to 3.21.3.

---
updated-dependencies:
- dependency-name: alpine
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-02-17 04:59:41 +00:00
Simon L.
ddf90f8b1d Merge pull request #6039 from nextcloud/nextcloud-container-update
Nextcloud dependency update
2025-02-14 13:42:55 +01:00
Simon L.
f68dbb678e Merge pull request #6038 from nextcloud/aio-dependency-update
PHP dependency updates
2025-02-14 13:42:34 +01:00
szaimen
52b8f7bccb nextcloud-update automated change
Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
2025-02-14 12:11:15 +00:00
szaimen
afba1368ea php dependency updates
Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
2025-02-14 12:02:55 +00:00
Simon L.
0b3d0d7ca3 Merge pull request #6034 from nextcloud/aio-dependency-update
PHP dependency updates
2025-02-13 13:30:35 +01:00
szaimen
aa94662aa7 php dependency updates
Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
2025-02-13 12:03:05 +00:00
Simon L.
ff7fdb5864 Merge pull request #6033 from nextcloud/dependabot/docker/Containers/imaginary/golang-1.24.0-alpine3.21
build(deps): bump golang from 1.23.6-alpine3.21 to 1.24.0-alpine3.21 in /Containers/imaginary
2025-02-13 07:36:26 +01:00
dependabot[bot]
b1f14ea187 build(deps): bump golang in /Containers/imaginary
Bumps golang from 1.23.6-alpine3.21 to 1.24.0-alpine3.21.

---
updated-dependencies:
- dependency-name: golang
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-02-13 04:16:57 +00:00
Simon L.
cfca4f6ad7 Merge pull request #6031 from nextcloud/aio-dependency-update
PHP dependency updates
2025-02-12 13:11:27 +01:00
Simon L.
db1b0189c5 Merge pull request #6032 from nextcloud/aio-yaml-update
Yaml updates
2025-02-12 13:11:08 +01:00
szaimen
1ea7f48f9f Yaml updates
Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
2025-02-12 12:03:12 +00:00
szaimen
4f86b0ad0a php dependency updates
Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
2025-02-12 12:03:01 +00:00
Simon L.
2112916255 Merge pull request #6030 from nextcloud/dependabot/docker/Containers/fulltextsearch/elasticsearch-8.17.2
build(deps): bump elasticsearch from 8.17.1 to 8.17.2 in /Containers/fulltextsearch
2025-02-12 07:43:43 +01:00
dependabot[bot]
f9fe028f77 build(deps): bump elasticsearch in /Containers/fulltextsearch
Bumps elasticsearch from 8.17.1 to 8.17.2.

---
updated-dependencies:
- dependency-name: elasticsearch
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-02-12 04:43:19 +00:00
Simon L.
12efc88bc8 Merge pull request #5987 from nextcloud/aio-dependency-update
PHP dependency updates
2025-02-11 14:36:36 +01:00
Simon L.
37c299188c Merge pull request #6015 from nextcloud/dependabot/docker/Containers/imaginary/golang-1.23.6-alpine3.21
build(deps): bump golang from 1.23.5-alpine3.21 to 1.23.6-alpine3.21 in /Containers/imaginary
2025-02-11 14:35:43 +01:00
Simon L.
b87b3f7efe update OO
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-02-11 14:35:11 +01:00
Simon L.
9397f12a75 Merge pull request #6027 from nextcloud/enh/noid/add-retention-policy-chapter
readme: add chapter how to adjust version and trashbin retention policy
2025-02-11 14:34:17 +01:00
Simon L.
b3d8cf78fb readme: add chapter how to adjust version and trashbin retention policy
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-02-11 14:32:47 +01:00
Simon L.
41ca74b2f6 Merge pull request #6023 from nextcloud/dependabot/docker/Containers/collabora/collabora/code-24.04.12.3.1
build(deps): bump collabora/code from 24.04.12.2.1 to 24.04.12.3.1 in /Containers/collabora
2025-02-11 14:26:40 +01:00
Simon L.
d8d40c0026 Merge pull request #6021 from nextcloud/dependabot/docker/Containers/clamav/clamav/clamav-1.4.2-26
build(deps): bump clamav/clamav from 1.4.2-25 to 1.4.2-26 in /Containers/clamav
2025-02-11 14:26:27 +01:00
Simon L.
0d29399e46 Merge pull request #6026 from nextcloud/enh/noid/add-note-about-manual-upgrade
manual-upgrade: add note that method 1 seems to be currently broken
2025-02-11 14:24:32 +01:00
Simon L.
4b219fa692 Merge pull request #6025 from nextcloud/enh/6024/add-tz-to-notify-push
notify-push: add timezone to container
2025-02-11 14:24:18 +01:00
Simon L.
6170e699c5 manual-upgrade: add note that method 1 seems to be currently broken
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-02-11 14:23:03 +01:00
Simon L.
abec1ef102 notify-push: add timezone to container
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-02-11 10:11:38 +01:00
dependabot[bot]
b340152d80 build(deps): bump collabora/code in /Containers/collabora
Bumps collabora/code from 24.04.12.2.1 to 24.04.12.3.1.

---
updated-dependencies:
- dependency-name: collabora/code
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-02-11 04:45:11 +00:00
dependabot[bot]
ee5db17004 build(deps): bump clamav/clamav in /Containers/clamav
Bumps clamav/clamav from 1.4.2-25 to 1.4.2-26.

---
updated-dependencies:
- dependency-name: clamav/clamav
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-02-10 04:43:37 +00:00
szaimen
3c83570360 php dependency updates
Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
2025-02-07 12:06:53 +00:00
Simon L.
db81abed09 Merge pull request #6018 from nextcloud/dependabot/docker/Containers/talk-recording/python-3.13.2-alpine3.21
build(deps): bump python from 3.13.1-alpine3.21 to 3.13.2-alpine3.21 in /Containers/talk-recording
2025-02-07 09:58:01 +01:00
dependabot[bot]
3a19de9e65 build(deps): bump python in /Containers/talk-recording
Bumps python from 3.13.1-alpine3.21 to 3.13.2-alpine3.21.

---
updated-dependencies:
- dependency-name: python
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-02-07 05:02:37 +00:00
dependabot[bot]
75f00d4e7e build(deps): bump golang in /Containers/imaginary
Bumps golang from 1.23.5-alpine3.21 to 1.23.6-alpine3.21.

---
updated-dependencies:
- dependency-name: golang
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-02-06 04:48:12 +00:00
Simon L.
965f8611a1 Merge pull request #6013 from nextcloud/enh/scrutiny/improve-docs
scrutiny-cc: improve documentation
2025-02-05 13:51:22 +01:00
Simon L.
4a00eb9347 scrutiny-cc: improve documentation
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-02-05 13:48:54 +01:00
Simon L.
13afcd944a borg: allow to exclude datadir and preview folder from backup via .noaiobackup file
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-02-04 19:52:55 +01:00
Simon L.
69ea9d1a72 adjust detail
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-02-04 17:29:10 +01:00
Simon L.
d0374e4b47 Merge pull request #6004 from nextcloud/enh/noid/add-toc
readme: add TOC
2025-02-04 17:22:52 +01:00
Simon L.
7b65109126 readme: add TOC
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-02-04 17:19:55 +01:00
Simon L.
32dc801885 Merge pull request #5998 from nextcloud/enh/noid/add-further-ui-secrets
also add ui-secret to pi-hole and vaultwarden
2025-02-04 12:07:55 +01:00
Simon L.
f87f8187ee Merge pull request #5990 from nextcloud/enh/noid/adjust-message
run-exec-commands.sh. adjust message when waiting for container
2025-02-04 12:07:07 +01:00
Simon L.
2c71c2307b Merge pull request #5989 from nextcloud/dependabot/docker/Containers/docker-socket-proxy/haproxy-3.1.3-alpine
build(deps): bump haproxy from 3.1.2-alpine to 3.1.3-alpine in /Containers/docker-socket-proxy
2025-02-04 12:06:02 +01:00
Simon L.
88fd732743 Merge pull request #5992 from nextcloud/dependabot/docker/Containers/collabora/collabora/code-24.04.12.2.1
build(deps): bump collabora/code from 24.04.12.1.1 to 24.04.12.2.1 in /Containers/collabora
2025-02-04 12:05:46 +01:00
Simon L.
eb1753b2a2 Merge pull request #5999 from nextcloud/dependabot/docker/Containers/clamav/clamav/clamav-1.4.2-25
build(deps): bump clamav/clamav from 1.4.2-24 to 1.4.2-25 in /Containers/clamav
2025-02-04 12:05:30 +01:00
Simon L.
953cf4437d Merge pull request #6003 from nextcloud/aio-helm-update
Helm Chart updates
2025-02-04 12:04:25 +01:00
Simon L.
a0752a22f6 Merge pull request #6001 from nextcloud/Anvil5465-patch-2
jellyseerr-cc: eliminate tini errors
2025-02-04 12:03:47 +01:00
szaimen
cefdec414e Helm Chart updates
Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
2025-02-04 11:00:55 +00:00
Anvil5465
f2987232da Update jellyseerr.json
Eliminate tini errors

Signed-off-by: Anvil5465 <119350594+Anvil5465@users.noreply.github.com>
2025-02-03 20:29:04 -05:00
Simon L.
67d294ced7 Merge pull request #5997 from nextcloud/Anvil5465-patch-2
jellyseer-cc: Update readme.md
2025-02-03 11:02:33 +01:00
dependabot[bot]
033c8b6798 build(deps): bump clamav/clamav in /Containers/clamav
Bumps clamav/clamav from 1.4.2-24 to 1.4.2-25.

---
updated-dependencies:
- dependency-name: clamav/clamav
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-02-03 04:52:11 +00:00
Simon L.
13da99fa91 also add ui-secret to pi-hole and vaultwarden
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-02-02 14:51:11 +01:00
Anvil5465
844dcd068b Update readme.md
Recommendation to enable CSRF protection when using with the caddy container

Signed-off-by: Anvil5465 <119350594+Anvil5465@users.noreply.github.com>
2025-02-02 08:47:02 -05:00
Anvil5465
1b3b385238 Update readme.md
Add requirement for proxy support setting with fail2ban

Signed-off-by: Anvil5465 <119350594+Anvil5465@users.noreply.github.com>
2025-02-02 08:40:36 -05:00
dependabot[bot]
8bac3fd2fe build(deps): bump collabora/code in /Containers/collabora
Bumps collabora/code from 24.04.12.1.1 to 24.04.12.2.1.

---
updated-dependencies:
- dependency-name: collabora/code
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-31 05:09:47 +00:00
Simon L.
ee3d2a4db7 run-exec-commands.sh. adjust message when waiting for container
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-30 11:36:12 +01:00
dependabot[bot]
f3ed548add build(deps): bump haproxy in /Containers/docker-socket-proxy
Bumps haproxy from 3.1.2-alpine to 3.1.3-alpine.

---
updated-dependencies:
- dependency-name: haproxy
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-30 04:24:44 +00:00
Simon L.
3a2b1a2efe fix space
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-29 10:28:36 +01:00
Simon L.
768545a1d8 Merge pull request #5984 from nextcloud/aio-yaml-update
Yaml updates
2025-01-28 14:00:32 +01:00
szaimen
bd09fc02b8 Yaml updates
Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
2025-01-28 12:32:17 +00:00
Simon L.
f039901993 fix whiteboard
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-28 13:03:43 +01:00
Simon L.
417d36644f talk: add set x for easier debugging
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-28 12:42:33 +01:00
Simon L.
92f0f2bc44 try to fix whiteboard
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-28 12:36:47 +01:00
Simon L.
39595d632c Merge pull request #5983 from nextcloud/enh/noid/fix-whiteboard
whiteboard: add tmpfs in app as this seems to be required now
2025-01-28 12:18:52 +01:00
Simon L.
365e8f6f79 whiteboard: add tmpfs in app as this seems to be required now
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-28 12:16:51 +01:00
Simon L.
a87d7b3aa9 scrutiny does not allow init
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-28 11:49:35 +01:00
Simon L.
1542c894c1 fix formatting of password in aio-interface
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-28 11:48:06 +01:00
Simon L.
21dfc131ad fix showing ui-secret in aio-interface
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-28 11:11:41 +01:00
Simon L.
6f2ae6258f increase to 10.5.0
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-28 10:46:39 +01:00
Simon L.
1eebe6fd60 Merge pull request #5945 from nextcloud/enh/5938/show-secret-in-interface
containers-schema: allow to specify ui-secret and show in aio interface
2025-01-28 10:36:50 +01:00
Simon L.
0a1fba8c3b nextcloud: updates3.config.php
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-28 10:16:00 +01:00
Simon L.
63aee30ed4 Merge pull request #5977 from nextcloud/enh/5973/add-talk-recording-note
aio-interface: add note that talk-recording only works on x86
2025-01-27 15:21:16 +01:00
Simon L.
f3dff2f780 address review
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-27 13:52:54 +01:00
Simon L.
4cd8ac0ab7 aio-interface: add note that talk-recording only works on x86
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-27 13:51:51 +01:00
Simon L.
ae261cbb17 Merge pull request #5966 from nextcloud/dependabot/docker/Containers/clamav/clamav/clamav-1.4.2-24
build(deps): bump clamav/clamav from 1.4.2-23 to 1.4.2-24 in /Containers/clamav
2025-01-27 07:45:21 +01:00
dependabot[bot]
0f15fb194d build(deps): bump clamav/clamav in /Containers/clamav
Bumps clamav/clamav from 1.4.2-23 to 1.4.2-24.

---
updated-dependencies:
- dependency-name: clamav/clamav
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-27 05:07:55 +00:00
Simon L.
28aecab211 Update wording
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-25 02:36:39 +01:00
Simon L.
de49af4806 add empty line
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-25 02:29:23 +01:00
Simon L.
a07b3b8ccb some more adjustments
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-25 02:28:35 +01:00
Simon L.
ac54fce522 fix details
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-25 02:05:27 +01:00
Simon L.
cc171c4c9e Merge pull request #5955 from nextcloud/enh/noid/tailscale-promotion
make Tailscale even more prominent
2025-01-25 01:17:09 +01:00
Simon L.
4aef95a87a make Tailscale even more prominent
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-24 23:47:09 +01:00
Simon L.
2efeff2b96 address review
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-24 13:34:14 +01:00
Simon L.
25e597a123 Merge pull request #5951 from nextcloud/dependabot/docker/Containers/talk/nats-2.10.25-scratch
build(deps): bump nats from 2.10.24-scratch to 2.10.25-scratch in /Containers/talk
2025-01-24 13:18:25 +01:00
Simon L.
f8f32a9a5d Merge pull request #5950 from nextcloud/dependabot/docker/Containers/mastercontainer/docker-27.5.1-cli
build(deps): bump docker from 27.5.0-cli to 27.5.1-cli in /Containers/mastercontainer
2025-01-24 13:18:12 +01:00
Simon L.
8f8a37c38f Merge pull request #5949 from nextcloud/dependabot/docker/Containers/collabora/collabora/code-24.04.12.1.1
build(deps): bump collabora/code from 24.04.11.3.1 to 24.04.12.1.1 in /Containers/collabora
2025-01-24 13:17:58 +01:00
Simon L.
955908cc83 Merge pull request #5948 from nextcloud/dependabot/docker/Containers/apache/httpd-2.4.63-alpine3.21
build(deps): bump httpd from 2.4.62-alpine3.21 to 2.4.63-alpine3.21 in /Containers/apache
2025-01-24 13:17:45 +01:00
dependabot[bot]
2b4f65a0aa build(deps): bump nats in /Containers/talk
Bumps nats from 2.10.24-scratch to 2.10.25-scratch.

---
updated-dependencies:
- dependency-name: nats
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-24 04:58:35 +00:00
dependabot[bot]
85821b467b build(deps): bump docker in /Containers/mastercontainer
Bumps docker from 27.5.0-cli to 27.5.1-cli.

---
updated-dependencies:
- dependency-name: docker
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-24 04:58:18 +00:00
dependabot[bot]
afab39dca9 build(deps): bump collabora/code in /Containers/collabora
Bumps collabora/code from 24.04.11.3.1 to 24.04.12.1.1.

---
updated-dependencies:
- dependency-name: collabora/code
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-24 04:57:54 +00:00
dependabot[bot]
dee3773bf3 build(deps): bump httpd in /Containers/apache
Bumps httpd from 2.4.62-alpine3.21 to 2.4.63-alpine3.21.

---
updated-dependencies:
- dependency-name: httpd
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-24 04:57:37 +00:00
Simon L.
04ef45667f containers-schema: allow to specify ui-secret and show in aio interface
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-23 16:41:43 +01:00
Simon L.
bc358f32b1 Merge pull request #5936 from nextcloud/enh/noid/disable-ipv6-for-talk
talk: automatically bind ipv4 only if ipv6 is disabled
2025-01-23 15:30:26 +01:00
Simon L.
1fb631cc51 add note regarding scalable variant
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-23 14:18:58 +01:00
Simon L.
00a2e88c22 address review
Signed-off-by: Simon L. <szaimen@e.mail.de>

Co-authored-by: Richard Steinmetz <richard@steinmetz.cloud>
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-23 11:22:07 +01:00
Simon L.
5ff6292e24 Merge pull request #5942 from nextcloud/dependabot/docker/Containers/talk/strukturag/nextcloud-spreed-signaling-2.0.2
build(deps): bump strukturag/nextcloud-spreed-signaling from 2.0.1 to 2.0.2 in /Containers/talk
2025-01-23 08:41:18 +01:00
Simon L.
e7bb4be145 Merge pull request #5941 from nextcloud/dependabot/docker/Containers/clamav/clamav/clamav-1.4.2-23
build(deps): bump clamav/clamav from 1.4.1-22 to 1.4.2-23 in /Containers/clamav
2025-01-23 08:40:57 +01:00
dependabot[bot]
96a577b093 build(deps): bump strukturag/nextcloud-spreed-signaling
Bumps strukturag/nextcloud-spreed-signaling from 2.0.1 to 2.0.2.

---
updated-dependencies:
- dependency-name: strukturag/nextcloud-spreed-signaling
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-23 04:42:08 +00:00
dependabot[bot]
16a5c1c04f build(deps): bump clamav/clamav in /Containers/clamav
Bumps clamav/clamav from 1.4.1-22 to 1.4.2-23.

---
updated-dependencies:
- dependency-name: clamav/clamav
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-23 04:41:11 +00:00
Simon L.
0e10cfd20b move community containers to top as one of the main feature
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-22 20:47:48 +01:00
Simon L.
895f4b82e3 talk: automatically bind ipv4 only if ipv6 is disabled
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-22 16:51:55 +01:00
Simon L.
d1b37c1216 Merge pull request #5929 from nextcloud/enh/3549/add-scrutiny
add scrutiny community container
2025-01-22 13:47:32 +01:00
Simon L.
4def229eea add scrutiny community container
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-22 13:43:18 +01:00
Simon L.
28cc905db1 Merge pull request #4902 from nextcloud/enh/3889/add-makemkv
community-containers: add makemkv
2025-01-22 12:19:22 +01:00
Simon L.
1e55e776b4 Merge pull request #5889 from nextcloud/enh/noid/add-backup-viewer
add borgbackup-viewer community container
2025-01-22 12:18:58 +01:00
Simon L.
7468386397 add borgbackup-viewer community container
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-22 12:17:55 +01:00
Simon L.
bfc5f40448 community-containers: add makemkv
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-22 12:17:02 +01:00
Simon L.
499c51add1 Merge pull request #5899 from thoschaefer/fix/onlyoffice_custom_port
Support custom port for onlyoffice
2025-01-22 12:11:23 +01:00
Simon L.
6333b59d2d Merge pull request #5927 from nextcloud/enh/5925/improve-wording
aio-interface: update wording for entering the domain
2025-01-22 11:44:29 +01:00
Simon L.
3e4133da82 Merge pull request #5921 from nextcloud/enh/noid/apache-add-docs
apache: add docs to aio interface
2025-01-22 11:44:12 +01:00
Simon L.
7bd36f9999 Merge pull request #5920 from nextcloud/enh/5913/improve-logging
DockerActionManager and DockerController: improve the logging
2025-01-22 11:43:59 +01:00
Simon L.
f4f9c3630a Merge pull request #5895 from nextcloud/enh/noid/improve-check
improve check for auth.docker.io
2025-01-22 11:40:59 +01:00
Simon L.
42898dbf7a Merge pull request #5935 from nextcloud/aio-helm-update
Helm Chart updates
2025-01-22 11:11:48 +01:00
szaimen
521f9fd0e0 Helm Chart updates
Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
2025-01-22 10:10:18 +00:00
Anvil5465
0d86e36ff6 Add Jellyseerr Community Container (#5911)
Signed-off-by: Anvil5465 <119350594+Anvil5465@users.noreply.github.com>
Co-authored-by: Simon L. <szaimen@e.mail.de>
2025-01-22 11:07:39 +01:00
Simon L.
c238e815fa fix chellcheck
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-22 11:04:52 +01:00
Simon L.
f8e55119dd Merge pull request #5934 from nextcloud/dependabot/docker/Containers/whiteboard/nextcloud-releases/whiteboard-v1.0.5
build(deps): bump nextcloud-releases/whiteboard from v1.0.4 to v1.0.5 in /Containers/whiteboard
2025-01-22 10:59:09 +01:00
Simon L.
0b0322bec0 Merge pull request #5933 from nextcloud/dependabot/docker/Containers/fulltextsearch/elasticsearch-8.17.1
build(deps): bump elasticsearch from 8.17.0 to 8.17.1 in /Containers/fulltextsearch
2025-01-22 10:58:39 +01:00
Simon L.
b0a3b8b9a7 Merge pull request #5918 from nextcloud/dependabot/docker/Containers/nextcloud/php-8.3.16-fpm-alpine3.21
build(deps): bump php from 8.3.15-fpm-alpine3.21 to 8.3.16-fpm-alpine3.21 in /Containers/nextcloud
2025-01-22 10:58:22 +01:00
Simon L.
f9b324cae1 Merge pull request #5917 from nextcloud/dependabot/docker/Containers/mastercontainer/php-8.3.16-fpm-alpine3.21
build(deps): bump php from 8.3.15-fpm-alpine3.21 to 8.3.16-fpm-alpine3.21 in /Containers/mastercontainer
2025-01-22 10:58:10 +01:00
Simon L.
468197172c Merge pull request #5916 from nextcloud/dependabot/docker/Containers/imaginary/golang-1.23.5-alpine3.21
build(deps): bump golang from 1.23.4-alpine3.21 to 1.23.5-alpine3.21 in /Containers/imaginary
2025-01-22 10:57:47 +01:00
Simon L.
431ee81083 Merge pull request #5915 from nextcloud/dependabot/docker/Containers/collabora/collabora/code-24.04.11.3.1
build(deps): bump collabora/code from 24.04.11.2.1 to 24.04.11.3.1 in /Containers/collabora
2025-01-22 10:57:34 +01:00
Simon L.
7c7170c079 Merge pull request #5914 from nextcloud/dependabot/docker/Containers/clamav/clamav/clamav-1.4.1-22
build(deps): bump clamav/clamav from 1.4.1-21 to 1.4.1-22 in /Containers/clamav
2025-01-22 10:57:23 +01:00
Simon L.
56304aae46 Merge pull request #5894 from nextcloud/aio-dependency-update
PHP dependency updates
2025-01-22 10:57:10 +01:00
dependabot[bot]
3fb8ae5b91 build(deps): bump nextcloud-releases/whiteboard
Bumps nextcloud-releases/whiteboard from v1.0.4 to v1.0.5.

---
updated-dependencies:
- dependency-name: nextcloud-releases/whiteboard
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-22 04:46:59 +00:00
dependabot[bot]
a9cf1e960c build(deps): bump php in /Containers/mastercontainer
Bumps php from 8.3.15-fpm-alpine3.21 to 8.3.16-fpm-alpine3.21.

---
updated-dependencies:
- dependency-name: php
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-22 04:46:26 +00:00
dependabot[bot]
278d449bc2 build(deps): bump php in /Containers/nextcloud
Bumps php from 8.3.15-fpm-alpine3.21 to 8.3.16-fpm-alpine3.21.

---
updated-dependencies:
- dependency-name: php
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-22 04:46:12 +00:00
dependabot[bot]
e6c42f0bf8 build(deps): bump elasticsearch in /Containers/fulltextsearch
Bumps elasticsearch from 8.17.0 to 8.17.1.

---
updated-dependencies:
- dependency-name: elasticsearch
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-22 04:46:06 +00:00
Simon L.
03b846b3f4 aio-interface: update wording for entering the domain
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-21 14:49:56 +01:00
szaimen
d6a9f92aee php dependency updates
Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
2025-01-21 12:02:54 +00:00
Simon L.
c578a6e3f3 DockerActionManager: improve the logging
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-21 12:30:01 +01:00
Simon L.
35ff787d77 Merge pull request #5923 from nextcloud/szaimen-patch-1
Update dependabot.yml
2025-01-20 16:36:41 +01:00
Simon L.
666b5ef341 Update dependabot.yml
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-20 15:25:33 +01:00
Simon L.
282588169a Merge pull request #5922 from nextcloud/dependabot/github_actions/helm/chart-releaser-action-1.7.0
build(deps): bump helm/chart-releaser-action from 1.6.0 to 1.7.0
2025-01-20 15:12:26 +01:00
dependabot[bot]
db5bfa7936 build(deps): bump helm/chart-releaser-action from 1.6.0 to 1.7.0
Bumps [helm/chart-releaser-action](https://github.com/helm/chart-releaser-action) from 1.6.0 to 1.7.0.
- [Release notes](https://github.com/helm/chart-releaser-action/releases)
- [Commits](https://github.com/helm/chart-releaser-action/compare/v1.6.0...v1.7.0)

---
updated-dependencies:
- dependency-name: helm/chart-releaser-action
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-20 13:06:32 +00:00
Simon L.
ec3895beef apache: add docs to aio interface
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-20 13:37:43 +01:00
dependabot[bot]
1be5749102 build(deps): bump golang in /Containers/imaginary
Bumps golang from 1.23.4-alpine3.21 to 1.23.5-alpine3.21.

---
updated-dependencies:
- dependency-name: golang
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-20 05:02:15 +00:00
dependabot[bot]
572dfd634f build(deps): bump collabora/code in /Containers/collabora
Bumps collabora/code from 24.04.11.2.1 to 24.04.11.3.1.

---
updated-dependencies:
- dependency-name: collabora/code
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-20 05:02:07 +00:00
dependabot[bot]
497d6d1191 build(deps): bump clamav/clamav in /Containers/clamav
Bumps clamav/clamav from 1.4.1-21 to 1.4.1-22.

---
updated-dependencies:
- dependency-name: clamav/clamav
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-20 05:02:05 +00:00
Simon L.
2992198d9b Merge pull request #5910 from gdk22/main
Improve the readme by clarifying that the NC instance can be restored by the backup data
2025-01-19 22:17:44 +01:00
Gerald Krause
da07aaa887 Improved the readme by clarifying that the NC instance can be restored by the backup data
Signed-off-by: Gerald Krause <geedeekay@justmail.de>

Signed-off-by: Gerald Krause <geedeekay@justmail.de>
2025-01-19 20:28:58 +01:00
Simon L.
a8e9f6f91e Merge pull request #5909 from nextcloud/npmplus-community-container-readme
Update NPMplus community container readme.md
2025-01-19 15:27:35 +01:00
Zoey
b16dfd83ce Update NPMplus community container readme.md
Signed-off-by: Zoey <zoey@z0ey.de>
2025-01-19 14:25:51 +01:00
Thorsten Schaefer
a425f5b49b Support custom port for onlyoffice
Signed-off-by: Thorsten Schaefer <github@npath.de>
2025-01-17 19:07:37 +01:00
Simon L.
1ad0fcf1b6 improve check for auth.docker.io
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-17 13:52:33 +01:00
Simon L.
1630867fb3 Merge pull request #5890 from nextcloud/nextcloud-container-update
Nextcloud dependency update
2025-01-17 12:34:14 +01:00
szaimen
23755a0371 nextcloud-update automated change
Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
2025-01-16 19:45:00 +00:00
Simon L.
c19ba34cdf Merge pull request #5881 from nextcloud/enh/noid/add-jellyfin
fail2ban-cc: add jellyfin
2025-01-16 12:33:21 +01:00
Simon L.
784da23323 Merge pull request #5888 from nextcloud/enh/5268/check-auth.docker.io-reachable
mastercontainer: check if auth.docker.io is reachable during startup
2025-01-16 12:33:13 +01:00
Simon L.
5d2cc65aa0 Merge pull request #5885 from nextcloud/enh/noid/add-further-hint-to-debug-section
rp-docs: add info about hairpin-nat and local dns-record in debug section
2025-01-16 12:31:49 +01:00
Simon L.
02cc5f04ca mastercontainer: check if auth.docker.io is reachable during startup
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-16 10:45:49 +01:00
Simon L.
22fdaa57ce rp-docs: add info about hairpin-nat and local dns-record in debug section
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-15 15:36:43 +01:00
Simon L.
276cd7d9d8 fail2ban-cc: add jellyfin
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-15 13:48:06 +01:00
Simon L.
bdff564e2e Merge pull request #5880 from nextcloud/dependabot/docker/Containers/mastercontainer/docker-27.5.0-cli
build(deps): bump docker from 27.4.1-cli to 27.5.0-cli in /Containers/mastercontainer
2025-01-15 09:33:09 +01:00
Simon L.
409777cb7a Merge pull request #5879 from nextcloud/dependabot/docker/Containers/docker-socket-proxy/haproxy-3.1.2-alpine
build(deps): bump haproxy from 3.1.1-alpine to 3.1.2-alpine in /Containers/docker-socket-proxy
2025-01-15 09:32:45 +01:00
dependabot[bot]
96ea32405d build(deps): bump docker in /Containers/mastercontainer
Bumps docker from 27.4.1-cli to 27.5.0-cli.

---
updated-dependencies:
- dependency-name: docker
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-15 05:13:02 +00:00
dependabot[bot]
a8f6e7a336 build(deps): bump haproxy in /Containers/docker-socket-proxy
Bumps haproxy from 3.1.1-alpine to 3.1.2-alpine.

---
updated-dependencies:
- dependency-name: haproxy
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-15 05:12:46 +00:00
Simon L.
b6ad2782e4 Merge pull request #5870 from nextcloud/enh/noid/allow-configure-redis-user
allow to configure redis user
2025-01-14 14:46:49 +01:00
Simon L.
b786415cfb Revert changes to notify-push and whiteboard
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-14 14:39:32 +01:00
Simon L.
4acc9d8f41 add idea
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-14 14:26:59 +01:00
Simon L.
d2242b2eba Merge pull request #5877 from nextcloud/imaginary-container-update
Imaginary update
2025-01-14 14:07:02 +01:00
szaimen
2148b60fc0 imaginary-update automated change
Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
2025-01-14 12:02:59 +00:00
Simon L.
d971f86f0c increase to 10.4.0
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-14 11:51:42 +01:00
Simon L.
baa653d711 Merge pull request #5876 from nextcloud/aio-helm-update
Helm Chart updates
2025-01-14 11:47:21 +01:00
szaimen
f658318df0 Helm Chart updates
Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
2025-01-14 10:42:41 +00:00
pailloM
ce7a10e4c0 add calcardbackup community container (#5864)
Signed-off-by: PailloM <paillomams@gmx.com>
Signed-off-by: pailloM <56462552+pailloM@users.noreply.github.com>
Signed-off-by: Simon L. <szaimen@e.mail.de>
Co-authored-by: Simon L. <szaimen@e.mail.de>
2025-01-14 10:43:36 +01:00
Simon L.
4f5d257af5 Merge pull request #5862 from nextcloud/enh/noid/remove-networks
containers-schema and containers.json: remove networks from definition
2025-01-14 10:33:08 +01:00
Simon L.
93fcf2783c Merge pull request #5861 from nextcloud/enh/noid/improve-domain-validation
domain-validation: improve the notice about the private ip-address
2025-01-14 10:32:31 +01:00
Simon L.
3199b84934 Merge pull request #5843 from nextcloud/enh/noid/adjust-app-api-logic
nextcloud-entrypoint:  adjust logic around app api app
2025-01-14 10:32:01 +01:00
Simon L.
cdf39556c1 Merge pull request #5868 from nextcloud/dependabot/docker/Containers/clamav/clamav/clamav-1.4.1-21
build(deps): bump clamav/clamav from 1.4.1-20 to 1.4.1-21 in /Containers/clamav
2025-01-14 10:30:10 +01:00
Simon L.
fd38942b2b Merge pull request #5860 from nextcloud/dependabot/docker/Containers/watchtower/alpine-3.21.2
build(deps): bump alpine from 3.21.1 to 3.21.2 in /Containers/watchtower
2025-01-14 10:29:54 +01:00
Simon L.
b0058954a1 Merge pull request #5859 from nextcloud/dependabot/docker/Containers/talk/alpine-3.21.2
build(deps): bump alpine from 3.21.1 to 3.21.2 in /Containers/talk
2025-01-14 10:29:43 +01:00
Simon L.
560674d3f0 Merge pull request #5858 from nextcloud/dependabot/docker/Containers/notify-push/alpine-3.21.2
build(deps): bump alpine from 3.21.1 to 3.21.2 in /Containers/notify-push
2025-01-14 10:29:31 +01:00
Simon L.
3a6b54057b Merge pull request #5857 from nextcloud/dependabot/docker/Containers/mastercontainer/caddy-2.9.1-alpine
build(deps): bump caddy from 2.8.4-alpine to 2.9.1-alpine in /Containers/mastercontainer
2025-01-14 10:29:20 +01:00
Simon L.
9408d145c9 Merge pull request #5856 from nextcloud/dependabot/docker/Containers/imaginary/alpine-3.21.2
build(deps): bump alpine from 3.21.1 to 3.21.2 in /Containers/imaginary
2025-01-14 10:29:08 +01:00
Simon L.
8d51f16d38 Merge pull request #5855 from nextcloud/dependabot/docker/Containers/domaincheck/alpine-3.21.2
build(deps): bump alpine from 3.21.1 to 3.21.2 in /Containers/domaincheck
2025-01-14 10:28:57 +01:00
Simon L.
63e971c32b Merge pull request #5854 from nextcloud/dependabot/docker/Containers/collabora/collabora/code-24.04.11.2.1
build(deps): bump collabora/code from 24.04.11.1.1 to 24.04.11.2.1 in /Containers/collabora
2025-01-14 10:28:45 +01:00
Simon L.
f152b41037 Merge pull request #5853 from nextcloud/dependabot/docker/Containers/borgbackup/alpine-3.21.2
build(deps): bump alpine from 3.21.1 to 3.21.2 in /Containers/borgbackup
2025-01-14 10:28:32 +01:00
Simon L.
70136188b9 Merge pull request #5852 from nextcloud/dependabot/docker/Containers/apache/caddy-2.9.1-alpine
build(deps): bump caddy from 2.8.4-alpine to 2.9.1-alpine in /Containers/apache
2025-01-14 10:28:20 +01:00
Simon L.
2fc2be363a nextcloud: allow to configure redis user
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-13 16:56:33 +01:00
dependabot[bot]
76ccf69a05 build(deps): bump clamav/clamav in /Containers/clamav
Bumps clamav/clamav from 1.4.1-20 to 1.4.1-21.

---
updated-dependencies:
- dependency-name: clamav/clamav
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-13 04:34:09 +00:00
Simon L.
b046294801 containers-schema and containers.json: remove networks from definition
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-10 23:12:12 +01:00
Simon L.
41a867e7f2 domain-validation: improve the notice about the private ip-address
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-10 23:09:12 +01:00
dependabot[bot]
75ea7c4f27 build(deps): bump alpine from 3.21.1 to 3.21.2 in /Containers/watchtower
Bumps alpine from 3.21.1 to 3.21.2.

---
updated-dependencies:
- dependency-name: alpine
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-10 04:34:34 +00:00
dependabot[bot]
4b8dd232c5 build(deps): bump alpine from 3.21.1 to 3.21.2 in /Containers/talk
Bumps alpine from 3.21.1 to 3.21.2.

---
updated-dependencies:
- dependency-name: alpine
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-10 04:34:26 +00:00
dependabot[bot]
0e1eb9d1a8 build(deps): bump alpine in /Containers/notify-push
Bumps alpine from 3.21.1 to 3.21.2.

---
updated-dependencies:
- dependency-name: alpine
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-10 04:34:12 +00:00
dependabot[bot]
16f764941e build(deps): bump caddy in /Containers/mastercontainer
Bumps caddy from 2.8.4-alpine to 2.9.1-alpine.

---
updated-dependencies:
- dependency-name: caddy
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-10 04:34:02 +00:00
dependabot[bot]
d6d0086a66 build(deps): bump alpine from 3.21.1 to 3.21.2 in /Containers/imaginary
Bumps alpine from 3.21.1 to 3.21.2.

---
updated-dependencies:
- dependency-name: alpine
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-10 04:33:53 +00:00
dependabot[bot]
c06a52e2be build(deps): bump alpine in /Containers/domaincheck
Bumps alpine from 3.21.1 to 3.21.2.

---
updated-dependencies:
- dependency-name: alpine
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-10 04:33:46 +00:00
dependabot[bot]
1ec07aeabd build(deps): bump collabora/code in /Containers/collabora
Bumps collabora/code from 24.04.11.1.1 to 24.04.11.2.1.

---
updated-dependencies:
- dependency-name: collabora/code
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-10 04:33:42 +00:00
dependabot[bot]
c4f6c89b67 build(deps): bump alpine from 3.21.1 to 3.21.2 in /Containers/borgbackup
Bumps alpine from 3.21.1 to 3.21.2.

---
updated-dependencies:
- dependency-name: alpine
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-10 04:33:39 +00:00
dependabot[bot]
ea789d2dca build(deps): bump caddy in /Containers/apache
Bumps caddy from 2.8.4-alpine to 2.9.1-alpine.

---
updated-dependencies:
- dependency-name: caddy
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
2025-01-10 04:33:25 +00:00
Simon L.
f2a5b2bdc7 nextcloud-entrypoint: adjust logic around app api app
Signed-off-by: Simon L. <szaimen@e.mail.de>
2025-01-07 15:26:08 +01:00
Simon L.
c1f1207a0e Merge pull request #5842 from nextcloud/aio-yaml-update
Yaml updates
2025-01-07 13:22:12 +01:00
szaimen
1ef6769941 Yaml updates
Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
2025-01-07 12:03:30 +00:00
90 changed files with 808 additions and 214 deletions

View File

@@ -7,6 +7,9 @@ updates:
time: "12:00"
open-pull-requests-limit: 10
rebase-strategy: "disabled"
labels:
- 3. to review
- dependencies
- package-ecosystem: composer
directory: "/php/"
schedule:

View File

@@ -41,7 +41,7 @@ jobs:
helm lint ./nextcloud-aio-helm-chart
- name: Run chart-releaser
uses: helm/chart-releaser-action@v1.6.0
uses: helm/chart-releaser-action@v1.7.0
with:
mark_as_latest: false
charts_dir: .

View File

@@ -40,7 +40,7 @@ https://{$ADDITIONAL_TRUSTED_DOMAIN}:443,
route /onlyoffice/* {
uri strip_prefix /onlyoffice
reverse_proxy {$ONLYOFFICE_HOST}:80 {
header_up X-Forwarded-Host {http.request.host}/onlyoffice
header_up X-Forwarded-Host {http.request.hostport}/onlyoffice
header_up X-Forwarded-Proto https
}
}

View File

@@ -1,8 +1,8 @@
# syntax=docker/dockerfile:latest
FROM caddy:2.8.4-alpine AS caddy
FROM caddy:2.9.1-alpine AS caddy
# From https://github.com/docker-library/httpd/blob/master/2.4/alpine/Dockerfile
FROM httpd:2.4.62-alpine3.21
FROM httpd:2.4.63-alpine3.21
COPY --from=caddy /usr/bin/caddy /usr/bin/caddy

View File

@@ -1,5 +1,5 @@
# syntax=docker/dockerfile:latest
FROM alpine:3.21.1
FROM alpine:3.21.3
RUN set -ex; \
\

View File

@@ -185,13 +185,27 @@ if [ "$BORG_MODE" = backup ]; then
# Borg options
# auto,zstd compression seems to has the best ratio based on:
# https://forum.level1techs.com/t/optimal-compression-for-borg-backups/145870/6
BORG_OPTS=(-v --stats --compression "auto,zstd" --exclude-caches)
BORG_OPTS=(-v --stats --compression "auto,zstd")
if [ "$NEW_REPOSITORY" = 1 ]; then
BORG_OPTS+=(--progress)
fi
# Exclude the nextcloud log and audit log for GDPR reasons
BORG_EXCLUDE=(--exclude "/nextcloud_aio_volumes/nextcloud_aio_nextcloud/data/nextcloud.log*" --exclude "/nextcloud_aio_volumes/nextcloud_aio_nextcloud/data/audit.log")
BORG_INCLUDE=()
# Exclude datadir if .noaiobackup file was found
# shellcheck disable=SC2144
if [ -f "/nextcloud_aio_volumes/nextcloud_aio_nextcloud_data/.noaiobackup" ]; then
BORG_EXCLUDE+=(--exclude "/nextcloud_aio_volumes/nextcloud_aio_nextcloud_data/")
BORG_INCLUDE+=(--pattern="+/nextcloud_aio_volumes/nextcloud_aio_nextcloud_data/.noaiobackup")
echo "⚠️⚠️⚠️ '.noaiobackup' file was found in Nextclouds data directory. Excluding the data directory from backup!"
# Exclude preview folder if .noaiobackup file was found
elif [ -f /nextcloud_aio_volumes/nextcloud_aio_nextcloud_data/appdata_*/preview/.noaiobackup ]; then
BORG_EXCLUDE+=(--exclude "/nextcloud_aio_volumes/nextcloud_aio_nextcloud_data/appdata_*/preview/")
BORG_INCLUDE+=(--pattern="+/nextcloud_aio_volumes/nextcloud_aio_nextcloud_data/appdata_*/preview/.noaiobackup")
echo "⚠️⚠️⚠️ '.noaiobackup' file was found in the preview directory. Excluding the preview directory from backup!"
fi
# Make sure that there is always a borg.config file before creating a new backup
if ! [ -f "/nextcloud_aio_volumes/nextcloud_aio_mastercontainer/data/borg.config" ]; then
@@ -203,7 +217,7 @@ if [ "$BORG_MODE" = backup ]; then
# Create the backup
echo "Starting the backup..."
get_start_time
if ! borg create "${BORG_OPTS[@]}" "${BORG_EXCLUDE[@]}" "::$CURRENT_DATE-nextcloud-aio" "/nextcloud_aio_volumes/" --exclude-from /borg_excludes; then
if ! borg create "${BORG_OPTS[@]}" "${BORG_INCLUDE[@]}" "${BORG_EXCLUDE[@]}" "::$CURRENT_DATE-nextcloud-aio" "/nextcloud_aio_volumes/" --exclude-from /borg_excludes; then
echo "Deleting the failed backup archive..."
borg delete --stats "::$CURRENT_DATE-nextcloud-aio"
echo "Backup failed!"
@@ -320,16 +334,30 @@ if [ "$BORG_MODE" = restore ]; then
fi
echo "Restoring '$SELECTED_ARCHIVE'..."
# Exclude previews from restore if selected to speed up process
ADDITIONAL_RSYNC_EXCLUDES=()
ADDITIONAL_BORG_EXCLUDES=()
ADDITIONAL_FIND_EXCLUDES=()
if [ -n "$RESTORE_EXCLUDE_PREVIEWS" ]; then
# Exclude datadir if .noaiobackup file was found
# shellcheck disable=SC2144
if [ -f "/nextcloud_aio_volumes/nextcloud_aio_nextcloud_data/.noaiobackup" ]; then
# Keep these 3 in sync. Beware, the pattern syntax and the paths differ
ADDITIONAL_RSYNC_EXCLUDES=(--exclude "nextcloud_aio_nextcloud_data/**")
ADDITIONAL_BORG_EXCLUDES=(--exclude "sh:nextcloud_aio_volumes/nextcloud_aio_nextcloud_data/**")
ADDITIONAL_FIND_EXCLUDES=(-o -regex 'nextcloud_aio_volumes/nextcloud_aio_nextcloud_data\(/.*\)?')
echo "⚠️⚠️⚠️ '.noaiobackup' file was found in Nextclouds data directory. Excluding the data directory from restore!"
echo "You might run into problems due to this afterwards as potentially this makes the directory go out of sync with the database."
echo "You might be able to fix this by running 'occ files:scan --all' and 'occ maintenance:repair' and 'occ files:scan-app-data' after the restore."
echo "See https://github.com/nextcloud/all-in-one#how-to-run-occ-commands"
# Exclude previews from restore if selected to speed up process or exclude preview folder if .noaiobackup file was found
elif [ -n "$RESTORE_EXCLUDE_PREVIEWS" ] || [ -f /nextcloud_aio_volumes/nextcloud_aio_nextcloud_data/appdata_*/preview/.noaiobackup ]; then
# Keep these 3 in sync. Beware, the pattern syntax and the paths differ
ADDITIONAL_RSYNC_EXCLUDES=(--exclude "nextcloud_aio_nextcloud_data/appdata_*/preview/**")
ADDITIONAL_BORG_EXCLUDES=(--exclude "sh:nextcloud_aio_volumes/nextcloud_aio_nextcloud_data/appdata_*/preview/**")
ADDITIONAL_FIND_EXCLUDES=(-o -regex 'nextcloud_aio_volumes/nextcloud_aio_nextcloud_data/appdata_[^/]*/preview\(/.*\)?')
echo "Excluding previews from restore"
echo "⚠️⚠️⚠️ Excluding previews from restore!"
echo "You might run into problems due to this afterwards as potentially this makes the directory go out of sync with the database."
echo "You might be able to fix this by running 'occ files:scan-app-data preview' after the restore."
echo "See https://github.com/nextcloud/all-in-one#how-to-run-occ-commands"
fi
# Save Additional Backup dirs
@@ -521,7 +549,7 @@ if [ "$BORG_MODE" = check ]; then
# Perform the check
if ! borg check -v --verify-data; then
echo "Some errors were found while checking the backup integrity!"
echo "Check the AIO interface for advices on how to proceed now!"
echo "Check the AIO interface for advice on how to proceed now!"
exit 1
fi

View File

@@ -1,6 +1,6 @@
# syntax=docker/dockerfile:latest
# Probably from this file: https://github.com/Cisco-Talos/clamav-docker/blob/main/clamav/1.3/alpine/Dockerfile
FROM clamav/clamav:1.4.1-20
FROM clamav/clamav:1.4.2-27
COPY clamav.conf /clamav.conf
COPY --chmod=775 start.script /start.script

View File

@@ -1,6 +1,6 @@
# syntax=docker/dockerfile:latest
# From a file located probably somewhere here: https://github.com/CollaboraOnline/online/tree/master/docker
FROM collabora/code:24.04.11.1.1
FROM collabora/code:24.04.12.3.1
USER root
ARG DEBIAN_FRONTEND=noninteractive

View File

@@ -1,5 +1,5 @@
# syntax=docker/dockerfile:latest
FROM haproxy:3.1.1-alpine
FROM haproxy:3.1.3-alpine
# hadolint ignore=DL3002
USER root

View File

@@ -1,5 +1,5 @@
# syntax=docker/dockerfile:latest
FROM alpine:3.21.1
FROM alpine:3.21.3
RUN set -ex; \
apk upgrade --no-cache -a; \
apk add --no-cache bash lighttpd netcat-openbsd; \

View File

@@ -1,6 +1,6 @@
# syntax=docker/dockerfile:latest
# Probably from here https://github.com/elastic/elasticsearch/blob/main/distribution/docker/src/docker/Dockerfile
FROM elasticsearch:8.17.0
FROM elasticsearch:8.17.2
USER root
@@ -22,3 +22,4 @@ USER 1000:0
HEALTHCHECK --interval=10s --timeout=5s --start-period=1m --retries=5 CMD /healthcheck.sh
LABEL com.centurylinklabs.watchtower.enable="false"
ENV ES_JAVA_OPTS="-Xms512M -Xmx512M"

View File

@@ -1,7 +1,7 @@
# syntax=docker/dockerfile:latest
FROM golang:1.23.4-alpine3.21 AS go
FROM golang:1.24.0-alpine3.21 AS go
ENV IMAGINARY_HASH=8f36a26c448be8c151a3878404b75fcd1cd3cf0c
ENV IMAGINARY_HASH=1d4e251cfcd58ea66f8361f8721d7b8cc85002a3
RUN set -ex; \
apk add --no-cache \
@@ -13,7 +13,7 @@ RUN set -ex; \
build-base; \
go install github.com/h2non/imaginary@"$IMAGINARY_HASH";
FROM alpine:3.21.1
FROM alpine:3.21.3
RUN set -ex; \
apk upgrade --no-cache -a; \
apk add --no-cache \

View File

@@ -1,12 +1,12 @@
# syntax=docker/dockerfile:latest
# Docker CLI is a requirement
FROM docker:27.4.1-cli AS docker
FROM docker:27.5.1-cli AS docker
# Caddy is a requirement
FROM caddy:2.8.4-alpine AS caddy
FROM caddy:2.9.1-alpine AS caddy
# From https://github.com/docker-library/php/blob/master/8.3/alpine3.21/fpm/Dockerfile
FROM php:8.3.15-fpm-alpine3.21
FROM php:8.3.17-fpm-alpine3.21
EXPOSE 80
EXPOSE 8080

View File

@@ -283,6 +283,15 @@ if [ "$?" = 6 ]; then
exit 1
fi
# Check if auth.docker.io is reachable
# Solves issues like https://github.com/nextcloud/all-in-one/discussions/5268
if ! curl https://auth.docker.io/token 2>&1 | grep -q token; then
print_red "Could not reach https://auth.docker.io."
echo "Most likely is something blocking access to it."
echo "You should be able to fix this by using https://github.com/nextcloud/all-in-one/tree/main/manual-install"
exit 1
fi
# Check that no changes have been made to timezone settings since AIO only supports running in Etc/UTC timezone
if [ -n "$TZ" ]; then
print_red "The environmental variable TZ has been set which is not supported by AIO since it only supports running in the default Etc/UTC timezone!"

View File

@@ -1,5 +1,5 @@
# syntax=docker/dockerfile:latest
FROM php:8.3.15-fpm-alpine3.21
FROM php:8.3.17-fpm-alpine3.21
ENV PHP_MEMORY_LIMIT=512M
ENV PHP_UPLOAD_LIMIT=16G
@@ -8,7 +8,7 @@ ENV SOURCE_LOCATION=/usr/src/nextcloud
ENV REDIS_DB_INDEX=0
# AIO settings start # Do not remove or change this line!
ENV NEXTCLOUD_VERSION=30.0.4
ENV NEXTCLOUD_VERSION=30.0.6
ENV AIO_TOKEN=123456
ENV AIO_URL=localhost
# AIO settings end # Do not remove or change this line!
@@ -147,7 +147,7 @@ RUN set -ex; \
\
{ \
echo 'session.save_handler = redis'; \
echo 'session.save_path = "tcp://${REDIS_HOST}:6379/${REDIS_DB_INDEX}?auth=${REDIS_HOST_PASSWORD}"'; \
echo 'session.save_path = "tcp://${REDIS_HOST}:6379?database=${REDIS_DB_INDEX}${REDIS_USER_AUTH}&auth[]=${REDIS_HOST_PASSWORD}"'; \
echo 'redis.session.locking_enabled = 1'; \
echo 'redis.session.lock_retries = -1'; \
echo 'redis.session.lock_wait_time = 10000'; \

View File

@@ -18,4 +18,8 @@ if (getenv('REDIS_HOST')) {
if (getenv('REDIS_DB_INDEX')) {
$CONFIG['redis']['dbindex'] = (int) getenv('REDIS_DB_INDEX');
}
if (getenv('REDIS_USER_AUTH') !== false) {
$CONFIG['redis']['user'] = str_replace("&auth[]=", "", getenv('REDIS_USER_AUTH'));
}
}

View File

@@ -11,7 +11,6 @@ if (getenv('OBJECTSTORE_S3_BUCKET')) {
'bucket' => getenv('OBJECTSTORE_S3_BUCKET'),
'key' => getenv('OBJECTSTORE_S3_KEY') ?: '',
'secret' => getenv('OBJECTSTORE_S3_SECRET') ?: '',
'sse_c_key' => getenv('OBJECTSTORE_S3_SSE_C_KEY') ?: '',
'region' => getenv('OBJECTSTORE_S3_REGION') ?: '',
'hostname' => getenv('OBJECTSTORE_S3_HOST') ?: '',
'port' => getenv('OBJECTSTORE_S3_PORT') ?: '',
@@ -26,4 +25,9 @@ if (getenv('OBJECTSTORE_S3_BUCKET')) {
)
)
);
}
$sse_c_key = getenv('OBJECTSTORE_S3_SSE_C_KEY');
if ($sse_c_key) {
$CONFIG['objectstore']['arguments']['sse_c_key'] = $sse_c_key;
}
}

View File

@@ -864,17 +864,20 @@ else
fi
# Docker socket proxy
# app_api is a shipped app
if [ -d "/var/www/html/custom_apps/app_api" ]; then
php /var/www/html/occ app:disable app_api
rm -r "/var/www/html/custom_apps/app_api"
fi
if [ "$DOCKER_SOCKET_PROXY_ENABLED" = 'yes' ]; then
if ! [ -d "/var/www/html/custom_apps/app_api" ]; then
php /var/www/html/occ app:install app_api
elif [ "$(php /var/www/html/occ config:app:get app_api enabled)" != "yes" ]; then
if [ "$(php /var/www/html/occ config:app:get app_api enabled)" != "yes" ]; then
php /var/www/html/occ app:enable app_api
elif [ "$SKIP_UPDATE" != 1 ]; then
php /var/www/html/occ app:update app_api
fi
else
if [ "$REMOVE_DISABLED_APPS" = yes ] && [ -d "/var/www/html/custom_apps/app_api" ]; then
php /var/www/html/occ app:remove app_api
if [ "$REMOVE_DISABLED_APPS" = yes ]; then
if [ "$(php /var/www/html/occ config:app:get app_api enabled)" != "no" ]; then
php /var/www/html/occ app:disable app_api
fi
fi
fi

View File

@@ -2,7 +2,7 @@
# Wait until the apache container is ready
while ! nc -z "$APACHE_HOST" "$APACHE_PORT"; do
echo "Waiting for Apache to become available..."
echo "Waiting for $APACHE_HOST to become available..."
sleep 15
done

View File

@@ -1,5 +1,5 @@
# syntax=docker/dockerfile:latest
FROM alpine:3.21.1
FROM alpine:3.21.3
COPY --chmod=775 start.sh /start.sh
COPY --chmod=775 healthcheck.sh /healthcheck.sh

View File

@@ -62,7 +62,7 @@ fi
# Set sensitive values as env
export DATABASE_URL="$DATABASE_TYPE://oc_$POSTGRES_USER:$POSTGRES_PASSWORD@$POSTGRES_HOST:$POSTGRES_PORT/$POSTGRES_DB"
export REDIS_URL="redis://:$REDIS_HOST_PASSWORD@$REDIS_HOST/$REDIS_DB_INDEX"
export REDIS_URL="redis://$REDIS_USER:$REDIS_HOST_PASSWORD@$REDIS_HOST/$REDIS_DB_INDEX"
# Run it
/nextcloud/custom_apps/notify_push/bin/"$CPU_ARCH"/notify_push \

View File

@@ -1,6 +1,6 @@
# syntax=docker/dockerfile:latest
# From https://github.com/ONLYOFFICE/Docker-DocumentServer/blob/master/Dockerfile
FROM onlyoffice/documentserver:8.2.2.1
FROM onlyoffice/documentserver:8.3.0.1
# USER root is probably used

View File

@@ -1,5 +1,5 @@
# syntax=docker/dockerfile:latest
FROM python:3.13.1-alpine3.21
FROM python:3.13.2-alpine3.21
COPY --chmod=775 start.sh /start.sh
COPY --chmod=775 healthcheck.sh /healthcheck.sh

View File

@@ -1,8 +1,8 @@
# syntax=docker/dockerfile:latest
FROM nats:2.10.24-scratch AS nats
FROM nats:2.10.25-scratch AS nats
FROM eturnal/eturnal:1.12.1 AS eturnal
FROM strukturag/nextcloud-spreed-signaling:2.0.1 AS signaling
FROM alpine:3.21.1 AS janus
FROM strukturag/nextcloud-spreed-signaling:2.0.2 AS signaling
FROM alpine:3.21.3 AS janus
ARG JANUS_VERSION=v1.3.0
WORKDIR /src
@@ -34,7 +34,7 @@ RUN set -ex; \
make configs; \
rename -v ".jcfg.sample" ".jcfg" /usr/local/etc/janus/*.jcfg.sample
FROM alpine:3.21.1
FROM alpine:3.21.3
ENV ETURNAL_ETC_DIR="/conf"
COPY --from=janus --chmod=777 --chown=1000:1000 /usr/local /usr/local
COPY --from=eturnal --chmod=777 --chown=1000:1000 /opt/eturnal /opt/eturnal

View File

@@ -30,14 +30,23 @@ if [ -n "$IPv4_ADDRESS_TALK" ] && [ "$IPv4_ADDRESS_TALK_RELAY" = "$IPv4_ADDRESS_
IPv4_ADDRESS_TALK=""
fi
set -x
IP_BINDING="::"
if grep -q "1" /sys/module/ipv6/parameters/disable \
|| grep -q "1" /proc/sys/net/ipv6/conf/all/disable_ipv6 \
|| grep -q "1" /proc/sys/net/ipv6/conf/default/disable_ipv6; then
IP_BINDING="0.0.0.0"
fi
set +x
# Turn
cat << TURN_CONF > "/conf/eturnal.yml"
eturnal:
listen:
- ip: "::"
- ip: "$IP_BINDING"
port: $TALK_PORT
transport: udp
- ip: "::"
- ip: "$IP_BINDING"
port: $TALK_PORT
transport: tcp
log_dir: stdout

View File

@@ -2,7 +2,7 @@
# From https://github.com/containrrr/watchtower/blob/main/dockerfiles/Dockerfile.self-contained
FROM containrrr/watchtower:1.7.1 AS watchtower
FROM alpine:3.21.1
FROM alpine:3.21.3
RUN set -ex; \
apk upgrade --no-cache -a; \

View File

@@ -1,6 +1,6 @@
# syntax=docker/dockerfile:latest
# Probably from this file: https://github.com/nextcloud/whiteboard/blob/main/Dockerfile
FROM ghcr.io/nextcloud-releases/whiteboard:v1.0.4
FROM ghcr.io/nextcloud-releases/whiteboard:v1.0.5
USER root
RUN set -ex; \
@@ -13,6 +13,8 @@ COPY --chmod=775 healthcheck.sh /healthcheck.sh
HEALTHCHECK CMD /healthcheck.sh
WORKDIR /tmp
ENTRYPOINT ["/start.sh"]
LABEL com.centurylinklabs.watchtower.enable="false"

View File

@@ -11,7 +11,7 @@ if [ -z "$REDIS_DB_INDEX" ]; then
REDIS_DB_INDEX=0
fi
export REDIS_URL="redis://:$REDIS_HOST_PASSWORD@$REDIS_HOST/$REDIS_DB_INDEX"
export REDIS_URL="redis://$REDIS_USER:$REDIS_HOST_PASSWORD@$REDIS_HOST/$REDIS_DB_INDEX"
# Run it
exec npm run server:start
exec npm --prefix /app run server:start

View File

@@ -0,0 +1,71 @@
{
"aio_services_v1": [
{
"container_name": "nextcloud-aio-borgbackup-viewer",
"image_tag": "v1",
"display_name": "Borg Backup Viewer",
"documentation": "https://github.com/nextcloud/all-in-one/tree/main/community-containers/borgbackup-viewer",
"image": "szaimen/aio-borgbackup-viewer",
"internal_port": "5801",
"ports": [
{
"ip_binding": "",
"port_number": "5801",
"protocol": "tcp"
}
],
"environment": [
"BORG_HOST_ID=nextcloud-aio-borgbackup-viewer",
"WEB_AUTHENTICATION_USERNAME=nextcloud",
"WEB_AUTHENTICATION_PASSWORD=%BORGBACKUP_VIEWER_PASSWORD%",
"WEB_LISTENING_PORT=5801",
"BORG_PASSPHRASE=%BORGBACKUP_PASSWORD%",
"BORG_REPO=/mnt/borgbackup/borg"
],
"secrets": [
"BORGBACKUP_VIEWER_PASSWORD",
"BORGBACKUP_PASSWORD"
],
"ui_secret": "BORGBACKUP_VIEWER_PASSWORD",
"volumes": [
{
"source": "nextcloud_aio_backup_cache",
"destination": "/root",
"writeable": true
},
{
"source": "%NEXTCLOUD_DATADIR%",
"destination": "/nextcloud_aio_volumes/nextcloud_aio_nextcloud_data",
"writeable": true
},
{
"source": "nextcloud_aio_mastercontainer",
"destination": "/nextcloud_aio_volumes/nextcloud_aio_mastercontainer",
"writeable": true
},
{
"source": "%BORGBACKUP_HOST_LOCATION%",
"destination": "/mnt/borgbackup",
"writeable": true
},
{
"source": "nextcloud_aio_elasticsearch",
"destination": "/nextcloud_aio_volumes/nextcloud_aio_elasticsearch",
"writeable": true
},
{
"source": "nextcloud_aio_redis",
"destination": "/mnt/redis",
"writeable": true
}
],
"devices": [
"/dev/fuse"
],
"cap_add": [
"SYS_ADMIN"
],
"apparmor_unconfined": true
}
]
}

View File

@@ -0,0 +1,17 @@
## Borgbackup Viewer
This container allows to view the local borg repository in a web session. It also allows you to restore files and folders from the backup by using desktop programs in a web browser.
### Notes
- After adding and starting the container, you need to visit `https://ip.address.of.this.server:5801` in order to log in with the user `nextcloud` and the password that you can see next to the container in the AIO interface. (The web page uses a self-signed certificate, so you need to accept the warning).
- Then, you should see a terminal. There type in `borg mount /mnt/borgbackup/borg /tmp/borg` to mount the backup archive at `/tmp/borg` inside the container. Afterwards type in `nautilus /tmp/borg` which will show a file explorer and allows you to see all the files. You can then copy files and folders back to their initial mountpoints inside `/nextcloud_aio_volumes/`, `/host_mounts/` and `/docker_volumes/`. ⚠️ Be very carefully while doing that as can break your instance!
- After you are done with the operation, click on the terminal in the background and press `[CTRL]+[c]` multiple times to close any open application. Then run `umount /tmp/borg` to unmount the mountpoint correctly.
- You can also delete specific archives by running `borg list`, delete a specific archive e.g. via `borg delete --stats --progress "::20220223_174237-nextcloud-aio"` and compact the archives via `borg compact`. After doing so, make sure to update the backup archives list in the AIO interface! You can do so by clicking on the `Check backup integrity` button or `Create backup` button.
- ⚠️ After you are done doing your operations, remove the container for better security again from the stack: https://github.com/nextcloud/all-in-one/tree/main/community-containers#how-to-remove-containers-from-aios-stack
- See https://github.com/nextcloud/all-in-one/tree/main/community-containers#community-containers how to add it to the AIO stack
### Repository
https://github.com/szaimen/aio-borgbackup-viewer
### Maintainer
https://github.com/szaimen

View File

@@ -9,6 +9,7 @@ This container bundles caddy and auto-configures it for you. It also covers http
- If you want to use this with https://github.com/nextcloud/all-in-one/tree/main/community-containers/jellyfin, make sure that you point `media.your-nc-domain.com` to your server using a cname record so that caddy can get a certificate automatically for jellyfin.
- If you want to use this with https://github.com/nextcloud/all-in-one/tree/main/community-containers/lldap, make sure that you point `ldap.your-nc-domain.com` to your server using a cname record so that caddy can get a certificate automatically for lldap.
- If you want to use this with https://github.com/nextcloud/all-in-one/tree/main/community-containers/nocodb, make sure that you point `tables.your-nc-domain.com` to your server using a cname record so that caddy can get a certificate automatically for nocodb.
- If you want to use this with https://github.com/nextcloud/all-in-one/tree/main/community-containers/jellyseerr, make sure that you point `requests.your-nc-domain.com` to your server using a cname record so that caddy can get a certificate automatically for jellyseerr.
- After the container was started the first time, you should see a new `nextcloud-aio-caddy` folder and inside there an `allowed-countries.txt` file when you open the files app with the default `admin` user. In there you can adjust the allowed country codes for caddy by adding them to the first line, e.g. `IT FR` would allow access from italy and france. Private ip-ranges are always allowed. Additionally, in order to activate this config, you need to get an account at https://dev.maxmind.com/geoip/geolite2-free-geolocation-data and download the `GeoLite2-Country.mmdb` and upload it with this exact name into the `nextcloud-aio-caddy` folder. Afterwards restart all containers from the AIO interface and your new config should be active!
- You can add your own Caddy configurations in `/data/caddy-imports/` inside the Caddy container (`sudo docker exec -it nextcloud-aio-caddy bash`). These will be imported on container startup.
- See https://github.com/nextcloud/all-in-one/tree/main/community-containers#community-containers how to add it to the AIO stack

View File

@@ -0,0 +1,37 @@
{
"aio_services_v1": [
{
"container_name": "nextcloud-aio-calcardbackup",
"display_name": "Calendar and contacts backup",
"documentation": "https://github.com/nextcloud/all-in-one/tree/main/community-containers/calcardbackup",
"image": "waja/calcardbackup",
"image_tag": "latest",
"restart": "unless-stopped",
"environment": [
"CRON_TIME=0 0 * * *",
"INIT_BACKUP=yes",
"BACKUP_DIR=/backup",
"NC_DIR=/nextcloud",
"NC_HOST=%NC_DOMAIN%",
"DB_HOST=nextcloud-aio-database",
"DB_PORT=5432",
"CALCARD_OPTS=-ltm 5"
],
"volumes": [
{
"source": "nextcloud_aio_calcardbackup",
"destination": "/backup",
"writeable": true
},
{
"source": "nextcloud_aio_nextcloud",
"destination": "/nextcloud",
"writeable": false
}
],
"backup_volumes": [
"nextcloud_aio_calcardbackup"
]
}
]
}

View File

@@ -0,0 +1,15 @@
## calcardbackup
This container packages calcardbackup which is a tool that exports calendars and addressbooks from Nextcloud to .ics and .vcf files and saves them to a compressed file.
### Notes
- Backups will be created at 00:00 CEST every day. Make sure that this does not conflict with the configured daily backups inside AIO.
- All the exports will be included in AIOs backup solution
- You can find the exports in the nextcloud_aio_calcardbackup volume
- See https://github.com/nextcloud/all-in-one/tree/main/community-containers#community-containers how to add it to the AIO stack
### Repository
https://github.com/waja/docker-calcardbackup
### Maintainer
https://github.com/pailloM

View File

@@ -25,6 +25,16 @@
"source": "nextcloud_aio_vaultwarden_logs",
"destination": "/vaultwarden",
"writeable": false
},
{
"source": "nextcloud_aio_jellyfin",
"destination": "/jellyfin",
"writeable": false
},
{
"source": "nextcloud_aio_jellyseerr",
"destination": "/jellyseerr",
"writeable": false
}
]
}

View File

@@ -1,5 +1,5 @@
## Fail2ban
This container bundles fail2ban and auto-configures it for you in order to block ip-addresses automatically. It also covers https://github.com/nextcloud/all-in-one/tree/main/community-containers/vaultwarden, if installed.
This container bundles fail2ban and auto-configures it for you in order to block ip-addresses automatically. It also covers https://github.com/nextcloud/all-in-one/tree/main/community-containers/vaultwarden, https://github.com/nextcloud/all-in-one/tree/main/community-containers/jellyfin, and https://github.com/nextcloud/all-in-one/tree/main/community-containers/jellyseerr, if installed.
### Notes
- If you get an error like `"ip6tables v1.8.9 (legacy): can't initialize ip6tables table filter': Table does not exist (do you need to insmod?)"`, you need to enable ip6tables on your host via `sudo modprobe ip6table_filter`.

View File

@@ -25,7 +25,7 @@
{
"source": "%NEXTCLOUD_MOUNT%",
"destination": "%NEXTCLOUD_MOUNT%",
"writeable": false
"writeable": true
}
],
"devices": [

View File

@@ -8,6 +8,7 @@ This container bundles Jellyfin and auto-configures it for you.
- In order to access your Jellyfin outside the local network, you have to set up your own reverse proxy. You can set up a reverse proxy following [these instructions](https://github.com/nextcloud/all-in-one/blob/main/reverse-proxy.md) and [Jellyfin's networking documentation](https://jellyfin.org/docs/general/networking/#running-jellyfin-behind-a-reverse-proxy), OR use the [Caddy](https://github.com/nextcloud/all-in-one/tree/main/community-containers/caddy) community container that will automatically configure `media.$NC_DOMAIN` to redirect to your Jellyfin.
- ⚠️ After the initial start, Jellyfin shows a configuration page to set up the root password, etc. **Be careful to initialize your Jellyfin before adding the DNS record.**
- If you have a firewall like ufw configured, you might need to open all Jellyfin ports in there first in order to make it work. Especially port 8096 is important!
- If you want to secure the installation with fail2ban, you might want to check out https://github.com/nextcloud/all-in-one/tree/main/community-containers/fail2ban
- The data of Jellyfin will be automatically included in AIO's backup solution!
- See [here](https://github.com/nextcloud/all-in-one/tree/main/community-containers#community-containers) how to add it to the AIO stack.

View File

@@ -0,0 +1,35 @@
{
"aio_services_v1": [
{
"container_name": "nextcloud-aio-jellyseerr",
"display_name": "Jellyseerr",
"documentation": "https://github.com/nextcloud/all-in-one/tree/main/community-containers/jellyseerr",
"image": "fallenbagel/jellyseerr",
"image_tag": "latest",
"internal_port": "5055",
"restart": "unless-stopped",
"init": false,
"ports": [
{
"ip_binding": "%APACHE_IP_BINDING%",
"port_number": "5055",
"protocol": "tcp"
}
],
"environment": [
"PORT=5055",
"TZ=%TIMEZONE%"
],
"volumes": [
{
"source": "nextcloud_aio_jellyseerr",
"destination": "/app/config",
"writeable": true
}
],
"backup_volumes": [
"nextcloud_aio_jellyseerr"
]
}
]
}

View File

@@ -0,0 +1,16 @@
## Jellyseerr
This container bundles Jellyseerr and auto-configures it for you.
### Notes
- This container is only intended to be used inside home networks as it uses http for its management page by default.
- After adding and starting the container, you can directly visit `http://ip.address.of.server:5055` and access your new Jellyseerr instance, which can be used to manage Plex, Jellyfin, and Emby.
- In order to access your Jellyseerr outside the local network, you have to set up your own reverse proxy. You can set up a reverse proxy following [these instructions](https://github.com/nextcloud/all-in-one/blob/main/reverse-proxy.md) and [Jellyseerr's reverse proxy documentation.](https://docs.jellyseerr.dev/extending-jellyseerr/reverse-proxy), OR use the Caddy community container that will automatically configure requests.$NC_DOMAIN to redirect to your Jellyseerr. Note that it is recommended to [enable CSRF protection in Jellyseerr](https://docs.jellyseerr.dev/using-jellyseerr/settings/general#enable-csrf-protection) for added security if you plan to use Jellyseerr outside the local network, but make sure to read up on it and understand the caveats first.
- If you want to secure the installation with fail2ban, you might want to check out https://github.com/nextcloud/all-in-one/tree/main/community-containers/fail2ban. Note that [enabling the proxy support option in Jellyseerr](https://docs.jellyseerr.dev/using-jellyseerr/settings/general#enable-proxy-support) is required for this to work properly.
- The config of Jellyseerr will be automatically included in AIO's backup solution!
- See [here](https://github.com/nextcloud/all-in-one/tree/main/community-containers#community-containers) how to add it to the AIO stack.
### Repository
https://github.com/Fallenbagel/jellyseerr
### Maintainer
https://github.com/Anvil5465

View File

@@ -27,6 +27,7 @@
"LLDAP_JWT_SECRET",
"LLDAP_LDAP_USER_PASS"
],
"ui_secret": "LLDAP_JWT_SECRET",
"volumes": [
{
"source": "nextcloud_aio_lldap",

View File

@@ -3,7 +3,7 @@ This container bundles LLDAP server and auto-configures your Nextcloud instance
### Notes
- In order to access your LLDAP web interface outside the local network, you have to set up your own reverse proxy. You can set up a reverse proxy following [these instructions](https://github.com/nextcloud/all-in-one/blob/main/reverse-proxy.md) OR use the [Caddy](https://github.com/nextcloud/all-in-one/tree/main/community-containers/caddy) community container that will automatically configure `ldap.$NC_DOMAIN` to redirect to your Lldap. You need to point the reverse proxy at port 17170 of this server.
- After adding and starting the container, you can log in to the lldap web interface by using the username `admin` and the password that you can retrieve via `sudo docker inspect nextcloud-aio-lldap | grep LLDAP_JWT_SECRET`.
- After adding and starting the container, you can log in to the lldap web interface by using the username `admin` and the secret that you can see next to the container in the AIO interface.
- To configure Nextcloud, you can use the generic configuration proposed below.
- For advanced configurations, see how to configure a client with lldap https://github.com/lldap/lldap#client-configuration
- Also, see how Nextcloud's LDAP application works https://docs.nextcloud.com/server/latest/admin_manual/configuration_user/user_auth_ldap.html

View File

@@ -0,0 +1,59 @@
{
"aio_services_v1": [
{
"container_name": "nextcloud-aio-makekv",
"display_name": "MakeMKV",
"documentation": "https://github.com/nextcloud/all-in-one/tree/main/community-containers/makemkv",
"image": "jlesage/makemkv",
"image_tag": "latest",
"internal_port": "5802",
"restart": "unless-stopped",
"ports": [
{
"ip_binding": "",
"port_number": "5802",
"protocol": "tcp"
}
],
"volumes": [
{
"source": "nextcloud_aio_makemkv",
"destination": "/config",
"writeable": true
},
{
"source": "%NEXTCLOUD_DATADIR%",
"destination": "/storage",
"writeable": false
},
{
"source": "%NEXTCLOUD_MOUNT%",
"destination": "/output",
"writeable": true
},
{
"source": "/dev",
"destination": "/dev",
"writeable": false
}
],
"environment": [
"TZ=%TIMEZONE%",
"SECURE_CONNECTION=1",
"WEB_AUTHENTICATION=1",
"USER_ID=33",
"GROUP_ID=33",
"WEB_AUTHENTICATION_USERNAME=makemkv",
"WEB_AUTHENTICATION_PASSWORD=%MAKEMKV_PASSWORD%",
"WEB_LISTENING_PORT=5802"
],
"secrets": [
"MAKEMKV_PASSWORD"
],
"ui_secret": "MAKEMKV_PASSWORD",
"backup_volumes": [
"nextcloud_aio_makemkv"
]
}
]
}

View File

@@ -0,0 +1,20 @@
## MakeMKV
This container bundles MakeMKV and auto-configures it for you.
### Notes
- This container should only be run in home networks
- ⚠️ This container mounts all devices from the host inside the container in order to be able to access the external DVD/Blu-ray drives which is a security issue. However no better solution was found for the time being.
- This container only works on Linux and not on Docker-Desktop.
- This container requires the [`NEXTCLOUD_MOUNT` variable in AIO to be set](https://github.com/nextcloud/all-in-one?tab=readme-ov-file#how-to-allow-the-nextcloud-container-to-access-directories-on-the-host). Otherwise the output will not be saved correctly..
- After adding and starting the container, you need to visit `https://internal.ip.of.server:5802` in order to log in with the `makemkv` user and the password that you can see next to the container in the AIO interface. (The web page uses a self-signed certificate, so you need to accept the warning).
- After the first login, you can adjust the `/output` directory in the MakeMKV settings to a subdirectory of the root of your chosen `NEXTCLOUD_MOUNT`. (by default `NEXTCLOUD_MOUNT` is mounted to `/output` inside the container. Thus all data is written to the root of it)
- The configured `NEXTCLOUD_DATADIR` is getting mounted to `/storage` inside the container.
- The config data of MakeMKV will be automatically included in AIOs backup solution!
- ⚠️ After you are done doing your operations, remove the container for better security again from the stack: https://github.com/nextcloud/all-in-one/tree/main/community-containers#how-to-remove-containers-from-aios-stack
- See https://github.com/nextcloud/all-in-one/tree/main/community-containers#community-containers how to add it to the AIO stack
### Repository
https://github.com/jlesage/docker-makemkv
### Maintainer
https://github.com/szaimen

View File

@@ -28,6 +28,7 @@
"NOCODB_JWT_SECRET",
"NOCODB_USER_PASS"
],
"ui_secret": "NOCODB_USER_PASS",
"volumes": [
{
"source": "nextcloud_aio_nocodb",

View File

@@ -17,7 +17,7 @@ This is an alternative of **Airtable**.
- You need to configure a reverse proxy in order to run this container since nocodb needs a dedicated (sub)domain! For that, you might have a look at https://github.com/nextcloud/all-in-one/tree/main/community-containers/caddy.
- Currently, only `tables.$NC_DOMAIN` is supported as subdomain! So if Nextcloud is using `your-domain.com`, nocodb will use `tables.your-domain.com`.
- The data of NocoDb will be automatically included in AIOs backup solution!
- After adding and starting the container, you need to run `docker inspect nextcloud-aio-nocodb | grep NC_ADMIN_PASS` to obtain the system administrator password (username: `admin@noco.db`). With this information, you can log in to the web interface at `https://tables.$NC_DOMAIN/#/signin`
- After adding and starting the container, you can log in to the web interface at `https://tables.$NC_DOMAIN/#/signin` with the username `admin@noco.db` and the password that you can see in the AIO interface next to the container.
- See https://docs.nocodb.com/ for usage of NocoDb
- See https://github.com/nextcloud/all-in-one/tree/main/community-containers#community-containers how to add it to the AIO stack

View File

@@ -3,7 +3,6 @@ This container contains a fork of the Nginx Proxy Manager, which is a WebUI for
### Notes
- This container is incompatible with the [caddy](https://github.com/nextcloud/all-in-one/tree/main/community-containers/caddy) community container. So make sure that you do not enable both at the same time!
- You can ignore the NPM configuration of the reverse-proxy.md. The NPMplus fork already contains the changes of the advanced tab.
- Make sure that no other service is using port `443 (tcp/upd)` or `81 (tcp)` on your host as otherwise the containers will fail to start. You can check this with `sudo netstat -tulpn | grep "443\|81"` before installing AIO.
- Please change the default login data first, after you can read inside the logs that the default config for AIO is created and there are no errors.
- After the container was started the first time, please check the logs for errors. Then you can open NPMplus on `https://<ip>:81` and change the password.
@@ -11,7 +10,7 @@ This container contains a fork of the Nginx Proxy Manager, which is a WebUI for
- If you want to use NPMplus behind a domain and outside localhost just create a new proxy host inside the NPMplus which proxies to `https`, `127.0.0.1` and port `81` - all other settings should be the same as for the AIO host.
- If you want to set env options from this [compose.yaml](https://github.com/ZoeyVid/NPMplus/blob/develop/compose.yaml), please set them inside the `.env` file which you can find in the `nextcloud_aio_npmplus` volume
- The data (certs, configs, etc.) of NPMplus will be automatically included in AIOs backup solution!
- **Important:** you always need to enable https for your hosts, since `DISABLE_HTTP` is set to true
- **Important:** you always need to enable https for your hosts, since `DISABLE_HTTP` is set to true by default
- See https://github.com/nextcloud/all-in-one/tree/main/community-containers#community-containers how to add it to the AIO stack
### Repository and Documentation

View File

@@ -48,6 +48,7 @@
"nextcloud_aio_pihole",
"nextcloud_aio_pihole_dnsmasq"
],
"ui_secret": "PIHOLE_WEBPASSWORD",
"secrets": [
"PIHOLE_WEBPASSWORD"
]

View File

@@ -6,7 +6,7 @@ This container bundles pi-hole and auto-configures it for you.
- Make sure that no dns server is already running by checking with `sudo netstat -tulpn | grep 53`. Otherwise the container will not be able to start!
- The DHCP functionality of Pi-hole has been disabled!
- The data of pi-hole will be automatically included in AIOs backup solution!
- After adding and starting the container, you can visit `http://ip.address.of.this.server:8573/admin` in order to log in with the admin key that you can retrieve when running `sudo docker inspect nextcloud-aio-pihole | grep WEBPASSWORD`. There you can configure the pi-hole setup. Also you can add local dns records.
- After adding and starting the container, you can visit `http://ip.address.of.this.server:8573/admin` in order to log in with the admin key that you can see next to the container in the AIO interface. There you can configure the pi-hole setup. Also you can add local dns records.
- You can configure your home network now to use pi-hole as its dns server by configuring your router.
- Additionally, you can configure the docker daemon to use that by editing `/etc/docker/daemon.json` and adding ` { "dns" : [ "ip.address.of.this.server" , "8.8.8.8" ] } `.
- See https://github.com/nextcloud/all-in-one/tree/main/community-containers#community-containers how to add it to the AIO stack

View File

@@ -0,0 +1,16 @@
## Scrutiny
This container bundles Scrutiny which is a frontend for SMART stats and auto-configures it for you.
### Notes
- This container should only be run in home networks
- ⚠️ This container mounts all devices from the host inside the container in order to be able to access the drives and smartctl stats which is a security issue. However no better solution was found for the time being.
- This container only works on Linux and not on Docker-Desktop.
- After adding and starting the container, you need to visit `http://internal.ip.of.server:8000` which will show the dashboard for your drives.
- It currently does not support sending notifications as no good solution was found yet that makes this possible. See https://github.com/szaimen/aio-scrutiny/issues/3
- See https://github.com/nextcloud/all-in-one/tree/main/community-containers#community-containers how to add it to the AIO stack
### Repository
https://github.com/szaimen/aio-scrutiny
### Maintainer
https://github.com/szaimen

View File

@@ -0,0 +1,56 @@
{
"aio_services_v1": [
{
"container_name": "nextcloud-aio-scrutiny",
"display_name": "Scrutiny",
"documentation": "https://github.com/nextcloud/all-in-one/tree/main/community-containers/scrutiny",
"image": "szaimen/aio-scrutiny",
"image_tag": "v1",
"internal_port": "8000",
"init": false,
"restart": "unless-stopped",
"ports": [
{
"ip_binding": "",
"port_number": "8000",
"protocol": "tcp"
}
],
"cap_add": [
"SYS_RAWIO",
"SYS_ADMIN"
],
"environment": [
"TZ=%TIMEZONE%",
"SCRUTINY_WEB_LISTEN_PORT=8000",
"COLLECTOR_API_ENDPOINT=http://127.0.0.1:8000"
],
"volumes": [
{
"source": "nextcloud_aio_scrutiny",
"destination": "/opt/scrutiny/config",
"writeable": true
},
{
"source": "nextcloud_aio_scrutiny_db",
"destination": "/opt/scrutiny/influxdb",
"writeable": true
},
{
"source": "/run/udev",
"destination": "/run/udev",
"writeable": false
},
{
"source": "/dev",
"destination": "/dev",
"writeable": false
}
],
"backup_volumes": [
"nextcloud_aio_scrutiny",
"nextcloud_aio_scrutiny_db"
]
}
]
}

View File

@@ -53,6 +53,7 @@
"secrets": [
"STALWART_USER_PASS"
],
"ui_secret": "STALWART_USER_PASS",
"volumes": [
{
"source": "nextcloud_aio_stalwart",

View File

@@ -6,7 +6,7 @@ This container bundles vaultwarden and auto-configures it for you.
- Currently, only `bw.$NC_DOMAIN` is supported as subdomain! So if Nextcloud is using `your-domain.com`, vaultwarden will use `bw.your-domain.com`. The reverse proxy and domain must be configured accordingly!
- If you want to secure the installation with fail2ban, you might want to check out https://github.com/nextcloud/all-in-one/tree/main/community-containers/fail2ban
- The data of Vaultwarden will be automatically included in AIOs backup solution!
- After adding and starting the container, you need to visit `https://bw.your-domain.com/admin` in order to log in with the admin key that you can retrieve when running `sudo docker inspect nextcloud-aio-vaultwarden | grep ADMIN_TOKEN`. There you can configure smtp first and then invite users via mail. After this is done, you might disable the admin panel via the reverse proxy by blocking connections to the subdirectory.
- After adding and starting the container, you need to visit `https://bw.your-domain.com/admin` in order to log in with the admin key that you can see next to the container in the AIO interface. There you can configure smtp first and then invite users via mail. After this is done, you might disable the admin panel via the reverse proxy by blocking connections to the subdirectory.
- If using the caddy community container, the vaultwarden admin interface can be disabled by creating a `block-vaultwarden-admin` file in the `nextcloud-aio-caddy` folder when you open the Nextcloud files app with the default `admin` user. Afterwards restart all containers from the AIO interface and the admin interface should be disabled! You can unlock the admin interface by removing the file again and afterwards restarting the containers via the AIO interface.
- See https://github.com/nextcloud/all-in-one/tree/main/community-containers#community-containers how to add it to the AIO stack

View File

@@ -40,6 +40,7 @@
"backup_volumes": [
"nextcloud_aio_vaultwarden"
],
"ui_secret": "VAULTWARDEN_ADMIN_TOKEN",
"secrets": [
"VAULTWARDEN_ADMIN_TOKEN"
]

View File

@@ -20,6 +20,7 @@ services:
# APACHE_ADDITIONAL_NETWORK: frontend_net # (Optional) Connect the apache container to an additional docker network. Needed when behind a web server or reverse proxy (like Apache, Nginx, Caddy, Cloudflare Tunnel and else) running in a different docker network on same server. See https://github.com/nextcloud/all-in-one/blob/main/reverse-proxy.md
# BORG_RETENTION_POLICY: --keep-within=7d --keep-weekly=4 --keep-monthly=6 # Allows to adjust borgs retention policy. See https://github.com/nextcloud/all-in-one#how-to-adjust-borgs-retention-policy
# COLLABORA_SECCOMP_DISABLED: false # Setting this to true allows to disable Collabora's Seccomp feature. See https://github.com/nextcloud/all-in-one#how-to-disable-collaboras-seccomp-feature
# FULLTEXTSEARCH_JAVA_OPTIONS: "-Xms1024M -Xmx1024M" # Allows to adjust the fulltextsearch java options. See https://github.com/nextcloud/all-in-one#how-to-adjust-the-fulltextsearch-java-options
# NEXTCLOUD_DATADIR: /mnt/ncdata # Allows to set the host directory for Nextcloud's datadir. ⚠️⚠️⚠️ Warning: do not set or adjust this value after the initial Nextcloud installation is done! See https://github.com/nextcloud/all-in-one#how-to-change-the-default-location-of-nextclouds-datadir
# NEXTCLOUD_MOUNT: /mnt/ # Allows the Nextcloud container to access the chosen directory on the host. See https://github.com/nextcloud/all-in-one#how-to-allow-the-nextcloud-container-to-access-directories-on-the-host
# NEXTCLOUD_UPLOAD_LIMIT: 16G # Can be adjusted if you need more. See https://github.com/nextcloud/all-in-one#how-to-adjust-the-upload-limit-for-nextcloud
@@ -38,6 +39,7 @@ services:
# security_opt: ["label:disable"] # Is needed when using SELinux
# # Optional: Caddy reverse proxy. See https://github.com/nextcloud/all-in-one/discussions/575
# # Alternatively, use Tailscale if you don't have a domain yet. See https://github.com/nextcloud/all-in-one/discussions/5439
# # Hint: You need to uncomment APACHE_PORT: 11000 above, adjust cloud.example.com to your domain and uncomment the necessary docker volumes at the bottom of this file in order to make it work
# # You can find further examples here: https://github.com/nextcloud/all-in-one/discussions/588
# caddy:

View File

@@ -2,14 +2,17 @@
It is possible due to several reasons that you do not want or cannot open Nextcloud to the public internet. Perhaps you were hoping to access AIO directly from an `ip.add.r.ess` (unsupported) or without a valid domain. However, AIO requires a valid certificate to work correctly. Below is discussed how you can achieve both: Having a valid certificate for Nextcloud and only using it locally.
### Content
- [1. The recommended way](#1-the-recommended-way)
- [2. Use the ACME DNS-challenge](#2-use-the-acme-dns-challenge)
- [3. Use Cloudflare](#3-use-cloudflare)
- [4. Buy a certificate and use that](#4-buy-a-certificate-and-use-that)
- [5. Tailscale network](#5-tailscale-network)
- [1. Tailscale](#1-tailscale)
- [2. The normal way](#2-the-normal-way)
- [3. Use the ACME DNS-challenge](#3-use-the-acme-dns-challenge)
- [4. Use Cloudflare](#4-use-cloudflare)
- [5. Buy a certificate and use that](#5-buy-a-certificate-and-use-that)
## 1. The recommended way
The recommended way is the following:
## 1. Tailscale
This is the recommended way. For a reverse proxy example guide for Tailscale, see this guide by @flll: https://github.com/nextcloud/all-in-one/discussions/5439
## 2. The normal way
The normal way is the following:
1. Set up your domain correctly to point to your home network
1. Set up a reverse proxy by following the [reverse proxy documentation](./reverse-proxy.md) but only open port 80 (which is needed for the ACME challenge to work - however no real traffic will use this port).
1. Set up a local DNS-server like a pi-hole and configure it to be your local DNS-server for the whole network. Then in the Pi-hole interface, add a custom DNS-record for your domain and overwrite the A-record (and possibly the AAAA-record, too) to point to the private ip-address of your reverse proxy (see https://github.com/nextcloud/all-in-one#how-can-i-access-nextcloud-locally)
@@ -18,14 +21,11 @@ The recommended way is the following:
**Hint:** You may have a look at [this video](https://youtu.be/zk-y2wVkY4c) for a more complete but possibly outdated example.
## 2. Use the ACME DNS-challenge
## 3. Use the ACME DNS-challenge
You can alternatively use the ACME DNS-challenge to get a valid certificate for Nextcloud. Here is described how to set it up: https://github.com/nextcloud/all-in-one#how-to-get-nextcloud-running-using-the-acme-dns-challenge
## 3. Use Cloudflare
## 4. Use Cloudflare
If you do not have any control over the network, you may think about using Cloudflare Tunnel to get a valid certificate for your Nextcloud. However it will be opened to the public internet then. See https://github.com/nextcloud/all-in-one#how-to-run-nextcloud-behind-a-cloudflare-tunnel how to set this up.
## 4. Buy a certificate and use that
## 5. Buy a certificate and use that
If none of the above ways work for you, you may simply buy a certificate from an issuer for your domain. You then download the certificate onto your server, configure AIO in [reverse proxy mode](./reverse-proxy.md) and use the certificate for your domain in your reverse proxy config.
## 5. Tailscale network
For a reverse proxy example guide for Tailscale, see this guide by @flll: https://github.com/nextcloud/all-in-one/discussions/5439

View File

@@ -202,6 +202,7 @@ services:
environment:
- NC_DOMAIN
- NEXTCLOUD_HOST=nextcloud-aio-nextcloud
- TZ=${TIMEZONE}
- REDIS_HOST=nextcloud-aio-redis
- REDIS_HOST_PASSWORD=${REDIS_PASSWORD}
- POSTGRES_HOST=nextcloud-aio-database
@@ -429,7 +430,7 @@ services:
- "9200"
environment:
- TZ=${TIMEZONE}
- ES_JAVA_OPTS=-Xms512M -Xmx512M
- ES_JAVA_OPTS=${FULLTEXTSEARCH_JAVA_OPTIONS}
- bootstrap.memory_lock=true
- cluster.name=nextcloud-aio
- discovery.type=single-node
@@ -459,6 +460,8 @@ services:
retries: 3
expose:
- "3002"
tmpfs:
- /tmp
environment:
- TZ=${TIMEZONE}
- NEXTCLOUD_URL=https://${NC_DOMAIN}
@@ -466,6 +469,7 @@ services:
- STORAGE_STRATEGY=redis
- REDIS_HOST=nextcloud-aio-redis
- REDIS_HOST_PASSWORD=${REDIS_PASSWORD}
- BACKUP_DIR=/tmp
restart: unless-stopped
profiles:
- whiteboard

View File

@@ -6,11 +6,13 @@ You can run the containers that are build for AIO with docker-compose. This come
- You can run it without a container having access to the docker socket
- You can modify all values on your own
- You can run the containers with docker swarm
- You can run this in environments where access to docker.io is not possible. See [this issue](https://github.com/nextcloud/all-in-one/discussions/5268).
### Disadvantages
- You lose the AIO interface
- You lose update notifications and automatic updates
- You lose all AIO backup and restore features
- You lose the built-in [Docker Socket Proxy container](https://github.com/nextcloud/docker-socket-proxy#readme) (needed for [Nextcloud App API](https://github.com/nextcloud/app_api#nextcloud-appapi))
- You lose all community containers: https://github.com/nextcloud/all-in-one/tree/main/community-containers#community-containers
- **You need to know what you are doing, especially when modifying the compose.yaml file**
- For updating, you need to strictly follow the at the bottom described update routine

View File

@@ -26,6 +26,7 @@ APACHE_MAX_SIZE=17179869184 # This needs to be an integer and in sync w
APACHE_PORT=443 # Changing this to a different value than 443 will allow you to run it behind a web server or reverse proxy (like Apache, Nginx, Caddy, Cloudflare Tunnel and else).
COLLABORA_DICTIONARIES="de_DE en_GB en_US es_ES fr_FR it nl pt_BR pt_PT ru" # You can change this in order to enable other dictionaries for collabora
COLLABORA_SECCOMP_POLICY=--o:security.seccomp=true # Changing the value to false allows to disable the seccomp feature of the Collabora container.
FULLTEXTSEARCH_JAVA_OPTIONS="-Xms512M -Xmx512M" # Allows to adjust the fulltextsearch java options.
INSTALL_LATEST_MAJOR=no # Setting this to yes will install the latest Major Nextcloud version upon the first installation
NEXTCLOUD_ADDITIONAL_APKS=imagemagick # This allows to add additional packages to the Nextcloud container permanently. Default is imagemagick but can be overwritten by modifying this value.
NEXTCLOUD_ADDITIONAL_PHP_EXTENSIONS=imagick # This allows to add additional php extensions to the Nextcloud container permanently. Default is imagick but can be overwritten by modifying this value.
@@ -37,5 +38,5 @@ NEXTCLOUD_STARTUP_APPS="deck twofactor_totp tasks calendar contacts notes"
NEXTCLOUD_TRUSTED_CACERTS_DIR=/usr/local/share/ca-certificates/my-custom-ca # Nextcloud container will trust all the Certification Authorities, whose certificates are included in the given directory.
NEXTCLOUD_UPLOAD_LIMIT=16G # This allows to change the upload limit of the Nextcloud container
REMOVE_DISABLED_APPS=yes # Setting this to no keep Nextcloud apps that are disabled via their switch and not uninstall them if they should be installed in Nextcloud.
TALK_PORT=3478 # This allows to adjust the port that the talk container is using.
TALK_PORT=3478 # This allows to adjust the port that the talk container is using. It should be set to something higher than 1024! Otherwise it might not work!
UPDATE_NEXTCLOUD_APPS="no" # When setting to "yes" (with quotes), it will automatically update all installed Nextcloud apps upon container startup on saturdays.

View File

@@ -14,6 +14,7 @@ cat /tmp/containers.json
OUTPUT="$(cat /tmp/containers.json)"
OUTPUT="$(echo "$OUTPUT" | jq 'del(.services[].internal_port)')"
OUTPUT="$(echo "$OUTPUT" | jq 'del(.services[].secrets)')"
OUTPUT="$(echo "$OUTPUT" | jq 'del(.services[].ui_secrets)')"
OUTPUT="$(echo "$OUTPUT" | jq 'del(.services[].devices)')"
OUTPUT="$(echo "$OUTPUT" | jq 'del(.services[].enable_nvidia_gpu)')"
OUTPUT="$(echo "$OUTPUT" | jq 'del(.services[].backup_volumes)')"
@@ -92,6 +93,7 @@ sed -i 's|NC_DOMAIN=|NC_DOMAIN=yourdomain.com # TODO! Needs to be chang
sed -i 's|NEXTCLOUD_PASSWORD=|NEXTCLOUD_PASSWORD= # TODO! This is the password of the initially created Nextcloud admin with username "admin".|' sample.conf
sed -i 's|TIMEZONE=|TIMEZONE=Europe/Berlin # TODO! This is the timezone that your containers will use.|' sample.conf
sed -i 's|COLLABORA_SECCOMP_POLICY=|COLLABORA_SECCOMP_POLICY=--o:security.seccomp=true # Changing the value to false allows to disable the seccomp feature of the Collabora container.|' sample.conf
sed -i 's|FULLTEXTSEARCH_JAVA_OPTIONS=|FULLTEXTSEARCH_JAVA_OPTIONS="-Xms512M -Xmx512M" # Allows to adjust the fulltextsearch java options.|' sample.conf
sed -i 's|NEXTCLOUD_STARTUP_APPS=|NEXTCLOUD_STARTUP_APPS="deck twofactor_totp tasks calendar contacts notes" # Allows to modify the Nextcloud apps that are installed on starting AIO the first time|' sample.conf
sed -i 's|NEXTCLOUD_ADDITIONAL_APKS=|NEXTCLOUD_ADDITIONAL_APKS=imagemagick # This allows to add additional packages to the Nextcloud container permanently. Default is imagemagick but can be overwritten by modifying this value.|' sample.conf
sed -i 's|NEXTCLOUD_ADDITIONAL_PHP_EXTENSIONS=|NEXTCLOUD_ADDITIONAL_PHP_EXTENSIONS=imagick # This allows to add additional php extensions to the Nextcloud container permanently. Default is imagick but can be overwritten by modifying this value.|' sample.conf

View File

@@ -7,7 +7,11 @@ The only way to fix this on your side is upgrading regularly (e.g. by enabling d
---
## Method 1
## Method 1 using `assaflavie/runlike`
> [!Warning]
> Please note that this method is apparently currently broken. See https://help.nextcloud.com/t/manual-upgrade-keeps-failing/217164/10
> So please refer to method 2 using Portainer.
1. Start all containers from the AIO interface
- Now, it will report that Nextcloud is restarting because it is not able to start due to the above mentioned problem
@@ -54,14 +58,11 @@ The only way to fix this on your side is upgrading regularly (e.g. by enabling d
---
## Method 2
## Method 2 using Portainer
#### *Approach using portainer if method 1 does not work for you*
Prerequisite: have all containers from AIO interface running.
<details>
<summary>Click to expand</summary>
##### 1. Install portainer if not installed:
```bash
docker volume create portainer_data
@@ -119,5 +120,3 @@ docker rm portainer
docker volume rm portainer_data
```
- Make sure you close port 9443 on your firewall and delete any necessary reverse proxy hosts.
</details>

View File

@@ -1,6 +1,6 @@
name: nextcloud-aio-helm-chart
description: A generated Helm Chart for Nextcloud AIO from Skippbox Kompose
version: 10.2.0
version: 10.5.0
apiVersion: v2
keywords:
- latest

View File

@@ -1,5 +1,8 @@
# Nextcloud AIO Helm-chart
> [!NOTE]
> For an enterprise-ready and scalable deployment method based on Helm Charts (also available for Podman), please [contact Nextcloud GmbH](https://nextcloud.com/enterprise/).
You can run the containers that are build for AIO with Kubernetes using this Helm chart. This comes with a few downsides, that are discussed below.
### Advantages

View File

@@ -61,7 +61,21 @@ spec:
value: "{{ .Values.TIMEZONE }}"
- name: WHITEBOARD_HOST
value: nextcloud-aio-whiteboard
image: nextcloud/aio-apache:20250106_094420
image: nextcloud/aio-apache:20250204_102259
readinessProbe:
exec:
command:
- /healthcheck.sh
failureThreshold: 3
periodSeconds: 30
timeoutSeconds: 30
livenessProbe:
exec:
command:
- /healthcheck.sh
failureThreshold: 3
periodSeconds: 30
timeoutSeconds: 30
name: nextcloud-aio-apache
ports:
- containerPort: {{ .Values.APACHE_PORT }}

View File

@@ -61,7 +61,7 @@ spec:
value: "{{ .Values.NEXTCLOUD_UPLOAD_LIMIT }}"
- name: TZ
value: "{{ .Values.TIMEZONE }}"
image: nextcloud/aio-clamav:20250106_094420
image: nextcloud/aio-clamav:20250204_102259
readinessProbe:
exec:
command:

View File

@@ -34,7 +34,7 @@ spec:
value: --o:ssl.enable=false --o:ssl.termination=true --o:mount_jail_tree=false --o:logging.level=warning --o:home_mode.enable=true {{ .Values.COLLABORA_SECCOMP_POLICY }} --o:remote_font_config.url=https://{{ .Values.NC_DOMAIN }}/apps/richdocuments/settings/fonts.json --o:net.post_allow.host[0]=.+
- name: server_name
value: "{{ .Values.NC_DOMAIN }}"
image: nextcloud/aio-collabora:20250106_094420
image: nextcloud/aio-collabora:20250204_102259
readinessProbe:
exec:
command:

View File

@@ -64,7 +64,7 @@ spec:
value: nextcloud
- name: TZ
value: "{{ .Values.TIMEZONE }}"
image: nextcloud/aio-postgresql:20250106_094420
image: nextcloud/aio-postgresql:20250204_102259
readinessProbe:
exec:
command:

View File

@@ -35,7 +35,7 @@ spec:
containers:
- env:
- name: ES_JAVA_OPTS
value: -Xms512M -Xmx512M
value: "{{ .Values.FULLTEXTSEARCH_JAVA_OPTIONS | default "-Xms512M -Xmx512M" }}"
- name: FULLTEXTSEARCH_PASSWORD
value: "{{ .Values.FULLTEXTSEARCH_PASSWORD }}"
- name: TZ
@@ -54,7 +54,7 @@ spec:
value: basic
- name: xpack.security.enabled
value: "false"
image: nextcloud/aio-fulltextsearch:20250106_094420
image: nextcloud/aio-fulltextsearch:20250204_102259
readinessProbe:
exec:
command:

View File

@@ -38,7 +38,7 @@ spec:
value: "{{ .Values.IMAGINARY_SECRET }}"
- name: TZ
value: "{{ .Values.TIMEZONE }}"
image: nextcloud/aio-imaginary:20250106_094420
image: nextcloud/aio-imaginary:20250204_102259
readinessProbe:
exec:
command:

View File

@@ -180,7 +180,7 @@ spec:
value: "{{ .Values.WHITEBOARD_ENABLED }}"
- name: WHITEBOARD_SECRET
value: "{{ .Values.WHITEBOARD_SECRET }}"
image: nextcloud/aio-nextcloud:20250106_094420
image: nextcloud/aio-nextcloud:20250204_102259
{{- if eq (.Values.RPSS_ENABLED | default "no") "yes" }} # AIO-config - do not change this comment!
securityContext:
# The items below only work in container context

View File

@@ -53,7 +53,7 @@ spec:
value: nextcloud-aio-redis
- name: REDIS_HOST_PASSWORD
value: "{{ .Values.REDIS_PASSWORD }}"
image: nextcloud/aio-notify-push:20250106_094420
image: nextcloud/aio-notify-push:20250204_102259
readinessProbe:
exec:
command:

View File

@@ -42,7 +42,7 @@ spec:
value: "{{ .Values.ONLYOFFICE_SECRET }}"
- name: TZ
value: "{{ .Values.TIMEZONE }}"
image: nextcloud/aio-onlyoffice:20250106_094420
image: nextcloud/aio-onlyoffice:20250204_102259
readinessProbe:
exec:
command:

View File

@@ -39,7 +39,7 @@ spec:
value: "{{ .Values.REDIS_PASSWORD }}"
- name: TZ
value: "{{ .Values.TIMEZONE }}"
image: nextcloud/aio-redis:20250106_094420
image: nextcloud/aio-redis:20250204_102259
readinessProbe:
exec:
command:

View File

@@ -52,7 +52,7 @@ spec:
value: "{{ .Values.TURN_SECRET }}"
- name: TZ
value: "{{ .Values.TIMEZONE }}"
image: nextcloud/aio-talk:20250106_094420
image: nextcloud/aio-talk:20250204_102259
readinessProbe:
exec:
command:

View File

@@ -44,7 +44,7 @@ spec:
value: "{{ .Values.RECORDING_SECRET }}"
- name: TZ
value: "{{ .Values.TIMEZONE }}"
image: nextcloud/aio-talk-recording:20250106_094420
image: nextcloud/aio-talk-recording:20250204_102259
readinessProbe:
exec:
command:

View File

@@ -34,6 +34,8 @@ spec:
{{- end }}
containers:
- env:
- name: BACKUP_DIR
value: /tmp
- name: JWT_SECRET_KEY
value: "{{ .Values.WHITEBOARD_SECRET }}"
- name: NEXTCLOUD_URL
@@ -46,7 +48,7 @@ spec:
value: redis
- name: TZ
value: "{{ .Values.TIMEZONE }}"
image: nextcloud/aio-whiteboard:20250106_094420
image: nextcloud/aio-whiteboard:20250204_102259
readinessProbe:
exec:
command:

View File

@@ -306,6 +306,8 @@ cat << EOL > /tmp/additional.config
EOL
# shellcheck disable=SC1083
find ./ -name '*nextcloud-deployment.yaml' -exec sed -i "/^.*\- env:/r /tmp/additional.config" \{} \;
# shellcheck disable=SC1083
find ./ -name '*fulltextsearch-deployment.yaml' -exec sed -i 's/{{ .Values.FULLTEXTSEARCH_JAVA_OPTIONS }}/{{ .Values.FULLTEXTSEARCH_JAVA_OPTIONS | default "-Xms512M -Xmx512M" }}/' \{} \;
# Additional config
cat << EOL > /tmp/additional-apache.config

View File

@@ -25,6 +25,7 @@ APACHE_MAX_SIZE: "17179869184" # This needs to be an integer and in syn
APACHE_PORT: 443 # Changing this to a different value than 443 will allow you to run it behind a web server or reverse proxy (like Apache, Nginx, Caddy, Cloudflare Tunnel and else).
COLLABORA_DICTIONARIES: de_DE en_GB en_US es_ES fr_FR it nl pt_BR pt_PT ru # You can change this in order to enable other dictionaries for collabora
COLLABORA_SECCOMP_POLICY: --o:security.seccomp=true # Changing the value to false allows to disable the seccomp feature of the Collabora container.
FULLTEXTSEARCH_JAVA_OPTIONS: -Xms512M -Xmx512M # Allows to adjust the fulltextsearch java options.
INSTALL_LATEST_MAJOR: no # Setting this to yes will install the latest Major Nextcloud version upon the first installation
NEXTCLOUD_ADDITIONAL_APKS: imagemagick # This allows to add additional packages to the Nextcloud container permanently. Default is imagemagick but can be overwritten by modifying this value.
NEXTCLOUD_ADDITIONAL_PHP_EXTENSIONS: imagick # This allows to add additional php extensions to the Nextcloud container permanently. Default is imagick but can be overwritten by modifying this value.
@@ -34,7 +35,7 @@ NEXTCLOUD_STARTUP_APPS: deck twofactor_totp tasks calendar contacts notes
NEXTCLOUD_TRUSTED_CACERTS_DIR: # Setting this to any value allows to automatically import root certificates into the Nextcloud container
NEXTCLOUD_UPLOAD_LIMIT: 16G # This allows to change the upload limit of the Nextcloud container
REMOVE_DISABLED_APPS: yes # Setting this to no keep Nextcloud apps that are disabled via their switch and not uninstall them if they should be installed in Nextcloud.
TALK_PORT: 3478 # This allows to adjust the port that the talk container is using.
TALK_PORT: 3478 # This allows to adjust the port that the talk container is using. It should be set to something higher than 1024! Otherwise it might not work!
UPDATE_NEXTCLOUD_APPS: no # When setting to yes (with quotes), it will automatically update all installed Nextcloud apps upon container startup on saturdays.
STORAGE_CLASS: # By setting this, you can adjust the storage class for your volumes

81
php/composer.lock generated
View File

@@ -391,32 +391,32 @@
},
{
"name": "laravel/serializable-closure",
"version": "v1.3.7",
"version": "v2.0.3",
"source": {
"type": "git",
"url": "https://github.com/laravel/serializable-closure.git",
"reference": "4f48ade902b94323ca3be7646db16209ec76be3d"
"reference": "f379c13663245f7aa4512a7869f62eb14095f23f"
},
"dist": {
"type": "zip",
"url": "https://api.github.com/repos/laravel/serializable-closure/zipball/4f48ade902b94323ca3be7646db16209ec76be3d",
"reference": "4f48ade902b94323ca3be7646db16209ec76be3d",
"url": "https://api.github.com/repos/laravel/serializable-closure/zipball/f379c13663245f7aa4512a7869f62eb14095f23f",
"reference": "f379c13663245f7aa4512a7869f62eb14095f23f",
"shasum": ""
},
"require": {
"php": "^7.3|^8.0"
"php": "^8.1"
},
"require-dev": {
"illuminate/support": "^8.0|^9.0|^10.0|^11.0",
"nesbot/carbon": "^2.61|^3.0",
"pestphp/pest": "^1.21.3",
"phpstan/phpstan": "^1.8.2",
"symfony/var-dumper": "^5.4.11|^6.2.0|^7.0.0"
"illuminate/support": "^10.0|^11.0|^12.0",
"nesbot/carbon": "^2.67|^3.0",
"pestphp/pest": "^2.36|^3.0",
"phpstan/phpstan": "^2.0",
"symfony/var-dumper": "^6.2.0|^7.0.0"
},
"type": "library",
"extra": {
"branch-alias": {
"dev-master": "1.x-dev"
"dev-master": "2.x-dev"
}
},
"autoload": {
@@ -448,7 +448,7 @@
"issues": "https://github.com/laravel/serializable-closure/issues",
"source": "https://github.com/laravel/serializable-closure"
},
"time": "2024-11-14T18:34:49+00:00"
"time": "2025-02-11T15:03:05+00:00"
},
{
"name": "nikic/fast-route",
@@ -502,16 +502,16 @@
},
{
"name": "php-di/invoker",
"version": "2.3.4",
"version": "2.3.6",
"source": {
"type": "git",
"url": "https://github.com/PHP-DI/Invoker.git",
"reference": "33234b32dafa8eb69202f950a1fc92055ed76a86"
"reference": "59f15608528d8a8838d69b422a919fd6b16aa576"
},
"dist": {
"type": "zip",
"url": "https://api.github.com/repos/PHP-DI/Invoker/zipball/33234b32dafa8eb69202f950a1fc92055ed76a86",
"reference": "33234b32dafa8eb69202f950a1fc92055ed76a86",
"url": "https://api.github.com/repos/PHP-DI/Invoker/zipball/59f15608528d8a8838d69b422a919fd6b16aa576",
"reference": "59f15608528d8a8838d69b422a919fd6b16aa576",
"shasum": ""
},
"require": {
@@ -545,7 +545,7 @@
],
"support": {
"issues": "https://github.com/PHP-DI/Invoker/issues",
"source": "https://github.com/PHP-DI/Invoker/tree/2.3.4"
"source": "https://github.com/PHP-DI/Invoker/tree/2.3.6"
},
"funding": [
{
@@ -553,24 +553,24 @@
"type": "github"
}
],
"time": "2023-09-08T09:24:21+00:00"
"time": "2025-01-17T12:49:27+00:00"
},
{
"name": "php-di/php-di",
"version": "7.0.7",
"version": "7.0.8",
"source": {
"type": "git",
"url": "https://github.com/PHP-DI/PHP-DI.git",
"reference": "e87435e3c0e8f22977adc5af0d5cdcc467e15cf1"
"reference": "98ddc81f8f768a2ad39e4cbe737285eaeabe577a"
},
"dist": {
"type": "zip",
"url": "https://api.github.com/repos/PHP-DI/PHP-DI/zipball/e87435e3c0e8f22977adc5af0d5cdcc467e15cf1",
"reference": "e87435e3c0e8f22977adc5af0d5cdcc467e15cf1",
"url": "https://api.github.com/repos/PHP-DI/PHP-DI/zipball/98ddc81f8f768a2ad39e4cbe737285eaeabe577a",
"reference": "98ddc81f8f768a2ad39e4cbe737285eaeabe577a",
"shasum": ""
},
"require": {
"laravel/serializable-closure": "^1.0",
"laravel/serializable-closure": "^1.0 || ^2.0",
"php": ">=8.0",
"php-di/invoker": "^2.0",
"psr/container": "^1.1 || ^2.0"
@@ -582,7 +582,7 @@
"friendsofphp/php-cs-fixer": "^3",
"friendsofphp/proxy-manager-lts": "^1",
"mnapoli/phpunit-easymock": "^1.3",
"phpunit/phpunit": "^9.5",
"phpunit/phpunit": "^9.6",
"vimeo/psalm": "^4.6"
},
"suggest": {
@@ -614,7 +614,7 @@
],
"support": {
"issues": "https://github.com/PHP-DI/PHP-DI/issues",
"source": "https://github.com/PHP-DI/PHP-DI/tree/7.0.7"
"source": "https://github.com/PHP-DI/PHP-DI/tree/7.0.8"
},
"funding": [
{
@@ -626,7 +626,7 @@
"type": "tidelift"
}
],
"time": "2024-07-21T15:55:45+00:00"
"time": "2025-01-28T21:02:46+00:00"
},
{
"name": "php-di/slim-bridge",
@@ -1633,24 +1633,23 @@
},
{
"name": "twig/twig",
"version": "v3.18.0",
"version": "v3.20.0",
"source": {
"type": "git",
"url": "https://github.com/twigphp/Twig.git",
"reference": "acffa88cc2b40dbe42eaf3a5025d6c0d4600cc50"
"reference": "3468920399451a384bef53cf7996965f7cd40183"
},
"dist": {
"type": "zip",
"url": "https://api.github.com/repos/twigphp/Twig/zipball/acffa88cc2b40dbe42eaf3a5025d6c0d4600cc50",
"reference": "acffa88cc2b40dbe42eaf3a5025d6c0d4600cc50",
"url": "https://api.github.com/repos/twigphp/Twig/zipball/3468920399451a384bef53cf7996965f7cd40183",
"reference": "3468920399451a384bef53cf7996965f7cd40183",
"shasum": ""
},
"require": {
"php": ">=8.0.2",
"php": ">=8.1.0",
"symfony/deprecation-contracts": "^2.5|^3",
"symfony/polyfill-ctype": "^1.8",
"symfony/polyfill-mbstring": "^1.3",
"symfony/polyfill-php81": "^1.29"
"symfony/polyfill-mbstring": "^1.3"
},
"require-dev": {
"phpstan/phpstan": "^2.0",
@@ -1697,7 +1696,7 @@
],
"support": {
"issues": "https://github.com/twigphp/Twig/issues",
"source": "https://github.com/twigphp/Twig/tree/v3.18.0"
"source": "https://github.com/twigphp/Twig/tree/v3.20.0"
},
"funding": [
{
@@ -1709,7 +1708,7 @@
"type": "tidelift"
}
],
"time": "2024-12-29T10:51:50+00:00"
"time": "2025-02-13T08:34:43+00:00"
}
],
"packages-dev": [
@@ -2700,16 +2699,16 @@
},
{
"name": "phpstan/phpdoc-parser",
"version": "2.0.0",
"version": "2.0.1",
"source": {
"type": "git",
"url": "https://github.com/phpstan/phpdoc-parser.git",
"reference": "c00d78fb6b29658347f9d37ebe104bffadf36299"
"reference": "72e51f7c32c5aef7c8b462195b8c599b11199893"
},
"dist": {
"type": "zip",
"url": "https://api.github.com/repos/phpstan/phpdoc-parser/zipball/c00d78fb6b29658347f9d37ebe104bffadf36299",
"reference": "c00d78fb6b29658347f9d37ebe104bffadf36299",
"url": "https://api.github.com/repos/phpstan/phpdoc-parser/zipball/72e51f7c32c5aef7c8b462195b8c599b11199893",
"reference": "72e51f7c32c5aef7c8b462195b8c599b11199893",
"shasum": ""
},
"require": {
@@ -2741,9 +2740,9 @@
"description": "PHPDoc parser with support for nullable, intersection and generic types",
"support": {
"issues": "https://github.com/phpstan/phpdoc-parser/issues",
"source": "https://github.com/phpstan/phpdoc-parser/tree/2.0.0"
"source": "https://github.com/phpstan/phpdoc-parser/tree/2.0.1"
},
"time": "2024-10-13T11:29:49+00:00"
"time": "2025-02-13T12:25:43+00:00"
},
{
"name": "sebastian/diff",

View File

@@ -145,6 +145,10 @@
"pattern": "^[A-Z_]+$"
}
},
"ui_secret": {
"type": "string",
"pattern": "^[A-Z_]+$"
},
"image_tag": {
"type": "string",
"pattern": "^([a-z0-9.-]+|%AIO_CHANNEL%)$"
@@ -187,13 +191,6 @@
"pattern": "^[a-z-]+$"
}
},
"networks": {
"type": "array",
"items": {
"type": "string",
"pattern": "^nextcloud-aio$"
}
},
"read_only": {
"type": "boolean"
},
@@ -220,7 +217,7 @@
},
"source": {
"type": "string",
"pattern": "^((nextcloud_aio_[a-z_]+)|(%[A-Z_]+%))$"
"pattern": "^((nextcloud_aio_[a-z_]+)|(%[A-Z_]+%)|(/dev)|(/run/udev))$"
},
"writeable": {
"type": "boolean"

View File

@@ -3,6 +3,7 @@
{
"container_name": "nextcloud-aio-apache",
"image_tag": "%AIO_CHANNEL%",
"documentation": "https://github.com/nextcloud/all-in-one/discussions/2105",
"depends_on": [
"nextcloud-aio-onlyoffice",
"nextcloud-aio-collabora",
@@ -67,9 +68,6 @@
"nextcloud_aio_nextcloud",
"nextcloud_aio_apache"
],
"networks": [
"nextcloud-aio"
],
"read_only": true,
"tmpfs": [
"/var/log/supervisord",
@@ -130,9 +128,6 @@
"nextcloud_aio_database",
"nextcloud_aio_database_dump"
],
"networks": [
"nextcloud-aio"
],
"read_only": true,
"tmpfs": [
"/var/run/postgresql"
@@ -268,9 +263,6 @@
"backup_volumes": [
"nextcloud_aio_nextcloud"
],
"networks": [
"nextcloud-aio"
],
"cap_drop": [
"NET_RAW"
]
@@ -308,6 +300,7 @@
"environment": [
"NC_DOMAIN=%NC_DOMAIN%",
"NEXTCLOUD_HOST=nextcloud-aio-nextcloud",
"TZ=%TIMEZONE%",
"REDIS_HOST=nextcloud-aio-redis",
"REDIS_HOST_PASSWORD=%REDIS_PASSWORD%",
"POSTGRES_HOST=nextcloud-aio-database",
@@ -317,9 +310,6 @@
"POSTGRES_USER=nextcloud"
],
"restart": "unless-stopped",
"networks": [
"nextcloud-aio"
],
"read_only": true,
"cap_drop": [
"NET_RAW"
@@ -361,9 +351,6 @@
"RECORDING_SECRET"
],
"restart": "unless-stopped",
"networks": [
"nextcloud-aio"
],
"read_only": true,
"cap_drop": [
"NET_RAW"
@@ -404,9 +391,6 @@
"profiles": [
"collabora"
],
"networks": [
"nextcloud-aio"
],
"cap_add": [
"MKNOD",
"SYS_ADMIN"
@@ -466,9 +450,6 @@
"talk",
"talk-recording"
],
"networks": [
"nextcloud-aio"
],
"read_only": true,
"tmpfs": [
"/var/log/supervisord",
@@ -526,9 +507,6 @@
"/dev/dri"
],
"enable_nvidia_gpu": true,
"networks": [
"nextcloud-aio"
],
"read_only": true,
"tmpfs": [
"/conf"
@@ -690,9 +668,6 @@
"profiles": [
"clamav"
],
"networks": [
"nextcloud-aio"
],
"read_only": true,
"tmpfs": [
"/var/lock",
@@ -745,9 +720,6 @@
"profiles": [
"onlyoffice"
],
"networks": [
"nextcloud-aio"
],
"cap_drop": [
"NET_RAW"
]
@@ -785,9 +757,6 @@
"profiles": [
"imaginary"
],
"networks": [
"nextcloud-aio"
],
"read_only": true,
"tmpfs": [
"/tmp"
@@ -817,7 +786,7 @@
"internal_port": "9200",
"environment": [
"TZ=%TIMEZONE%",
"ES_JAVA_OPTS=-Xms512M -Xmx512M",
"ES_JAVA_OPTS=%FULLTEXTSEARCH_JAVA_OPTIONS%",
"bootstrap.memory_lock=true",
"cluster.name=nextcloud-aio",
"discovery.type=single-node",
@@ -838,9 +807,6 @@
"profiles": [
"fulltextsearch"
],
"networks": [
"nextcloud-aio"
],
"secrets": [
"FULLTEXTSEARCH_PASSWORD"
],
@@ -892,6 +858,9 @@
"expose": [
"3002"
],
"tmpfs": [
"/tmp"
],
"internal_port": "3002",
"environment": [
"TZ=%TIMEZONE%",
@@ -899,7 +868,8 @@
"JWT_SECRET_KEY=%WHITEBOARD_SECRET%",
"STORAGE_STRATEGY=redis",
"REDIS_HOST=nextcloud-aio-redis",
"REDIS_HOST_PASSWORD=%REDIS_PASSWORD%"
"REDIS_HOST_PASSWORD=%REDIS_PASSWORD%",
"BACKUP_DIR=/tmp"
],
"secrets": [
"WHITEBOARD_SECRET",
@@ -910,9 +880,6 @@
"whiteboard"
],
"read_only": true,
"networks": [
"nextcloud-aio"
],
"cap_drop": [
"NET_RAW"
]

View File

@@ -21,6 +21,7 @@ readonly class Container {
private array $dependsOn,
/** @var string[] */
private array $secrets,
private string $uiSecret,
/** @var string[] */
private array $devices,
private bool $enableNvidiaGpu,
@@ -85,6 +86,10 @@ readonly class Container {
return $this->secrets;
}
public function GetUiSecret() : string {
return $this->dockerActionManager->GetAndGenerateSecretWrapper($this->uiSecret);
}
public function GetTmpfs() : array {
return $this->tmpfs;
}

View File

@@ -244,6 +244,11 @@ readonly class ContainerDefinitionFetcher {
$secrets = $entry['secrets'];
}
$uiSecret = '';
if (isset($entry['ui_secret'])) {
$uiSecret = $entry['ui_secret'];
}
$devices = [];
if (isset($entry['devices'])) {
$devices = $entry['devices'];
@@ -316,6 +321,7 @@ readonly class ContainerDefinitionFetcher {
$variables,
$dependsOn,
$secrets,
$uiSecret,
$devices,
$enableNvidiaGpu,
$capAdd,

View File

@@ -46,7 +46,7 @@ readonly class DockerController {
if ($pullImage) {
if (!$this->dockerActionManager->isDockerHubReachable($container)) {
$pullImage = false;
error_log('Not pulling the image for the ' . $container->GetContainerName() . ' container because docker hub does not seem to be reachable.');
error_log('Not pulling the ' . $container->GetContainerName() . ' image for the ' . $container->GetIdentifier() . ' container because docker hub does not seem to be reachable.');
}
}
@@ -171,7 +171,7 @@ readonly class DockerController {
}
if (isset($request->getParsedBody()['install_latest_major'])) {
$installLatestMajor = 30;
$installLatestMajor = 31;
} else {
$installLatestMajor = "";
}

View File

@@ -33,6 +33,10 @@ class ConfigurationManager
}
public function GetAndGenerateSecret(string $secretId) : string {
if ($secretId === '') {
return '';
}
$config = $this->GetConfig();
if(!isset($config['secrets'][$secretId])) {
$config['secrets'][$secretId] = bin2hex(random_bytes(24));
@@ -210,7 +214,7 @@ class ConfigurationManager
}
public function SetFulltextsearchEnabledState(int $value) : void {
# Elasticsearch does not work on kernels without seccomp anymore. See https://github.com/nextcloud/all-in-one/discussions/5768
// Elasticsearch does not work on kernels without seccomp anymore. See https://github.com/nextcloud/all-in-one/discussions/5768
if ($this->GetCollaboraSeccompDisabledState() === 'true') {
$value = 0;
}
@@ -281,6 +285,12 @@ class ConfigurationManager
if (!$this->isTalkEnabled()) {
$value = 0;
}
// Currently only works on x64. See https://github.com/nextcloud/nextcloud-talk-recording/issues/17
if (!$this->isx64Platform()) {
$value = 0;
}
$config = $this->GetConfig();
$config['isTalkRecordingEnabled'] = $value;
$this->WriteConfig($config);
@@ -340,9 +350,9 @@ class ConfigurationManager
if (!filter_var($dnsRecordIP, FILTER_VALIDATE_IP, FILTER_FLAG_NO_PRIV_RANGE | FILTER_FLAG_NO_RES_RANGE)) {
if ($port === '443') {
throw new InvalidSettingConfigurationException("It seems like the ip-address of the domain is set to an internal or reserved ip-address. This is not supported. (It was found to be set to '" . $dnsRecordIP . "'). Please set it to a public ip-address so that the domain validation can work!");
throw new InvalidSettingConfigurationException("It seems like the ip-address of the domain is set to an internal or reserved ip-address. This is not supported by the domain validation. (It was found to be set to '" . $dnsRecordIP . "'). Please set it to a public ip-address so that the domain validation can work or skip the domain validation!");
} else {
error_log("It seems like the ip-address of " . $domain . " is set to an internal or reserved ip-address. (It was found to be set to '" . $dnsRecordIP . "')");
error_log("Info: It seems like the ip-address of " . $domain . " is set to an internal or reserved ip-address. (It was found to be set to '" . $dnsRecordIP . "')");
}
}
@@ -704,6 +714,13 @@ class ConfigurationManager
return $this->GetEnvironmentalVariableOrConfig($envVariableName, $configName, $defaultValue);
}
public function GetFulltextsearchJavaOptions() : string {
$envVariableName = 'FULLTEXTSEARCH_JAVA_OPTIONS';
$configName = 'fulltextsearch_java_options';
$defaultValue = '-Xms512M -Xmx512M';
return $this->GetEnvironmentalVariableOrConfig($envVariableName, $configName, $defaultValue);
}
public function GetDockerSocketPath() : string {
$envVariableName = 'WATCHTOWER_DOCKER_SOCKET_PATH';
$configName = 'docker_socket_path';

View File

@@ -167,7 +167,7 @@ readonly class DockerActionManager {
try {
$this->guzzleClient->post($url);
} catch (RequestException $e) {
throw new \Exception("Could not start container " . $container->GetIdentifier() . ": " . $e->getMessage());
throw new \Exception("Could not start container " . $container->GetIdentifier() . ": " . $e->getResponse()?->getBody()->getContents());
}
}
@@ -357,6 +357,8 @@ readonly class DockerActionManager {
$replacements[1] = $this->configurationManager->GetNextcloudMaxTime();
} elseif ($out[1] === 'BORG_RETENTION_POLICY') {
$replacements[1] = $this->configurationManager->GetBorgRetentionPolicy();
} elseif ($out[1] === 'FULLTEXTSEARCH_JAVA_OPTIONS') {
$replacements[1] = $this->configurationManager->GetFulltextsearchJavaOptions();
} elseif ($out[1] === 'NEXTCLOUD_TRUSTED_CACERTS_DIR') {
$replacements[1] = $this->configurationManager->GetTrustedCacertsDir();
} elseif ($out[1] === 'ADDITIONAL_DIRECTORIES_BACKUP') {
@@ -541,19 +543,23 @@ readonly class DockerActionManager {
$mounts = [];
// Special things for the backup container which should not be exposed in the containers.json
if ($container->GetIdentifier() === 'nextcloud-aio-borgbackup') {
if (str_starts_with($container->GetIdentifier(), 'nextcloud-aio-borgbackup')) {
// Additional backup directories
foreach ($this->getAllBackupVolumes() as $additionalBackupVolumes) {
if ($additionalBackupVolumes !== '') {
$mounts[] = ["Type" => "volume", "Source" => $additionalBackupVolumes, "Target" => "/nextcloud_aio_volumes/" . $additionalBackupVolumes, "ReadOnly" => false];
}
}
// Make volumes read only in case of borgbackup container. The viewer makes them writeable
$isReadOnly = $container->GetIdentifier() === 'nextcloud-aio-borgbackup';
foreach ($this->configurationManager->GetAdditionalBackupDirectoriesArray() as $additionalBackupDirectories) {
if ($additionalBackupDirectories !== '') {
if (!str_starts_with($additionalBackupDirectories, '/')) {
$mounts[] = ["Type" => "volume", "Source" => $additionalBackupDirectories, "Target" => "/docker_volumes/" . $additionalBackupDirectories, "ReadOnly" => true];
$mounts[] = ["Type" => "volume", "Source" => $additionalBackupDirectories, "Target" => "/docker_volumes/" . $additionalBackupDirectories, "ReadOnly" => $isReadOnly];
} else {
$mounts[] = ["Type" => "bind", "Source" => $additionalBackupDirectories, "Target" => "/host_mounts" . $additionalBackupDirectories, "ReadOnly" => true, "BindOptions" => ["NonRecursive" => true]];
$mounts[] = ["Type" => "bind", "Source" => $additionalBackupDirectories, "Target" => "/host_mounts" . $additionalBackupDirectories, "ReadOnly" => $isReadOnly, "BindOptions" => ["NonRecursive" => true]];
}
}
}
@@ -588,7 +594,7 @@ readonly class DockerActionManager {
]
);
} catch (RequestException $e) {
throw new \Exception("Could not create container " . $container->GetIdentifier() . ": " . $e->getMessage());
throw new \Exception("Could not create container " . $container->GetIdentifier() . ": " . $e->getResponse()?->getBody()->getContents());
}
}
@@ -623,7 +629,7 @@ readonly class DockerActionManager {
try {
$this->guzzleClient->post($url);
} catch (RequestException $e) {
$message = "Could not pull image " . $imageName . ". Please run 'sudo docker exec -it nextcloud-aio-mastercontainer docker pull " . $imageName . "' in order to find out why it failed.";
$message = "Could not pull image " . $imageName . ": " . $e->getResponse()?->getBody()->getContents();
if ($imageIsThere === false) {
throw new \Exception($message);
} else {
@@ -883,7 +889,7 @@ readonly class DockerActionManager {
} catch (RequestException $e) {
// 409 is undocumented and gets thrown if the network already exists.
if ($e->getCode() !== 409) {
throw new \Exception("Could not create the nextcloud-aio network: " . $e->getMessage());
throw new \Exception("Could not create the nextcloud-aio network: " . $e->getResponse()?->getBody()->getContents());
}
}
}
@@ -1028,6 +1034,10 @@ readonly class DockerActionManager {
}
}
public function GetAndGenerateSecretWrapper(string $secretId) : string {
return $this->configurationManager->GetAndGenerateSecret($secretId);
}
public function isNextcloudImageOutdated() : bool {
$createdTime = $this->GetCreatedTimeOfNextcloudImage();

View File

@@ -17,7 +17,7 @@
<div class="container">
<main>
<h1>Nextcloud AIO v10.3.0</h1>
<h1>Nextcloud AIO v10.6.0</h1>
{# Add 2nd tab warning #}
<script type="text/javascript" src="second-tab-warning.js"></script>
@@ -33,7 +33,7 @@
{% set isBackupOrRestoreRunning = false %}
{% set isApacheStarting = false %}
{# Setting newMajorVersion to '' will hide corresponding options/elements, can be set to an integer like 26 in order to show corresponding elements. If set, also increase installLatestMajor in https://github.com/nextcloud/all-in-one/blob/main/php/src/Controller/DockerController.php #}
{% set newMajorVersion = '' %}
{% set newMajorVersion = 31 %}
{% if is_backup_container_running == true %}
{% if borg_backup_mode == 'backup' or borg_backup_mode == 'restore' %}
@@ -101,7 +101,7 @@
{% else %}
<p>AIO is currently in "reverse proxy mode" which means that it can be installed behind a web server or reverse proxy (like Apache, Nginx, Caddy, Cloudflare Tunnel and else) and does not do the TLS proxying itself.</p>
{% endif %}
<p>Please type the domain that will be used for Nextcloud below in order to create a new AIO instance.</p>
<p>Please type the domain that will be used for Nextcloud.</p>
{% if skip_domain_validation == true %}
<p><strong>Please note:</strong> The domain validation is disabled so any domain will be accepted here! Make sure you do not make a typo here as you will not be able to change it afterwards!</p>
{% endif %}
@@ -115,7 +115,7 @@
<p>Make sure that this server is reachable on port 443 (port 443/tcp is open/forwarded in your firewall/router and 443/udp as well if you want to enable http3) and that you've correctly set up the DNS config for the domain that you enter (set the A record to your public ipv4-address and if you need ipv6, set the AAAA record to your public ipv6-address. A CNAME record is, of course, also possible). You should see hints on what went wrong in the top right corner if your domain is not accepted.</p>
<details>
<summary>Click here for further hints</summary>
<p>If you do not have a domain yet, you can get one for free e.g. from duckdns.org and others.</p>
<p>If you do not have a domain yet, you can get one for free e.g. from duckdns.org and others. Recommended is to use <a href="https://github.com/nextcloud/all-in-one/discussions/5439">Tailscale</a></p>
<p>If you have a dynamic public IP-address, you can use e.g. <a href="https://ddclient.net/">DDclient</a> with a compatible domain provider for DNS updates.</p>
<p>If you only want to install AIO locally without exposing it to the public internet or if you cannot do so, feel free to follow <a href="https://github.com/nextcloud/all-in-one/blob/main/local-instance.md">this documentation</a>.</p>
<p>If you should be using Cloudflare Proxy for your domain, make sure to disable the Proxy feature temporarily as it might block the domain validation attempts.</p>
@@ -282,6 +282,9 @@
{% if container.GetDocumentation() != '' %}
(<a href="{{ container.GetDocumentation() }}">docs</a>)
{% endif %}
{% if container.GetUiSecret() != '' %}
(password: {{ container.GetUiSecret() }})
{% endif %}
</span>
{% elseif container.GetRunningState().value == 'running' %}
<span class="status success"></span>
@@ -289,6 +292,9 @@
{% if container.GetDocumentation() != '' %}
(<a href="{{ container.GetDocumentation() }}">docs</a>)
{% endif %}
{% if container.GetUiSecret() != '' %}
(password: {{ container.GetUiSecret() }})
{% endif %}
</span>
{% else %}
<span class="status error"></span>
@@ -296,6 +302,9 @@
{% if container.GetDocumentation() != '' %}
(<a href="{{ container.GetDocumentation() }}">docs</a>)
{% endif %}
{% if container.GetUiSecret() != '' %}
(password: {{ container.GetUiSecret() }})
{% endif %}
</span>
{% endif %}
</li>
@@ -313,7 +322,7 @@
{% if newMajorVersion != '' and isAnyRunning == true and isApacheStarting != true %}
<details>
<summary>Note about <strong>Nextcloud Hub {{ newMajorVersion - 21 }}</strong></summary>
<p>If you haven't upgraded to Nextcloud Hub {{ newMajorVersion - 21 }} yet and want to do that now, feel free to follow <strong><a href="https://github.com/nextcloud/all-in-one/discussions/5133">this documentation</a></strong></p>
<p>If you haven't upgraded to Nextcloud Hub {{ newMajorVersion - 21 }} yet and want to do that now, feel free to follow <strong><a href="https://github.com/nextcloud/all-in-one/discussions/6053">this documentation</a></strong></p>
</details>
{% endif %}
{% endif %}
@@ -504,6 +513,9 @@
{% endif %}
{% if has_backup_run_once == true %}
<h3>Backup Viewer</h3>
<p>There is now a community container that allows to access your backups in a web session. See <a href="https://github.com/nextcloud/all-in-one/tree/main/community-containers/borgbackup-viewer"><strong>this documentation</strong></a>.</p>
<h3>Backup check</h3>
<p>Click on the button below to perform a backup integrity check. This is an option that verifies that your backup is intact. It shouldn't be needed in most situations.</p>
<form method="POST" action="/api/docker/backup-check" class="xhr">

View File

@@ -21,7 +21,7 @@
data-initial-state="false"
{% endif %}
>
<label for="clamav">ClamAV (Antivirus backend for Nextcloud, only supported on x64, needs ~1GB additional RAM)</label>
<label for="clamav">ClamAV (Antivirus backend for Nextcloud, only supported on x86_64, needs ~1GB additional RAM)</label>
</p>
<p>
<input
@@ -96,7 +96,7 @@
data-initial-state="false"
{% endif %}
>
<label for="talk-recording">Nextcloud Talk Recording-server (needs Nextcloud Talk being enabled and ~1GB additional RAM and ~2 additional vCPUs)</label>
<label for="talk-recording">Nextcloud Talk Recording-server (needs Nextcloud Talk being enabled and ~1GB additional RAM and ~2 additional vCPUs, currently <a href="https://github.com/nextcloud/nextcloud-talk-recording/issues/17">only works on x86_64</a>)</label>
</p>
{% if is_onlyoffice_enabled == true %}
<p>
@@ -145,7 +145,7 @@
<input id="options-form-submit" type="submit" value="Save changes" />
<script type="text/javascript" src="options-form-submit.js?v3"></script>
</form>
<p><strong>Minimal system requirements:</strong> When any optional container is enabled, at least 2GB RAM, a dual-core CPU and 40GB system storage are required. When enabling ClamAV, Nextcloud Talk Recording-server or Fulltextsearch, at least 3GB RAM are required. For Talk Recording-server additional 2 vCPUs are required. When enabling everything, at least 5GB RAM and a quad-core CPU are required. Recommended are at least 1GB more RAM than the minimal requirement. For further advices and recommendations see <strong><a href="https://github.com/nextcloud/all-in-one/discussions/1335">this documentation</a></strong></p>
<p><strong>Minimal system requirements:</strong> When any optional container is enabled, at least 2GB RAM, a dual-core CPU and 40GB system storage are required. When enabling ClamAV, Nextcloud Talk Recording-server or Fulltextsearch, at least 3GB RAM are required. For Talk Recording-server additional 2 vCPUs are required. When enabling everything, at least 5GB RAM and a quad-core CPU are required. Recommended are at least 1GB more RAM than the minimal requirement. For further advice and recommendations see <strong><a href="https://github.com/nextcloud/all-in-one/discussions/1335">this documentation</a></strong></p>
{% if isAnyRunning == true or is_x64_platform == false %}
<script type="text/javascript" src="disable-clamav.js"></script>
{% endif %}

141
readme.md
View File

@@ -13,6 +13,7 @@ Included are:
- Fulltextsearch (optional)
- Whiteboard (optional)
- Docker Socket Proxy (optional, needed for [Nextcloud App API](https://github.com/cloud-py-api/app_api#nextcloud-appapi))
- [Community containers](https://github.com/nextcloud/all-in-one/tree/main/community-containers#community-containers)
<details><summary>And much more:</summary>
- Simple web interface included that enables easy installation and maintenance
@@ -27,7 +28,7 @@ Included are:
- A+ security in Nextcloud security scan
- Ready to be used behind existing [Reverse proxies](https://github.com/nextcloud/all-in-one/blob/main/reverse-proxy.md)
- Can be used behind [Cloudflare Tunnel](https://github.com/nextcloud/all-in-one#how-to-run-nextcloud-behind-a-cloudflare-tunnel)
- Can be used inside [Tailscale network](https://github.com/nextcloud/all-in-one/discussions/5439)
- Can be used via [Tailscale](https://github.com/nextcloud/all-in-one/discussions/5439)
- Ready for big file uploads up to 10 GB on public links, [adjustable](https://github.com/nextcloud/all-in-one#how-to-adjust-the-upload-limit-for-nextcloud) (logged in users can upload much bigger files using the webinterface or the mobile/desktop clients since chunking is used in that case)
- PHP and web server timeouts set to 3600s, [adjustable](https://github.com/nextcloud/all-in-one#how-to-adjust-the-max-execution-time-for-nextcloud) (important for big file uploads)
- Defaults to a max of 512 MB RAM per PHP process, [adjustable](https://github.com/nextcloud/all-in-one#how-to-adjust-the-php-memory-limit-for-nextcloud)
@@ -46,7 +47,6 @@ Included are:
- Possibility included to [permanently add additional PHP extensions into the Nextcloud container](https://github.com/nextcloud/all-in-one#how-to-add-php-extensions-permanently-to-the-nextcloud-container) without having to build your own Docker image
- Possibility included to [pass the needed device for hardware transcoding](https://github.com/nextcloud/all-in-one#how-to-enable-hardware-acceleration-for-nextcloud) to the Nextcloud container
- Possibility included to [store all docker related files on a separate drive](https://github.com/nextcloud/all-in-one#how-to-store-the-filesinstallation-on-a-separate-drive)
- [Additional features can be added very easily](https://github.com/nextcloud/all-in-one/tree/main/community-containers#community-containers)
- [LDAP can be used as user backend for Nextcloud](https://github.com/nextcloud/all-in-one/tree/main#ldap)
- Migration from any former Nextcloud installation to AIO is possible. See [this documentation](https://github.com/nextcloud/all-in-one/blob/main/migration.md)
- [Fail2Ban can be added](https://github.com/nextcloud/all-in-one#fail2ban)
@@ -138,6 +138,103 @@ If your firewall/router has port 80 and 8443 open/forwarded and you point a doma
5. Please do not forget to open port `3478/TCP` and `3478/UDP` in your firewall/router for the Talk container!
## FAQ
- [Where can I find additional documentation?](#where-can-i-find-additional-documentation)
- [How does it work?](#how-does-it-work)
- [How to contribute?](#how-to-contribute)
- [How many users are possible?](#how-many-users-are-possible)
- [Are reverse proxies supported?](#are-reverse-proxies-supported)
- [Which CPU architectures are supported?](#which-cpu-architectures-are-supported)
- [Which ports are mandatory to be open in your firewall/router?](#which-ports-are-mandatory-to-be-open-in-your-firewallrouter)
- [Explanation of used ports:](#explanation-of-used-ports)
- [How to run AIO on macOS?](#how-to-run-aio-on-macos)
- [How to run AIO on Windows?](#how-to-run-aio-on-windows)
- [How to run AIO on Synology DSM](#how-to-run-aio-on-synology-dsm)
- [How to run AIO with Portainer?](#how-to-run-aio-with-portainer)
- [Can I run AIO on TrueNAS SCALE?](#can-i-run-aio-on-truenas-scale)
- [Notes on Cloudflare (proxy/tunnel)](#notes-on-cloudflare-proxytunnel)
- [How to run Nextcloud behind a Cloudflare Tunnel?](#how-to-run-nextcloud-behind-a-cloudflare-tunnel)
- [How to run Nextcloud via Tailscale?](#how-to-run-nextcloud-via-tailscale)
- [Disrecommended VPS providers](#disrecommended-vps-providers)
- [Recommended VPS](#recommended-vps)
- [Note on storage options](#note-on-storage-options)
- [How to get Nextcloud running using the ACME DNS-challenge?](#how-to-get-nextcloud-running-using-the-acme-dns-challenge)
- [How to run Nextcloud locally? No domain wanted, or wanting intranet access within your LAN.](#how-to-run-nextcloud-locally-no-domain-wanted-or-wanting-intranet-access-within-your-lan)
- [Can I use an ip-address for Nextcloud instead of a domain?](#can-i-use-an-ip-address-for-nextcloud-instead-of-a-domain)
- [Can I run AIO offline or in an airgapped system?](#can-i-run-aio-offline-or-in-an-airgapped-system)
- [Are self-signed certificates supported for Nextcloud?](#are-self-signed-certificates-supported-for-nextcloud)
- [Can I use AIO with multiple domains?](#can-i-use-aio-with-multiple-domains)
- [Are other ports than the default 443 for Nextcloud supported?](#are-other-ports-than-the-default-443-for-nextcloud-supported)
- [Can I run Nextcloud in a subdirectory on my domain?](#can-i-run-nextcloud-in-a-subdirectory-on-my-domain)
- [How can I access Nextcloud locally?](#how-can-i-access-nextcloud-locally)
- [How to skip the domain validation?](#how-to-skip-the-domain-validation)
- [How to resolve firewall problems with Fedora Linux, RHEL OS, CentOS, SUSE Linux and others?](#how-to-resolve-firewall-problems-with-fedora-linux-rhel-os-centos-suse-linux-and-others)
- [Are there known problems when SELinux is enabled?](#are-there-known-problems-when-selinux-is-enabled)
- [How to run `occ` commands?](#how-to-run-occ-commands)
- [How to resolve `Security & setup warnings displays the "missing default phone region" after initial install`?](#how-to-resolve-security--setup-warnings-displays-the-missing-default-phone-region-after-initial-install)
- [How to run multiple AIO instances on one server?](#how-to-run-multiple-aio-instances-on-one-server)
- [Bruteforce protection FAQ](#bruteforce-protection-faq)
- [Update policy](#update-policy)
- [How to switch the channel?](#how-to-switch-the-channel)
- [How to update the containers?](#how-to-update-the-containers)
- [How often are update notifications sent?](#how-often-are-update-notifications-sent)
- [How to easily log in to the AIO interface?](#how-to-easily-log-in-to-the-aio-interface)
- [How to change the domain?](#how-to-change-the-domain)
- [How to properly reset the instance?](#how-to-properly-reset-the-instance)
- [Backup solution](#backup-solution)
- [What is getting backed up by AIO's backup solution?](#what-is-getting-backed-up-by-aios-backup-solution)
- [How to adjust borgs retention policy?](#how-to-adjust-borgs-retention-policy)
- [How to migrate from AIO to AIO?](#how-to-migrate-from-aio-to-aio)
- [Are remote borg backups supported?](#are-remote-borg-backups-supported)
- [Failure of the backup container in LXC containers](#failure-of-the-backup-container-in-lxc-containers)
- [How to create the backup volume on Windows?](#how-to-create-the-backup-volume-on-windows)
- [Pro-tip: Backup archives access](#pro-tip-backup-archives-access)
- [Delete backup archives manually](#delete-backup-archives-manually)
- [Sync local backups regularly to another drive](#sync-local-backups-regularly-to-another-drive)
- [How to exclude Nextcloud's data directory or the preview folder from backup?](#how-to-exclude-nextclouds-data-directory-or-the-preview-folder-from-backup)
- [How to stop/start/update containers or trigger the daily backup from a script externally?](#how-to-stopstartupdate-containers-or-trigger-the-daily-backup-from-a-script-externally)
- [How to disable the backup section?](#how-to-disable-the-backup-section)
- [How to change the default location of Nextcloud's Datadir?](#how-to-change-the-default-location-of-nextclouds-datadir)
- [Can I use a CIFS/SMB share as Nextcloud's datadir?](#can-i-use-a-cifssmb-share-as-nextclouds-datadir)
- [How to allow the Nextcloud container to access directories on the host?](#how-to-allow-the-nextcloud-container-to-access-directories-on-the-host)
- [How to adjust the Talk port?](#how-to-adjust-the-talk-port)
- [How to adjust the upload limit for Nextcloud?](#how-to-adjust-the-upload-limit-for-nextcloud)
- [How to adjust the max execution time for Nextcloud?](#how-to-adjust-the-max-execution-time-for-nextcloud)
- [How to adjust the PHP memory limit for Nextcloud?](#how-to-adjust-the-php-memory-limit-for-nextcloud)
- [What can I do to fix the internal or reserved ip-address error?](#what-can-i-do-to-fix-the-internal-or-reserved-ip-address-error)
- [Can I run this with Docker swarm?](#can-i-run-this-with-docker-swarm)
- [Can I run this with Kubernetes?](#can-i-run-this-with-kubernetes)
- [How to run this with Docker rootless?](#can-i-run-this-with-podman-instead-of-docker)
- [How to change the Nextcloud apps that are installed on the first startup?](#how-to-change-the-nextcloud-apps-that-are-installed-on-the-first-startup)
- [How to add OS packages permanently to the Nextcloud container?](#how-to-add-os-packages-permanently-to-the-nextcloud-container)
- [How to add PHP extensions permanently to the Nextcloud container?](#how-to-add-php-extensions-permanently-to-the-nextcloud-container)
- [What about the pdlib PHP extension for the facerecognition app?](#what-about-the-pdlib-php-extension-for-the-facerecognition-app)
- [How to enable hardware acceleration for Nextcloud?](#how-to-enable-hardware-acceleration-for-nextcloud)
- [With open source drivers MESA for AMD, Intel and **new** drivers `Nouveau` for Nvidia](#with-open-source-drivers-mesa-for-amd-intel-and-new-drivers-nouveau-for-nvidia)
- [With proprietary drivers for Nvidia :warning: BETA](#with-proprietary-drivers-for-nvidia-warning-beta)
- [How to keep disabled apps?](#how-to-keep-disabled-apps)
- [Huge docker logs](#huge-docker-logs)
- [Access/Edit Nextcloud files/folders manually](#accessedit-nextcloud-filesfolders-manually)
- [How to store the files/installation on a separate drive?](#how-to-store-the-filesinstallation-on-a-separate-drive)
- [How to edit Nextclouds config.php file with a texteditor?](#how-to-edit-nextclouds-configphp-file-with-a-texteditor)
- [How to change default files by creating a custom skeleton directory?](#how-to-change-default-files-by-creating-a-custom-skeleton-directory)
- [How to adjust the version retention policy and trashbin retention policy?](#how-to-adjust-the-version-retention-policy-and-trashbin-retention-policy)
- [Fail2ban](#fail2ban)
- [LDAP](#ldap)
- [Netdata](#netdata)
- [USER_SQL](#user_sql)
- [phpMyAdmin, Adminer or pgAdmin](#phpmyadmin-adminer-or-pgadmin)
- [Mail server](#mail-server)
- [How to migrate from an already existing Nextcloud installation to Nextcloud AIO?](#how-to-migrate-from-an-already-existing-nextcloud-installation-to-nextcloud-aio)
- [Requirements for integrating new containers](#requirements-for-integrating-new-containers)
- [How to trust user-defined Certification Authorities (CA)?](#how-to-trust-user-defined-certification-authorities-ca)
- [How to disable Collabora's Seccomp feature?](#how-to-disable-collaboras-seccomp-feature)
- [How to adjust the Fulltextsearch Java options?](#how-to-adjust-the-fulltextsearch-java-options)
- [How to enable automatic updates without creating a backup beforehand?](#how-to-enable-automatic-updates-without-creating-a-backup-beforehand)
- [Securing the AIO interface from unauthorized ACME challenges](#securing-the-aio-interface-from-unauthorized-acme-challenges)
### Where can I find additional documentation?
Some of the documentation is available on [GitHub Discussions](https://github.com/nextcloud/all-in-one/discussions/categories/wiki).
### How does it work?
Nextcloud AIO is inspired by projects like Portainer that manage the docker daemon by talking to it through the docker socket directly. This concept allows a user to install only one container with a single command that does the heavy lifting of creating and managing all containers that are needed in order to provide a Nextcloud installation with most features included. It also makes updating a breeze and is not bound to the host system (and its slow updates) anymore as everything is in containers. Additionally, it is very easy to handle from a user perspective because a simple interface for managing your Nextcloud AIO installation is provided.
@@ -232,6 +329,7 @@ On older TrueNAS SCALE releases with Kubernetes environment, there are two ways
Another but untested way is to install Portainer on your TrueNAS SCALE from here https://truecharts.org/charts/stable/portainer/installation-notes and add the Helm-chart repository https://nextcloud.github.io/all-in-one/ into Portainer by following https://docs.portainer.io/user/kubernetes/helm. More docs on AIOs Helm Chart are available here: https://github.com/nextcloud/all-in-one/tree/main/nextcloud-aio-helm-chart#nextcloud-aio-helm-chart.
### Notes on Cloudflare (proxy/tunnel)
Since Cloudflare Proxy/Tunnel comes with a lot of limitations which are listed below, it is rather recommended to switch to [Tailscale](https://github.com/nextcloud/all-in-one/discussions/5439) if possible.
- Cloudflare Proxy and Cloudflare Tunnel both require Cloudflare to perform TLS termination on their side and thus decrypt all the traffic on their infrastructure. This is a privacy concern and you will need to look for other solutions if it's unacceptable for you.
- Using Cloudflare Tunnel might potentially slow down Nextcloud since local access via the configured domain is not possible because TLS termination is in that case offloaded to Cloudflare's infrastructure. There is no way to disable this behavior in Cloudflare Tunnel.
- It is known that the domain validation may not work correctly behind Cloudflare since Cloudflare might block the validation attempt. You can simply skip it in that case by following: https://github.com/nextcloud/all-in-one#how-to-skip-the-domain-validation
@@ -248,7 +346,7 @@ Another but untested way is to install Portainer on your TrueNAS SCALE from here
### How to run Nextcloud behind a Cloudflare Tunnel?
Although it does not seems like it is the case but from AIO perspective a Cloudflare Tunnel works like a reverse proxy. So please follow the [reverse proxy documentation](./reverse-proxy.md) where is documented how to make it run behind a Cloudflare Tunnel. However please see the [caveats](https://github.com/nextcloud/all-in-one#notes-on-cloudflare-proxytunnel) before proceeding.
### How to run Nextcloud inside a Tailscale network?
### How to run Nextcloud via Tailscale?
For a reverse proxy example guide for Tailscale, see this guide by @flll: https://github.com/nextcloud/all-in-one/discussions/5439
### Disrecommended VPS providers
@@ -273,22 +371,22 @@ You can install AIO in reverse proxy mode where is also documented how to get it
If you do not want to open Nextcloud to the public internet, you may have a look at the following documentation on how to set it up locally: [local-instance.md](./local-instance.md), but keep in mind you're still required to have https working properly.
### Can I use an ip-address for Nextcloud instead of a domain?
No and it will not be added. If you only want to run it locally, you may have a look at the following documentation: [local-instance.md](./local-instance.md) for configuration without a traditional domain. Or, [consider using NextcloudPi](nextcloudpi.com) for ip-address access locally (it bundles fewer features than AIO).
No and it will not be added. If you only want to run it locally, you may have a look at the following documentation: [local-instance.md](./local-instance.md). Recommended is to use [Tailscale](https://github.com/nextcloud/all-in-one/discussions/5439).
### Can I run AIO offline or in an airgapped system?
No. This is not possible and will not be added due to multiple reasons: update checks, app installs via app-store, downloading additional docker images on demand and more.
### Are self-signed certificates supported for Nextcloud?
No and they will not be. If you want to run it locally, without opening Nextcloud to the public internet, please have a look at the [local instance documentation](./local-instance.md).
No and they will not be. If you want to run it locally, without opening Nextcloud to the public internet, please have a look at the [local instance documentation](./local-instance.md). Recommended is to use [Tailscale](https://github.com/nextcloud/all-in-one/discussions/5439).
### Can I use AIO with multiple domains?
No and it will not be added. However you can use [this feature](https://github.com/nextcloud/all-in-one/blob/main/multiple-instances.md) in order to create multiple AIO instances, one for each domain.
### Are other ports than the default 443 for Nextcloud supported?
No and they will not be. Please use a dedicated domain for Nextcloud and set it up correctly by following the [reverse proxy documentation](./reverse-proxy.md). If port 443 and/or 80 is blocked for you, you may use the a Cloudflare Tunnel if you want to publish it online. You could also use the ACME DNS-challenge to get a valid certificate. However in all cases the Nextcloud interface will redirect you to port 443.
No and they will not be. If port 443 and/or 80 is blocked for you, you may use [Tailscale](https://github.com/nextcloud/all-in-one/discussions/5439) if you want to publish it online. If you already run a different service on port 443, please use a dedicated domain for Nextcloud and set it up correctly by following the [reverse proxy documentation](./reverse-proxy.md). However in all cases the Nextcloud interface will redirect you to port 443.
### Can I run Nextcloud in a subdirectory on my domain?
No and it will not be added. Please use a dedicated (sub-)domain for Nextcloud and set it up correctly by following the [reverse proxy documentation](./reverse-proxy.md).
No and it will not be added. Please use a dedicated (sub-)domain for Nextcloud and set it up correctly by following the [reverse proxy documentation](./reverse-proxy.md). Alternatively, you may use [Tailscale](https://github.com/nextcloud/all-in-one/discussions/5439) if you want to publish it online.
### How can I access Nextcloud locally?
Please note that local access is not possible if you are running AIO behind Cloudflare Tunnel since TLS proxying is in that case offloaded to Cloudflares infrastructure. You can fix this by setting up your own reverse proxy that handles TLS proxying locally and will make the steps below work.
@@ -429,7 +527,7 @@ Be aware that this solution does not back up files and folders that are mounted
---
#### What is getting backed up by AIO's backup solution?
Backed up will get all important data of your Nextcloud AIO instance like the database, your files and configuration files of the mastercontainer and else. Files and folders that are mounted into Nextcloud using the external storage app are not getting backed up. There is currently no way to exclude the data directory because it would require hacks like running files:scan and would make the backup solution much more unreliable (since the database and your files/folders need to stay in sync). If you still don't want your datadirectory to be backed up, see https://github.com/nextcloud/all-in-one#how-to-enable-automatic-updates-without-creating-a-backup-beforehand for options (there is a hint what needs to be backed up in which order).
Backed up will get all important data of your Nextcloud AIO instance required to restore the instance, like the database, your files and configuration files of the mastercontainer and else. Files and folders that are mounted into Nextcloud using the external storage app are not getting backed up. There is currently no way to exclude the data directory because it would require hacks like running files:scan and would make the backup solution much more unreliable (since the database and your files/folders need to stay in sync). If you still don't want your datadirectory to be backed up, see https://github.com/nextcloud/all-in-one#how-to-enable-automatic-updates-without-creating-a-backup-beforehand for options (there is a hint what needs to be backed up in which order).
#### How to adjust borgs retention policy?
The built-in borg-based backup solution has by default a retention policy of `--keep-within=7d --keep-weekly=4 --keep-monthly=6`. See https://borgbackup.readthedocs.io/en/stable/usage/prune.html for what these values mean. You can adjust the retention policy by providing `--env BORG_RETENTION_POLICY="--keep-within=7d --keep-weekly=4 --keep-monthly=6"` to the docker run command of the mastercontainer (but before the last line `nextcloud/all-in-one:latest`! If it was started already, you will need to stop the mastercontainer, remove it (no data will be lost) and recreate it using the docker run command that you initially used) and customize the value to your fitting. ⚠️ Please make sure that this value is valid, otherwise backup pruning will bug out!
@@ -493,6 +591,9 @@ In this example, it would mount `E:\your\backup\path` into the volume so for a d
#### Pro-tip: Backup archives access
You can open the BorgBackup archives on your host by following these steps:<br>
(instructions for Ubuntu Desktop)
Alternatively, there is now a community container that allows to access your backups in a web session: https://github.com/nextcloud/all-in-one/tree/main/community-containers/borgbackup-viewer.
```bash
# Install borgbackup on the host
sudo apt update && sudo apt install borgbackup
@@ -520,6 +621,9 @@ sudo umount /tmp/borg
#### Delete backup archives manually
You can delete BorgBackup archives on your host manually by following these steps:<br>
(instructions for Debian based OS' like Ubuntu)
Alternatively, there is now a community container that allows to access your backups in a web session: https://github.com/nextcloud/all-in-one/tree/main/community-containers/borgbackup-viewer.
```bash
# Install borgbackup on the host
sudo apt update && sudo apt install borgbackup
@@ -648,6 +752,19 @@ Afterwards apply the correct permissions with `sudo chown root:root /root/backup
1. Add the following new line to the crontab if not already present: `0 20 * * 7 /root/backup-script.sh` which will run the script at 20:00 on Sundays each week.
1. save and close the crontab (when using nano are the shortcuts for this `Ctrl + o` -> `Enter` and close the editor with `Ctrl + x`).
#### How to exclude Nextcloud's data directory or the preview folder from backup?
In order to speed up the backups and to keep the backup archives small, you might want to exclude Nextcloud's data directory or its preview folder from backup.
> [!WARNING]
> However please note that you will run into problems if the database and the data directory or preview folder get out of sync. **So please only read further, if you have an additional external backup of the data directory!** See [this guide](#how-to-enable-automatic-updates-without-creating-a-backup-beforehand) for example.
> [!TIP]
> A better option is to use the external storage app inside Nextcloud as the data connected via the external storage app is not backed up by AIO's backup solution. See [this documentation](https://docs.nextcloud.com/server/latest/admin_manual/configuration_files/external_storage_configuration_gui.html) on how to configure the app.
If you still want to proceed, you can exclude the data directory by simply creating a `.noaiobackup` file in the root directory of the specified `NEXTCLOUD_DATADIR` target. The same logic is implemented for the preview folder that is located inside the data directory, inside the `appdata_*/preview` folder. So simply create a `.noaiobackup` file in there if you want to exclude the preview folder.
After doing a restore via the AIO interface, you might run into problems due to the data directory and database being out of sync. You might be able to fix this by running `occ files:scan --all` and `occ maintenance:repair` and `occ files:scan-app-data`. See https://github.com/nextcloud/all-in-one#how-to-run-occ-commands. If only the preview folder is excluded, the command `occ files:scan-app-data preview` should be used.
### How to stop/start/update containers or trigger the daily backup from a script externally?
> [!WARNING]
> The below script will only work after the initial setup of AIO. So you will always need to first visit the AIO interface, type in your domain and start the containers the first time or restore an older AIO instance from its borg backup before you can use the script.
@@ -825,6 +942,9 @@ You can edit Nextclouds config.php file directly from the host with your favorit
### How to change default files by creating a custom skeleton directory?
All users see a set of [default files and folders](https://docs.nextcloud.com/server/latest/admin_manual/configuration_files/default_files_configuration.html) as dictated by Nextcloud's configuration. To change these default files and folders a custom skeleton directory must first be created; this can be accomplished by copying your skeleton files `sudo docker cp --follow-link /path/to/nextcloud/skeleton/ nextcloud-aio-nextcloud:/mnt/ncdata/skeleton/`, applying the correct permissions with `sudo docker exec nextcloud-aio-nextcloud chown -R 33:0 /mnt/ncdata/skeleton/` and `sudo docker exec nextcloud-aio-nextcloud chmod -R 750 /mnt/ncdata/skeleton/` and setting the skeleton directory option with `sudo docker exec --user www-data -it nextcloud-aio-nextcloud php occ config:system:set skeletondirectory --value="/mnt/ncdata/skeleton"`. Further information is available in the Nextcloud documentation on [configuration parameters for the skeleton directory](https://docs.nextcloud.com/server/stable/admin_manual/configuration_server/config_sample_php_parameters.html#skeletondirectory).
### How to adjust the version retention policy and trashbin retention policy?
By default, AIO sets the `versions_retention_obligation` and `versions_retention_obligation` both to `auto, 30` which means that versions and items in the trashbin get deleted after 30 days. If you want to change this, see https://docs.nextcloud.com/server/latest/admin_manual/configuration_files/file_versioning.html.
### Fail2ban
You can configure your server to block certain ip-addresses using fail2ban as bruteforce protection. Here is how to set it up: https://docs.nextcloud.com/server/stable/admin_manual/installation/harden_server.html#setup-fail2ban. The logpath of AIO is by default `/var/lib/docker/volumes/nextcloud_aio_nextcloud/_data/data/nextcloud.log`. Do not forget to add `chain=DOCKER-USER` to your nextcloud jail config (`nextcloud.local`) otherwise the nextcloud service running on docker will still be accessible even if the IP is banned. Also, you may change the blocked ports to cover all AIO ports: by default `80,443,8080,8443,3478` (see [this](https://github.com/nextcloud/all-in-one#explanation-of-used-ports)). Apart from that there is now a community container that can be added to the AIO stack: https://github.com/nextcloud/all-in-one/tree/main/community-containers/fail2ban
@@ -869,7 +989,10 @@ When using `docker run`, the environmental variable can be set with `--env NEXTC
In order for the value to be valid, the path should start with `/` and not end with `/` and point to an existing **directory**. Pointing the variable directly to a certificate **file** will not work and may also break things.
### How to disable Collabora's Seccomp feature?
The Collabora container enables Seccomp by default, which is a security feature of the Linux kernel. On systems without this kernel feature enabled, you need to provide `--env COLLABORA_SECCOMP_DISABLED=true` to the initial docker run command in order to make it work.
The Collabora container enables Seccomp by default, which is a security feature of the Linux kernel. On systems without this kernel feature enabled, you need to provide `--env COLLABORA_SECCOMP_DISABLED=true` to the initial docker run command in order to make it work. If it was started already, you will need to stop the mastercontainer, remove it (no data will be lost) and recreate it using the docker run command that you initially used.
### How to adjust the Fulltextsearch Java options?
The Fulltextsearch Java options are by default set to `-Xms512M -Xmx512M` which might not be enough on some systems. You can adjust this by adding e.g. `--env FULLTEXTSEARCH_JAVA_OPTIONS="-Xms1024M -Xmx1024M"` to the initial docker run command. If it was started already, you will need to stop the mastercontainer, remove it (no data will be lost) and recreate it using the docker run command that you initially used.
### How to enable automatic updates without creating a backup beforehand?
If you have an external backup solution, you might want to enable automatic updates without creating a backup first. However note that doing this is disrecommended since you will not be able to easily create and restore a backup from the AIO interface anymore and you need to make sure to shut down all the containers properly before creating the backup, e.g. by stopping them from the AIO interface first.

View File

@@ -3,6 +3,9 @@
> [!NOTE]
> Please note that AIO comes secured with TLS out-of-the-box. So you don't need to necessarily set up your own reverse proxy if you only want to run Nextcloud AIO which is much easier. See [the normal readme](https://github.com/nextcloud/all-in-one?tab=readme-ov-file#how-to-use-this) in that case. However if port 443 should already be used because you already run a web server or reverse proxy (like Apache, Nginx, Caddy, Cloudflare Tunnel and else), you need to follow this reverse proxy documentation to set up Nextcloud AIO.
> [!TIP]
> If you don't have a domain yet, [Tailscale is recommended](https://github.com/nextcloud/all-in-one/discussions/5439). If you don't have a reverse proxy yet, [Caddy is recommended](https://github.com/nextcloud/all-in-one/discussions/575).
## Introduction
In order to run Nextcloud behind a web server or reverse proxy (like Apache, Nginx, Caddy, Cloudflare Tunnel and else), you need to:
1. add a specific config to your web server or reverse proxy. [See the documentation below.](#1-configure-the-reverse-proxy)
@@ -920,5 +923,6 @@ If something does not work, follow the steps below:
1. If you use Cloudflare, you might need to skip the domain validation anyways since it is known that Cloudflare might block the validation attempts. In that case, see the last option below!
1. If your reverse proxy is configured to use the host network (as recommended in the above docs) or running on the host, make sure that you've configured your firewall to open port 443 (and 80)!
1. Check if you have a public IPv4- and public IPv6-address. If you only have a public IPv6-address (e.g. due to DS-Lite), make sure to enable IPv6 in Docker and your whole networking infrastructure (e.g. also by adding an AAAA DNS-entry to your domain)!
1. [Enable Hairpin NAT in your router](https://github.com/nextcloud/all-in-one/discussions/5849) or [set up a local DNS server and add a custom dns-record](https://github.com/nextcloud/all-in-one#how-can-i-access-nextcloud-locally) that allows the server to reach itself locally
1. Try to configure everything from scratch - if it still does not work by following https://github.com/nextcloud/all-in-one#how-to-properly-reset-the-instance.
1. As last resort, you may disable the domain validation by adding `--env SKIP_DOMAIN_VALIDATION=true` to the docker run command. But only use this if you are completely sure that you've correctly configured everything!

View File

@@ -12,6 +12,7 @@
- [ ] When starting the mastercontainer with `--env NEXTCLOUD_MEMORY_LIMIT=1024M` it should change Nextclouds PHP memory limit to 1024M. See https://github.com/nextcloud/all-in-one#how-to-adjust-the-php-memory-limit-for-nextcloud for allowed values.
- [ ] When starting the mastercontainer with `--env NEXTCLOUD_MAX_TIME=4000` it should change Nextclouds upload max time 4000s. See https://github.com/nextcloud/all-in-one#how-to-adjust-the-max-execution-time-for-nextcloud for allowed values.
- [ ] When starting the mastercontainer with `--env BORG_RETENTION_POLICY="--keep-within=1d --keep-weekly=1 --keep-monthly=1"` it should change borgs retention policy to the defined one. This can be checked when creating a backup and looking at the logs.
- [ ] When starting the mastercontainer with `--env FULLTEXTSEARCH_JAVA_OPTIONS="-Xms1024M -Xmx1024M"` it should change Elasticsearchs `ES_JAVA_OPTS` options to the defined one. This can be checked by checking the `ES_JAVA_OPTS` variable for the nextcloud-aio-fulltextsearch container.
- [ ] When starting the mastercontainer with `--env WATCHTOWER_DOCKER_SOCKET_PATH="$XDG_RUNTIME_DIR/docker.sock"` it should map `$XDG_RUNTIME_DIR/docker.sock` to `/var/run/docker.sock` inside the watchtower container which allow to update the mastercontainer on docker rootless.
- [ ] When starting the mastercontainer with `--env AIO_DISABLE_BACKUP_SECTION=true` it should hide the backup section that gets shown after AIO is set up (everything of [020-backup-and-restore](./020-backup-and-restore.md)) and simply show that the backup section is disabled.
- [ ] When starting the mastercontainer with `--env NEXTCLOUD_TRUSTED_CACERTS_DIR=/path/to/my/cacerts`, the resulting nextcloud container should trust all the Certification Authorities, whose certificates are included in the directory `/path/to/my/cacerts` on the host.