No introduction found. Create it?
Install with:
helm repo add nextcloud oci://ghcr.io/bjw-s-labs/charts/
helm install nextcloud nextcloud/nextcloud -f values.yamlSee examples from other people.
| Name | Repo | Stars | Version | Timestamp |
|---|---|---|---|---|
| nextcloud | haraldkoch/kochhaus-home | 166 | 8.9.1 | 2 days ago |
| nextcloud | drag0n141/home-ops | 52 | 8.9.1 | a month ago |
| nextcloud | budimanjojo/home-cluster | 243 | 8.7.0 | 3 months ago |
See the most popular values for this chart:
| Key | Types |
|---|---|
| boolean | |
| boolean | |
externalDatabase.existingSecret.passwordKey (16) INIT_POSTGRES_PASS | string |
externalDatabase.existingSecret.secretName (16) nextcloud-secret | string |
externalDatabase.existingSecret.usernameKey (16) INIT_POSTGRES_USER | string |
| string | |
externalDatabase.existingSecret.hostKey (2) POSTGRES_HOST | string |
externalDatabase.type (16) postgresql | string |
externalDatabase.database (14) nextcloud | string |
externalDatabase.host (14) postgres-nextcloud-rw.databases.svc.cluster.local. | string |
| boolean | |
| boolean | |
nextcloud.existingSecret.secretName (16) nextcloud-secret | string |
| string | |
nextcloud.existingSecret.smtpPasswordKey (10) smtp-password | string |
nextcloud.existingSecret.smtpUsernameKey (10) smtp-username | string |
nextcloud.existingSecret.passwordKey (8) NEXTCLOUD_PASSWORD | string |
nextcloud.existingSecret.usernameKey (8) NEXTCLOUD_USERNAME | string |
nextcloud.host (16) cloud.${SECRET_DOMAIN} | string |
nextcloud.extraEnv[].name (15) REDIS_HOST | string |
nextcloud.extraEnv[].value (14) dragonfly.databases.svc.cluster.local. | string |
nextcloud.extraEnv[].valueFrom.secretKeyRef.key (6) redis-password | string |
nextcloud.extraEnv[].valueFrom.secretKeyRef.name (6) nextcloud-secret | string |
nextcloud.mail.domain (14) ${SECRET_DOMAIN} | string |
| boolean | |
| string | |
| number, string | |
| string | |
| string | |
nextcloud.mail.smtp.host (8) smtp-relay.${SECRET_DOMAIN} | string |
| string | |
| string | |
nextcloud.extraInitContainers[].envFrom[].secretRef.name (13) nextcloud-secret | string |
nextcloud.extraInitContainers[].image (13) ghcr.io/home-operations/postgres-init:18 | string |
| string | |
nextcloud.extraInitContainers[].command[] (3) - sh | string |
nextcloud.extraInitContainers[].volumeMounts[].mountPath (3) /usr/local/etc/php/conf.d/ | string |
| string | |
nextcloud.configs."misc.config.php" (9) <?php
$CONFIG = array (
'default_phone_region' => 'PL',
'maintenance_window_start' => 2,
); ?> | string |
nextcloud.configs."proxy.config.php" (9) <?php
$CONFIG = array (
'trusted_proxies' => array(
0 => '127.0.0.1',
1 => '10.43.0.0/16',
1 => '10.0.0.0/16',
),
'forwarded_for_headers' => array('HTTP_X_FORWARDED_FOR'),
); ?> | string |
nextcloud.configs."local.config.php" (6) <?php
$CONFIG = array (
'trusted_proxies' =>
array (
0 => 'cloud.thesteamedcrab.com',
1 => '127.0.0.1',
2 => '192.168.1.0/24',
),
'overwriteprotocol' => 'https',
'allow_local_remote_servers' => true,
'forwarded_for_headers' =>
array (
0 => 'HTTP_X_FORWARDED_FOR',
),
'default_phone_region' => 'CL',
'trashbin_retention_obligation' => 'auto, 30',
'auth.bruteforce.protection.enabled' => true,
'check_data_directory_permissions' => false,
'overwrite.cli.url' => 'https://cloud.thesteamedcrab.com',
); | string |
nextcloud.configs."logging.config.php" (6) <?php
$CONFIG = array (
'log_type' => 'file',
'logfile' => 'nextcloud.log',
'loglevel' => 0,
'logdateformat' => 'F d, Y H:i:s'
); | string |
nextcloud.configs."ingress.config.php" (4) <?php
$CONFIG = array (
'overwrite.cli.url' => 'https://cloud.${SECRET_DOMAIN}',
'overwriteprotocol' => 'https',
); | string |
nextcloud.configs."oidc.config.php" (3) <?php
$CONFIG = array (
'allow_user_to_change_display_name' => false,
'lost_password_link' => 'disabled',
'oidc_login_provider_url' => 'https://auth.${SECRET_DOMAIN_0}',
'oidc_login_client_id' => 'nextcloud',
'oidc_login_client_secret' => getenv('OIDC_CLIENT_SECRET'),
'oidc_login_auto_redirect' => false,
'oidc_login_button_text' => 'Log in with Authelia',
'oidc_login_hide_password_form' => false,
'oidc_login_use_id_token' => false,
'oidc_login_attributes' => array(
'id' => 'preferred_username',
'name' => 'name',
'mail' => 'email',
'groups' => 'groups',
'is_admin' => 'is_nextcloud_admin',
),
'oidc_login_default_group' => 'oidc',
'oidc_login_use_external_storage' => false,
'oidc_login_scope' => 'openid profile email groups nextcloud_userinfo',
'oidc_login_proxy_ldap' => false,
'oidc_login_disable_registration' => true,
'oidc_login_redir_fallback' => false,
'oidc_login_tls_verify' => true,
'oidc_create_groups' => false,
'oidc_login_webdav_enabled' => false,
'oidc_login_password_authentication' => false,
'oidc_login_public_key_caching_time' => 86400,
'oidc_login_min_time_between_jwks_requests' => 10,
'oidc_login_well_known_caching_time' => 86400,
'oidc_login_update_avatar' => false,
'oidc_login_code_challenge_method' => 'S256',
); | string |
nextcloud.configs."sso.config.php" (3) <?php
$CONFIG = array (
'allow_user_to_change_display_name' => false,
'lost_password_link' => 'disabled',
'oidc_login_client_id' => getenv('OIDC_CLIENT_ID'),
'oidc_login_client_secret' => getenv('OIDC_CLIENT_SECRET'),
'oidc_login_provider_url' => 'https://id.${SECRET_DOMAIN}',
'oidc_login_auto_redirect' => true, //login?noredir=1
'oidc_login_end_session_redirect' => true,
'oidc_login_button_text' => 'Log in with Pocket ID',
'oidc_login_hide_password_form' => true,
'oidc_login_use_id_token' => false,
'oidc_login_attributes' => array (
'id' => 'preferred_username',
'name' => 'name',
'mail' => 'email',
'groups' => 'groups',
'login_filter' => 'groups',
'photoURL' => 'picture',
'is_admin' => 'groups_ID-Admin',
),
'oidc_login_filter_allowed_values' => array('ID-Nextcloud'),
'oidc_login_use_external_storage' => false,
'oidc_login_scope' => 'openid profile email groups',
'oidc_login_proxy_ldap' => false,
'oidc_login_disable_registration' => false,
'oidc_login_redir_fallback' => false,
'oidc_login_tls_verify' => true,
'oidc_create_groups' => false,
'oidc_login_webdav_enabled' => false,
'oidc_login_password_authentication' => false,
'oidc_login_public_key_caching_time' => 86400,
'oidc_login_min_time_between_jwks_requests' => 10,
'oidc_login_well_known_caching_time' => 86400,
'oidc_login_update_avatar' => false,
); | string |
nextcloud.configs."caching.config.php" (2) <?php
$CONFIG = array (
'memcache.local' => '\\OC\\Memcache\\APCu',
'memcache.distributed' => '\\OC\\Memcache\\Redis',
'memcache.locking' => '\\OC\\Memcache\\Redis',
'filelocking.enabled' => true,
'redis' => array(
'host' => 'dragonfly.database.svc.cluster.local',
'port' => 6379,
'timeout' => 0.0,
'password' => '',
),
); | string |
nextcloud.configs."redis.config.php" (2) <?php
$CONFIG = array (
'memcache.distributed' => '\OC\Memcache\Redis',
'memcache.locking' => '\OC\Memcache\Redis',
'redis' => array (
'host' => getenv('REDIS_HOST'),
'port' => 6379,
'dbindex' => 4,
'password' => '',
),
); | string |
nextcloud.configs."timezone.config.php" (2) <?php
$CONFIG = array (
'default_timezone' => 'America/Los_Angeles',
); | string |
nextcloud.configs."bulkupload.config.php" (1) <?php
$CONFIG = array (
'bulkupload.enabled' => false,
); | string |
nextcloud.configs."collabora.config.php" (1) <?php
$CONFIG = array (
'richdocuments' => array(
'wopi_url' => 'https://collabora.vzkn.eu',
),
); | string |
nextcloud.configs."custom.config.php" (1) <?php
$CONFIG = array (
'overwriteprotocol' => 'https',
'overwrite.cli.url' => 'https://cloud.${SECRET_DOMAIN}',
'overewritehost' => 'cloud.${SECRET_DOMAIN}',
'filelocking.enabled' => 'true',
'default_phone_region' => 'DE',
'loglevel' => '2',
'enable_previews' => true,
'log_type' => 'syslog',
'maintenance_window_start' => 1,
'trusted_proxies' =>
array (
0 => '127.0.0.1',
1 => '10.42.0.0/16',
2 => '10.43.0.0/16',
),
); | string |
nextcloud.configs."gitops.config.php" (1) <?php
$CONFIG = array (
'appstoreenabled' => true,
'mail_domain' => '${SECRET_DOMAIN}',
); | string |
nextcloud.configs."minio.config.php" (1) <?php
$CONFIG = array (
'objectstore' => array(
'class' => '\\OC\\Files\\ObjectStore\\S3',
'arguments' => array(
'hostname' => 's3.hoohoot.org',
'port' => 443,
'use_path_style' => true,
'bucket' => 'nextcloud-data',
'autocreate' => false,
'key' => getenv('S3_ACCESS_KEY'),
'secret' => getenv('S3_SECRET_KEY'),
'use_ssl' => true,
),
),
); | string |
nextcloud.configs."notify_push.config.php" (1) <?php
$CONFIG = array (
'notify_push' => array(
'base_endpoint' => 'https://cloud.vzkn.eu/push',
),
); | string |
nextcloud.configs."performance.config.php" (1) <?php
$CONFIG = array (
'enable_previews' => true,
'enabledPreviewProviders' => array(
'OC\Preview\PNG',
'OC\Preview\JPEG',
'OC\Preview\GIF',
'OC\Preview\BMP',
'OC\Preview\XBitmap',
'OC\Preview\MP3',
'OC\Preview\TXT',
'OC\Preview\MarkDown',
'OC\Preview\OpenDocument',
'OC\Preview\Krita',
'OC\Preview\HEIC',
'OC\Preview\PDF',
'OC\Preview\TIFF',
'OC\Preview\SVG',
'OC\Preview\MP4',
'OC\Preview\Movie',
),
'preview_max_x' => 2048,
'preview_max_y' => 2048,
'preview_max_scale_factor' => 1,
'preview_concurrency_new' => 4,
'preview_concurrency_all' => 4,
'jpeg_quality' => 60,
); | string |
nextcloud.configs."preview.config.php" (1) <?php
$CONFIG = array (
'enabledPreviewProviders' => array(
'OC\Preview\PNG',
'OC\Preview\JPEG',
'OC\Preview\GIF',
'OC\Preview\BMP',
'OC\Preview\XBitmap',
'OC\Preview\MP3',
'OC\Preview\TXT',
'OC\Preview\MarkDown',
'OC\Preview\OpenDocument',
'OC\Preview\Krita',
'OC\Preview\HEIC',
),
); | string |
nextcloud.configs."talk.config.php" (1) <?php
$CONFIG = array (
'spreed' => array(
'external_signaling' => array(
'signaling_servers' => array(
array(
'url' => 'https://talk.vzkn.eu/',
'verify' => true,
),
),
),
'stun_servers' => array(
'turn.vzkn.eu:3478',
'turn.vzkn.eu:5349',
),
'turn_servers' => array(
array(
'server' => 'turn.vzkn.eu',
'secret' => '', # Managed by signaling server
'protocols' => 'udp,tcp',
),
),
),
); | string |
nextcloud.datadir (9) /var/www/data | string |
nextcloud.extraVolumeMounts[].mountPath (9) /usr/local/etc/php/conf.d/redis-session.ini | string |
nextcloud.extraVolumeMounts[].name (9) php-confd | string |
nextcloud.extraVolumeMounts[].subPath (4) redis-session.ini | string |
| boolean | |
nextcloud.extraVolumes[].name (9) php-confd | string |
| number | |
nextcloud.extraVolumes[].configMap.name (2) nextcloud-scripts | string |
nextcloud.extraVolumes[].nfs.path (2) /mnt/data/home | string |
nextcloud.extraVolumes[].nfs.server (2) nas01.${SECRET_DOMAIN_INT} | string |
nextcloud.extraVolumes[].persistentVolumeClaim.claimName (2) nextcloud-media-nfs | string |
nextcloud.extraVolumes[].secret.items[].key (1) replica.config.php | string |
nextcloud.extraVolumes[].secret.items[].path (1) replica.config.php | string |
nextcloud.extraVolumes[].secret.secretName (1) nextcloud-secret | string |
| number | |
| number | |
| boolean | |
| number | |
nextcloud.securityContext.fsGroupChangePolicy (2) OnRootMismatch | string |
| boolean | |
nextcloud.phpConfigs."uploadLimit.ini" (6) upload_max_filesize = 16G
post_max_size = 16G
max_input_time = 3600
max_execution_time = 3600
| string |
nextcloud.phpConfigs."www.conf" (6) [www]
user = www-data
group = www-data
listen = 127.0.0.1:9000
pm = dynamic
pm.max_children = 57
pm.start_servers = 14
pm.min_spare_servers = 14
pm.max_spare_servers = 42
pm.max_requests = 500
pm.process_idle_timeout = 10s
| string |
nextcloud.phpConfigs."php.ini" (1) max_execution_time = 600
default_socket_timeout = 300
curl.cainfo = /etc/ssl/certs/ca-certificates.crt
extension=imagick
extension=exif
extension=intl
extension=gd
memory_limit = 8G
opcache.memory_consumption = 512
opcache.max_accelerated_files = 20000
opcache.revalidate_freq = 60
| string |
nextcloud.lifecycle.postStartCommand[] (4) - /bin/sh | string |
| number | |
| boolean | |
| boolean | |
| boolean | |
nextcloud.extraSidecarContainers[].args[] (1) - --port | string |
nextcloud.extraSidecarContainers[].command[] (1) - /var/www/html/custom_apps/notify_push/bin/x86_64/notify_push | string |
nextcloud.extraSidecarContainers[].env[].name (1) NEXTCLOUD_URL | string |
nextcloud.extraSidecarContainers[].env[].value (1) http://localhost:8080 | string |
nextcloud.extraSidecarContainers[].image (1) nextcloud:33.0.0-fpm-alpine | string |
nextcloud.extraSidecarContainers[].name (1) notify-push | string |
| number | |
| string | |
| string | |
| string | |
| string | |
| string | |
nextcloud.extraSidecarContainers[].volumeMounts[].mountPath (1) /var/www/html | string |
nextcloud.extraSidecarContainers[].volumeMounts[].name (1) nextcloud-main | string |
| boolean | |
nextcloud.hooks.before-starting (1) # disable unneceserry apps
for appname in activity circles systemtags federation privacy \
nextcloud_announcements announcementcenter support survey_client \
user_status weather_status dashboard
do
php occ app:disable "$appname"
done | string |
nextcloud.hooks.post-installation (1) printf "Add missing DB indices\n"
php occ db:add-missing-indices | string |
nextcloud.hooks.post-upgrade (1) # based on https://github.com/nextcloud/all-in-one/blob/25c580bca370eaead5f1fad9d3842a9c49562dff/Containers/nextcloud/entrypoint.sh#L451-L457
php occ maintenance:repair --include-expensive
php occ db:add-missing-indices
php occ db:add-missing-columns
php occ db:add-missing-primary-keys | string |
| boolean | |
| string | |
| boolean | |
nextcloud.objectStorage.s3.existingSecret (1) nextcloud-secrets | string |
nextcloud.objectStorage.s3.host (1) minio.storage.svc.cluster.local | string |
| number | |
nextcloud.objectStorage.s3.secretKeys.accessKey (1) MINIO_ACCESS_KEY | string |
nextcloud.objectStorage.s3.secretKeys.secretKey (1) MINIO_SECRET_KEY | string |
| boolean | |
| boolean | |
nextcloud.objectstore.s3.bucket (1) nextcloud-data | string |
| boolean | |
nextcloud.objectstore.s3.existingSecret (1) nextcloud-secret | string |
nextcloud.objectstore.s3.host (1) 192.168.20.5:3900 | string |
nextcloud.objectstore.s3.region (1) us-east-1 | string |
nextcloud.objectstore.s3.secretKeys.accessKey (1) S3_ACCESS_KEY | string |
nextcloud.objectstore.s3.secretKeys.secretKey (1) S3_SECRET_KEY | string |
| boolean | |
| boolean | |
nextcloud.podSecurityContext.capabilities.add[] (1) - NET_BIND_SERVICE | string |
| string | |
| string | |
| boolean | |
| string | |
| boolean | |
| string | |
nextcloud.strategy.type (1) Recreate | string |
| boolean | |
persistence.existingClaim (16) nextcloud | string |
| boolean | |
persistence.nextcloudData.existingClaim (7) nextcloud-nfs | string |
persistence.nextcloudData.accessMode (6) ReadWriteMany | string |
persistence.data.globalMounts[].path (2) /var/www/html/data | string |
| boolean | |
persistence.data.existingClaim (1) {{ .Release.Name }} | string |
persistence.data.path (1) /mnt/apps/kubernetes/nextcloud | string |
persistence.data.server (1) ${SECRET_NFS_SERVER:=temp} | string |
| string | |
persistence.alex-nfs.globalMounts[].path (1) /var/www/html/data/alex/files | string |
persistence.alex-nfs.path (1) /mnt/Fast/Alex | string |
persistence.alex-nfs.server (1) 192.168.42.20 | string |
| string | |
persistence.config-file.globalMounts[].path (1) /var/www/html/config/custom.config.php | string |
persistence.config-file.globalMounts[].subPath (1) custom.config.php | string |
| string | |
persistence.config-file.type (1) configMap | string |
persistence.config.existingClaim (1) nextcloud | string |
persistence.config.globalMounts[].path (1) /var/www/html | string |
persistence.tmpfs.globalMounts[].path (1) /tmp | string |
persistence.tmpfs.globalMounts[].subPath (1) tmp | string |
persistence.tmpfs.type (1) emptyDir | string |
| boolean | |
| number | |
| number | |
| number | |
| number | |
| number | |
| boolean | |
| string | |
| string | |
| string | |
| string | |
nginx.config.headers.Strict-Transport-Security (2) max-age=15552000; includeSubDomains | string |
| boolean | |
nginx.config.serverBlockCustom (1) client_max_body_size 10G;
client_body_timeout 300s;
fastcgi_buffers 64 4K;
fastcgi_read_timeout 3600s;
# Handle forwarded headers for proper protocol detection
real_ip_header X-Forwarded-For;
set_real_ip_from 10.0.0.0/8;
set_real_ip_from 172.16.0.0/12;
set_real_ip_from 192.168.0.0/16;
| string |
| string | |
nginx.image.tag (1) 1.29.5 | string |
ingress.enabled (13) false | boolean |
| string | |
ingress.annotations."nginx.ingress.kubernetes.io/server-snippet" (3) server_tokens off;
proxy_hide_header X-Powered-By;
more_set_headers "Strict-Transport-Security: max-age=31536000; includeSubDomains; preload";
rewrite ^/.well-known/webfinger /public.php?service=webfinger last;
rewrite ^/.well-known/host-meta /public.php?service=host-meta last;
rewrite ^/.well-known/host-meta.json /public.php?service=host-meta-json;
location = /.well-known/carddav {
return 301 $scheme://$host/remote.php/dav;
}
location = /.well-known/caldav {
return 301 $scheme://$host/remote.php/dav;
}
location = /robots.txt {
allow all;
log_not_found off;
access_log off;
}
location ~ ^/(?:build|tests|config|lib|3rdparty|templates|data)/ {
deny all;
}
location ~ ^/(?:autotest|occ|issue|indie|db_|console) {
deny all;
} | string |
| string | |
| string | |
ingress.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
| string | |
| string | |
| string | |
| string | |
ingress.annotations."hajimari.io/icon" (1) simple-icons:nextcloud | string |
ingress.annotations."hajimari.io/info" (1) File and Calendar server | string |
| string | |
ingress.annotations."nginx.ingress.kubernetes.io/cors-allow-headers" (1) X-Forwarded-For, X-Real-IP, X-Frame-Options, X-Content-Type-Options, X-Forwarded-Proto | string |
| string | |
ingress.annotations."nginx.org/rewrites" (1) /.well-known/webfinger /index.php/.well-known/webfinger;
/.well-known/nodeinfo /index.php/.well-known/nodeinfo;
/.well-known/host-meta /public.php?service=host-meta;
/.well-known/host-meta.json /public.php?service=host-meta-json;
/.well-known/carddav $scheme://$host/remote.php/dav redirect=301;
/.well-known/caldav $scheme://$host/remote.php/dav redirect=301;
| string |
| string | |
ingress.className (3) external | string |
| string | |
ingress.pathType (2) Prefix | string |
ingress.tls[].hosts[] (1) - nc.${SECRET_DOMAIN} | string |
ingress.tls[].secretName (1) tls.nextcloud | string |
| boolean | |
| boolean | |
| number | |
| number | |
| string | |
| string | |
| string | |
| string | |
cronjob.cronjob.command[] (1) - /bin/sh | string |
cronjob.cronjob.env[].name (1) MAIL_FROM_ADDRESS | string |
cronjob.cronjob.env[].value (1) ${FROM_ADDRESS} | string |
| string | |
| string | |
| boolean | |
| number | |
cronjob.cronjob.extraVolumes[].configMap.name (1) nextcloud-scripts | string |
| string | |
| number | |
cronjob.cronjob.schedule (1) */5 * * * * | string |
| number | |
| boolean | |
| number | |
| number | |
| number | |
| string | |
| string | |
| string | |
| string | |
| boolean | |
| string | |
| boolean | |
| string | |
cronjob.type (1) cronjob | string |
image.flavor (12) fpm-alpine | string |
image.tag (5) 33.0.0-fpm-alpine | string |
image.repository (2) nextcloud | string |
image.pullPolicy (1) IfNotPresent | string |
| string | |
| string | |
| string | |
| number | |
| string | |
deploymentAnnotations."secret.reloader.stakater.com/reload" (2) nextcloud-secret | string |
| boolean | |
| number | |
| number | |
| number | |
| number | |
| number | |
| boolean | |
| number | |
| number | |
| number | |
| number | |
| number | |
| boolean | |
| string | |
redis.enabled (3) false | boolean |
| boolean | |
redis.auth.existingSecret (1) nextcloud-secret | string |
redis.auth.existingSecretPasswordKey (1) REDIS_PASSWORD | string |
redis.host (1) nextcloud-valkey.selfhosted.svc.cluster.local | string |
redis.port (1) 6379 | number |
| string | |
controllers.nextcloud.containers.app.env.NEXTCLOUD_TRUSTED_DOMAINS (2) nextcloud.${SECRET_DOMAIN} | string |
controllers.nextcloud.containers.app.env.NEXTCLOUD_ADMIN_PASSWORD.valueFrom.secretKeyRef.key (1) NEXTCLOUD_ADMIN_PASSWORD | string |
| string | |
| string | |
| string | |
controllers.nextcloud.containers.app.env.NEXTCLOUD_DATA_DIR (1) /var/www/html/data | string |
controllers.nextcloud.containers.app.env.OVERWRITECLIURL (1) https://nextcloud.${SECRET_DOMAIN} | string |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
| string | |
controllers.nextcloud.containers.app.env.REDIS_HOST (1) dragonfly.database.svc.cluster.local | string |
| string | |
| string | |
controllers.nextcloud.containers.app.image.tag (2) 32.0.6-apache | string |
| boolean | |
| boolean | |
| number | |
| string | |
| number | |
| string | |
| string | |
| number | |
| number | |
| number | |
| boolean | |
| boolean | |
| number | |
| string | |
| number | |
| string | |
| string | |
| number | |
| number | |
| number | |
| boolean | |
| number | |
| number | |
| string | |
| number | |
| number | |
| number | |
| boolean | |
| string | |
| string | |
| string | |
| boolean | |
| string | |
| boolean | |
controllers.nextcloud.containers.app.envFrom[].secretRef.name (1) {{ .Release.Name }}-secret | string |
controllers.nextcloud.initContainers.copy-config.command[] (1) - sh | string |
controllers.nextcloud.initContainers.copy-config.image.repository (1) docker.io/library/nextcloud | string |
controllers.nextcloud.initContainers.copy-config.image.tag (1) 33.0.0@sha256:ff2cbaab14c85e587b5541e3aff4216a8a484e06424ebae661581937c0c8da0c | string |
| boolean | |
| string | |
| boolean | |
| string | |
controllers.nextcloud.initContainers.init-db.image.repository (1) ghcr.io/home-operations/postgres-init | string |
| string | |
controllers.nextcloud.type (1) deployment | string |
| number | |
| string | |
| number | |
| boolean | |
| number | |
| boolean | |
| boolean | |
route.app.annotations."gatus.home-operations.com/endpoint" (2) group: productivity
| string |
| string | |
route.app.annotations."gethomepage.dev/description" (1) File Sync & Collaboration | string |
| string | |
| string | |
route.app.annotations."gethomepage.dev/icon" (1) nextcloud.png | string |
| string | |
route.app.annotations."gethomepage.dev/widget.password" (1) {{`{{HOMEPAGE_VAR_NEXTCLOUD_PASSWORD}}`}} | string |
| string | |
route.app.annotations."gethomepage.dev/widget.url" (1) http://nextcloud.productivity.svc.cluster.local:80 | string |
route.app.annotations."gethomepage.dev/widget.username" (1) {{`{{HOMEPAGE_VAR_NEXTCLOUD_USERNAME}}`}} | string |
route.app.hostnames[] (2) - nextcloud.${SECRET_DOMAIN} | string |
route.app.parentRefs[].name (2) internal | string |
| string | |
| string | |
| string | |
| number | |
route.app.rules[].filters[].responseHeaderModifier.add[].name (1) Strict-Transport-Security | string |
route.app.rules[].filters[].responseHeaderModifier.add[].value (1) max-age=31536000; includeSubDomains; preload | string |
route.app.rules[].filters[].type (1) ResponseHeaderModifier | string |
securityContext.fsGroupChangePolicy (2) OnRootMismatch | string |
| number | |
service.app.controller (1) nextcloud | string |
| string | |
| string | |
| string | |
| number | |
configMaps.config.data."custom.config.php" (1) <?php
$CONFIG = array(
'overwriteprotocol' => 'https',
'overwrite.cli.url' => 'https://storage.hyde.services',
'overwritehost' => 'storage.hyde.services',
'check_data_directory_permissions' => false,
'default_phone_region' => 'AU',
'trusted_proxies' => array(
0 => '127.0.0.1',
1 => '10.42.0.0/16',
),
'trusted_domains' => array(
0 => '127.0.0.1',
1 => 'storage.hyde.services',
),
'simpleSignUpLink.shown' => false,
'cache_path' => '/cache',
'forwarded_for_headers' => array('X-Forwarded-For'),
'maintenance_window_start' => 100,
'memcache.distributed' => '\OC\Memcache\Redis',
'memcache.locking' => '\OC\Memcache\Redis',
'redis' => array(
'host' => 'dragonfly.databases.svc.cluster.local',
'port' => 6379,
'dbindex' => 1,
),
); | string |
configMaps.config.data."php.ini" (1) session.save_handler = redis
session.save_path = "tcp://dragonfly.databases.svc.cluster.local:6379/1"
redis.session.locking_enabled = 1
redis.session.lock_retries = -1
redis.session.lock_wait_time = 10000
upload_max_filesize = 16G
post_max_size = 16G
memory_limit = 512M
max_execution_time = 3600 | string |
configMaps.config.data."remoteip.conf" (1) RemoteIPHeader X-Forwarded-For
RemoteIPInternalProxy 10.42.0.0/16 | string |
configMaps.config.data."www.conf" (1) [www]
listen = 127.0.0.1:9000
pm = dynamic
pm.max_children = 50
pm.start_servers = 12
pm.min_spare_servers = 6
pm.max_spare_servers = 18 | string |
| string | |
| string | |
extraManifests[] (1) - apiVersion: v1
kind: Service
metadata:
name: nextcloud-push
labels:
app.kubernetes.io/name: {{ include "nextcloud.name" . }}
app.kubernetes.io/instance: {{ .Release.Name }}
spec:
type: ClusterIP
ports:
- name: push
port: 7867
targetPort: 7867
protocol: TCP
selector:
app.kubernetes.io/name: {{ include "nextcloud.name" . }}
app.kubernetes.io/instance: {{ .Release.Name }}
| string |
fullnameOverride (1) nextcloud | string |
hpa.enabled (1) false | boolean |
| string | |
httpRoute.apiVersion (1) gateway.networking.k8s.io/v1 | string |
| boolean | |
httpRoute.hostnames[] (1) - nextcloud.${SECRET_DOMAIN} | string |
httpRoute.kind (1) HTTPRoute | string |
httpRoute.parentRefs[].name (1) envoy-external | string |
| string | |
httpRoute.rules[].backendRefs[].name (1) notify-push | string |
httpRoute.rules[].backendRefs[].port (1) 7867 | number |
httpRoute.rules[].filters[].type (1) URLRewrite | string |
httpRoute.rules[].filters[].urlRewrite.path.replaceFullPath (1) /public.php?service=host-meta | string |
httpRoute.rules[].filters[].urlRewrite.path.replacePrefixMatch (1) /index.php/.well-known/webfinger | string |
httpRoute.rules[].filters[].urlRewrite.path.type (1) ReplacePrefixMatch | string |
httpRoute.rules[].matches[].path.type (1) PathPrefix | string |
httpRoute.rules[].matches[].path.value (1) /push/ | string |
lifecycle.postStartCommand[] (1) - /bin/bash | string |
| string |