Nextcloud
Access through untrusted domain
Please contact your administrator. If you are an administrator, edit the "trusted_domains" setting in config/config.php like the example in config.sample.php.
Further information how to configure this can be found in the documentation.
Description of the change
nextcloud/docker
config files:charts/nextcloud/files/defaultConfigs/autoconfig.php.tpl
charts/nextcloud/files/defaultConfigs/redis.config.php.tpl
charts/nextcloud/files/defaultConfigs/reverse-proxy.config.php.tpl
🆕charts/nextcloud/files/defaultConfigs/s3.config.php.tpl
🆕charts/nextcloud/files/defaultConfigs/smtp.config.php.tpl
charts/nextcloud/files/defaultConfigs/swift.config.php.tpl
🆕charts/nextcloud/files/defaultConfigs/upgrade-disable-web.config.php.tpl
🆕Adds
nextcloud.objectStore.s3
to use S3 for primary storage:click me for new
```yaml nextcloud: objectStore: s3: enabled: false # ignored if nextcloud.objectstore.s3.existingSecret is not empty string accessKey: "" # ignored if nextcloud.objectstore.s3.existingSecret is not empty string secretKey: "" # use legacy auth method legacyAuth: false # s3 endpoint to use; only required if you're not using AWS host: "" # use TLS/SSL for S3 connections ssl: true # default port that can be changed based on your object store, e.g. for minio, you can use 9000 port: "443" # this is the default in the nextcloud docs region: "eu-west-1" provokateurin marked this conversation as resolved. # required if using s3, the name of the bucket you'd like to use bucket: "" # object prefix in bucket prefix: "" # set to true if you are not using DNS for your buckets. usePathStyle: false # autocreate the bucket autoCreate: false # optonal parameter: you probably want to keep this as default storageClass: "STANDARD" # server side encryption key. learn more: https://docs.nextcloud.com/server/latest/admin_manual/configuration_files/primary_storage.html#s3-sse-c-encryption-support sse_c_key: "" # use an existingSecret for S3 credentials. If set, we ignore the following under nextcloud.objectStore.s3 # endpoint, accessKey, secretKey existingSecret: "" secretKeys: # key in nextcloud.objectStore.s3.existingSecret to use for s3 endpoint host: "" # key in nextcloud.objectStore.s3.existingSecret to use for s3 accessKeyID accessKey: "" # key in nextcloud.objectStore.s3.existingSecret to use for s3 secretAccessKey secretKey: "" # key in nextcloud.objectStore.s3.existingSecret to use for the s3 bucket bucket: "" # key in nextcloud.objectStore.s3.existingSecret to use for the s3 sse_c_key sse_c_key: "" ```nextcloud.objectStore.s3
valuesAdds
nextcloud.objectStore.swift
to use OpenStack Swift for primary storage:click me for new
```yaml nextcloud: objectStore: ## options related to using Swift as a primary object storage swift: enabled: false # swift user info user: domain: "Default" name: "" password: "" # swift project info project: name: "" domain: "Default" # The Identity / Keystone endpoint url: "" region: "" # optional on some swift implementations service: "swift" # the container to store the data in container: "" # autocreate container autoCreate: false ```nextcloud.objectStore.swift
valuesadds a new ci
test_case
for enabling S3 as a primary object storeadds
nextcloud.trustedDomains
as a helm parameter. Takes a list that, if set, we then template out to a space separated list. Otherwise, we still use our default templating for that parameter (which usesnextcloud.host
)rename
run-tests
job totest
since the job before it is just calledlint
and it keeps the check names from truncating as much in the following view (can't be longer than 30 characters):Benefits
This lets users use both
nextcloud.configs
and still use the nextcloud/docker auto configuration via environment variables. Prior to this change, you had to use one or the other when it came to s3 as primary object storage.Possible drawbacks
not sure 🤷 but always open to feedback :)
Applicable issues
Checklist
Chart.yaml
according to semver.