aboutsummaryrefslogtreecommitdiffstats
path: root/config/config.sample.php
diff options
context:
space:
mode:
Diffstat (limited to 'config/config.sample.php')
-rw-r--r--config/config.sample.php1609
1 files changed, 1103 insertions, 506 deletions
diff --git a/config/config.sample.php b/config/config.sample.php
index 54d3d46070a..d8780324cb0 100644
--- a/config/config.sample.php
+++ b/config/config.sample.php
@@ -1,6 +1,12 @@
<?php
/**
+ * SPDX-FileCopyrightText: 2016-2024 Nextcloud GmbH and Nextcloud contributors
+ * SPDX-FileCopyrightText: 2016 ownCloud, Inc.
+ * SPDX-License-Identifier: AGPL-3.0-only
+ */
+
+/**
* This configuration file is only provided to document the different
* configuration options and their usage.
*
@@ -11,13 +17,13 @@
*
* This file is used to generate the configuration documentation.
* Please consider following requirements of the current parser:
- * * all comments need to start with `/**` and end with ` *\/` - each on their
+ * * All comments need to start with `/**` and end with ` *\/` - each on their
* own line
- * * add a `@see CONFIG_INDEX` to copy a previously described config option
+ * * Add a `@see CONFIG_INDEX` to copy a previously described config option
* also to this line
- * * everything between the ` *\/` and the next `/**` will be treated as the
+ * * Everything between the ` *\/` and the next `/**` will be treated as the
* config option
- * * use RST syntax
+ * * Use RST syntax
*/
$CONFIG = [
@@ -41,41 +47,54 @@ $CONFIG = [
*/
'instanceid' => '',
- /**
- * The salt used to hash all passwords, auto-generated by the Nextcloud
- * installer. (There are also per-user salts.) If you lose this salt you lose
- * all your passwords. This example is for documentation only, and you should
- * never use it.
- *
- * @deprecated This salt is deprecated and only used for legacy-compatibility,
- * developers should *NOT* use this value for anything nowadays.
- *
- * 'passwordsalt' => 'd3c944a9af095aa08f',
+/**
+ * The salt used to hash all passwords, auto-generated by the Nextcloud
+ * installer. (There are also per-user salts.) If you lose this salt, you lose
+ * all your passwords. This example is for documentation only, and you should
+ * never use it.
+ *
+ * @deprecated This salt is deprecated and only used for legacy-compatibility,
+ * developers should *NOT* use this value for anything nowadays.
+ *
+ * 'passwordsalt' => 'd3c944a9af095aa08f',
*/
'passwordsalt' => '',
/**
+ * Secret used by Nextcloud for various purposes, e.g., to encrypt data. If you
+ * lose this string, there will be data corruption.
+ */
+'secret' => '',
+
+/**
* Your list of trusted domains that users can log into. Specifying trusted
* domains prevents host header poisoning. Do not remove this, as it performs
* necessary security checks.
* You can specify:
*
- * - the exact hostname of your host or virtual host, e.g. demo.example.org.
- * - the exact hostname with permitted port, e.g. demo.example.org:443.
+ * - The exact hostname of your host or virtual host, e.g., demo.example.org.
+ * - The exact hostname with permitted port, e.g., demo.example.org:443.
* This disallows all other ports on this host
- * - use * as a wildcard, e.g. ubos-raspberry-pi*.local will allow
+ * - Use * as a wildcard, e.g., ubos-raspberry-pi*.local will allow
* ubos-raspberry-pi.local and ubos-raspberry-pi-2.local
- * - the IP address with or without permitted port, e.g. [2001:db8::1]:8080
+ * - The IP address with or without permitted port, e.g., [2001:db8::1]:8080
* Using TLS certificates where commonName=<IP address> is deprecated
*/
-'trusted_domains' =>
- [
- 'demo.example.org',
- 'otherdomain.example.org',
- '10.111.112.113',
- '[2001:db8::1]'
- ],
+'trusted_domains' => [
+ 'demo.example.org',
+ 'otherdomain.example.org',
+ '10.111.112.113',
+ '[2001:db8::1]'
+],
+/**
+ * The validity domain for cookies, for example '' (cookies will be sent only
+ * the domain that defined it, e.g. 'demo.example.org'), 'demo.example.org'
+ * (cookies will be valid for the domain and all subdomains), ...
+ *
+ * Defaults to '' (safe option)
+ */
+'cookie_domain' => '',
/**
* Where user files are stored. The SQLite database is also stored here, when
@@ -96,9 +115,9 @@ $CONFIG = [
* ``supportedDatabases``
*
* Available:
- * - sqlite3 (SQLite3)
- * - mysql (MySQL/MariaDB)
- * - pgsql (PostgreSQL)
+ * - sqlite3 (SQLite3)
+ * - mysql (MySQL/MariaDB)
+ * - pgsql (PostgreSQL)
*
* Defaults to ``sqlite3``
*/
@@ -106,9 +125,10 @@ $CONFIG = [
/**
* Your host server name, for example ``localhost``, ``hostname``,
- * ``hostname.example.com``, or the IP address. To specify a port use
- * ``hostname:####``; to specify a Unix socket use
- * ``/path/to/directory/containing/socket`` e.g. ``/run/postgresql/``.
+ * ``hostname.example.com``, or the IP address.
+ * To specify a port, use ``hostname:####``; for IPv6 addresses, use the URI notation ``[ip]:port``.
+ * To specify a Unix socket, use ``localhost:/path/to/directory/containing/socket`` or
+ * ``:/path/to/directory/containing/socket``, e.g., ``localhost:/run/postgresql/``.
*/
'dbhost' => '',
@@ -136,8 +156,29 @@ $CONFIG = [
*
* Default to ``oc_``
*/
-'dbtableprefix' => '',
+'dbtableprefix' => 'oc_',
+/**
+ * Enable persistent connections to the database.
+ * This setting uses the "persistent" option from Doctrine DBAL, which in turn
+ * uses the PDO::ATTR_PERSISTENT option from the PDO driver.
+ */
+'dbpersistent' => '',
+
+/**
+ * Specify read-only replicas to be used by Nextcloud when querying the database
+ */
+'dbreplica' => [
+ ['user' => 'nextcloud', 'password' => 'password1', 'host' => 'replica1', 'dbname' => ''],
+ ['user' => 'nextcloud', 'password' => 'password2', 'host' => 'replica2', 'dbname' => ''],
+],
+
+/**
+ * Add request ID to the database query in a comment.
+ *
+ * This can be enabled to assist in mapping database logs to Nextcloud logs.
+ */
+'db.log_request_id' => false,
/**
* Indicates whether the Nextcloud instance was installed successfully; ``true``
@@ -159,20 +200,21 @@ $CONFIG = [
/**
* This sets the default language on your Nextcloud server, using ISO_639-1
* language codes such as ``en`` for English, ``de`` for German, and ``fr`` for
- * French. It overrides automatic language detection on public pages like login
- * or shared items. User's language preferences configured under "personal ->
- * language" override this setting after they have logged in. Nextcloud has two
- * distinguished language codes for German, 'de' and 'de_DE'. 'de' is used for
- * informal German and 'de_DE' for formal German. By setting this value to 'de_DE'
- * you can enforce the formal version of German unless the user has chosen
- * something different explicitly.
+ * French. The default_language parameter is only used when the browser does
+ * not send any language, and the user hasn’t configured their own language
+ * preferences.
+ *
+ * Nextcloud has two distinguished language codes for German, 'de' and 'de_DE'.
+ * 'de' is used for informal German and 'de_DE' for formal German. By setting
+ * this value to 'de_DE', you can enforce the formal version of German unless
+ * the user has chosen something different explicitly.
*
* Defaults to ``en``
*/
'default_language' => 'en',
/**
- * With this setting a language can be forced for all users. If a language is
+ * With this setting, a language can be forced for all users. If a language is
* forced, the users are also unable to change their language in the personal
* settings. If users shall be unable to change their language, but users have
* different languages, this value can be set to ``true`` instead of a language
@@ -195,17 +237,26 @@ $CONFIG = [
'default_locale' => 'en_US',
/**
+ * With this setting, it is possible to reduce the languages available in the
+ * language chooser. The languages have to be set as array values using ISO_639-1
+ * language codes such as ``en`` for English, ``de`` for German, etc.
+ *
+ * For example: Set to ['de', 'fr'] to only allow German and French languages.
+ */
+'reduce_to_languages' => [],
+
+/**
* This sets the default region for phone numbers on your Nextcloud server,
* using ISO 3166-1 country codes such as ``DE`` for Germany, ``FR`` for France, …
* It is required to allow inserting phone numbers in the user profiles starting
- * without the country code (e.g. +49 for Germany).
+ * without the country code (e.g., +49 for Germany).
*
* No default value!
*/
'default_phone_region' => 'GB',
/**
- * With this setting a locale can be forced for all users. If a locale is
+ * With this setting, a locale can be forced for all users. If a locale is
* forced, the users are also unable to change their locale in the personal
* settings. If users shall be unable to change their locale, but users have
* different languages, this value can be set to ``true`` instead of a locale
@@ -216,15 +267,14 @@ $CONFIG = [
'force_locale' => 'en_US',
/**
- * Set the default app to open on login. Use the app names as they appear in the
- * URL after clicking them in the Apps menu, such as documents, calendar, and
- * gallery. You can use a comma-separated list of app names, so if the first
- * app is not enabled for a user then Nextcloud will try the second one, and so
- * on. If no enabled apps are found it defaults to the dashboard app.
+ * This sets the default timezone on your Nextcloud server, using IANA
+ * identifiers like ``Europe/Berlin`` or ``Pacific/Auckland``. The default
+ * timezone parameter is only used when the timezone of the user cannot be
+ * determined.
*
- * Defaults to ``dashboard,files``
+ * Defaults to ``UTC``
*/
-'defaultapp' => 'dashboard,files',
+'default_timezone' => 'Europe/Berlin',
/**
* ``true`` enables the Help menu item in the user menu (top right of the
@@ -233,14 +283,50 @@ $CONFIG = [
'knowledgebaseenabled' => true,
/**
+ * ``true`` embeds the documentation in an iframe inside Nextcloud.
+ * ``false`` only shows buttons to the online documentation.
+ */
+'knowledgebase.embedded' => false,
+
+/**
* ``true`` allows users to change their display names (on their Personal
* pages), and ``false`` prevents them from changing their display names.
*/
'allow_user_to_change_display_name' => true,
/**
+ * The directory where the skeleton files are located. These files will be
+ * copied to the data directory of new users. Set empty string to not copy any
+ * skeleton files. If unset and templatedirectory is an empty string, shipped
+ * templates will be used to create a template directory for the user.
+ * ``{lang}`` can be used as a placeholder for the language of the user.
+ * If the directory does not exist, it falls back to non-dialect (from ``de_DE``
+ * to ``de``). If that does not exist either, it falls back to ``default``
+ *
+ * Defaults to ``core/skeleton`` in the Nextcloud directory.
+ */
+'skeletondirectory' => '/path/to/nextcloud/core/skeleton',
+
+/**
+ * The directory where the template files are located. These files will be
+ * copied to the template directory of new users. Set empty string to not copy any
+ * template files.
+ * ``{lang}`` can be used as a placeholder for the language of the user.
+ * If the directory does not exist, it falls back to non-dialect (from ``de_DE``
+ * to ``de``). If that does not exist either, it falls back to ``default``
+ *
+ * To disable creating a template directory, set both skeletondirectory and
+ * templatedirectory to empty strings.
+ */
+'templatedirectory' => '/path/to/nextcloud/templates',
+
+/**
+ * User session
+ */
+
+/**
* Lifetime of the remember login cookie. This should be larger than the
- * session_lifetime. If it is set to 0 remember me is disabled.
+ * session_lifetime. If it is set to 0, remember me is disabled.
*
* Defaults to ``60*60*24*15`` seconds (15 days)
*/
@@ -257,6 +343,34 @@ $CONFIG = [
'session_lifetime' => 60 * 60 * 24,
/**
+ * The timeout in seconds for requests to servers made by the DAV component (e.g., needed for federated shares).
+ */
+'davstorage.request_timeout' => 30,
+
+/**
+ * The timeout in seconds for synchronizing address books, e.g., federated system address books (as run by `occ federation:sync-addressbooks`).
+ *
+ * Defaults to ``30`` seconds
+ */
+'carddav_sync_request_timeout' => 30,
+
+/**
+ * The limit applied to the synchronization report request, e.g. federated system address books (as run by `occ federation:sync-addressbooks`).
+ */
+'carddav_sync_request_truncation' => 2500,
+
+/**
+ * `true` enables a relaxed session timeout, where the session timeout would no longer be
+ * handled by Nextcloud but by either the PHP garbage collection or the expiration of
+ * potential other session backends like Redis.
+ *
+ * This may lead to sessions being available for longer than what session_lifetime uses but
+ * comes with performance benefits as sessions are no longer a locking operation for concurrent
+ * requests.
+ */
+'session_relaxed_expiry' => false,
+
+/**
* Enable or disable session keep-alive when a user is logged in to the Web UI.
* Enabling this sends a "heartbeat" to the server to keep it from timing out.
*
@@ -266,8 +380,10 @@ $CONFIG = [
/**
* Enable or disable the automatic logout after session_lifetime, even if session
- * keepalive is enabled. This will make sure that an inactive browser will be logged out
- * even if requests to the server might extend the session lifetime.
+ * keepalive is enabled. This will make sure that an inactive browser will log itself out
+ * even if requests to the server might extend the session lifetime. Note: the logout is
+ * handled on the client side. This is not a way to limit the duration of potentially
+ * compromised sessions.
*
* Defaults to ``false``
*/
@@ -284,18 +400,18 @@ $CONFIG = [
/**
* The interval at which token activity should be updated.
- * Increasing this value means that the last activty on the security page gets
+ * Increasing this value means that the last activity on the security page gets
* more outdated.
*
* Tokens are still checked every 5 minutes for validity
* max value: 300
*
- * Defaults to ``300``
+ * Defaults to ``60``
*/
'token_auth_activity_update' => 60,
/**
- * Whether the bruteforce protection shipped with Nextcloud should be enabled or not.
+ * Whether the brute force protection shipped with Nextcloud should be enabled or not.
*
* Disabling this is discouraged for security reasons.
*
@@ -304,52 +420,98 @@ $CONFIG = [
'auth.bruteforce.protection.enabled' => true,
/**
- * By default WebAuthn is available but it can be explicitly disabled by admins
+ * Whether the brute force protection should write into the database even when a memory cache is available
+ *
+ * Using the database is most likely worse for performance, but makes investigating
+ * issues a lot easier as it's possible to look directly at the table to see all
+ * logged remote addresses and actions.
+ *
+ * Defaults to ``false``
*/
-'auth.webauthn.enabled' => true,
+'auth.bruteforce.protection.force.database' => false,
/**
- * By default the login form is always available. There are cases (SSO) where an
- * admin wants to avoid users entering their credentials to the system if the SSO
- * app is unavailable.
+ * Whether the brute force protection shipped with Nextcloud should be set to testing mode.
*
- * This will show an error. But the the direct login still works with adding ?direct=1
+ * In testing mode, brute force attempts are still recorded, but the requests do
+ * not sleep/wait for the specified time. They will still abort with
+ * "429 Too Many Requests" when the maximum delay is reached.
+ * Enabling this is discouraged for security reasons
+ * and should only be done for debugging and on CI when running tests.
+ *
+ * Defaults to ``false``
*/
-'hide_login_form' => false,
+'auth.bruteforce.protection.testing' => false,
/**
- * The directory where the skeleton files are located. These files will be
- * copied to the data directory of new users. Leave empty to not copy any
- * skeleton files.
- * ``{lang}`` can be used as a placeholder for the language of the user.
- * If the directory does not exist, it falls back to non dialect (from ``de_DE``
- * to ``de``). If that does not exist either, it falls back to ``default``
+ * Brute force protection: maximum number of attempts before blocking
*
- * Defaults to ``core/skeleton`` in the Nextcloud directory.
+ * When more than max-attempts login requests are sent to Nextcloud, requests
+ * will abort with "429 Too Many Requests".
+ * For security reasons, change it only if you know what you are doing.
+ *
+ * Defaults to ``10``
*/
-'skeletondirectory' => '/path/to/nextcloud/core/skeleton',
+'auth.bruteforce.max-attempts' => 10,
+/**
+ * Whether the rate limit protection shipped with Nextcloud should be enabled or not.
+ *
+ * Disabling this is discouraged for security reasons.
+ *
+ * Defaults to ``true``
+ */
+'ratelimit.protection.enabled' => true,
/**
- * The directory where the template files are located. These files will be
- * copied to the template directory of new users. Leave empty to not copy any
- * template files.
- * ``{lang}`` can be used as a placeholder for the language of the user.
- * If the directory does not exist, it falls back to non dialect (from ``de_DE``
- * to ``de``). If that does not exist either, it falls back to ``default``
+ * Size of subnet used to normalize IPv6
*
- * If this is not set creating a template directory will only happen if no custom
- * ``skeletondirectory`` is defined, otherwise the shipped templates will be used
- * to create a template directory for the user.
+ * For Brute Force Protection and Rate Limiting, IPv6 addresses are truncated using subnet size.
+ * It defaults to /56, but you can set it between /32 and /64
+ *
+ * Defaults to ``56``
*/
-'templatedirectory' => '/path/to/nextcloud/templates',
+'security.ipv6_normalized_subnet_size' => 56,
+
+/**
+ * By default, WebAuthn is available, but it can be explicitly disabled by admins
+ */
+'auth.webauthn.enabled' => true,
+
+/**
+ * Whether encrypted passwords should be stored in the database
+ *
+ * The passwords are only decrypted using the login token stored uniquely in the
+ * clients and allow connecting to external storages, autoconfiguring mail accounts in
+ * the mail app, and periodically checking if the password is still valid.
+ *
+ * This might be desirable to disable this functionality when using one-time
+ * passwords or when having a password policy enforcing long passwords (> 300
+ * characters).
+ *
+ * By default, the passwords are stored encrypted in the database.
+ *
+ * WARNING: If disabled, password changes on the user backend (e.g., on LDAP) no
+ * longer log connected clients out automatically. Users can still disconnect
+ * the clients by deleting the app token from the security settings.
+ */
+'auth.storeCryptedPassword' => true,
/**
- * If your user backend does not allow password resets (e.g. when it's a
+ * By default, the login form is always available. There are cases (SSO) where an
+ * admin wants to avoid users entering their credentials to the system if the SSO
+ * app is unavailable.
+ *
+ * This will show an error. But the direct login still works with adding ?direct=1
+ */
+'hide_login_form' => false,
+
+/**
+ * If your user backend does not allow password resets (e.g., when it's a
* read-only user backend like LDAP), you can specify a custom link, where the
* user is redirected to, when clicking the "reset password" link after a failed
- * login-attempt.
- * In case you do not want to provide any link, replace the url with 'disabled'
+ * login attempt.
+ * In case you do not want to provide any link, replace the URL with 'disabled'
*/
'lost_password_link' => 'https://example.org/link/to/password/reset',
@@ -378,36 +540,41 @@ $CONFIG = [
* FROM address that overrides the built-in ``sharing-noreply`` and
* ``lostpassword-noreply`` FROM addresses.
*
- * Defaults to different from addresses depending on the feature.
+ * Defaults to different FROM addresses depending on the feature.
*/
'mail_from_address' => 'nextcloud',
/**
* Enable SMTP class debugging.
+ * NOTE: ``loglevel`` will likely need to be adjusted too. See docs:
+ * https://docs.nextcloud.com/server/latest/admin_manual/configuration_server/email_configuration.html#enabling-debug-mode
*
* Defaults to ``false``
*/
'mail_smtpdebug' => false,
/**
- * Which mode to use for sending mail: ``sendmail``, ``smtp`` or ``qmail``.
+ * Which mode to use for sending mail: ``sendmail``, ``smtp``, ``qmail``, or ``null``.
*
* If you are using local or remote SMTP, set this to ``smtp``.
*
- * For the ``sendmail`` option you need an installed and working email system on
+ * For the ``sendmail`` option, you need an installed and working email system on
* the server, with ``/usr/sbin/sendmail`` installed on your Unix system.
*
- * For ``qmail`` the binary is /var/qmail/bin/sendmail, and it must be installed
+ * For ``qmail``, the binary is /var/qmail/bin/sendmail, and it must be installed
* on your Unix system.
*
+ * Use the string ``null`` to send no mails (disable mail delivery). This can be
+ * useful if mails should be sent via APIs and rendering messages is not necessary.
+ *
* Defaults to ``smtp``
*/
'mail_smtpmode' => 'smtp',
/**
* This depends on ``mail_smtpmode``. Specify the IP address of your mail
- * server host. This may contain multiple hosts separated by a semi-colon. If
- * you need to specify the port number append it to the IP address separated by
+ * server host. This may contain multiple hosts separated by a semicolon. If
+ * you need to specify the port number, append it to the IP address separated by
* a colon, like this: ``127.0.0.1:24``.
*
* Defaults to ``127.0.0.1``
@@ -431,8 +598,10 @@ $CONFIG = [
'mail_smtptimeout' => 10,
/**
- * This depends on ``mail_smtpmode``. Specify when you are using ``ssl`` for SSL/TLS or
- * ``tls`` for STARTTLS, or leave empty for no encryption.
+ * This depends on ``mail_smtpmode``. Specify ``ssl`` when you are using SSL/TLS. Any other value will be ignored.
+ *
+ * If the server advertises STARTTLS capabilities, they might be used, but they cannot be enforced by
+ * this config option.
*
* Defaults to ``''`` (empty string)
*/
@@ -447,14 +616,6 @@ $CONFIG = [
'mail_smtpauth' => false,
/**
- * This depends on ``mail_smtpmode``. If SMTP authentication is required, choose
- * the authentication type as ``LOGIN`` or ``PLAIN``.
- *
- * Defaults to ``LOGIN``
- */
-'mail_smtpauthtype' => 'LOGIN',
-
-/**
* This depends on ``mail_smtpauth``. Specify the username for authenticating to
* the SMTP server.
*
@@ -472,14 +633,14 @@ $CONFIG = [
/**
* Replaces the default mail template layout. This can be utilized if the
- * options to modify the mail texts with the theming app is not enough.
- * The class must extend ``\OC\Mail\EMailTemplate``
+ * options to modify the mail texts with the theming app are not enough.
+ * The class must extend ``\OC\Mail\EMailTemplate``
*/
'mail_template_class' => '\OC\Mail\EMailTemplate',
/**
- * Email will be send by default with an HTML and a plain text body. This option
- * allows to only send plain text emails.
+ * Email will be sent by default with an HTML and a plain text body. This option
+ * allows sending only plain text emails.
*/
'mail_send_plaintext_only' => false,
@@ -493,10 +654,10 @@ $CONFIG = [
/**
* Which mode is used for sendmail/qmail: ``smtp`` or ``pipe``.
*
- * For ``smtp`` the sendmail binary is started with the parameter ``-bs``:
+ * For ``smtp``, the sendmail binary is started with the parameter ``-bs``:
* - Use the SMTP protocol on standard input and output.
*
- * For ``pipe`` the binary is started with the parameters ``-t``:
+ * For ``pipe``, the binary is started with the parameters ``-t``:
* - Read message from STDIN and extract recipients.
*
* Defaults to ``smtp``
@@ -510,7 +671,7 @@ $CONFIG = [
/**
* The automatic hostname detection of Nextcloud can fail in certain reverse
* proxy and CLI/cron situations. This option allows you to manually override
- * the automatic detection; for example ``www.example.com``, or specify the port
+ * the automatic detection; for example, ``www.example.com``, or specify the port
* ``www.example.com:8080``.
*/
'overwritehost' => '',
@@ -548,30 +709,32 @@ $CONFIG = [
* are generated within Nextcloud using any kind of command line tools (cron or
* occ). The value should contain the full base URL:
* ``https://www.example.com/nextcloud``
+ * Please make sure to set the value to the URL that your users mainly use to access this Nextcloud.
+ * Otherwise, there might be problems with the URL generation via cron.
*
* Defaults to ``''`` (empty string)
*/
'overwrite.cli.url' => '',
/**
- * To have clean URLs without `/index.php` this parameter needs to be configured.
+ * To have clean URLs without `/index.php`, this parameter needs to be configured.
*
* This parameter will be written as "RewriteBase" on update and installation of
* Nextcloud to your `.htaccess` file. While this value is often simply the URL
- * path of the Nextcloud installation it cannot be set automatically properly in
+ * path of the Nextcloud installation, it cannot be set automatically properly in
* every scenario and needs thus some manual configuration.
*
- * In a standard Apache setup this usually equals the folder that Nextcloud is
- * accessible at. So if Nextcloud is accessible via "https://mycloud.org/nextcloud"
+ * In a standard Apache setup, this usually equals the folder that Nextcloud is
+ * accessible at. So if Nextcloud is accessible via "https://mycloud.org/nextcloud",
* the correct value would most likely be "/nextcloud". If Nextcloud is running
- * under "https://mycloud.org/" then it would be "/".
+ * under "https://mycloud.org/", then it would be "/".
*
* Note that the above rule is not valid in every case, as there are some rare setup
- * cases where this may not apply. However, to avoid any update problems this
+ * cases where this may not apply. However, to avoid any update problems, this
* configuration value is explicitly opt-in.
*
- * After setting this value run `occ maintenance:update:htaccess`. Now, when the
- * following conditions are met Nextcloud URLs won't contain `index.php`:
+ * After setting this value, run `occ maintenance:update:htaccess`. Now, when the
+ * following conditions are met, Nextcloud URLs won't contain `index.php`:
*
* - `mod_rewrite` is installed
* - `mod_env` is installed
@@ -581,23 +744,23 @@ $CONFIG = [
'htaccess.RewriteBase' => '/',
/**
- * For server setups, that don't have `mod_env` enabled or restricted (e.g. suEXEC)
+ * For server setups that don't have `mod_env` enabled or restricted (e.g., suEXEC),
* this parameter has to be set to true and will assume mod_rewrite.
*
- * Please check, if `mod_rewrite` is active and functional before setting this
- * parameter and you updated your .htaccess with `occ maintenance:update:htaccess`.
- * Otherwise your nextcloud installation might not be reachable anymore.
+ * Please check if `mod_rewrite` is active and functional before setting this
+ * parameter, and you updated your .htaccess with `occ maintenance:update:htaccess`.
+ * Otherwise, your Nextcloud installation might not be reachable anymore.
* For example, try accessing resources by leaving out `index.php` in the URL.
*/
'htaccess.IgnoreFrontController' => false,
/**
- * The URL of your proxy server, for example ``proxy.example.com:8081``.
+ * The URL of your proxy server, for example, ``proxy.example.com:8081``.
*
- * Note: Guzzle (the http library used by Nextcloud) is reading the environment
- * variables HTTP_PROXY (only for cli request), HTTPS_PROXY, and NO_PROXY by default.
+ * Note: Guzzle (the HTTP library used by Nextcloud) reads the environment
+ * variables HTTP_PROXY (only for CLI requests), HTTPS_PROXY, and NO_PROXY by default.
*
- * If you configure proxy with Nextcloud any default configuration by Guzzle
+ * If you configure a proxy with Nextcloud, any default configuration by Guzzle
* is overwritten. Make sure to set ``proxyexclude`` accordingly if necessary.
*
* Defaults to ``''`` (empty string)
@@ -613,7 +776,7 @@ $CONFIG = [
'proxyuserpwd' => '',
/**
- * List of host names that should not be proxied to.
+ * List of hostnames that should not be proxied to.
* For example: ``['.mit.edu', 'foo.com']``.
*
* Hint: Use something like ``explode(',', getenv('NO_PROXY'))`` to sync this
@@ -624,7 +787,7 @@ $CONFIG = [
'proxyexclude' => [],
/**
- * Allow remote servers with local addresses e.g. in federated shares, webcal services and more
+ * Allow remote servers with local addresses, e.g., in federated shares, webcal services, and more
*
* Defaults to false
*/
@@ -639,27 +802,46 @@ $CONFIG = [
/**
* If the trash bin app is enabled (default), this setting defines the policy
* for when files and folders in the trash bin will be permanently deleted.
+ *
+ * If the user quota limit is exceeded due to deleted files in the trash bin,
+ * retention settings will be ignored and files will be cleaned up until
+ * the quota requirements are met.
+ *
* The app allows for two settings, a minimum time for trash bin retention,
* and a maximum time for trash bin retention.
+ *
* Minimum time is the number of days a file will be kept, after which it
- * may be deleted. Maximum time is the number of days at which it is guaranteed
- * to be deleted.
+ * *may be* deleted. A file may be deleted after the minimum number of days
+ * has expired if space is needed. The file will not be deleted if space is
+ * not needed.
+ *
+ * Whether "space is needed" depends on whether a user quota is defined or not:
+ *
+ * * If no user quota is defined, the available space on the Nextcloud data
+ * partition sets the limit for the trashbin
+ * (issues: see https://github.com/nextcloud/server/issues/28451).
+ * * If a user quota is defined, 50% of the user's remaining quota space sets
+ * the limit for the trashbin.
+ *
+ * Maximum time is the number of days at which it is *guaranteed
+ * to be* deleted. There is no further dependency on the available space.
+ *
* Both minimum and maximum times can be set together to explicitly define
* file and folder deletion. For migration purposes, this setting is installed
* initially set to "auto", which is equivalent to the default setting in
* Nextcloud.
*
- * Available values:
+ * Available values (D1 and D2 are configurable numbers):
*
* * ``auto``
- * default setting. keeps files and folders in the trash bin for 30 days
+ * default setting. Keeps files and folders in the trash bin for 30 days
* and automatically deletes anytime after that if space is needed (note:
* files may not be deleted if space is not needed).
- * * ``D, auto``
- * keeps files and folders in the trash bin for D+ days, delete anytime if
+ * * ``D1, auto``
+ * keeps files and folders in the trash bin for D1+ days, delete anytime if
* space needed (note: files may not be deleted if space is not needed)
- * * ``auto, D``
- * delete all files in the trash bin that are older than D days
+ * * ``auto, D2``
+ * delete all files in the trash bin that are older than D2 days
* automatically, delete other files anytime if space needed
* * ``D1, D2``
* keep files and folders in the trash bin for at least D1 days and
@@ -698,7 +880,7 @@ $CONFIG = [
* rules. Please refer to :doc:`../configuration_files/file_versioning` for
* more information.
* * ``D, auto``
- * keep versions at least for D days, apply expire rules to all versions
+ * keep versions at least for D days, apply expiration rules to all versions
* that are older than D days
* * ``auto, D``
* delete all versions that are older than D days automatically, delete
@@ -721,8 +903,8 @@ $CONFIG = [
/**
* Checks an app before install whether it uses private APIs instead of the
- * proper public APIs. If this is set to true it will only allow to install or
- * enable apps that pass this check.
+ * proper public APIs. If this is set to true, it will only allow installing or
+ * enabling apps that pass this check.
*
* Defaults to ``false``
*/
@@ -730,8 +912,8 @@ $CONFIG = [
/**
* Check if Nextcloud is up-to-date and shows a notification if a new version is
- * available. It sends current version, php version, installation and last update
- * time and release channel to the updater server which responds with the latest
+ * available. It sends current version, PHP version, installation and last update
+ * time, and release channel to the updater server which responds with the latest
* available version based on those metrics.
*
* Defaults to ``true``
@@ -749,9 +931,10 @@ $CONFIG = [
* The channel that Nextcloud should use to look for updates
*
* Supported values:
- * - ``daily``
- * - ``beta``
- * - ``stable``
+ *
+ * - ``daily``
+ * - ``beta``
+ * - ``stable``
*/
'updater.release.channel' => 'stable',
@@ -774,16 +957,16 @@ $CONFIG = [
*
* Defaults to the following domains:
*
- * - www.nextcloud.com
- * - www.startpage.com
- * - www.eff.org
- * - www.edri.org
+ * - https://www.nextcloud.com
+ * - https://www.startpage.com
+ * - https://www.eff.org
+ * - https://www.edri.org
*/
'connectivity_check_domains' => [
- 'www.nextcloud.com',
- 'www.startpage.com',
- 'www.eff.org',
- 'www.edri.org'
+ 'https://www.nextcloud.com',
+ 'https://www.startpage.com',
+ 'https://www.eff.org',
+ 'https://www.edri.org'
],
/**
@@ -807,11 +990,11 @@ $CONFIG = [
'check_for_working_htaccess' => true,
/**
- * In rare setups (e.g. on Openshift or docker on windows) the permissions check
+ * In rare setups (e.g., on OpenShift or Docker on Windows), the permissions check
* might block the installation while the underlying system offers no means to
* "correct" the permissions. In this case, set the value to false.
*
- * In regular cases, if issues with permissions are encountered they should be
+ * In regular cases, if issues with permissions are encountered, they should be
* adjusted accordingly. Changing the flag is discouraged.
*
* Defaults to ``true``
@@ -819,10 +1002,10 @@ $CONFIG = [
'check_data_directory_permissions' => true,
/**
- * In certain environments it is desired to have a read-only configuration file.
+ * In certain environments, it is desired to have a read-only configuration file.
* When this switch is set to ``true``, writing to the config file will be
* forbidden. Therefore, it will not be possible to configure all options via
- * the Web interface. Furthermore, when updating Nextcloud it is required to
+ * the Web interface. Furthermore, when updating Nextcloud, it is required to
* make the configuration file writable again and to set this switch to ``false``
* for the update process.
*
@@ -876,7 +1059,7 @@ $CONFIG = [
/**
* Log file mode for the Nextcloud logging type in octal notation.
*
- * Defaults to 0640 (writeable by user, readable by group).
+ * Defaults to 0640 (writable by user, readable by group).
*/
'logfilemode' => 0640,
@@ -889,9 +1072,27 @@ $CONFIG = [
'loglevel' => 2,
/**
+ * Loglevel used by the frontend to start logging at. The same values as
+ * for ``loglevel`` can be used. If not set, it defaults to the value
+ * configured for ``loglevel`` or Warning if that is not set either.
+ *
+ * Defaults to ``2``
+ */
+'loglevel_frontend' => 2,
+
+/**
+ * Loglevel used by the dirty database query detection. Useful to identify
+ * potential database bugs in production. Set this to loglevel or higher to
+ * see dirty queries in the logs.
+ *
+ * Defaults to ``0`` (debug)
+ */
+'loglevel_dirty_database_queries' => 0,
+
+/**
* If you maintain different instances and aggregate the logs, you may want
* to distinguish between them. ``syslog_tag`` can be set per instance
- * with a unique id. Only available if ``log_type`` is set to ``syslog`` or
+ * with a unique ID. Only available if ``log_type`` is set to ``syslog`` or
* ``systemd``.
*
* The default value is ``Nextcloud``.
@@ -901,7 +1102,7 @@ $CONFIG = [
/**
* If you maintain different instances and aggregate the logs, you may want
* to distinguish between them. ``syslog_tag_audit`` can be set per instance
- * with a unique id. Only available if ``log_type`` is set to ``syslog`` or
+ * with a unique ID. Only available if ``log_type`` is set to ``syslog`` or
* ``systemd``.
*
* The default value is the value of ``syslog_tag``.
@@ -910,16 +1111,19 @@ $CONFIG = [
/**
* Log condition for log level increase based on conditions. Once one of these
- * conditions is met, the required log level is set to debug. This allows to
- * debug specific requests, users or apps
+ * conditions is met, the required log level is set to debug. This allows
+ * debugging specific requests, users, or apps
*
* Supported conditions:
* - ``shared_secret``: if a request parameter with the name `log_secret` is set to
- * this value the condition is met
+ * this value, the condition is met
* - ``users``: if the current request is done by one of the specified users,
* this condition is met
* - ``apps``: if the log message is invoked by one of the specified apps,
* this condition is met
+ * - ``matches``: if all the conditions inside a group match,
+ * this condition is met. This allows logging only entries to an app
+ * by a few users.
*
* Defaults to an empty array.
*/
@@ -927,9 +1131,28 @@ $CONFIG = [
'shared_secret' => '57b58edb6637fe3059b3595cf9c41b9',
'users' => ['sample-user'],
'apps' => ['files'],
+ 'matches' => [
+ [
+ 'shared_secret' => '57b58edb6637fe3059b3595cf9c41b9',
+ 'users' => ['sample-user'],
+ 'apps' => ['files'],
+ 'loglevel' => 1,
+ 'message' => 'contains substring'
+ ],
+ ],
],
/**
+ * Enables logging a backtrace with each log line. Normally, only Exceptions
+ * carry backtrace information, which are logged automatically. This
+ * switch turns them on for any log message. Enabling this option will lead
+ * to increased log data size.
+ *
+ * Defaults to ``false``.
+ */
+'log.backtrace' => false,
+
+/**
* This uses PHP.date formatting; see https://www.php.net/manual/en/function.date.php
*
* Defaults to ISO 8601 ``2005-08-15T15:52:01+00:00`` - see \DateTime::ATOM
@@ -953,7 +1176,7 @@ $CONFIG = [
/**
* Enables log rotation and limits the total size of logfiles. Set it to 0 for
- * no rotation. Specify a size in bytes, for example 104857600 (100 megabytes
+ * no rotation. Specify a size in bytes, for example, 104857600 (100 megabytes
* = 100 * 1024 * 1024 bytes). A new logfile is created with a new name when the
* old logfile reaches your limit. If a rotated log file is already present, it
* will be overwritten.
@@ -972,9 +1195,68 @@ $CONFIG = [
'profiler' => false,
/**
+ * Enable profiling for individual requests if profiling single requests is enabled or the secret is passed.
+ * This requires the excimer extension to be installed. Be careful with this, as it can generate a lot of data.
+ *
+ * The profile data will be stored as a JSON file in the profiling.path directory that can be analyzed with speedscope.
+ *
+ * Defaults to ``false``
+ */
+'profiling.request' => false,
+
+/**
+ * The rate at which profiling data is collected for individual requests.
+ * A lower value means more data points but higher overhead.
+ *
+ * Defaults to ``0.001``
+ */
+'profiling.request.rate' => 0.001,
+
+/**
+ * A secret token that can be passed via ?profile_secret=<secret> to enable profiling for a specific request.
+ * This allows profiling specific requests in production without enabling it globally.
+ *
+ * No default value.
+ */
+'profiling.secret' => '',
+
+/**
+ * Enable sampling-based profiling. This collects profiling data periodically rather than per-request.
+ * This requires the excimer extension to be installed. Be careful with this, as it can generate a lot of data.
+ *
+ * The profile data will be stored as a plain text file in the profiling.path directory that can be analyzed with speedscope.
+ *
+ * Defaults to ``false``
+ */
+'profiling.sample' => false,
+
+/**
+ * The rate at which sampling profiling data is collected in seconds.
+ * A lower value means more frequent samples but higher overhead.
+ *
+ * Defaults to ``1``
+ */
+'profiling.sample.rate' => 1,
+
+/**
+ * How often (in minutes) the sample log files are rotated.
+ *
+ * Defaults to ``60``
+ */
+'profiling.sample.rotation' => 60,
+
+/**
+ * The directory where profiling data is stored.
+ *
+ * Note that this directory must be writable by the web server user and will not be cleaned up automatically.
+ */
+'profiling.path' => '/tmp',
+
+
+/**
* Alternate Code Locations
*
- * Some of the Nextcloud code may be stored in alternate locations.
+ * Some Nextcloud code may be stored in alternate locations.
*/
/**
@@ -982,19 +1264,24 @@ $CONFIG = [
* seen in the first-run wizard and on Personal pages.
*
* Defaults to:
- * - Desktop client: ``https://nextcloud.com/install/#install-clients``
- * - Android client: ``https://play.google.com/store/apps/details?id=com.nextcloud.client``
- * - iOS client: ``https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8``
- * - iOS client app id: ``1125420102``
+ *
+ * - Desktop client: ``https://nextcloud.com/install/#install-clients``
+ * - Android client: ``https://play.google.com/store/apps/details?id=com.nextcloud.client``
+ * - iOS client: ``https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8``
+ * - iOS client app ID: ``1125420102``
+ * - F-Droid client: ``https://f-droid.org/packages/com.nextcloud.client/``
*/
'customclient_desktop' =>
- 'https://nextcloud.com/install/#install-clients',
+ 'https://nextcloud.com/install/#install-clients',
'customclient_android' =>
- 'https://play.google.com/store/apps/details?id=com.nextcloud.client',
+ 'https://play.google.com/store/apps/details?id=com.nextcloud.client',
'customclient_ios' =>
- 'https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8',
+ 'https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8',
'customclient_ios_appid' =>
- '1125420102',
+ '1125420102',
+'customclient_fdroid' =>
+ 'https://f-droid.org/packages/com.nextcloud.client/',
+
/**
* Apps
*
@@ -1002,6 +1289,17 @@ $CONFIG = [
*/
/**
+ * Set the default app to open on login. The entry IDs can be retrieved from
+ * the Navigations OCS API endpoint: https://docs.nextcloud.com/server/latest/developer_manual/_static/openapi.html#/operations/core-navigation-get-apps-navigation.
+ * You can use a comma-separated list of app names, so if the first
+ * app is not enabled for a user, then Nextcloud will try the second one, and so
+ * on. If no enabled apps are found, it defaults to the dashboard app.
+ *
+ * Defaults to ``dashboard,files``
+ */
+'defaultapp' => 'dashboard,files',
+
+/**
* When enabled, admins may install apps from the Nextcloud app store.
*
* Defaults to ``true``
@@ -1009,8 +1307,8 @@ $CONFIG = [
'appstoreenabled' => true,
/**
- * Enables the installation of apps from a self hosted apps store.
- * Requires that at least one of the configured apps directories is writeable.
+ * Enables the installation of apps from a self-hosted apps store.
+ * Requires that at least one of the configured apps directories is writable.
*
* Defaults to ``https://apps.nextcloud.com/api/v1``
*/
@@ -1063,6 +1361,28 @@ $CONFIG = [
* Defaults to ``true``
*/
'enable_previews' => true,
+
+/**
+ * Number of all preview requests being processed concurrently,
+ * including previews that need to be newly generated, and those that have
+ * been generated.
+ *
+ * This should be greater than 'preview_concurrency_new'.
+ * If unspecified, defaults to twice the value of 'preview_concurrency_new'.
+ */
+'preview_concurrency_all' => 8,
+
+/**
+ * Number of new previews that are being concurrently generated.
+ *
+ * Depending on the max preview size set by 'preview_max_x' and 'preview_max_y',
+ * the generation process can consume considerable CPU and memory resources.
+ * It's recommended to limit this to be no greater than the number of CPU cores.
+ * If unspecified, defaults to the number of CPU cores, or 4 if that cannot
+ * be determined.
+ */
+'preview_concurrency_new' => 4,
+
/**
* The maximum width, in pixels, of a preview. A value of ``null`` means there
* is no limit.
@@ -1089,94 +1409,131 @@ $CONFIG = [
'preview_max_filesize_image' => 50,
/**
- * max memory for generating image previews with imagegd (default behavior)
+ * Max memory for generating image previews with imagegd (default behavior)
* Reads the image dimensions from the header and assumes 32 bits per pixel.
* If creating the image would allocate more memory, preview generation will
* be disabled and the default mimetype icon is shown. Set to -1 for no limit.
*
- * Defaults to ``128`` megabytes
+ * Defaults to ``256`` megabytes
*/
-'preview_max_memory' => 128,
+'preview_max_memory' => 256,
/**
- * custom path for LibreOffice/OpenOffice binary
+ * Custom path for LibreOffice/OpenOffice binary
*
*
* Defaults to ``''`` (empty string)
*/
'preview_libreoffice_path' => '/usr/bin/libreoffice',
+
/**
- * Use this if LibreOffice/OpenOffice requires additional arguments.
+ * Custom path for ffmpeg binary
*
- * Defaults to ``''`` (empty string)
+ * Defaults to ``null`` and falls back to searching ``avconv`` and ``ffmpeg``
+ * in the configured ``PATH`` environment
+ */
+'preview_ffmpeg_path' => '/usr/bin/ffmpeg',
+
+/**
+ * Custom path for ffprobe binary
+ *
+ * Defaults to ``null`` and falls back to using the same path as ffmpeg.
+ * ffprobe is typically packaged with ffmpeg and is required for
+ * enhanced preview generation for HDR videos.
*/
-'preview_office_cl_parameters' =>
- ' --headless --nologo --nofirststartwizard --invisible --norestore '.
- '--convert-to png --outdir ',
+'preview_ffprobe_path' => '/usr/bin/ffprobe',
/**
* Set the URL of the Imaginary service to send image previews to.
- * Also requires the OC\Preview\Imaginary provider to be enabled.
+ * Also requires the ``OC\Preview\Imaginary`` provider to be enabled in the
+ * ``enabledPreviewProviders`` array, to create previews for these mimetypes: bmp,
+ * x-bitmap, png, jpeg, gif, heic, heif, svg+xml, tiff, webp, and illustrator.
+ *
+ * If you want Imaginary to also create preview images from PDF documents, you
+ * have to add the ``OC\Preview\ImaginaryPDF`` provider as well.
*
* See https://github.com/h2non/imaginary
*/
'preview_imaginary_url' => 'http://previews_hpb:8088/',
/**
+ * If you want to set an API key for Imaginary.
+ */
+'preview_imaginary_key' => 'secret',
+
+/**
* Only register providers that have been explicitly enabled
*
* The following providers are disabled by default due to performance or privacy
* concerns:
*
- * - OC\Preview\Illustrator
- * - OC\Preview\HEIC
- * - OC\Preview\Movie
- * - OC\Preview\MSOffice2003
- * - OC\Preview\MSOffice2007
- * - OC\Preview\MSOfficeDoc
- * - OC\Preview\PDF
- * - OC\Preview\Photoshop
- * - OC\Preview\Postscript
- * - OC\Preview\StarOffice
- * - OC\Preview\SVG
- * - OC\Preview\TIFF
- * - OC\Preview\Font
+ * - ``OC\Preview\Font``
+ * - ``OC\Preview\HEIC``
+ * - ``OC\Preview\Illustrator``
+ * - ``OC\Preview\Movie``
+ * - ``OC\Preview\MSOffice2003``
+ * - ``OC\Preview\MSOffice2007``
+ * - ``OC\Preview\MSOfficeDoc``
+ * - ``OC\Preview\PDF``
+ * - ``OC\Preview\Photoshop``
+ * - ``OC\Preview\Postscript``
+ * - ``OC\Preview\StarOffice``
+ * - ``OC\Preview\SVG``
+ * - ``OC\Preview\TIFF``
+ * - ``OC\Preview\EMF``
*
*
* Defaults to the following providers:
*
- * - OC\Preview\BMP
- * - OC\Preview\GIF
- * - OC\Preview\JPEG
- * - OC\Preview\MarkDown
- * - OC\Preview\MP3
- * - OC\Preview\PNG
- * - OC\Preview\TXT
- * - OC\Preview\XBitmap
- * - OC\Preview\OpenDocument
- * - OC\Preview\Krita
+ * - ``OC\Preview\BMP``
+ * - ``OC\Preview\GIF``
+ * - ``OC\Preview\JPEG``
+ * - ``OC\Preview\Krita``
+ * - ``OC\Preview\MarkDown``
+ * - ``OC\Preview\MP3``
+ * - ``OC\Preview\OpenDocument``
+ * - ``OC\Preview\PNG``
+ * - ``OC\Preview\TXT``
+ * - ``OC\Preview\XBitmap``
*/
'enabledPreviewProviders' => [
- 'OC\Preview\PNG',
- 'OC\Preview\JPEG',
- 'OC\Preview\GIF',
'OC\Preview\BMP',
- 'OC\Preview\XBitmap',
- 'OC\Preview\MP3',
- 'OC\Preview\TXT',
+ 'OC\Preview\GIF',
+ 'OC\Preview\JPEG',
+ 'OC\Preview\Krita',
'OC\Preview\MarkDown',
+ 'OC\Preview\MP3',
'OC\Preview\OpenDocument',
- 'OC\Preview\Krita',
+ 'OC\Preview\PNG',
+ 'OC\Preview\TXT',
+ 'OC\Preview\XBitmap',
],
/**
+ * Maximum file size for metadata generation.
+ * If a file exceeds this size, metadata generation will be skipped.
+ * Note: memory equivalent to this size will be used for metadata generation.
+ *
+ * Default: 256 megabytes.
+ */
+'metadata_max_filesize' => 256,
+
+/**
+ * Maximum file size for file conversion.
+ * If a file exceeds this size, the file will not be converted.
+ *
+ * Default: 100 MiB
+ */
+'max_file_conversion_filesize' => 100,
+
+/**
* LDAP
*
* Global settings used by LDAP User and Group Backend
*/
/**
- * defines the interval in minutes for the background job that checks user
+ * Defines the interval in minutes for the background job that checks user
* existence and marks them as ready to be cleaned up. The number is always
* minutes. Setting it to 0 disables the feature.
* See command line (occ) methods ``ldap:show-remnants`` and ``user:delete``
@@ -1188,7 +1545,8 @@ $CONFIG = [
/**
* Sort groups in the user settings by name instead of the user count
*
- * By enabling this the user count beside the group name is disabled as well.
+ * By enabling this, the user count beside the group name is disabled as well.
+ * @deprecated since Nextcloud 29 - Use the frontend instead or set the app config value `group.sortBy` for `core` to `2`
*/
'sort_groups_by_name' => false,
@@ -1200,7 +1558,7 @@ $CONFIG = [
/**
* Replaces the default Comments Manager Factory. This can be utilized if an
- * own or 3rdParty CommentsManager should be used that – for instance – uses the
+ * own or 3rd-party CommentsManager should be used that – for instance – uses the
* filesystem instead of the database to keep the comments.
*
* Defaults to ``\OC\Comments\ManagerFactory``
@@ -1209,7 +1567,7 @@ $CONFIG = [
/**
* Replaces the default System Tags Manager Factory. This can be utilized if an
- * own or 3rdParty SystemTagsManager should be used that – for instance – uses the
+ * own or 3rd-party SystemTagsManager should be used that – for instance – uses the
* filesystem instead of the database to keep the tags.
*
* Defaults to ``\OC\SystemTag\ManagerFactory``
@@ -1228,7 +1586,7 @@ $CONFIG = [
*
* If you want to prevent users from logging in to Nextcloud before you start
* doing some maintenance work, you need to set the value of the maintenance
- * parameter to true. Please keep in mind that users who are already logged-in
+ * parameter to true. Please keep in mind that users who are already logged in
* are kicked out of Nextcloud instantly.
*
* Defaults to ``false``
@@ -1241,14 +1599,22 @@ $CONFIG = [
* Some background jobs only run once a day. When an hour is defined for this config,
* the background jobs which advertise themselves as not time sensitive will be
* delayed during the "working" hours and only run in the 4 hours after the given time.
- * This is e.g. used for activity expiration, suspicious login training and update checks.
+ * This is, e.g., used for activity expiration, suspicious login training, and update checks.
*
- * A value of 1 e.g. will only run these background jobs between 01:00am UTC and 05:00am UTC.
+ * A value of 1, e.g., will only run these background jobs between 01:00am UTC and 05:00am UTC.
*
* Defaults to ``100`` which disables the feature
*/
'maintenance_window_start' => 1,
+/**
+ * Log all LDAP requests into a file
+ *
+ * Warning: This heavily decreases the performance of the server and is only
+ * meant to debug/profile the LDAP interaction manually.
+ * Also, it might log sensitive data into a plain text file.
+ */
+'ldap_log_file' => '',
/**
* SSL
@@ -1256,7 +1622,7 @@ $CONFIG = [
/**
* Extra SSL options to be used for configuration.
- *
+ *
* Defaults to an empty array.
*/
'openssl' => [
@@ -1284,7 +1650,7 @@ $CONFIG = [
/**
* Memory caching backend for locally stored data
*
- * * Used for host-specific data, e.g. file paths
+ * * Used for host-specific data, e.g., file paths
*
* Defaults to ``none``
*/
@@ -1293,7 +1659,7 @@ $CONFIG = [
/**
* Memory caching backend for distributed data
*
- * * Used for installation-specific data, e.g. database caching
+ * * Used for installation-specific data, e.g., database caching
* * If unset, defaults to the value of memcache.local
*
* Defaults to ``none``
@@ -1301,24 +1667,24 @@ $CONFIG = [
'memcache.distributed' => '\OC\Memcache\Memcached',
/**
- * Connection details for redis to use for memory caching in a single server configuration.
+ * Connection details for Redis to use for memory caching in a single server configuration.
*
- * For enhanced security it is recommended to configure Redis
+ * For enhanced security, it is recommended to configure Redis
* to require a password. See http://redis.io/topics/security
* for more information.
*
- * We also support redis SSL/TLS encryption as of version 6.
+ * We also support Redis SSL/TLS encryption as of version 6.
* See https://redis.io/topics/encryption for more information.
*/
'redis' => [
- 'host' => 'localhost', // can also be a unix domain socket: '/tmp/redis.sock'
+ 'host' => 'localhost', // can also be a Unix domain socket: '/tmp/redis.sock'
'port' => 6379,
'timeout' => 0.0,
'read_timeout' => 0.0,
- 'user' => '', // Optional, if not defined no password will be used.
- 'password' => '', // Optional, if not defined no password will be used.
- 'dbindex' => 0, // Optional, if undefined SELECT will not run and will use Redis Server's default DB Index.
- // If redis in-transit encryption is enabled, provide certificates
+ 'user' => '', // Optional: if not defined, no password will be used.
+ 'password' => '', // Optional: if not defined, no password will be used.
+ 'dbindex' => 0, // Optional: if undefined, SELECT will not run and will use Redis Server's default DB Index.
+ // If Redis in-transit encryption is enabled, provide certificates
// SSL context https://www.php.net/manual/en/context.ssl.php
'ssl_context' => [
'local_cert' => '/certs/redis.crt',
@@ -1328,12 +1694,9 @@ $CONFIG = [
],
/**
- * Connection details for a Redis Cluster
- *
- * Only for use with Redis Clustering, for Sentinel-based setups use the single
- * server configuration above, and perform HA on the hostname.
+ * Connection details for a Redis Cluster.
*
- * Redis Cluster support requires the php module phpredis in version 3.0.0 or
+ * Redis Cluster support requires the PHP module phpredis in version 3.0.0 or
* higher.
*
* Available failover modes:
@@ -1341,9 +1704,9 @@ $CONFIG = [
* - \RedisCluster::FAILOVER_ERROR - failover to slaves for read commands if master is unavailable (recommended)
* - \RedisCluster::FAILOVER_DISTRIBUTE - randomly distribute read commands across master and slaves
*
- * WARNING: FAILOVER_DISTRIBUTE is a not recommended setting and we strongly
+ * WARNING: FAILOVER_DISTRIBUTE is a not recommended setting, and we strongly
* suggest to not use it if you use Redis for file locking. Due to the way Redis
- * is synchronized it could happen, that the read for an existing lock is
+ * is synchronized, it could happen that the read for an existing lock is
* scheduled to a slave that is not fully synchronized with the connected master
* which then causes a FileLocked exception.
*
@@ -1353,16 +1716,16 @@ $CONFIG = [
* https://github.com/phpredis/phpredis/commit/c5994f2a42b8a348af92d3acb4edff1328ad8ce1
*/
'redis.cluster' => [
- 'seeds' => [ // provide some/all of the cluster servers to bootstrap discovery, port required
+ 'seeds' => [ // provide some or all of the cluster servers to bootstrap discovery, port required
'localhost:7000',
'localhost:7001',
],
'timeout' => 0.0,
'read_timeout' => 0.0,
'failover_mode' => \RedisCluster::FAILOVER_ERROR,
- 'user' => '', // Optional, if not defined no password will be used.
- 'password' => '', // Optional, if not defined no password will be used.
- // If redis in-transit encryption is enabled, provide certificates
+ 'user' => '', // Optional: if not defined, no password will be used.
+ 'password' => '', // Optional: if not defined, no password will be used.
+ // If Redis in-transit encryption is enabled, provide certificates
// SSL context https://www.php.net/manual/en/context.ssl.php
'ssl_context' => [
'local_cert' => '/certs/redis.crt',
@@ -1373,10 +1736,11 @@ $CONFIG = [
/**
- * Server details for one or more memcached servers to use for memory caching.
+ * Server details for one or more Memcached servers to use for memory caching.
*/
'memcached_servers' => [
- // hostname, port and optional weight. Also see:
+ // hostname, port and optional weight
+ // or path and port 0 for Unix socket. Also see:
// https://www.php.net/manual/en/memcached.addservers.php
// https://www.php.net/manual/en/memcached.addserver.php
['localhost', 11211],
@@ -1384,7 +1748,7 @@ $CONFIG = [
],
/**
- * Connection options for memcached
+ * Connection options for Memcached
*/
'memcached_options' => [
// Set timeouts to 50ms
@@ -1403,7 +1767,7 @@ $CONFIG = [
// Enable Binary Protocol
\Memcached::OPT_BINARY_PROTOCOL => true,
- // Binary serializer vill be enabled if the igbinary PECL module is available
+ // Binary serializer will be enabled if the igbinary PECL module is available
//\Memcached::OPT_SERIALIZER => \Memcached::SERIALIZER_IGBINARY,
],
@@ -1434,7 +1798,7 @@ $CONFIG = [
/**
* This example shows how to configure Nextcloud to store all files in a
- * swift object storage.
+ * Swift object storage.
*
* It is important to note that Nextcloud in object store mode will expect
* exclusive access to the object store container because it only stores the
@@ -1442,19 +1806,18 @@ $CONFIG = [
* database for performance reasons.
*
* WARNING: The current implementation is incompatible with any app that uses
- * direct file IO and circumvents our virtual filesystem. That includes
+ * direct file I/O and circumvents our virtual filesystem. That includes
* Encryption and Gallery. Gallery will store thumbnails directly in the
- * filesystem and encryption will cause severe overhead because key files need
+ * filesystem, and encryption will cause severe overhead because key files need
* to be fetched in addition to any requested file.
*
- * One way to test is applying for a trystack account at http://trystack.org/
*/
'objectstore' => [
'class' => 'OC\\Files\\ObjectStore\\Swift',
'arguments' => [
- // trystack will use your facebook id as the user name
+ // trystack will use your Facebook ID as the username
'username' => 'facebook100000123456789',
- // in the trystack dashboard go to user -> settings -> API Password to
+ // in the trystack dashboard, go to user -> settings -> API Password to
// generate a password
'password' => 'Secr3tPaSSWoRdt7',
// must already exist in the objectstore, name can be different
@@ -1467,18 +1830,20 @@ $CONFIG = [
'region' => 'RegionOne',
// The Identity / Keystone endpoint
'url' => 'http://8.21.28.222:5000/v2.0',
+ // uploadPartSize: size of the uploaded chunks, defaults to 524288000
+ 'uploadPartSize' => 524288000,
// required on dev-/trystack
'tenantName' => 'facebook100000123456789',
// dev-/trystack uses swift by default, the lib defaults to 'cloudFiles'
// if omitted
'serviceName' => 'swift',
- // The Interface / url Type, optional
+ // The Interface / URL Type, optional
'urlType' => 'internal'
],
],
/**
- * To use swift V3
+ * To use Swift V3
*/
'objectstore' => [
'class' => 'OC\\Files\\ObjectStore\\Swift',
@@ -1508,17 +1873,17 @@ $CONFIG = [
],
/**
- * If this is set to true and a multibucket object store is configured then
+ * If this is set to true and a multibucket object store is configured, then
* newly created previews are put into 256 dedicated buckets.
*
- * Those buckets are named like the mulibucket version but with the postfix
+ * Those buckets are named like the multibucket version but with the postfix
* ``-preview-NUMBER`` where NUMBER is between 0 and 255.
*
* Keep in mind that only previews of files are put in there that don't have
- * some already. Otherwise the old bucket will be used.
+ * some already. Otherwise, the old bucket will be used.
*
- * To migrate existing previews to this new multibucket distribution of previews
- * use the occ command ``preview:repair``. For now this will only migrate
+ * To migrate existing previews to this new multibucket distribution of previews,
+ * use the occ command ``preview:repair``. For now, this will only migrate
* previews that were generated before Nextcloud 19 in the flat
* ``appdata_INSTANCEID/previews/FILEID`` folder structure.
*/
@@ -1533,7 +1898,7 @@ $CONFIG = [
/**
* Replaces the default Share Provider Factory. This can be utilized if
- * own or 3rdParty Share Providers are used that – for instance – use the
+ * own or 3rd-party Share Providers are used that – for instance – use the
* filesystem instead of the database to keep the share information.
*
* Defaults to ``\OC\Share20\ProviderFactory``
@@ -1542,8 +1907,8 @@ $CONFIG = [
/**
* Enables expiration for link share passwords sent by email (sharebymail).
- * The passwords will expire after the configured interval, the users can
- * still request a new one in the public link page.
+ * The passwords will expire after the configured interval; the users can
+ * still request a new one on the public link page.
*/
'sharing.enable_mail_link_password_expiration' => false,
@@ -1556,9 +1921,9 @@ $CONFIG = [
* Define max number of results returned by the search for auto-completion of
* users, groups, etc. The value must not be lower than 0 (for unlimited).
*
- * If more, different sources are requested (e.g. different user backends; or
+ * If more, different sources are requested (e.g., different user backends; or
* both users and groups), the value is applied per source and might not be
- * truncated after collecting the results. I.e. more results can appear than
+ * truncated after collecting the results. I.e., more results can appear than
* configured here.
*
* Default is 25.
@@ -1583,12 +1948,20 @@ $CONFIG = [
'sharing.force_share_accept' => false,
/**
- * Set to false to prevent users from setting a custom share_folder
+ * Set to ``false`` to prevent users from setting a custom share_folder
*/
'sharing.allow_custom_share_folder' => true,
/**
- * Set to false to stop sending a mail when users receive a share
+ * Define a default folder for shared files and folders other than root.
+ * Changes to this value will only have effect on new shares.
+ *
+ * Defaults to ``/``
+ */
+'share_folder' => '/',
+
+/**
+ * Set to ``false`` to stop sending a mail when users receive a share
*/
'sharing.enable_share_mail' => true,
@@ -1606,17 +1979,69 @@ $CONFIG = [
'transferIncomingShares' => false,
/**
+ * Federated Cloud Sharing
+ */
+
+/**
+ * Allow self-signed certificates for federated shares
+ */
+'sharing.federation.allowSelfSignedCertificates' => false,
+
+/**
+ * Hashing
+ */
+
+/**
+ * By default, Nextcloud will use the Argon2 password hashing if available.
+ * However, if for whatever reason you want to stick with the PASSWORD_DEFAULT
+ * of your PHP version, then set the setting to true.
+ *
+ * Nextcloud uses the Argon2 algorithm (with PHP >= 7.2) to create hashes by its
+ * own and exposes its configuration options as following. More information can
+ * be found at: https://www.php.net/manual/en/function.password-hash.php
+ */
+'hashing_default_password' => false,
+
+/**
+ * The number of CPU threads to be used by the algorithm for computing a hash.
+ * The value must be an integer, and the minimum value is 1. Rationally, it does
+ * not help to provide a number higher than the available threads on the machine.
+ * Values that undershoot the minimum will be ignored in favor of the minimum.
+ */
+'hashingThreads' => PASSWORD_ARGON2_DEFAULT_THREADS,
+
+/**
+ * The memory in KiB to be used by the algorithm for computing a hash. The value
+ * must be an integer, and the minimum value is 8 times the number of CPU threads.
+ * Values that undershoot the minimum will be ignored in favor of the minimum.
+ */
+'hashingMemoryCost' => PASSWORD_ARGON2_DEFAULT_MEMORY_COST,
+
+/**
+ * The number of iterations that are used by the algorithm for computing a hash.
+ * The value must be an integer, and the minimum value is 1. Values that
+ * undershoot the minimum will be ignored in favor of the minimum.
+ */
+'hashingTimeCost' => PASSWORD_ARGON2_DEFAULT_TIME_COST,
+
+/**
+ * The hashing cost used by hashes generated by Nextcloud
+ * Using a higher value requires more time and CPU power to calculate the hashes
+ */
+'hashingCost' => 10,
+
+/**
* All other configuration options
*/
/**
- * Additional driver options for the database connection, eg. to enable SSL
+ * Additional driver options for the database connection, e.g., to enable SSL
* encryption in MySQL or specify a custom wait timeout on a cheap hoster.
*
* When setting up TLS/SSL for encrypting the connections, you need to ensure that
- * the passed keys and certificates are readable by the PHP process. In addition
+ * the passed keys and certificates are readable by the PHP process. In addition,
* PDO::MYSQL_ATTR_SSL_VERIFY_SERVER_CERT might need to be set to false, if the
- * database servers certificates CN does not match with the hostname used to connect.
+ * database server's certificate CN does not match with the hostname used to connect.
* The standard behavior here is different from the MySQL/MariaDB CLI client, which
* does not verify the server cert except --ssl-verify-server-cert is passed manually.
*/
@@ -1629,31 +2054,31 @@ $CONFIG = [
],
/**
- * sqlite3 journal mode can be specified using this configuration parameter -
- * can be 'WAL' or 'DELETE' see for more details https://www.sqlite.org/wal.html
+ * SQLite3 journal mode can be specified using this configuration parameter -
+ * can be 'WAL' or 'DELETE'. See https://www.sqlite.org/wal.html for more details.
*/
'sqlite.journal_mode' => 'DELETE',
/**
* During setup, if requirements are met (see below), this setting is set to true
- * and MySQL can handle 4 byte characters instead of 3 byte characters.
+ * to enable MySQL to handle 4-byte characters instead of 3-byte characters.
*
- * If you want to convert an existing 3-byte setup into a 4-byte setup please
- * set the parameters in MySQL as mentioned below and run the migration command:
+ * To convert an existing 3-byte setup to a 4-byte setup, configure the MySQL
+ * parameters as described below and run the migration command:
* ./occ db:convert-mysql-charset
- * The config setting will be set automatically after a successful run.
+ * This config setting will be automatically updated after a successful migration.
*
- * Consult the documentation for more details.
+ * Refer to the documentation for more details.
*
- * MySQL requires a special setup for longer indexes (> 767 bytes) which are
- * needed:
+ * MySQL requires specific settings for longer indexes (> 767 bytes), which are
+ * necessary for 4-byte character support:
*
* [mysqld]
* innodb_large_prefix=ON
* innodb_file_format=Barracuda
* innodb_file_per_table=ON
*
- * Tables will be created with
+ * Tables will be created with:
* * character set: utf8mb4
* * collation: utf8mb4_bin
* * row_format: dynamic
@@ -1668,33 +2093,32 @@ $CONFIG = [
'mysql.utf8mb4' => false,
/**
- * For search queries in the database, a default collation – depending on the
- * character set – is chosen. In some cases a different behaviour is desired,
- * for instances when a accent sensitive search is desired.
+ * For search queries in the database, a default collation is chosen based on the
+ * character set. In some cases, a different collation is desired, such as for
+ * accent-sensitive searches.
*
- * MariaDB and MySQL have an overlap in available collations, but also
- * incompatible ones, also depending on the version of the database server.
+ * MariaDB and MySQL share some collations, but also have incompatible ones,
+ * depending on the database server version.
*
- * This option allows to override the automatic choice. Example:
+ * This option allows overriding the automatic collation choice. Example:
*
* 'mysql.collation' => 'utf8mb4_0900_as_ci',
*
- * This setting has no effect on setup or creating tables. In those cases
- * always utf8[mb4]_bin is being used. This setting is only taken into
- * consideration in SQL queries that utilize LIKE comparison operators.
+ * This setting does not affect table creation or setup, where utf8[mb4]_bin is
+ * always used. It applies only to SQL queries using LIKE comparison operators.
*/
'mysql.collation' => null,
/**
- * Database types that are supported for installation.
+ * Database types supported for installation.
*
* Available:
- * - sqlite (SQLite3)
- * - mysql (MySQL)
- * - pgsql (PostgreSQL)
- * - oci (Oracle)
+ * - sqlite (SQLite3)
+ * - mysql (MySQL)
+ * - pgsql (PostgreSQL)
+ * - oci (Oracle)
*
- * Defaults to the following databases:
+ * Defaults to:
* - sqlite (SQLite3)
* - mysql (MySQL)
* - pgsql (PostgreSQL)
@@ -1707,88 +2131,103 @@ $CONFIG = [
],
/**
- * Override where Nextcloud stores temporary files. Useful in situations where
- * the system temporary directory is on a limited space ramdisk or is otherwise
- * restricted, or if external storage which do not support streaming are in
- * use.
+ * Override the location where Nextcloud stores temporary files. Useful in setups
+ * where the system temporary directory is on a limited-space ramdisk, restricted,
+ * or when using external storage that does not support streaming.
*
- * The Web server user must have write access to this directory.
+ * The web server user/PHP must have write access to this directory. Ensure that
+ * PHP configuration recognizes this as a valid temporary directory by setting
+ * the TMP, TMPDIR, and TEMP environment variables accordingly. Additional
+ * permissions may be required for AppArmor or SELinux.
*/
'tempdirectory' => '/tmp/nextcloudtemp',
/**
- * Hashing
- */
-
-/**
- * By default Nextcloud will use the Argon2 password hashing if available.
- * However if for whatever reason you want to stick with the PASSWORD_DEFAULT
- * of your php version. Then set the setting to true.
- */
-'hashing_default_password' => false,
-
-/**
+ * Override the location where Nextcloud stores update files during updates.
+ * Useful when the default `datadirectory` is on a network disk like NFS or is
+ * otherwise restricted. Defaults to the value of `datadirectory` if unset.
*
- * Nextcloud uses the Argon2 algorithm (with PHP >= 7.2) to create hashes by its
- * own and exposes its configuration options as following. More information can
- * be found at: https://www.php.net/manual/en/function.password-hash.php
+ * If set, the directory must be located outside the Nextcloud installation
+ * directory and writable by the web server user.
*/
+'updatedirectory' => '',
/**
- * The number of CPU threads to be used by the algorithm for computing a hash.
- * The value must be an integer, and the minimum value is 1. Rationally it does
- * not help to provide a number higher than the available threads on the machine.
- * Values that undershoot the minimum will be ignored in favor of the minimum.
+ * Block specific files or filenames, disallowing uploads or access (read and write).
+ * ``.htaccess`` is blocked by default.
+ *
+ * WARNING: Use this only if you understand the implications.
+ *
+ * Note: This list is case-insensitive.
+ *
+ * Defaults to ``['.htaccess']``
*/
-'hashingThreads' => PASSWORD_ARGON2_DEFAULT_THREADS,
+'forbidden_filenames' => ['.htaccess'],
/**
- * The memory in KiB to be used by the algorithm for computing a hash. The value
- * must be an integer, and the minimum value is 8 times the number of CPU threads.
- * Values that undershoot the minimum will be ignored in favor of the minimum.
+ * Disallow uploads of files with specific basenames. Matching existing files
+ * cannot be updated, and no new files can be created in matching folders.
+ *
+ * The basename is the filename without the extension, e.g., for "archive.tar.gz",
+ * the basename is "archive".
+ *
+ * Note: This list is case-insensitive.
+ *
+ * Defaults to ``[]`` (empty array)
*/
-'hashingMemoryCost' => PASSWORD_ARGON2_DEFAULT_MEMORY_COST,
+'forbidden_filename_basenames' => [],
/**
- * The number of iterations that are used by the algorithm for computing a hash.
- * The value must be an integer, and the minimum value is 1. Values that
- * undershoot the minimum will be ignored in favor of the minimum.
+ * Block specific characters in filenames. Useful for filesystems or operating
+ * systems (e.g., Windows) that do not support certain characters. Matching
+ * existing files cannot be updated, and no new files can be created in matching
+ * folders.
+ *
+ * The '/' and '\' characters, as well as ASCII characters [0-31], are always
+ * forbidden.
+ *
+ * Example for Windows: ``['?', '<', '>', ':', '*', '|', '"']``
+ * See: https://en.wikipedia.org/wiki/Comparison_of_file_systems#Limits
+ *
+ * Defaults to ``[]`` (empty array)
*/
-'hashingTimeCost' => PASSWORD_ARGON2_DEFAULT_TIME_COST,
+'forbidden_filename_characters' => [],
/**
- * The hashing cost used by hashes generated by Nextcloud
- * Using a higher value requires more time and CPU power to calculate the hashes
+ * Deny specific file extensions. Matching existing files cannot be updated, and
+ * no new files can be created in matching folders.
+ *
+ * The '.part' extension is always forbidden, as it is used internally by Nextcloud.
+ *
+ * Defaults to ``['.filepart', '.part']``
*/
-'hashingCost' => 10,
+'forbidden_filename_extensions' => ['.part', '.filepart'],
/**
- * Blacklist a specific file or files and disallow the upload of files
- * with this name. ``.htaccess`` is blocked by default.
- * WARNING: USE THIS ONLY IF YOU KNOW WHAT YOU ARE DOING.
+ * Specify the name of a theme to apply to Nextcloud. Themes are located in
+ * ``nextcloud/themes/`` by default.
*
- * Defaults to ``array('.htaccess')``
+ * Defaults to the theming app, included since Nextcloud 9.
*/
-'blacklisted_files' => ['.htaccess'],
+'theme' => '',
/**
- * Define a default folder for shared files and folders other than root.
- * Changes to this value will only have effect on new shares.
- *
- * Defaults to ``/``
+ * Enforce a specific user theme, disabling user theming settings. Must be a
+ * valid ITheme ID, e.g., dark, dark-highcontrast, default, light,
+ * light-highcontrast, opendyslexic.
*/
-'share_folder' => '/',
+'enforce_theme' => '',
/**
- * If you are applying a theme to Nextcloud, enter the name of the theme here.
- * The default location for themes is ``nextcloud/themes/``.
+ * Enable or disable Progressive Web App (PWA) functionality, which allows
+ * browsers to open web applications in dedicated windows.
*
- * Defaults to the theming app which is shipped since Nextcloud 9
+ * Defaults to ``true``
*/
-'theme' => '',
+'theming.standalone_window.enabled' => true,
/**
- * The default cipher for encrypting files. Currently supported are:
+ * Specify the default cipher for encrypting files. Supported ciphers:
* - AES-256-CTR
* - AES-128-CTR
* - AES-256-CFB
@@ -1799,353 +2238,511 @@ $CONFIG = [
'cipher' => 'AES-256-CTR',
/**
- * The minimum Nextcloud desktop client version that will be allowed to sync with
- * this server instance. All connections made from earlier clients will be denied
- * by the server. Defaults to the minimum officially supported Nextcloud desktop
- * clientversion at the time of release of this server version.
+ * Use the legacy base64 format for encrypted files instead of the more
+ * space-efficient binary format. This affects only newly written files; existing
+ * encrypted files remain readable regardless of the format.
+ *
+ * Defaults to ``false``
+ */
+'encryption.use_legacy_base64_encoding' => false,
+
+/**
+ * Specify the minimum Nextcloud desktop client version allowed to sync with this
+ * server. Connections from earlier clients will be denied. Defaults to the
+ * minimum officially supported version at the time of this server release.
+ *
+ * Changing this may cause older, unsupported clients to malfunction, potentially
+ * leading to data loss or unexpected behavior.
*
- * When changing this, note that older unsupported versions of the Nextcloud desktop
- * client may not function as expected, and could lead to permanent data loss for
- * clients or other unexpected results.
+ * Defaults to ``3.1.0``
+ */
+'minimum.supported.desktop.version' => '3.1.0',
+
+/**
+ * Specify the maximum Nextcloud desktop client version allowed to sync with this
+ * server. Connections from later clients will be denied.
*
- * Defaults to ``2.0.0``
+ * Defaults to ``99.99.99``
*/
-'minimum.supported.desktop.version' => '2.0.0',
+'maximum.supported.desktop.version' => '99.99.99',
/**
- * Option to allow local storage to contain symlinks.
- * WARNING: Not recommended. This would make it possible for Nextcloud to access
- * files outside the data directory and could be considered a security risk.
+ * Allow local storage to contain symlinks.
+ * WARNING: Not recommended, as this allows Nextcloud to access files outside the
+ * data directory, posing a potential security risk.
*
* Defaults to ``false``
*/
'localstorage.allowsymlinks' => false,
/**
- * EXPERIMENTAL: option whether to include external storage in quota
- * calculation, defaults to false.
+ * Nextcloud overrides umask to ensure suitable access permissions regardless of
+ * web server or PHP-FPM configuration. Modifying this value has security
+ * implications and may cause issues with the installation.
+ *
+ * Most installations should not modify this value.
+ *
+ * Defaults to ``0022``
+ */
+'localstorage.umask' => 0022,
+
+/**
+ * Allow storage systems that do not support modifying existing files to overcome
+ * this limitation by removing files before overwriting.
+ *
+ * Defaults to ``false``
+ */
+'localstorage.unlink_on_truncate' => false,
+
+/**
+ * EXPERIMENTAL: Include external storage in quota calculations.
*
* Defaults to ``false``
*/
'quota_include_external_storage' => false,
/**
- * When an external storage is unavailable for some reasons, it will be flagged
- * as such for 10 minutes. When the trigger is a failed authentication attempt
- * the delay is higher and can be controlled with this option. The motivation
- * is to make account lock outs at Active Directories (and compatible) more
- * unlikely.
+ * When an external storage is unavailable (e.g., due to failed authentication),
+ * it is flagged as such for a specified duration. For authentication failures,
+ * this delay can be customized to reduce the likelihood of account lockouts in
+ * systems like Active Directory.
*
- * Defaults to ``1800`` (seconds)
+ * Defaults to ``1800`` seconds (30 minutes)
*/
'external_storage.auth_availability_delay' => 1800,
/**
- * Allows to create external storages of type "Local" in the web interface and APIs.
- *
- * When disable, it is still possible to create local storages with occ using
- * the following command:
+ * Allow creation of external storages of type "Local" via the web interface and
+ * APIs. When disabled, local storages can still be created using the occ command:
*
- * % php occ files_external:create /mountpoint local null::null -c datadir=/path/to/data
+ * occ files_external:create /mountpoint local null::null -c datadir=/path/to/data
*
* Defaults to ``true``
- *
*/
'files_external_allow_create_new_local' => true,
/**
- * Specifies how often the local filesystem (the Nextcloud data/ directory, and
- * NFS mounts in data/) is checked for changes made outside Nextcloud. This
- * does not apply to external storage.
- *
- * 0 -> Never check the filesystem for outside changes, provides a performance
- * increase when it's certain that no changes are made directly to the
- * filesystem
+ * Specify how often the local filesystem (Nextcloud data/ directory and NFS
+ * mounts in data/) is checked for changes made outside Nextcloud. This does not
+ * apply to external storage.
*
+ * 0 -> Never check the filesystem for outside changes, improving performance
+ * when no external changes are expected.
* 1 -> Check each file or folder at most once per request, recommended for
- * general use if outside changes might happen.
+ * general use if outside changes are possible.
*
* Defaults to ``0``
*/
'filesystem_check_changes' => 0,
/**
- * By default Nextcloud will store the part files created during upload in the
- * same storage as the upload target. Setting this to false will store the part
- * files in the root of the users folder which might be required to work with certain
- * external storage setups that have limited rename capabilities.
+ * Store part files created during upload in the same storage as the upload
+ * target. Setting this to false stores part files in the root of the user's
+ * folder, which may be necessary for external storage with limited rename
+ * capabilities.
*
* Defaults to ``true``
*/
'part_file_in_storage' => true,
/**
- * Where ``mount.json`` file should be stored, defaults to ``data/mount.json``
- * in the Nextcloud directory.
+ * Specify the location of the ``mount.json`` file.
*
* Defaults to ``data/mount.json`` in the Nextcloud directory.
*/
'mount_file' => '/var/www/nextcloud/data/mount.json',
/**
- * When ``true``, prevent Nextcloud from changing the cache due to changes in
- * the filesystem for all storage.
+ * Prevent Nextcloud from updating the cache due to filesystem changes for all
+ * storage.
*
* Defaults to ``false``
*/
'filesystem_cache_readonly' => false,
/**
- * Secret used by Nextcloud for various purposes, e.g. to encrypt data. If you
- * lose this string there will be data corruption.
- */
-'secret' => '',
-
-/**
- * List of trusted proxy servers
- *
- * You may set this to an array containing a combination of
- * - IPv4 addresses, e.g. `192.168.2.123`
- * - IPv4 ranges in CIDR notation, e.g. `192.168.2.0/24`
- * - IPv6 addresses, e.g. `fd9e:21a7:a92c:2323::1`
+ * List of trusted proxy servers. Supported formats:
+ * - IPv4 addresses, e.g., `192.168.2.123`
+ * - IPv4 ranges in CIDR notation, e.g., `192.168.2.0/24`
+ * - IPv6 addresses, e.g., `fd9e:21a7:a92c:2323::1`
+ * - IPv6 ranges in CIDR notation, e.g., `2001:db8:85a3:8d3:1319:8a20::/95`
*
- * _(CIDR notation for IPv6 is currently work in progress and thus not
- * available as of yet)_
+ * If a request's `REMOTE_ADDR` matches an address here, it is treated as a proxy,
+ * and the client IP is read from the HTTP header specified in
+ * `forwarded_for_headers` instead of `REMOTE_ADDR`.
*
- * When an incoming request's `REMOTE_ADDR` matches any of the IP addresses
- * specified here, it is assumed to be a proxy instead of a client. Thus, the
- * client IP will be read from the HTTP header specified in
- * `forwarded_for_headers` instead of from `REMOTE_ADDR`.
+ * Ensure `forwarded_for_headers` is configured if `trusted_proxies` is set.
*
- * So if you configure `trusted_proxies`, also consider setting
- * `forwarded_for_headers` which otherwise defaults to `HTTP_X_FORWARDED_FOR`
- * (the `X-Forwarded-For` header).
- *
- * Defaults to an empty array.
+ * Defaults to ``[]`` (empty array)
*/
'trusted_proxies' => ['203.0.113.45', '198.51.100.128', '192.168.2.0/24'],
/**
- * Headers that should be trusted as client IP address in combination with
- * `trusted_proxies`. If the HTTP header looks like 'X-Forwarded-For', then use
- * 'HTTP_X_FORWARDED_FOR' here.
+ * Headers trusted as containing the client IP address when used with
+ * `trusted_proxies`. For example, use `HTTP_X_FORWARDED_FOR` for the
+ * `X-Forwarded-For` header.
*
- * If set incorrectly, a client can spoof their IP address as visible to
- * Nextcloud, bypassing access controls and making logs useless!
+ * Incorrect configuration allows clients to spoof their IP address, bypassing
+ * access controls and rendering logs unreliable.
*
- * Defaults to ``'HTTP_X_FORWARDED_FOR'``
+ * Defaults to ``['HTTP_X_FORWARDED_FOR']``
*/
'forwarded_for_headers' => ['HTTP_X_FORWARDED', 'HTTP_FORWARDED_FOR'],
/**
- * max file size for animating gifs on public-sharing-site.
- * If the gif is bigger, it'll show a static preview
+ * List of trusted IP ranges for admin actions. If non-empty, all admin actions
+ * must originate from IPs within these ranges.
*
- * Value represents the maximum filesize in megabytes. Set to ``-1`` for
- * no limit.
+ * Supported formats:
+ * - IPv4 addresses or ranges, e.g., `192.0.2.42/32`, `233.252.0.0/24`
+ * - IPv6 addresses or ranges, e.g., `2001:db8::13:37/64`
*
- * Defaults to ``10`` megabytes
+ * Defaults to ``[]`` (empty array)
*/
-'max_filesize_animated_gifs_public_sharing' => 10,
-
+'allowed_admin_ranges' => ['192.0.2.42/32', '233.252.0.0/24', '2001:db8::13:37/64'],
/**
- * Enables transactional file locking.
- * This is enabled by default.
+ * Maximum file size (in megabytes) for animating GIFs on public sharing pages.
+ * If a GIF exceeds this size, a static preview is shown.
*
- * Prevents concurrent processes from accessing the same files
- * at the same time. Can help prevent side effects that would
- * be caused by concurrent operations. Mainly relevant for
- * very large installations with many users working with
- * shared files.
+ * Set to ``-1`` for no limit.
*
- * Defaults to ``true``
+ * Defaults to ``10`` megabytes
*/
-'filelocking.enabled' => true,
+'max_filesize_animated_gifs_public_sharing' => 10,
/**
- * Set the lock's time-to-live in seconds.
+ * Set the lock's time-to-live (TTL) in seconds. Locks older than this are
+ * automatically cleaned up.
*
- * Any lock older than this will be automatically cleaned up.
- *
- * Defaults to ``60*60`` seconds (1 hour) or the php
- * max_execution_time, whichever is higher.
+ * Defaults to ``3600`` seconds (1 hour) or the PHP `max_execution_time`,
+ * whichever is higher.
*/
'filelocking.ttl' => 60*60,
/**
- * Memory caching backend for file locking
- *
- * Because most memcache backends can clean values without warning using redis
- * is highly recommended to *avoid data loss*.
+ * Memory caching backend for file locking. Redis is highly recommended to avoid
+ * data loss, as many memcache backends may evict values unexpectedly.
*
* Defaults to ``none``
*/
'memcache.locking' => '\\OC\\Memcache\\Redis',
/**
- * Enable locking debug logging
+ * Enable debug logging for file locking. This can generate a large volume of log
+ * entries, potentially causing performance degradation and large log files on
+ * busy instances.
*
- * Note that this can lead to a very large volume of log items being written which can lead
- * to performance degradation and large log files on busy instance.
+ * Use with `log.condition` to limit logging in production environments.
*
- * Thus enabling this in production for longer periods of time is not recommended
- * or should be used together with the ``log.condition`` setting.
+ * Defaults to ``false``
*/
'filelocking.debug' => false,
/**
- * Disable the web based updater
+ * Disable the web-based updater.
+ *
+ * Defaults to ``false``
*/
'upgrade.disable-web' => false,
/**
- * Set this Nextcloud instance to debugging mode
- *
- * Only enable this for local development and not in production environments
- * This will disable the minifier and outputs some additional debug information
+ * Customize the CLI upgrade documentation link.
+ */
+'upgrade.cli-upgrade-link' => '',
+
+/**
+ * Customize the server logs documentation link for exception handling.
+ */
+'documentation_url.server_logs' => '',
+
+/**
+ * Enable debugging mode for Nextcloud. Only use for local development, not in
+ * production, as it disables minification and outputs additional debug
+ * information.
*
* Defaults to ``false``
*/
'debug' => false,
/**
- * Sets the data-fingerprint of the current data served
- *
- * This is a property used by the clients to find out if a backup has been
- * restored on the server. Once a backup is restored run
+ * Set the data fingerprint for the current data served. Used by clients to
+ * detect if a backup has been restored. Update this by running:
* ./occ maintenance:data-fingerprint
- * To set this to a new value.
*
- * Updating/Deleting this value can make connected clients stall until
- * the user has resolved conflicts.
+ * Changing or deleting this value may cause connected clients to stall until
+ * conflicts are resolved.
*
* Defaults to ``''`` (empty string)
*/
'data-fingerprint' => '',
/**
- * This entry is just here to show a warning in case somebody copied the sample
- * configuration. DO NOT ADD THIS SWITCH TO YOUR CONFIGURATION!
+ * This entry serves as a warning if the sample configuration was copied.
+ * DO NOT ADD THIS TO YOUR CONFIGURATION!
*
- * If you, brave person, have read until here be aware that you should not
- * modify *ANY* settings in this file without reading the documentation.
+ * Ensure all settings are modified only after consulting the documentation.
*/
'copied_sample_config' => true,
/**
- * use a custom lookup server to publish user data
+ * Use a custom lookup server to publish user data.
+ *
+ * Defaults to ``https://lookup.nextcloud.com``
*/
'lookup_server' => 'https://lookup.nextcloud.com',
/**
- * set to true if the server is used in a setup based on Nextcloud's Global Scale architecture
+ * Enable Nextcloud's Global Scale architecture.
+ *
+ * Defaults to ``false``
*/
'gs.enabled' => false,
/**
- * by default federation is only used internally in a Global Scale setup
- * If you want to allow federation outside of your environment set it to 'global'
+ * Configure federation for Global Scale setups. Set to 'global' to allow
+ * federation outside the environment.
+ *
+ * Defaults to ``internal``
*/
'gs.federation' => 'internal',
/**
- * List of incompatible user agents opted out from Same Site Cookie Protection.
- * Some user agents are notorious and don't really properly follow HTTP
- * specifications. For those, have an opt-out.
+ * List of user agents exempt from SameSite cookie protection due to non-standard
+ * HTTP behavior.
*
- * WARNING: only use this if you know what you are doing
+ * WARNING: Use only if you understand the implications.
+ *
+ * Defaults to:
+ * - /^WebDAVFS/ (OS X Finder)
+ * - /^Microsoft-WebDAV-MiniRedir/ (Windows WebDAV drive)
*/
'csrf.optout' => [
'/^WebDAVFS/', // OS X Finder
- '/^Microsoft-WebDAV-MiniRedir/', // Windows webdav drive
+ '/^Microsoft-WebDAV-MiniRedir/', // Windows WebDAV drive
],
/**
- * By default there is on public pages a link shown that allows users to
- * learn about the "simple sign up" - see https://nextcloud.com/signup/
+ * Specify allowed user agents for Login Flow V2 using regular expressions.
+ * User agents not matching this list are denied access to Login Flow V2.
+ *
+ * WARNING: Use only if you understand the implications.
+ *
+ * Example: Allow only the Nextcloud Android app:
+ * 'core.login_flow_v2.allowed_user_agents' => ['/Nextcloud-android/i'],
*
- * If this is set to "false" it will not show the link.
+ * Defaults to ``[]`` (empty array)
*/
-'simpleSignUpLink.shown' => true,
+'core.login_flow_v2.allowed_user_agents' => [],
/**
- * By default autocompletion is enabled for the login form on Nextcloud's login page.
- * While this is enabled, browsers are allowed to "remember" login names and such.
- * Some companies require it to be disabled to comply with their security policy.
+ * Show or hide the "simple sign up" link on public pages.
+ * See: https://nextcloud.com/signup/
*
- * Simply set this property to "false", if you want to turn this feature off.
+ * Defaults to ``true``
*/
+'simpleSignUpLink.shown' => true,
+/**
+ * Enable or disable autocompletion for the login form. Disabling this prevents
+ * browsers from remembering login credentials, which may be required for
+ * compliance with certain security policies.
+ *
+ * Defaults to ``true``
+ */
'login_form_autocomplete' => true,
/**
- * Disable background scanning of files
+ * Set a timeout (in seconds) for the login form. After this period, the form is
+ * reset to prevent password leaks on public devices if the user forgets to clear
+ * it.
*
- * By default, a background job runs every 10 minutes and execute a background
- * scan to sync filesystem and database. Only users with unscanned files
- * (size < 0 in filecache) are included. Maximum 500 users per job.
+ * A value of 0 disables the timeout.
*
- * Defaults to ``true``
+ * Defaults to ``300`` seconds (5 minutes)
+ */
+'login_form_timeout' => 300,
+
+/**
+ * Suppress warnings for outdated or unsupported browsers. When enabled, users
+ * can bypass the warning after reading it.
+ *
+ * Set to ``true`` to disable the warning.
+ *
+ * Defaults to ``false``
+ */
+'no_unsupported_browser_warning' => false,
+
+/**
+ * Disable background scanning of files. When enabled, a background job runs
+ * every 10 minutes to sync the filesystem and database for up to 500 users with
+ * unscanned files (size < 0 in filecache).
+ *
+ * Defaults to ``false``
*/
'files_no_background_scan' => false,
/**
- * Log all queries into a file
+ * Log all database queries to a file.
*
- * Warning: This heavily decreases the performance of the server and is only
- * meant to debug/profile the query interaction manually.
- * Also, it might log sensitive data into a plain text file.
+ * WARNING: This significantly reduces server performance and is intended only
+ * for debugging or profiling query interactions. Sensitive data may be logged in
+ * plain text.
*/
'query_log_file' => '',
/**
- * Log all redis requests into a file
+ * Prefix all queries with the request ID when set to `yes`.
*
- * Warning: This heavily decreases the performance of the server and is only
- * meant to debug/profile the redis interaction manually.
- * Also, it might log sensitive data into a plain text file.
+ * Requires `query_log_file` to be set.
*/
-'redis_log_file' => '',
+'query_log_file_requestid' => '',
/**
- * Log all LDAP requests into a file
+ * Include all query parameters in the query log when set to `yes`.
*
- * Warning: This heavily decreases the performance of the server and is only
- * meant to debug/profile the LDAP interaction manually.
- * Also, it might log sensitive data into a plain text file.
+ * Requires `query_log_file` to be set.
+ * WARNING: This may log sensitive data in plain text.
*/
-'ldap_log_file' => '',
+'query_log_file_parameters' => '',
+
+/**
+ * Include a backtrace in the query log when set to `yes`.
+ *
+ * Requires `query_log_file` to be set.
+ */
+'query_log_file_backtrace' => '',
/**
- * Enable diagnostics event logging
+ * Log all Redis requests to a file.
*
- * If enabled the timings of common execution steps will be logged to the
- * Nextcloud log at debug level. log.condition is useful to enable this on
- * production systems to only log under some conditions
+ * WARNING: This significantly reduces server performance and is intended only
+ * for debugging or profiling Redis interactions. Sensitive data may be logged in
+ * plain text.
+ */
+'redis_log_file' => '',
+
+/**
+ * Enable diagnostics event logging. Logs timings of common execution steps at
+ * debug level. Use with `log.condition` to enable conditionally in production.
+ *
+ * Defaults to ``true``
*/
'diagnostics.logging' => true,
/**
- * Limit diagnostics event logging to events longer than the configured threshold in ms
+ * Limit diagnostics event logging to events longer than the specified threshold
+ * (in milliseconds). A value of 0 disables diagnostics event logging.
*/
'diagnostics.logging.threshold' => 0,
/**
- * Enable profile globally
+ * Enable profiling globally.
*
* Defaults to ``true``
*/
'profile.enabled' => true,
/**
- * Enable file metadata collection
+ * Override default scopes for account data. Valid properties and scopes are
+ * defined in ``OCP\Accounts\IAccountManager``. Values are merged with defaults
+ * from ``OC\Accounts\AccountManager``.
+ *
+ * Example: Set phone property to private scope:
+ * ``[\OCP\Accounts\IAccountManager::PROPERTY_PHONE => \OCP\Accounts\IAccountManager::SCOPE_PRIVATE]``
+ */
+'account_manager.default_property_scope' => [],
+
+/**
+ * Enable the deprecated Projects feature, superseded by Related Resources since
+ * Nextcloud 25.
+ *
+ * Defaults to ``false``
+ */
+'projects.enabled' => false,
+
+/**
+ * Enable the bulk upload feature.
+ *
+ * Defaults to ``true``
+ */
+'bulkupload.enabled' => true,
+
+/**
+ * Enable fetching Open Graph metadata from remote URLs.
+ *
+ * Defaults to ``true``
+ */
+'reference_opengraph' => true,
+
+/**
+ * Enable the legacy unified search.
+ *
+ * Defaults to ``false``
+ */
+'unified_search.enabled' => false,
+
+/**
+ * Enable features that do not yet comply with accessibility standards.
+ *
+ * Defaults to ``true``
+ */
+'enable_non-accessible_features' => true,
+
+/**
+ * Directories where Nextcloud searches for external binaries (e.g., LibreOffice,
+ * sendmail, ffmpeg).
+ *
+ * Defaults to:
+ * - /usr/local/sbin
+ * - /usr/local/bin
+ * - /usr/sbin
+ * - /usr/bin
+ * - /sbin
+ * - /bin
+ * - /opt/bin
+ */
+'binary_search_paths' => [
+ '/usr/local/sbin',
+ '/usr/local/bin',
+ '/usr/sbin',
+ '/usr/bin',
+ '/sbin',
+ '/bin',
+ '/opt/bin',
+],
+
+/**
+ * Maximum chunk size for chunked uploads (in bytes). Larger chunks increase
+ * throughput but yield diminishing returns above 100 MiB. Services like
+ * Cloudflare may limit to 100 MiB.
*
- * This is helpful for the mobile clients and will enable a few optimization in
- * the future for the preview generation.
+ * Defaults to ``100 * 1024 * 1024`` (100 MiB)
+ */
+'files.chunked_upload.max_size' => 100 * 1024 * 1024,
+
+/**
+ * Maximum number of chunks uploaded in parallel during chunked uploads. Higher
+ * counts increase throughput but consume more server resources, with diminishing
+ * returns.
*
- * Note that when enabled, this data will be stored in the database and might increase
- * the database storage.
+ * Defaults to ``5``
+ */
+'files.chunked_upload.max_parallel_count' => 5,
+
+/**
+ * Allow users to manually delete files from their trashbin. Automated deletions
+ * (e.g., due to low quota) are unaffected.
+ *
+ * Defaults to ``true``
+ */
+'files.trash.delete' => true,
+
+/**
+ * Enable PHP 8.4 lazy objects for Dependency Injection to improve performance by
+ * avoiding instantiation of unused objects.
+ *
+ * Defaults to ``true``
*/
-'enable_file_metadata' => true,
+'enable_lazy_objects' => true,
];