Unverified Commit 9952f619 authored by Naïm Favier's avatar Naïm Favier Committed by GitHub
Browse files

Merge pull request #203022 from NixOS/backport-202866-to-release-22.11

parents e22d9c39 bbd46b68
Loading
Loading
Loading
Loading
+1 −1
Original line number Diff line number Diff line
@@ -656,7 +656,7 @@
          <literal>22.11</literal>. This is to make sure that people
          using
          <link xlink:href="https://docs.nextcloud.com/server/latest/admin_manual/configuration_files/encryption_configuration.html">server-side
          encryption</link> don’t loose access to their files.
          encryption</link> don’t lose access to their files.
        </para>
        <para>
          In any other case it’s safe to use OpenSSL 3 for PHP’s openssl
+1 −1
Original line number Diff line number Diff line
@@ -210,7 +210,7 @@ Available as [services.patroni](options.html#opt-services.patroni.enable).

- The `openssl`-extension for the PHP interpreter used by Nextcloud is built against OpenSSL 1.1 if
  [](#opt-system.stateVersion) is below `22.11`. This is to make sure that people using [server-side encryption](https://docs.nextcloud.com/server/latest/admin_manual/configuration_files/encryption_configuration.html)
  don't loose access to their files.
  don't lose access to their files.

  In any other case it's safe to use OpenSSL 3 for PHP's openssl extension. This can be done by setting
  [](#opt-services.nextcloud.enableBrokenCiphersForSSE) to `false`.