Settings Service Configuration
Introduction
The Infinite Scale Settings service provides functionality for other services to register new settings as well as storing and retrieving the respective settings' values.
Settings Managed
The settings service is currently used for managing the:
-
users'
profile
settings like the language and the email notification settings, -
possible user roles and their respective permissions,
-
assignment of roles to users.
As an example, user profile settings that can be changed in the Web UI must be persistent.
The settings service supports two different backends for persisting the data. The backend can be set via the SETTINGS_STORE_TYPE
environment variable. Supported values are:
-
metadata
: The default. This backend persists the settings data via thestorage-system
service. -
filesystem
: This backend persists the settings data in a directory on the local filesystem. The directory can be configured withSETTINGS_DATA_PATH
. This backend is not suitable for running multiple intances of thesettings
service in a scale-out deployment and should be therefore considered deprecated.
Settings Management
Infinite Scale services can register settings bundles with the settings service.
Settings Usage
Services can set or query Infinite Scale setting values of a user from settings bundles.
Service Accounts
The settings service needs to know the IDs of service accounts but it doesn’t need their secrets. Currently only one service account can be configured which has the admin role. This can be set with the SETTINGS_SERVICE_ACCOUNT_ID_ADMIN
envvar, but it will also pick up the global OCIS_SERVICE_ACCOUNT_ID
envvar. Also see the auth-service service description for additional details.
Default Language
The default language can be defined via the OCIS_DEFAULT_LANGUAGE
environment variable. If this variable is not defined, English will be used as default. The value has the ISO 639-1 format ("de", "en", etc.) and is limited to the list of supported languages. This setting can be used to set the default language for notification and invitation emails.
The OCIS_DEFAULT_LANGUAGE
setting impacts the notification
and userlog
services and the WebUI. Note that translations must exist for all named components to be presented correctly.
-
If
OCIS_DEFAULT_LANGUAGE
is not set, the expected behavior is:-
The
notification
anduserlog
services and the Web UI use English by default, until a user sets another language in the Web UI via . -
If a user sets another language in the Web UI in
, then thenotification
anduserlog
services and Web UI use the language defined by the user. If no translation is found, it falls back to English.
-
-
If
OCIS_DEFAULT_LANGUAGE
is set, the expected behavior is:-
The
notification
anduserlog
services and the Web UI useOCIS_DEFAULT_LANGUAGE
by default, until a user sets another language in the Web UI via . -
If a user sets another language in the Web UI in
, thenotification
anduserlog
services and Web UI use the language defined by the user. If no translation is found, it falls back toOCIS_DEFAULT_LANGUAGE
and then to English.
-
Custom Roles
It is possible to replace the default Infinite Scale roles (admin
, user
) with custom roles that contain custom permissions. One can set SETTINGS_BUNDLES_PATH
to the path of a json
file containing the new role definition.
[
{
"id": "38071a68-456a-4553-846a-fa67bf5596cc", // ID of the role. Recommendation is to use a random uuidv4. But any unique string will do.
"name": "user-light", // Internal name of the role. This is used by the system to identify the role. Any string will do here, but it should be unique among the other roles.
"type": "TYPE_ROLE", // Always use `TYPE_ROLE`
"extension": "ocis-roles", // Always use `ocis-roles`
"displayName": "User Light", // DisplayName of the role used in webui
"settings": [
], // Permissions attached to the role. See Details below.
"resource": {
"type": "TYPE_SYSTEM" // Always use `TYPE_SYSTEM`
}
}
]
To create custom roles:
-
Copy the role example to a
json
file. -
Change
id
,name
, anddisplayName
according your requirements. -
Copy the desired permissions from the
user-all-permissions
example to thesettings
array of the role. -
Set the
SETTINGS_BUNDLE_PATH
environment variable to the path/json-file and (re)start Infinite Scale.
See the full Custom Roles json example in the developer documentation for more details.
Caching
When using SETTINGS_STORE_TYPE=metadata
, the settings
service caches the results of queries against the storage backend to provide faster responses. The content of this cache is independent of the cache used in the storage-system
service as it caches directory listing and settings content stored in files.
The settings service can use a configured store via the global OCIS_CACHE_STORE
environment variable.
Note that for each global environment variable, an independent service-based one might be available additionally. For precedences see Environment Variable Notes. Check the configuration section below. Supported stores are:
Store Type | Description |
---|---|
|
Basic in-memory store. Will not survive a restart. |
|
Stores data using key-value-store feature of NATS JetStream. |
|
Stores data in a configured Redis Sentinel cluster. |
|
Stores nothing. Useful for testing. Not recommended in production environments. |
The settings service can only be scaled if not using the memory store and the stores are configured identically over all instances!
|
If you have used one of the deprecated stores of a former version, you should reconfigure to use one of the supported ones as the deprecated stores will be removed in a later version. |
- Store specific notes
-
-
When using
redis-sentinel
:
The Redis master to use is configured via e.g.OCIS_CACHE_STORE_NODES
in the form of<sentinel-host>:<sentinel-port>/<redis-master>
like10.10.0.200:26379/mymaster
. -
When using
nats-js-kv
:-
It is recommended to set
OCIS_CACHE_STORE_NODES
to the same value asOCIS_EVENTS_ENDPOINT
. That way the cache uses the same nats instance as the event bus. See the Event Bus Configuration for more details. -
Authentication can be added, if configured, via
OCIS_CACHE_AUTH_USERNAME
andOCIS_CACHE_AUTH_PASSWORD
. -
It is possible to set
OCIS_CACHE_DISABLE_PERSISTENCE
to instruct nats to not persist cache data on disc.
-
-
Event Bus Configuration
The Infinite Scale event bus can be configured by a set of environment variables.
|
Note that for each global environment variable, a service-based one might be available additionally. For precedences see Environment Variable Notes. Check the configuration section below.
Without the aim of completeness, see the list of environment variables to configure the event bus:
Envvar | Description |
---|---|
|
The address of the event system. |
|
The clusterID of the event system. Mandatory when using NATS as event system. |
|
Enable TLS for the connection to the events broker. |
|
Whether to verify the server TLS certificates. |
|
The username to authenticate with the events broker. |
|
The password to authenticate with the events broker. |
Configuration
Environment Variables
The settings
service is configured via the following environment variables. Read the Environment Variable Types documentation for important details. Column IV
shows with which release the environment variable has been introduced.
Name | IV | Type | Default Value | Description |
---|---|---|---|---|
|
pre5.0 |
bool |
false |
Activates tracing. |
|
pre5.0 |
string |
|
The type of tracing. Defaults to '', which is the same as 'jaeger'. Allowed tracing types are 'jaeger' and '' as of now. |
|
pre5.0 |
string |
|
The endpoint of the tracing agent. |
|
pre5.0 |
string |
|
The HTTP endpoint for sending spans directly to a collector, i.e. http://jaeger-collector:14268/api/traces. Only used if the tracing endpoint is unset. |
|
pre5.0 |
string |
|
The log level. Valid values are: 'panic', 'fatal', 'error', 'warn', 'info', 'debug', 'trace'. |
|
pre5.0 |
bool |
false |
Activates pretty log output. |
|
pre5.0 |
bool |
false |
Activates colorized log output. |
|
pre5.0 |
string |
|
The path to the log file. Activates logging to this file if set. |
|
pre5.0 |
string |
127.0.0.1:9194 |
Bind address of the debug server, where metrics, health, config and debug endpoints will be exposed. |
|
pre5.0 |
string |
|
Token to secure the metrics endpoint. |
|
pre5.0 |
bool |
false |
Enables pprof, which can be used for profiling. |
|
pre5.0 |
bool |
false |
Enables zpages, which can be used for collecting and viewing in-memory traces. |
|
pre5.0 |
string |
127.0.0.1:9190 |
The bind address of the HTTP service. |
|
pre5.0 |
bool |
false |
Activates TLS for the http based services using the server certifcate and key configured via OCIS_HTTP_TLS_CERTIFICATE and OCIS_HTTP_TLS_KEY. If OCIS_HTTP_TLS_CERTIFICATE is not set a temporary server certificate is generated - to be used with PROXY_INSECURE_BACKEND=true. |
|
pre5.0 |
string |
|
Path/File name of the TLS server certificate (in PEM format) for the http services. |
|
pre5.0 |
string |
|
Path/File name for the TLS certificate key (in PEM format) for the server certificate to use for the http services. |
|
pre5.0 |
string |
/ |
Subdirectory that serves as the root for this HTTP service. |
|
pre5.0 |
[]string |
[*] |
A list of allowed CORS origins. See following chapter for more details: Access-Control-Allow-Origin at https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Access-Control-Allow-Origin. See the Environment Variable Types description for more details. |
|
pre5.0 |
[]string |
[GET POST PUT PATCH DELETE OPTIONS] |
A list of allowed CORS methods. See following chapter for more details: Access-Control-Request-Method at https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Access-Control-Request-Method. See the Environment Variable Types description for more details. |
|
pre5.0 |
[]string |
[Authorization Origin Content-Type Accept X-Requested-With X-Request-Id] |
A list of allowed CORS headers. See following chapter for more details: Access-Control-Request-Headers at https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Access-Control-Request-Headers. See the Environment Variable Types description for more details. |
|
pre5.0 |
bool |
true |
Allow credentials for CORS.See following chapter for more details: Access-Control-Allow-Credentials at https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Access-Control-Allow-Credentials. |
|
pre5.0 |
string |
127.0.0.1:9191 |
The bind address of the GRPC service. |
|
pre5.0 |
string |
com.owncloud.api.storage-system |
GRPC address of the STORAGE-SYSTEM service. |
|
pre5.0 |
string |
com.owncloud.api.storage-system |
GRPC address of the STORAGE-SYSTEM service. |
|
pre5.0 |
string |
|
ID of the oCIS STORAGE-SYSTEM system user. Admins need to set the ID for the STORAGE-SYSTEM system user in this config option which is then used to reference the user. Any reasonable long string is possible, preferably this would be an UUIDv4 format. |
|
pre5.0 |
string |
internal |
IDP of the oCIS STORAGE-SYSTEM system user. |
|
pre5.0 |
string |
|
API key for the STORAGE-SYSTEM system user. |
|
pre5.0 |
string |
memory |
The type of the cache store. Supported values are: 'memory', 'redis-sentinel', 'nats-js-kv', 'noop'. See the text description for details. |
|
pre5.0 |
[]string |
[127.0.0.1:9233] |
A list of nodes to access the configured store. This has no effect when 'memory' store is configured. Note that the behaviour how nodes are used is dependent on the library of the configured store. See the Environment Variable Types description for more details. |
|
pre5.0 |
string |
settings-cache |
The database name the configured store should use. |
|
pre5.0 |
string |
settings_files |
The database table the store should use for the file cache. |
|
pre5.0 |
string |
settings_dirs |
The database table the store should use for the directory cache. |
|
pre5.0 |
Duration |
10m0s |
Default time to live for entries in the cache. Only applied when access tokens has no expiration. See the Environment Variable Types description for more details. |
|
5.0 |
bool |
false |
Disables persistence of the cache. Only applies when store type 'nats-js-kv' is configured. Defaults to false. |
|
5.0 |
string |
|
The username to authenticate with the cache. Only applies when store type 'nats-js-kv' is configured. |
|
5.0 |
string |
|
The password to authenticate with the cache. Only applies when store type 'nats-js-kv' is configured. |
|
pre5.0 |
string |
|
The path to a JSON file with a list of bundles. If not defined, the default bundles will be loaded. |
|
pre5.0 |
string |
|
ID of the user that should receive admin privileges. Consider that the UUID can be encoded in some LDAP deployment configurations like in .ldif files. These need to be decoded beforehand. |
|
pre5.0 |
string |
|
The secret to mint and validate jwt tokens. |
|
pre5.0 |
bool |
false |
The default role assignments the demo users should be setup. |
|
5.0 |
[]string |
[service-user-id] |
The list of all service account IDs. These will be assigned the hidden 'service-account' role. Note: When using 'OCIS_SERVICE_ACCOUNT_ID' this will contain only one value while 'SETTINGS_SERVICE_ACCOUNT_IDS' can have multiple. See the 'auth-service' service description for more details about service accounts. |
|
5.0 |
string |
|
The default language used by services and the WebUI. If not defined, English will be used as default. See the documentation for more details. |
YAML Example
-
Note the file shown below must be renamed and placed in the correct folder according to the Configuration File Naming conventions to be effective.
-
See the Notes for Environment Variables if you want to use environment variables in the yaml file.
# Autogenerated
# Filename: settings-config-example.yaml
tracing:
enabled: false
type: ""
endpoint: ""
collector: ""
log:
level: ""
pretty: false
color: false
file: ""
debug:
addr: 127.0.0.1:9194
token: ""
pprof: false
zpages: false
http:
addr: 127.0.0.1:9190
tls:
enabled: false
cert: ""
key: ""
root: /
cors:
allow_origins:
- '*'
allow_methods:
- GET
- POST
- PUT
- PATCH
- DELETE
- OPTIONS
allow_headers:
- Authorization
- Origin
- Content-Type
- Accept
- X-Requested-With
- X-Request-Id
allow_credentials: true
grpc:
addr: 127.0.0.1:9191
tls: null
grpc_client_tls: null
metadata_config:
gateway_addr: com.owncloud.api.storage-system
storage_addr: com.owncloud.api.storage-system
system_user_id: ""
system_user_idp: internal
system_user_api_key: ""
cache:
store: memory
addresses:
- 127.0.0.1:9233
database: settings-cache
files_table: settings_files
directories_table: settings_dirs
ttl: 10m0s
disable_persistence: false
username: ""
password: ""
bundles_path: ""
admin_user_id: ""
token_manager:
jwt_secret: ""
set_default_assignments: false
service_account_ids:
- service-user-id
default_language: ""