ownCloud
Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Back to homepage

Settings

Abstract

The settings service provides functionality for other services to register new settings as well as storing and retrieving the respective settings’ values.

Table of Contents

Settings Managed

The settings service is currently used for managing the:

  • users’ profile settings like the language and the email notification settings,
  • possible user roles and their respective permissions,
  • assignment of roles to users.

As an example, user profile settings that can be changed in the Web UI must be persistent.

The settings service persists the settings data via the storage-system service.

Caching

The settings service caches the results of queries against the storage backend to provide faster responses. The content of this cache is independent of the cache used in the storage-system service as it caches directory listing and settings content stored in files.

The store used for the cache can be configured using the SETTINGS_CACHE_STORE environment variable. Possible stores are:

  • memory: Basic in-memory store and the default.
  • redis-sentinel: Stores data in a configured Redis Sentinel cluster.
  • nats-js-kv: Stores data using key-value-store feature of nats jetstream
  • noop: Stores nothing. Useful for testing. Not recommended in production environments.

Other store types may work but are not supported currently.

Note: The service can only be scaled if not using memory store and the stores are configured identically over all instances!

Note that if you have used one of the deprecated stores, you should reconfigure to one of the supported ones as the deprecated stores will be removed in a later version.

Store specific notes:

  • When using redis-sentinel, the Redis master to use is configured via e.g. OCIS_CACHE_STORE_NODES in the form of <sentinel-host>:<sentinel-port>/<redis-master> like 10.10.0.200:26379/mymaster.
  • When using nats-js-kv it is recommended to set OCIS_CACHE_STORE_NODES to the same value as OCIS_EVENTS_ENDPOINT. That way the cache uses the same nats instance as the event bus.
  • When using the nats-js-kv store, it is possible to set OCIS_CACHE_DISABLE_PERSISTENCE to instruct nats to not persist cache data on disc.

Settings Management

Infinite Scale services can register settings bundles with the settings service.

Settings Usage

Services can set or query Infinite Scale setting values of a user from settings bundles.

Service Accounts

The settings service needs to know the IDs of service accounts but it doesn’t need their secrets. They can be configured using the SETTINGS_SERVICE_ACCOUNTS_IDS envvar. When only using one service account OCIS_SERVICE_ACCOUNT_ID can also be used. All configured service accounts will get a hidden ‘service-account’ role. This role contains all permissions the service account needs but will not appear calls to the list roles endpoint. It is not possible to assign the ‘service-account’ role to a normal user.

Default Language

The default language can be defined via the OCIS_DEFAULT_LANGUAGE environment variable. If this variable is not defined, English will be used as default. The value has the ISO 639-1 format (“de”, “en”, etc.) and is limited by the list supported languages. This setting can be used to set the default language for notification and invitation emails.

Important developer note: the list of supported languages is at the moment not easy defineable, as it is the minimum intersection of languages shown in the WebUI and languages defined in the ocis code for the use of notifications and userlog. Even more, not all languages where there are translations available on transifex, are available in the WebUI respectively for ocis notifications, and the translation rate for existing languages is partially not that high. You will see therefore quite often English default strings though a supported language may exist and was selected.

The OCIS_DEFAULT_LANGUAGE setting impacts the notification and userlog services and the WebUI. Note that translations must exist for all named components to be presented correctly.

  • If OCIS_DEFAULT_LANGUAGE is not set, the expected behavior is:

    • The notification and userlog services and the WebUI use English by default until a user sets another language in the WebUI via Account -> Language.
    • If a user sets another language in the WebUI in Account -> Language, then the notification and userlog services and WebUI use the language defined by the user. If no translation is found, it falls back to English.
  • If OCIS_DEFAULT_LANGUAGE is set, the expected behavior is:

    • The notification and userlog services and the WebUI use OCIS_DEFAULT_LANGUAGE by default until a user sets another language in the WebUI via Account -> Language.
    • If a user sets another language in the WebUI in Account -> Language, the notification and userlog services and WebUI use the language defined by the user. If no translation is found, it falls back to OCIS_DEFAULT_LANGUAGE and then to English.

Custom Roles

It is possible to replace the default ocis roles (admin, user) with custom roles that contain custom permissions. One can set SETTINGS_BUNDLES_PATH to the path of a json file containing the new roles.

Role Example:

[
    {
        "id": "38071a68-456a-4553-846a-fa67bf5596cc", // ID of the role. Recommendation is to use a random uuidv4. But any unique string will do.
        "name": "user-light",                         // Internal name of the role. This is used by the system to identify the role. Any string will do here, but it should be unique among the other roles.
        "type": "TYPE_ROLE",                          // Always use `TYPE_ROLE`
        "extension": "ocis-roles",                    // Always use `ocis-roles`
        "displayName": "User Light",                  // DisplayName of the role used in webui
        "settings": [
        ],                                            // Permissions attached to the role. See Details below.
        "resource": {
            "type": "TYPE_SYSTEM"                     // Always use `TYPE_SYSTEM`
        }
    }
]

To create custom roles:

  • Copy the role example to a json file.
  • Change id, name, and displayName to your liking.
  • Copy the desired permissions from the user-all-permissions example below to the settings array of the role.
  • Set the SETTINGS_BUNDLE_PATH envvar to the path of the json file and start ocis

Example File:

[
    {
        "id": "38071a68-456a-4553-846a-fa67bf5596cc",
        "name": "user-1-permission",
        "type": "TYPE_ROLE",
        "extension": "ocis-roles",
        "displayName": "User with one permission only",
        "settings": [
            {
                "id": "7d81f103-0488-4853-bce5-98dcce36d649",
                "name": "Language.ReadWrite",
                "displayName": "Permission to read and set the language",
                "permissionValue": {
                    "operation": "OPERATION_READWRITE",
                    "constraint": "CONSTRAINT_OWN"
                },
                "resource": {
                    "type": "TYPE_SETTING",
                    "id": "aa8cfbe5-95d4-4f7e-a032-c3c01f5f062f"
                }
            }
        ],
        "resource": {
            "type": "TYPE_SYSTEM"
        }
    },
    {
        "id": "71881883-1768-46bd-a24d-a356a2afdf7f",
        "name": "user-all-permissions",
        "type": "TYPE_ROLE",
        "extension": "ocis-roles",
        "displayName": "User with all available permissions",
        "settings": [
            {
                "id": "8e587774-d929-4215-910b-a317b1e80f73",
                "name": "Accounts.ReadWrite",
                "displayName": "Account Management",
                "description": "This permission gives full access to everything that is related to account management.",
                "permissionValue": {
                    "operation": "OPERATION_READWRITE",
                    "constraint": "CONSTRAINT_ALL"
                },
                "resource": {
                    "type": "TYPE_USER",
                    "id": "all"
                }
            },
            {
                "id": "4e41363c-a058-40a5-aec8-958897511209",
                "name": "AutoAcceptShares.ReadWriteDisabled",
                "displayName": "enable/disable auto accept shares",
                "permissionValue": {
                    "operation": "OPERATION_READWRITE",
                    "constraint": "CONSTRAINT_OWN"
                },
                "resource": {
                    "type": "TYPE_SETTING",
                    "id": "ec3ed4a3-3946-4efc-8f9f-76d38b12d3a9"
                }
            },
            {
                "id": "ed83fc10-1f54-4a9e-b5a7-fb517f5f3e01",
                "name": "Logo.Write",
                "displayName": "Change logo",
                "description": "This permission permits to change the system logo.",
                "permissionValue": {
                    "operation": "OPERATION_READWRITE",
                    "constraint": "CONSTRAINT_ALL"
                },
                "resource": {
                    "type": "TYPE_SYSTEM"
                }
            },
            {
                "id": "11516bbd-7157-49e1-b6ac-d00c820f980b",
                "name": "PublicLink.Write",
                "displayName": "Write publiclink",
                "description": "This permission allows creating public links.",
                "permissionValue": {
                    "operation": "OPERATION_WRITE",
                    "constraint": "CONSTRAINT_ALL"
                },
                "resource": {
                    "type": "TYPE_SHARE"
                }
            },
            {
                "id": "069c08b1-e31f-4799-9ed6-194b310e7244",
                "name": "Shares.Write",
                "displayName": "Write share",
                "description": "This permission allows creating shares.",
                "permissionValue": {
                    "operation": "OPERATION_WRITE",
                    "constraint": "CONSTRAINT_ALL"
                },
                "resource": {
                    "type": "TYPE_SHARE"
                }
            },
            {
                "id": "79e13b30-3e22-11eb-bc51-0b9f0bad9a58",
                "name": "Drives.Create",
                "displayName": "Create Space",
                "description": "This permission allows creating new spaces.",
                "permissionValue": {
                    "operation": "OPERATION_READWRITE",
                    "constraint": "CONSTRAINT_ALL"
                },
                "resource": {
                    "type": "TYPE_SYSTEM"
                }
            },
            {
                "id": "5de9fe0a-4bc5-4a47-b758-28f370caf169",
                "name": "Drives.DeletePersonal",
                "displayName": "Delete All Home Spaces",
                "description": "This permission allows deleting home spaces.",
                "permissionValue": {
                    "operation": "OPERATION_DELETE",
                    "constraint": "CONSTRAINT_ALL"
                },
                "resource": {
                    "type": "TYPE_SYSTEM"
                }
            },
            {
                "id": "fb60b004-c1fa-4f09-bf87-55ce7d46ac61",
                "name": "Drives.DeleteProject",
                "displayName": "Delete AllSpaces",
                "description": "This permission allows deleting all spaces.",
                "permissionValue": {
                    "operation": "OPERATION_DELETE",
                    "constraint": "CONSTRAINT_ALL"
                },
                "resource": {
                    "type": "TYPE_SYSTEM"
                }
            },
            {
                "id": "e9a697c5-c67b-40fc-982b-bcf628e9916d",
                "name": "ReadOnlyPublicLinkPassword.Delete",
                "displayName": "Delete Read-Only Public link password",
                "description": "This permission permits to opt out of a public link password enforcement.",
                "permissionValue": {
                    "operation": "OPERATION_WRITE",
                    "constraint": "CONSTRAINT_ALL"
                },
                "resource": {
                    "type": "TYPE_SHARE"
                }
            },
            {
                "id": "ad5bb5e5-dc13-4cd3-9304-09a424564ea8",
                "name": "EmailNotifications.ReadWriteDisabled",
                "displayName": "Disable Email Notifications",
                "permissionValue": {
                    "operation": "OPERATION_READWRITE",
                    "constraint": "CONSTRAINT_OWN"
                },
                "resource": {
                    "type": "TYPE_SETTING",
                    "id": "33ffb5d6-cd07-4dc0-afb0-84f7559ae438"
                }
            },
            {
                "id": "522adfbe-5908-45b4-b135-41979de73245",
                "name": "Groups.ReadWrite",
                "displayName": "Group Management",
                "description": "This permission gives full access to everything that is related to group management.",
                "permissionValue": {
                    "operation": "OPERATION_READWRITE",
                    "constraint": "CONSTRAINT_ALL"
                },
                "resource": {
                    "type": "TYPE_GROUP",
                    "id": "all"
                }
            },
            {
                "id": "7d81f103-0488-4853-bce5-98dcce36d649",
                "name": "Language.ReadWrite",
                "displayName": "Permission to read and set the language",
                "permissionValue": {
                    "operation": "OPERATION_READWRITE",
                    "constraint": "CONSTRAINT_ALL"
                },
                "resource": {
                    "type": "TYPE_SETTING",
                    "id": "aa8cfbe5-95d4-4f7e-a032-c3c01f5f062f"
                }
            },
            {
                "id": "4ebaa725-bfaa-43c5-9817-78bc9994bde4",
                "name": "Favorites.List",
                "displayName": "List Favorites",
                "description": "This permission allows listing favorites.",
                "permissionValue": {
                    "operation": "OPERATION_READ",
                    "constraint": "CONSTRAINT_OWN"
                },
                "resource": {
                    "type": "TYPE_SYSTEM"
                }
            },
            {
                "id": "016f6ddd-9501-4a0a-8ebe-64a20ee8ec82",
                "name": "Drives.List",
                "displayName": "List All Spaces",
                "description": "This permission allows listing all spaces.",
                "permissionValue": {
                    "operation": "OPERATION_READ",
                    "constraint": "CONSTRAINT_ALL"
                },
                "resource": {
                    "type": "TYPE_SYSTEM"
                }
            },
            {
                "id": "b44b4054-31a2-42b8-bb71-968b15cfbd4f",
                "name": "Drives.ReadWrite",
                "displayName": "Manage space properties",
                "description": "This permission allows managing space properties such as name and description.",
                "permissionValue": {
                    "operation": "OPERATION_READWRITE",
                    "constraint": "CONSTRAINT_ALL"
                },
                "resource": {
                    "type": "TYPE_SYSTEM"
                }
            },
            {
                "id": "a53e601e-571f-4f86-8fec-d4576ef49c62",
                "name": "Roles.ReadWrite",
                "displayName": "Role Management",
                "description": "This permission gives full access to everything that is related to role management.",
                "permissionValue": {
                    "operation": "OPERATION_READWRITE",
                    "constraint": "CONSTRAINT_ALL"
                },
                "resource": {
                    "type": "TYPE_USER",
                    "id": "all"
                }
            },
            {
                "id": "4e6f9709-f9e7-44f1-95d4-b762d27b7896",
                "name": "Drives.ReadWritePersonalQuota",
                "displayName": "Set Personal Space Quota",
                "description": "This permission allows managing personal space quotas.",
                "permissionValue": {
                    "operation": "OPERATION_READWRITE",
                    "constraint": "CONSTRAINT_ALL"
                },
                "resource": {
                    "type": "TYPE_SYSTEM"
                }
            },
            {
                "id": "977f0ae6-0da2-4856-93f3-22e0a8482489",
                "name": "Drives.ReadWriteProjectQuota",
                "displayName": "Set Project Space Quota",
                "description": "This permission allows managing project space quotas.",
                "permissionValue": {
                    "operation": "OPERATION_READWRITE",
                    "constraint": "CONSTRAINT_ALL"
                },
                "resource": {
                    "type": "TYPE_SYSTEM"
                }
            },
            {
                "id": "3d58f441-4a05-42f8-9411-ef5874528ae1",
                "name": "Settings.ReadWrite",
                "displayName": "Settings Management",
                "description": "This permission gives full access to everything that is related to settings management.",
                "permissionValue": {
                    "operation": "OPERATION_READWRITE",
                    "constraint": "CONSTRAINT_ALL"
                },
                "resource": {
                    "type": "TYPE_USER",
                    "id": "all"
                }
            },
            {
                "id": "cf3faa8c-50d9-4f84-9650-ff9faf21aa9d",
                "name": "Drives.ReadWriteEnabled",
                "displayName": "Space ability",
                "description": "This permission allows enabling and disabling spaces.",
                "permissionValue": {
                    "operation": "OPERATION_READWRITE",
                    "constraint": "CONSTRAINT_ALL"
                },
                "resource": {
                    "type": "TYPE_SYSTEM"
                }
            },
            {
                "id": "a54778fd-1c45-47f0-892d-655caf5236f2",
                "name": "Favorites.Write",
                "displayName": "Write Favorites",
                "description": "This permission allows marking files as favorites.",
                "permissionValue": {
                    "operation": "OPERATION_WRITE",
                    "constraint": "CONSTRAINT_OWN"
                },
                "resource": {
                    "type": "TYPE_FILE"
                }
            }
        ],
        "resource": {
            "type": "TYPE_SYSTEM"
        }
    }
]

Example Yaml Config

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
# Autogenerated
# Filename: settings-config-example.yaml

tracing:
  enabled: false
  type: ""
  endpoint: ""
  collector: ""
log:
  level: ""
  pretty: false
  color: false
  file: ""
debug:
  addr: 127.0.0.1:9194
  token: ""
  pprof: false
  zpages: false
http:
  addr: 127.0.0.1:9190
  tls:
    enabled: false
    cert: ""
    key: ""
  root: /
  cors:
    allow_origins:
    - '*'
    allow_methods:
    - GET
    - POST
    - PUT
    - PATCH
    - DELETE
    - OPTIONS
    allow_headers:
    - Authorization
    - Origin
    - Content-Type
    - Accept
    - X-Requested-With
    - X-Request-Id
    allow_credentials: true
grpc:
  addr: 127.0.0.1:9191
  tls: null
grpc_client_tls: null
metadata_config:
  gateway_addr: com.owncloud.api.storage-system
  storage_addr: com.owncloud.api.storage-system
  system_user_id: ""
  system_user_idp: internal
  system_user_api_key: ""
  cache:
    store: memory
    addresses:
    - 127.0.0.1:9233
    database: settings-cache
    files_table: settings_files
    directories_table: settings_dirs
    ttl: 10m0s
    disable_persistence: false
    username: ""
    password: ""
bundles_path: ""
admin_user_id: ""
token_manager:
  jwt_secret: ""
set_default_assignments: false
service_account_ids:
- service-user-id
default_language: ""

Environment Variables

Name Type Default Value Description
OCIS_TRACING_ENABLED
SETTINGS_TRACING_ENABLED
bool false Activates tracing.
OCIS_TRACING_TYPE
SETTINGS_TRACING_TYPE
string The type of tracing. Defaults to ‘’, which is the same as ‘jaeger’. Allowed tracing types are ‘jaeger’ and ’’ as of now.
OCIS_TRACING_ENDPOINT
SETTINGS_TRACING_ENDPOINT
string The endpoint of the tracing agent.
OCIS_TRACING_COLLECTOR
SETTINGS_TRACING_COLLECTOR
string The HTTP endpoint for sending spans directly to a collector, i.e. http://jaeger-collector:14268/api/traces. Only used if the tracing endpoint is unset.
OCIS_LOG_LEVEL
SETTINGS_LOG_LEVEL
string The log level. Valid values are: ‘panic’, ‘fatal’, ’error’, ‘warn’, ‘info’, ‘debug’, ’trace’.
OCIS_LOG_PRETTY
SETTINGS_LOG_PRETTY
bool false Activates pretty log output.
OCIS_LOG_COLOR
SETTINGS_LOG_COLOR
bool false Activates colorized log output.
OCIS_LOG_FILE
SETTINGS_LOG_FILE
string The path to the log file. Activates logging to this file if set.
SETTINGS_DEBUG_ADDR string 127.0.0.1:9194 Bind address of the debug server, where metrics, health, config and debug endpoints will be exposed.
SETTINGS_DEBUG_TOKEN string Token to secure the metrics endpoint.
SETTINGS_DEBUG_PPROF bool false Enables pprof, which can be used for profiling.
SETTINGS_DEBUG_ZPAGES bool false Enables zpages, which can be used for collecting and viewing in-memory traces.
SETTINGS_HTTP_ADDR string 127.0.0.1:9190 The bind address of the HTTP service.
OCIS_HTTP_TLS_ENABLED bool false Activates TLS for the http based services using the server certifcate and key configured via OCIS_HTTP_TLS_CERTIFICATE and OCIS_HTTP_TLS_KEY. If OCIS_HTTP_TLS_CERTIFICATE is not set a temporary server certificate is generated - to be used with PROXY_INSECURE_BACKEND=true.
OCIS_HTTP_TLS_CERTIFICATE string Path/File name of the TLS server certificate (in PEM format) for the http services.
OCIS_HTTP_TLS_KEY string Path/File name for the TLS certificate key (in PEM format) for the server certificate to use for the http services.
SETTINGS_HTTP_ROOT string / Subdirectory that serves as the root for this HTTP service.
OCIS_CORS_ALLOW_ORIGINS
SETTINGS_CORS_ALLOW_ORIGINS
[]string [*] A list of allowed CORS origins. See following chapter for more details: Access-Control-Allow-Origin at https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Access-Control-Allow-Origin. See the Environment Variable Types description for more details.
OCIS_CORS_ALLOW_METHODS
SETTINGS_CORS_ALLOW_METHODS
[]string [GET POST PUT PATCH DELETE OPTIONS] A list of allowed CORS methods. See following chapter for more details: Access-Control-Request-Method at https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Access-Control-Request-Method. See the Environment Variable Types description for more details.
OCIS_CORS_ALLOW_HEADERS
SETTINGS_CORS_ALLOW_HEADERS
[]string [Authorization Origin Content-Type Accept X-Requested-With X-Request-Id] A list of allowed CORS headers. See following chapter for more details: Access-Control-Request-Headers at https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Access-Control-Request-Headers. See the Environment Variable Types description for more details.
OCIS_CORS_ALLOW_CREDENTIALS
SETTINGS_CORS_ALLOW_CREDENTIALS
bool true Allow credentials for CORS.See following chapter for more details: Access-Control-Allow-Credentials at https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Access-Control-Allow-Credentials.
SETTINGS_GRPC_ADDR string 127.0.0.1:9191 The bind address of the GRPC service.
SETTINGS_STORAGE_GATEWAY_GRPC_ADDR
STORAGE_GATEWAY_GRPC_ADDR
string com.owncloud.api.storage-system GRPC address of the STORAGE-SYSTEM service.
SETTINGS_STORAGE_GRPC_ADDR
STORAGE_GRPC_ADDR
string com.owncloud.api.storage-system GRPC address of the STORAGE-SYSTEM service.
OCIS_SYSTEM_USER_ID
SETTINGS_SYSTEM_USER_ID
string ID of the oCIS STORAGE-SYSTEM system user. Admins need to set the ID for the STORAGE-SYSTEM system user in this config option which is then used to reference the user. Any reasonable long string is possible, preferably this would be an UUIDv4 format.
OCIS_SYSTEM_USER_IDP
SETTINGS_SYSTEM_USER_IDP
string internal IDP of the oCIS STORAGE-SYSTEM system user.
OCIS_SYSTEM_USER_API_KEY string API key for the STORAGE-SYSTEM system user.
OCIS_CACHE_STORE
SETTINGS_CACHE_STORE
string memory The type of the cache store. Supported values are: ‘memory’, ‘redis-sentinel’, ’nats-js-kv’, ’noop’. See the text description for details.
OCIS_CACHE_STORE_NODES
SETTINGS_CACHE_STORE_NODES
[]string [127.0.0.1:9233] A list of nodes to access the configured store. This has no effect when ‘memory’ store is configured. Note that the behaviour how nodes are used is dependent on the library of the configured store. See the Environment Variable Types description for more details.
OCIS_CACHE_DATABASE string settings-cache The database name the configured store should use.
SETTINGS_FILE_CACHE_TABLE string settings_files The database table the store should use for the file cache.
SETTINGS_DIRECTORY_CACHE_TABLE string settings_dirs The database table the store should use for the directory cache.
OCIS_CACHE_TTL
SETTINGS_CACHE_TTL
Duration 10m0s Default time to live for entries in the cache. Only applied when access tokens has no expiration. See the Environment Variable Types description for more details.
OCIS_CACHE_DISABLE_PERSISTENCE
SETTINGS_CACHE_DISABLE_PERSISTENCE
bool false Disables persistence of the cache. Only applies when store type ’nats-js-kv’ is configured. Defaults to false.
OCIS_CACHE_AUTH_USERNAME
SETTINGS_CACHE_AUTH_USERNAME
string The username to authenticate with the cache. Only applies when store type ’nats-js-kv’ is configured.
OCIS_CACHE_AUTH_PASSWORD
SETTINGS_CACHE_AUTH_PASSWORD
string The password to authenticate with the cache. Only applies when store type ’nats-js-kv’ is configured.
SETTINGS_BUNDLES_PATH string The path to a JSON file with a list of bundles. If not defined, the default bundles will be loaded.
OCIS_ADMIN_USER_ID
SETTINGS_ADMIN_USER_ID
string ID of the user that should receive admin privileges. Consider that the UUID can be encoded in some LDAP deployment configurations like in .ldif files. These need to be decoded beforehand.
OCIS_JWT_SECRET
SETTINGS_JWT_SECRET
string The secret to mint and validate jwt tokens.
SETTINGS_SETUP_DEFAULT_ASSIGNMENTS
IDM_CREATE_DEMO_USERS
bool false The default role assignments the demo users should be setup.
SETTINGS_SERVICE_ACCOUNT_IDS
OCIS_SERVICE_ACCOUNT_ID
[]string [service-user-id] The list of all service account IDs. These will be assigned the hidden ‘service-account’ role. Note: When using ‘OCIS_SERVICE_ACCOUNT_ID’ this will contain only one value while ‘SETTINGS_SERVICE_ACCOUNT_IDS’ can have multiple. See the ‘auth-service’ service description for more details about service accounts.
OCIS_DEFAULT_LANGUAGE string The default language used by services and the WebUI. If not defined, English will be used as default. See the documentation for more details.