summaryrefslogtreecommitdiffstats
path: root/README.md
diff options
context:
space:
mode:
authorDennis Værum <6872940+dvaerum@users.noreply.github.com>2023-06-22 17:06:37 +0100
committerGitHub <noreply@github.com>2023-06-22 16:06:37 +0000
commitd3251467e6844c9742a57bacc72a682e98ae2cce (patch)
tree3bc5398e53cb23aa39f3ed2d5cb00e1860b127f4 /README.md
parentceb2893af1c4ee9bec07082c82f5b638bb47cff7 (diff)
Added entrypoint hooks for your own custom scripts (#1964)
* Added entrypoint hooks for your own custom scripts Signed-off-by: Dennis Vestergaard Værum <github@varum.dk> * Small changes: - Only execute shell-scripts (mening files ending with .sh) - Sort the files before executing them, had forgotten 😅 - Added a message when a hook script finish - Added prefix arror to message to show the are related Signed-off-by: Dennis Vestergaard Værum <github@varum.dk> * Show in the search msg that it only searches for '*.sh' files Signed-off-by: Dennis Vestergaard Værum <github@varum.dk> * Fixed spelling mistake Co-authored-by: J0WI <J0WI@users.noreply.github.com> Signed-off-by: Dennis Værum <6872940+dvaerum@users.noreply.github.com> * Updated the `README.md` file Signed-off-by: Dennis Vestergaard Værum <github@varum.dk> * change from using find to using a for-loop to located the `.sh` files Signed-off-by: Dennis Vestergaard Værum <github@varum.dk> * Fix bug - that would make docker-entrypoint.sh failed, hook folders was empty Signed-off-by: Dennis Vestergaard Værum <github@varum.dk> --------- Signed-off-by: Dennis Vestergaard Værum <github@varum.dk> Signed-off-by: Dennis Værum <6872940+dvaerum@users.noreply.github.com> Co-authored-by: J0WI <J0WI@users.noreply.github.com>
Diffstat (limited to 'README.md')
-rw-r--r--README.md32
1 files changed, 32 insertions, 0 deletions
diff --git a/README.md b/README.md
index 4128efc1..31531767 100644
--- a/README.md
+++ b/README.md
@@ -202,6 +202,38 @@ To customize other PHP limits you can simply change the following variables:
- `PHP_UPLOAD_LIMIT` (default `512M`) This sets the upload limit (`post_max_size` and `upload_max_filesize`) for big files. Note that you may have to change other limits depending on your client, webserver or operating system. Check the [Nextcloud documentation](https://docs.nextcloud.com/server/latest/admin_manual/configuration_files/big_file_upload_configuration.html) for more information.
+## Auto configuration via hook folders
+
+There are 5 hooks
+
+- `pre-installation` Executed before the Nextcloud is installed/initiated
+- `post-installation` Executed after the Nextcloud is installed/initiated
+- `pre-upgrade` Executed before the Nextcloud is upgraded
+- `post-upgrade` Executed after the Nextcloud is upgraded
+- `before-starting` Executed before the Nextcloud starts
+
+To use the hooks triggered by the `entrypoint` script, either
+- Added your script(s) to the individual of the hook folder(s), which are located at the path `/docker-entrypoint-hooks.d` in the container
+- Use volume(s) if you want to use script from the host system inside the container, see example.
+
+**Note:** Only the script(s) located in a hook folder (not sub-folders), ending with `.sh` and marked as executable, will be executed.
+
+**Example:** Mount using volumes
+```yaml
+...
+ app:
+ image: nextcloud:stable
+
+ volumes:
+ - ./app-hooks/pre-installation:/docker-entrypoint-hooks.d/pre-installation
+ - ./app-hooks/post-installation:/docker-entrypoint-hooks.d/post-installation
+ - ./app-hooks/pre-upgrade:/docker-entrypoint-hooks.d/pre-upgrade
+ - ./app-hooks/post-upgrade:/docker-entrypoint-hooks.d/post-upgrade
+ - ./app-hooks/before-starting:/docker-entrypoint-hooks.d/before-starting
+...
+```
+
+
## Using the apache image behind a reverse proxy and auto configure server host and protocol
The apache image will replace the remote addr (IP address visible to Nextcloud) with the IP address from `X-Real-IP` if the request is coming from a proxy in `10.0.0.0/8`, `172.16.0.0/12` or `192.168.0.0/16` by default. If you want Nextcloud to pick up the server host (`HTTP_X_FORWARDED_HOST`), protocol (`HTTP_X_FORWARDED_PROTO`) and client IP (`HTTP_X_FORWARDED_FOR`) from a trusted proxy, then disable rewrite IP and add the reverse proxy's IP address to `TRUSTED_PROXIES`.