#!/usr/bin/with-contenv sh set -ex PGPASSWORD=$DB_PASSWORD psql -h $DB_HOST -U $DB_USER -d $DB_NAME -c "SELECT EXISTS (SELECT 1 FROM information_schema.tables WHERE table_name = '${DB_TABLE_PREFIX}appconfig')" | grep f if [ $? -ne 1 ]; then cd /usr/share/webapps/nextcloud s6-setuidgid nginx ./occ maintenance:install \ --database=pgsql \ --database-host=$DB_HOST \ --database-name=$DB_NAME \ --database-user=$DB_USER \ --database-pass=$DB_PASSWORD \ --database-table-prefix=$DB_TABLE_PREFIX \ --admin-user=$ADMIN_USER \ --admin-pass=$ADMIN_PASSWORD \ --data-dir=/var/lib/nextcloud/data/ \ --no-interaction s6-setuidgid nginx ./occ config:app:set --value cron core backgroundjobs_mode s6-setuidgid nginx ./occ app:enable user_ldap s6-setuidgid nginx ./occ app:enable files_sharing s6-setuidgid nginx ./occ config:system:set --value "https://$DOMAIN" overwrite.cli.url s6-setuidgid nginx ./occ config:system:set --value ["localhost", "$DOMAIN"] trusted_domains s6-setuidgid nginx ./occ config:system:set --value "smtp" mail_smtpmode s6-setuidgid nginx ./occ config:system:set --value "${MAIL_SMTP_AUTH_TYPE:-PLAIN}" mail_smtpauthtype s6-setuidgid nginx ./occ config:system:set --value "$MAIL_FROM" mail_from_address s6-setuidgid nginx ./occ config:system:set --value "$MAIL_DOMAIN" mail_domain s6-setuidgid nginx ./occ config:system:set --value "${MAIL_SMTP_SECURITY:-tls}" mail_smtpsecure s6-setuidgid nginx ./occ config:system:set --value "${MAIL_SMTP_AUTH:-1}" mail_smtpauth s6-setuidgid nginx ./occ config:system:set --value "$MAIL_SMTP_HOST" mail_smtphost s6-setuidgid nginx ./occ config:system:set --value "${MAIL_SMTP_PORT:-587}" mail_smtpport s6-setuidgid nginx ./occ config:system:set --value "$MAIL_SMTP_NAME" mail_smtpname s6-setuidgid nginx ./occ config:system:set --value "$MAIL_SMTP_PASSWORD" mail_smtppassword s6-setuidgid nginx ./occ config:app:set --value "$LDAP_BASE_GROUP_DN" user_ldap ldap_base_groups s6-setuidgid nginx ./occ config:app:set --value "$LDAP_EMAIL_ATTRIBUTE" user_ldap ldap_email_attr s6-setuidgid nginx ./occ config:app:set --value "$LDAP_USER_FILTER" user_ldap ldap_userlist_filter s6-setuidgid nginx ./occ config:app:set --value "$LDAP_LOGIN_FILTER" user_ldap ldap_login_filter s6-setuidgid nginx ./occ config:app:set --value "$LDAP_TLS" user_ldap ldap_tls s6-setuidgid nginx ./occ config:app:set --value "$LDAP_HOST" user_ldap ldap_host s6-setuidgid nginx ./occ config:app:set --value "$LDAP_BIND_USER" user_ldap ldap_dn s6-setuidgid nginx ./occ config:app:set --value "$LDAP_BIND_PASSWORD" user_ldap ldap_agent_password s6-setuidgid nginx ./occ config:app:set --value "$LDAP_GROUP_FILTER" user_ldap ldap_group_filter s6-setuidgid nginx ./occ config:app:set --value "$LDAP_USER_DISPLAY_NAME" user_ldap ldap_display_name s6-setuidgid nginx ./occ config:app:set --value "${LDAP_PORT:-389}" user_ldap ldap_port s6-setuidgid nginx ./occ config:app:set --value "$LDAP_BASE_USER_DN" user_ldap ldap_base_users s6-setuidgid nginx ./occ config:app:set --value "yes" user_ldap enabled fi