I'm not using Docker, can't help you.
I refer running it directly.
NextCloud Installation Q & A
-
- OMV 3.x
- tinh_x7
-
-
Thank you anyway, I'll check out the docker setup by myself, maybe my experiences are good enough to write a tutorial.
-
I have NextCloud installed on OMV 3.0.96 running from a 16GB USB Stick on Microserver Gen10, everything is working fine except when I want to upload big files.
The problem is that the file is uploaded to a temp folder somewhere on USB drive and I heave only 10Gb free space and I can't upload files bigger thatn 10GB and eventually that drive will wear out from R/W.
Can I change that temp folder to point to another SATA disk? -
-
-
I have tried to configure it like this:
env[TMP] = /srv/52559f90-1d49-4c27-93a2-63f2a2abff5b/www/nextcloud/tmp
env[TMPDIR] = /srv/52559f90-1d49-4c27-93a2-63f2a2abff5b/www/nextcloud/tmp
env[TEMP] = /srv/52559f90-1d49-4c27-93a2-63f2a2abff5b/www/nextcloud/tmpBut it still uses USB Drive (sde1) to temporarily save files.
-
Hello,
I'm a bit confused: I've tried to install nextcloud on my raspberry using this excellent guide. No problem unitl I've passed the initial install webpage from nc. After this, I'm redirected to a https page which gives ERR_SSL_PROTOCOL_ERROR since I have no certificate (yet) . When trying to reach the same page but with http I get error 503: too many redirects.So, is it necessary to have an certificate when setting up nc? The guide states the following in this regards:
Note: It would easier to begin the setup with HTTP than HTTPS. After the installation is done, you can change it to HTTPS, and use Let's Encrypt for your encryption if you want.
thanks for the advice
-
-
For fresh installs i use already https, but with a self signed cert and replace it afterwards with letsencrypt. But it should make no difference. You can start with letsencrypt or even with plain http.
-
Well, If it's possible to start with plain http, why do I get a 503: ERR_TOO_MANY_REDIRECTS?
I've read through this bugrepport, but I'f I'm right the nginx.conf as described in the guide does have the correct order of fastcgi_split_path_info ^(.+\.php)(/.*)$; & include fastcgi_params; (see at the bottom).
So: could it be there is something wrong with my nginx.conf? Here it is (the same as in the guide):
add_header Strict-Transport-Security "max-age=15768000; includeSubDomains; preload;";
add_header X-Content-Type-Options nosniff;
add_header X-Frame-Options "SAMEORIGIN";
add_header X-XSS-Protection "1; mode=block";
add_header X-Robots-Tag none;
add_header X-Download-Options noopen;
add_header X-Permitted-Cross-Domain-Policies none;
location = /robots.txt {
log_not_found off;
allow all;
access_log off;
}
# The following 2 rules are only needed for the user_webfinger app.
# Uncomment it if you're planning to use this app.
#rewrite ^/.well-known/host-meta /public.php?service=host-meta last;
#rewrite ^/.well-known/host-meta.json /public.php?service=host-meta-json
# last;
location = /.well-known/carddav {
return 301 $scheme://$host/remote.php/dav;
}
location = /.well-known/caldav {
return 301 $scheme://$host/remote.php/dav;
}
# set max upload size
client_max_body_size 50G;
fastcgi_buffers 64 4K;
# Disable gzip to avoid the removal of the ETag header
gzip off;
# Uncomment if your server is build with the ngx_pagespeed module
# This module is currently not supported.
#pagespeed off;
error_page 403 /core/templates/403.php;
error_page 404 /core/templates/404.php;
location / {
rewrite ^ /index.php$uri;
}
location ~ ^/(?:build|tests|config|lib|3rdparty|templates|data)/ {
deny all;
}
location ~ ^/(?:\.|autotest|occ|issue|indie|db_|console) {
deny all;
}
location ~ ^/(?:index|remote|public|cron|core/ajax/update|status|ocs/v[12]|updater/.+|ocs-provider/.+|core/templates/40[34])\.php(?:$|/) {
fastcgi_split_path_info ^(.+\.php)(/.*)$;
include fastcgi_params;
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
fastcgi_param PATH_INFO $fastcgi_path_info;
fastcgi_param HTTPS on;
#Avoid sending the security headers twice
fastcgi_param modHeadersAvailable true;
fastcgi_param front_controller_active true;
fastcgi_pass $socket;
fastcgi_intercept_errors on;
}
location ~ ^/(?:updater|ocs-provider)(?:$|/) {
try_files $uri/ =404;
index index.php;
}
# Adding the cache control header for js and css files
# Make sure it is BELOW the PHP block
location ~* \.(?:css|js|woff|svg|gif)$ {
try_files $uri /index.php$uri$is_args$args;
add_header Cache-Control "public, max-age=7200";
add_header Strict-Transport-Security "max-age=15768000; includeSubDomains; preload;";
add_header X-Content-Type-Options nosniff;
add_header X-Frame-Options "SAMEORIGIN";
add_header X-XSS-Protection "1; mode=block";
add_header X-Robots-Tag none;
add_header X-Download-Options noopen;
add_header X-Permitted-Cross-Domain-Policies none;
# Optional: Don't log access to assets
access_log off;
}
location ~* \.(?:png|html|ttf|ico|jpg|jpeg)$ {
try_files $uri /index.php$uri$is_args$args;
# Optional: Don't log access to other assets
access_log off;
} -
(removed double post)
-
-
Have you try to turn off HTTPS & and use HTTP ? fastcgi_param HTTPS on;
-
Yes, you're right! Commenting the line fastcgi_param HTTPS on; did solve the problem.
Thanks!
-
Or you can change it to: fastcgi_param HTTPS off;
-
-
I reinstalled OMV and had a hard time to get nextcloud working. Here are a few things I had to change:
- I got the error The "X-Frame-Options" HTTP header is not configured to equal to "SAMEORIGIN". This is a potential security or privacy risk and we recommend adjusting this setting. Solved this by commenting out both lines of add_header X-Frame-Options "SAMEORIGIN";
- To get letsencrypt working I had to add location ^~ /.well-known/acme-challenge/ { } to extra options.
- For creating a new server nginx has to be enabled. I thought I could enable it afterwards.
Will the renewal of the letsencrypt certificate work if I enable fastcgi_param HTTPS? In extra options there is the command
and right under it a second time. Is this necessary?
-
Use this line if you're using LE: location ^~ /.well-known/acme-challenge/ { }
fastcgi_param HTTPS is for SSL, so enable it to use for LE is make sense.
-
Thanks it works with omv4 too.
-
-
-
The setup guide is too long, so it won't allow me to do anymore update.
Not everybody use Let's Encrypt, so they have to read this thread.
Reading is really important if you want to learnMaybe when I use OMV4 in the future, I'll post another installation guide.
-
This guide helped me a lot but I'm not familiar with nginx. So it took me hours to get a letsencrypt certificate. I didn't even know what the problem was. Searching for "challenge failed" revealed no working solution. I don't think that it has to be mentioned in this guide but it should be mentioned somewhere in the forum. I hope that if someone has the same problem he will find this thread.
Btw I think that nextcloud + letsencrypt is a relatively common combination.
-
-
my opinion for letsencrypt was a sharedfolder it names "vhosts". In this i make a direktorry with mydns.com
The rights for the folders are:
vhosts:
owner www-data with right/write/execute
groop: user with right/write/execute
other write/ execute
mydns.com:
owner root with right/write/execute
groop: www-data with right/write/execute
other write/ executein the nginx options you must add:
location /.well-known {
alias /srv/dev-disk-by-label-data1/vhosts/mydns.com/.well-known;}and put in the Letsencrypt options in Webroot:
/srv/dev-disk-by-label-data1/vhosts/mydns.comThats work on my omv4
-
This guide helped me a lot but I'm not familiar with nginx. So it took me hours to get a letsencrypt certificate. I didn't even know what the problem was. Searching for "challenge failed" revealed no working solution. I don't think that it has to be mentioned in this guide but it should be mentioned somewhere in the forum. I hope that if someone has the same problem he will find this thread.
Btw I think that nextcloud + letsencrypt is a relatively common combination.
Hello, have you search correctly ? read Let's Encrypt Plugin
Jetzt mitmachen!
Sie haben noch kein Benutzerkonto auf unserer Seite? Registrieren Sie sich kostenlos und nehmen Sie an unserer Community teil!