Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

NCPI 1.54.0 x86 LXC image: redis does not start due to faulty ownership #1940

Open
Arouraios opened this issue Jun 25, 2024 · 1 comment
Open
Assignees
Labels
3rd party issue the issue in question is related to a 3rd party product and needs to be solved there

Comments

@Arouraios
Copy link

Arouraios commented Jun 25, 2024

When using a clean NextcloudPi v1.54.0 x86 LXC image on an up to date proxmox, nextcloud activation gets stuck on "not yet initialized, trying again in a few seconds".
Journalctl shows errors for redis-server.service not being able to start, most notably it says it cannot access /etc/redis/redis.conf. Unfortunately I have not copied these journalctl outputs, I might reproduce the error later on and attach all the logs and errors.
ls -ld /etc/redis outputs ownership of user postfix, group prometheus. Similarly /var/log/redis and /var/lib/redis are both owned by postfix.

Solution:

chown -R redis:redis /etc/redis/
chown -R redis:adm /var/log/redis/
chown -R redis:redis /var/lib/redis/
systemctl restart redis-server.service
(or reboot to be sure)

I think I also had to add the www-data user to the redis group (usermod -aG redis www-data), but I might be mixing some things up (in the last couple of days I've done more nextcloud installations than I can count).
This only happens on v1.54.0 of NextcloudPi, v1.53.3 activates without issue.
After fixing ownership nextcloud appears to be working without issues. Well kinda, eth0 isn't up after reboot, but a simple ip link set up eth0 fixes that. And I've had this issue with other containers as well, it could very well be caused by the proxmox community kernel acting up, that's why I haven't opened a NCPI issue report about it.

Considering this issue does not appear when using the install script I assume it's a new problem with the build process for the container.

I have not appended the output of ncp-report since it lists my workplaces public v4 under trusted domains. If necessary I could censor it but I don't think the output is necessary at all since it's an unmodified lxc image.

@theCalcaholic
Copy link
Collaborator

Hi, I've finally had a closer look into this and it seems to be a bug with Proxmox's id mapping for unprivileged lxc containers. The LXC image itself has proper ownership for these directories, but the user ids in proxmox are off by one inside the container.

If this issue persists with the latest proxmox (I can't update mine atm, due to a long-running backup-migration process), I'll create an upstream issue.

@theCalcaholic theCalcaholic self-assigned this Aug 11, 2024
@theCalcaholic theCalcaholic added 3rd party issue the issue in question is related to a 3rd party product and needs to be solved there and removed has-updates labels Aug 19, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
3rd party issue the issue in question is related to a 3rd party product and needs to be solved there
Projects
None yet
Development

No branches or pull requests

2 participants