-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[13-0.7 & 14.0.2] /.well-known/caldav and carddav #11787
Comments
Same behaviour here. Before the upgrade this message wasn't displayed. I don't think there's a real problem though, as my synchronization with DAVdroid is still working after the upgrade. Just the message keeps saying that there is a misconfiguration. My setup is nextcloud fpm in the official docker images with an nginx webserver in front of it. I didn't change my webserver configuration regarding these well-known URLs for the upgrade though. |
This should be fixed with PR #11738. May opcache isn't recognizing a new php source file? |
Background of this:
Does that helps to understand the problem here? |
I guess that all your instances are in a subfolder, which then explains this message. The check itself was broken before 14.0.2 and thus didn't showed up. I will close this. If this is not the case for your instance we are happy to help with further steps. |
I am seeing the same error message since the update to 14.0.2. |
Could you open the webdev tools in your browser and check the network tab for what it actually requests and what the response is? Open the network tab and then refresh the admin page to see all requests. |
|
I think the problem here is that we are redirected from https to http which is denied by "Content Security Policy". I have the same problem with my nginx + fpm docker setup after the 14.0.2 update |
Ah, right. I forgot to mention that. In my case the nginx running Nextcloud is behind a reverse proxy handling ssl. That proxy redirects all http request to https which has not caused any problems yet. Changing the redirect rule for in the nginx config for Nextcloud-site from
to
to force connection directly via https fixed the issue for me. |
@MorrisJobke Yes, changing the nginx config as I described above removed the error message for me |
any hint what i have to change in apache2 so solve this? |
@terrar the response code (405) in your screenshot suggest, that your current apache setup blocks PROPFIND requests. Check the apache documentation how to allow those. |
This helped, thanks! Sync for dav is working fine but nextcloud still shows /.well-known/caldav error while testing settings. |
I'm running 14.0.2 on Apache behind an HAProxy. Apache listens on 80 and HAProxy does the SSL termination. Both Chrome and Firefox have this issue and the console log is quite clear:
Why is the server requesting those checks to be done over http rather than https ? I have tried with I don't have a 14.0.1 anymore and wonder if the checks were done over https, or if the CSP policy was different. |
Replying to myself, I just re-installed a 14.0.1 and apparently the browser was not trying to reach .well-known URLs at all during the check in older versions. Therefore the problem seems to be new requests to those URLs (over http) rather than a CSP change. |
Yes we fixed this in 14.0.2. The check was never done before. The refused request is due to the downgrade from https to http. I would recommend you to check that the redirect is setup correctly. |
@MorrisJobke Thanks for the clarification. Just to be clear, if I open a new blank browser tab, I see this:
The first 301 redirect comes from Nextcloud and the second 307 comes from HAProxy, which means (to me) that the http->https redirect config is correct. The problem is why does Nextcloud return a plaintext (http) in the first 301. When I do the same from the settings admin page, my understanding is that the browser refuses to open the http plaintext request, because it violates the CSP. I also understand the admin pages generates PROPFIND requests versus me testing with GET requests. I'm still pretty confident that my HAProxy correctly redirects http to https (for all URLS to a given hostname) and I still see this issue. |
Yes - this should be like that. What web server do you use? By any chance Nginx? Then this might be nextcloud/documentation#899 |
@MorrisJobke as mentioned above I'm running Nextcloud on CentOS7/Apache, listening on port 80 only. Another host is running HAProxy with a TLS frontend. I'm redirecting all HTTP trafic to HTTPS (no filter based on specific URLs) and I'm not touching the content, other than adding an x-Forwarded-For header to the requests. I'm still questioning why the browser would receive or build an HTTP plain text URL where it should send HTTPS requests only. I have tried (and failed) to understand how this URL is constructed and so far I don't even understand if it's built in JS (browser-side) or if it is somehow pushed by he server. I can also confirm that during the check, the HAProxy doesn't receive a single HTTP request (only HTTPS) so it doesn't have a chance to perform any redirect to HTTPS. For me, the problem is really that this HTTP URL shouldn't be there in the first place and the browser correctly blocks the connection because of the CSP. Thanks for looking into this. |
Check out the proxy configuration: https://docs.nextcloud.com/server/14/admin_manual/configuration_server/reverse_proxy_configuration.html maybe this helps in your setup to properly do the redirect. As this seems to be a setup issue I would like to ask you to raise your question in the forums: https://help.nextcloud.com If you wish support with setup issues from Nextcloud GmbH we offer this as part of the Nextcloud subscription. Learn more about this at https://nextcloud.com/enterprise/ |
@pzwahlen i have nextcloud running on apache2 behind an apache2 reverse proxy. i was having same issue with the check failing on admin control panel and was seeing the same CSP failures. Ultimately i tried hard coding the https://foo.bar to the 301 redir via .htaccess and nextcloud.conf and also ensuring the correct paramaters were set for:
i was still getting the error but i noticed that when i ran:
i resolved this by adding the hard-coded 301 redirects including full https://foo.bar to my nextcloud virtual host (note that my nextcloud only has an http virtual host since TLS is offloaded at proxy). Might help -- might not, but i think it is likely a configuration issue after all. |
Thanks, this seems to be the only solution for this problem. |
Hey. |
In case you use nginx, just add this to the config before the
|
Thanks, had the same problem with haproxy and apache2 running nextcloud.example.com, this solved my problems too. |
Steps to reproduce
Expected behaviour
Upgrade without errors
Actual behaviour
Error message:
Dein Web-Server ist nicht richtig eingerichtet um "/.well-known/caldav" aufzulösen. Weitere Informationen findest Du in der Dokumentation.
Dein Web-Server ist nicht richtig eingerichtet um "/.well-known/carddav" aufzulösen. Weitere Informationen findest Du in der Dokumentation.
Server configuration
Operating system: Ubuntu 16.0.4
Web server: apache2
Database: mysql
PHP version: 7
Updated from an older Nextcloud/ownCloud or fresh install: upgrade
This .htacces settings should not produce the error message above i think:
(they were generated automatically but it seems hey do not work)
The text was updated successfully, but these errors were encountered: