ich habe das problem das ich leider nicht dahinter komme was das problem ist dahinter würde mich sehr freuen wen mir jemand helfen kann
die nextcloud lässt sich nicht über die domain aufrufen und bekomme immer das selber
Setup Nextcloud auf unraid
pfsense als router mit HAProxy
hier noch paar daten
{
"system": {
"datadirectory": "***REMOVED SENSITIVE VALUE***",
"instanceid": "***REMOVED SENSITIVE VALUE***",
"passwordsalt": "***REMOVED SENSITIVE VALUE***",
"secret": "***REMOVED SENSITIVE VALUE***",
"trusted_domains": [
"10.88.0.23",
"cloud.test.cloud",
"https:\/\/cloud.test.cloud"
],
"dbtype": "mysql",
"version": "31.0.2.1",
"overwrite.cli.url": "https:\/\/cloud.test.cloud",
"overwriteprotocol": "https",
"dbname": "***REMOVED SENSITIVE VALUE***",
"dbhost": "***REMOVED SENSITIVE VALUE***",
"dbport": "",
"dbtableprefix": "oc_",
"mysql.utf8mb4": true,
"dbuser": "***REMOVED SENSITIVE VALUE***",
"dbpassword": "***REMOVED SENSITIVE VALUE***",
"installed": true,
"memcache.local": "\\OC\\Memcache\\APCu",
"filelocking.enabled": true,
"memcache.locking": "\\OC\\Memcache\\APCu",
"upgrade.disable-web": true
}
}
root@134f694895a9:/# curl -v https://cloud.kerner.cloud
* Host cloud.kerner.cloud:443 was resolved.
* IPv6: (none)
* IPv4: ……...
* Trying ………….:443...
* ALPN: curl offers h2,http/1.1
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* CAfile: /etc/ssl/cert.pem
* CApath: none
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / x25519 / RSASSA-PSS
* ALPN: server accepted h2
* Server certificate:
* subject: CN=kerner.cloud
* start date: Feb 23 18:26:14 2025 GMT
* expire date: May 24 18:26:13 2025 GMT
* subjectAltName: host "cloud.kerner.cloud" matched cert's "*.kerner.cloud"
* issuer: C=US; O=Let's Encrypt; CN=R11
* SSL certificate verify ok.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha256WithRSAEncryption
* Connected to cloud.kerner.cloud (109.192.152.81) port 443
* using HTTP/2
* [HTTP/2] [1] OPENED stream for https://cloud.kerner.cloud/
* [HTTP/2] [1] [:method: GET]
* [HTTP/2] [1] [:scheme: https]
* [HTTP/2] [1] [:authority: cloud.test.cloud]
* [HTTP/2] [1] [:path: /]
* [HTTP/2] [1] [user-agent: curl/8.12.1]
* [HTTP/2] [1] [accept: */*]
> GET / HTTP/2
> Host: cloud.test.cloud
> User-Agent: curl/8.12.1
> Accept: */*
>
* Request completely sent off
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
< HTTP/2 400
< server: nginx
< date: Tue, 25 Mar 2025 23:35:38 GMT
< content-type: text/html
< content-length: 248
< x-content-type-options: nosniff
< x-permitted-cross-domain-policies: none
< x-xss-protection: 1; mode=block
< x-robots-tag: noindex, nofollow
< x-frame-options: SAMEORIGIN
< referrer-policy: same-origin
<
<html>
<head><title>400 The plain HTTP request was sent to HTTPS port</title></head>
<body>
<center><h1>400 Bad Request</h1></center>
<center>The plain HTTP request was sent to HTTPS port</center>
<hr><center>nginx</center>
</body>
</html>
* Connection #0 to host cloud.test.cloud left intact