[Solved] Raspberry pi 3B+ self hosted didn't work

Hello everyone,

I have got a similiar issue, but my setup is a bit different:

  • Raspberry PI 3B+
  • Nginx 1.10.3
  • PHP 7.3

I would prefer to use this config since the RPI is not so powerful and theses elements should be more efficient.
I have followed this documentation:
https://www.c-rieger.de/nextcloud-installation-guide-ubuntu/
and for the nginx configuration I have this:

upstream php-handler {
server unix:/var/run/nextcloud.sock;
}

server {
    listen                        80;
    listen                        [::]:80;
    server_name                   nextcloud.mycloud.com;
    return                        301 https://$server_name$request_uri;
}
 
server {
    listen                        443 ssl http2;
    listen                        [::]:443 ssl http2;
    server_name                   nextcloud.mycloud.com;
 
    # Path to the root of your installation
    root                          /var/www/nextcloud/;
 
    ssl                           on;
    ssl_certificate               /etc/letsencrypt/live/nextcloud.mycloud.com/fullchain.pem;
    ssl_certificate_key           /etc/letsencrypt/live/nextcloud.mycloud.com/privkey.pem;
    ssl_trusted_certificate       /etc/letsencrypt/live/nextcloud.mycloud.com/chain.pem;
    #ssl_dhparam                   /etc/ssl/certs/dhparam.pem;
 
    ssl_session_cache             shared:SSL:1m;
    ssl_session_timeout           1440m;
    ssl_buffer_size               8k;
    ssl_protocols                 TLSv1 TLSv1.1 TLSv1.2;
    ssl_ciphers                   'kEECDH+ECDSA+AES128 kEECDH+ECDSA+AES256 kEECDH+AES128 kEECDH+AES256 kEDH+AES128 kEDH+AES256 DES-CBC3-SHA +SHA !aNULL !eNULL !LOW !kECDH !DSS !MD5 !EXP !PSK !SRP !CAMELLIA !SEED';
    ssl_prefer_server_ciphers     on;
    ssl_stapling                  on;
    ssl_stapling_verify           on;
 
    # Add headers to serve security related headers
    add_header                    X-Content-Type-Options nosniff;
    add_header                    X-XSS-Protection "1; mode=block";
    add_header                    X-Robots-Tag none;
    add_header                    X-Download-Options noopen;
    add_header                    X-Permitted-Cross-Domain-Policies none;
    add_header                    Strict-Transport-Security 'max-age=31536000; includeSubDomains;';
 
    location = /robots.txt {
        allow                     all;
        log_not_found             off;
        access_log                off;
    }
 
    location = /.well-known/carddav {
      return                      301 $scheme://$host/remote.php/dav;
    }
 
    location = /.well-known/caldav {
      return                      301 $scheme://$host/remote.php/dav;
    }
 
    # set max upload size
    client_max_body_size          512M;
    fastcgi_buffers               64 4K;
 
    # Enable gzip but do not remove ETag headers
    gzip                          on;
    gzip_vary                     on;
    gzip_comp_level               4;
    gzip_min_length               256;
    gzip_proxied                  expired no-cache no-store private no_last_modified no_etag auth;
    gzip_types                    application/atom+xml application/javascript application/json application/ld+json application/manifest+json application/rss+xml application/vnd.geo+json application/vnd.ms-fontobject application/x-font-ttf application/x-web-app-manifest+json application/xhtml+xml application/xml font/opentype image/bmp image/svg+xml image/x-icon text/cache-manifest text/css text/plain text/vcard text/vnd.rim.location.xloc text/vtt text/x-component text/x-cross-domain-policy;
 
    location / {
        rewrite                   ^ /index.php$uri;
    }
 
    location ~ ^/.well-known/acme-challenge/* {
        allow                     all;
    }
 
    location ~ ^/(?:build|tests|config|lib|3rdparty|templates|data)/ {
        deny                      all;
    }
 
    location ~ ^/(?:\.|autotest|occ|issue|indie|db_|console) {
        deny                      all;
    }
 
    location ~ ^/(?:index|remote|public|cron|core/ajax/update|status|ocs/v[12]|updater/.+|ocs-provider/.+).php(?:$|/) {
        fastcgi_split_path_info   ^(.+.php)(/.*)$;
        include                   fastcgi_params;
        fastcgi_param             SCRIPT_FILENAME $document_root$fastcgi_script_name;
        fastcgi_param             PATH_INFO $fastcgi_path_info;
        fastcgi_param             HTTPS on;
        #Avoid sending the security headers twice
        fastcgi_param             modHeadersAvailable true;
        fastcgi_param             front_controller_active true;
        fastcgi_pass              php-handler;
        fastcgi_intercept_errors  on;
        fastcgi_request_buffering off;
        fastcgi_read_timeout      300;
    }
 
    location ~ ^/(?:updater|ocs-provider)(?:$|/) {
        try_files                 $uri/ =404;
        index                     index.php;
    }
 
    # Adding the cache control header for js and css files
    # Make sure it is BELOW the PHP block
    location ~* .(?:css|js|woff|svg|gif)$ {
        try_files                 $uri /index.php$uri$is_args$args;
        add_header                Cache-Control "public, max-age=15778463";
        add_header                X-Content-Type-Options nosniff;
        add_header                X-XSS-Protection "1; mode=block";
        add_header                X-Robots-Tag none;
        add_header                X-Download-Options noopen;
        add_header                X-Permitted-Cross-Domain-Policies none;
        # Optional: Don't log access to assets
        access_log                off;
    }
 
    location ~* .(?:png|html|ttf|ico|jpg|jpeg)$ {
        try_files                 $uri /index.php$uri$is_args$args;
        # Optional: Don't log access to other assets
        access_log                off;
    }
}

When I go to the main webpage, the server provide the raw PHP file for download.
It seems that Nginx didnot linked the php module.
Any help could be greatfull :slight_smile: