Your web server is not properly set up to resolve "/ocm-provider/" etc

I recently installed NC 27.1.3 and managed to resolve all errors and warnings. However, I cannot solve one warning.

  • Your web server is not properly set up to resolve “/ocm-provider/”. This is most likely related to a web server configuration that was not updated to deliver this folder directly. Please compare your configuration against the shipped rewrite rules in “.htaccess” for Apache or the provided one in the documentation for Nginx at it’s documentation page :arrow_upper_right:. On Nginx those are typically the lines starting with “location ~” that need an update.

I have NC installed behind the reverse proxy nginx.

nginx config file

server {
    server_name cloud-example.com;
    return 301 http://www.cloud-example.com$request_uri;

    # HTTP/3 support
    listen 443 ssl;
    listen 443 quic;
    
    ssl_certificate /etc/letsencrypt/live/cloud-example.com/fullchain.pem; # managed by Certbot
    ssl_certificate_key /etc/letsencrypt/live/cloud-example.com/privkey.pem; # managed by Certbot
    include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
    ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot

    # HTTP/3 Header
    add_header Alt-Svc 'h3=":$server_port"; ma=86400';
    add_header x-quic 'h3';
    add_header Alt-Svc 'h3-29=":$server_port"';

    add_header Strict-Transport-Security "max-age=15768000; includeSubdomains; preload;";
}
 
server {
    server_name www.cloud-example.com;
 
    location / {
        proxy_pass http://192.168.1.145;
        proxy_set_header Host $host;
        proxy_set_header X-Real-IP $remote_addr;
        proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
        proxy_set_header X-Forwarded-Proto $scheme;
        client_max_body_size 512M;

    }

    # HTTP/3 support
    listen 443 ssl;
    listen 443 quic;
    
    ssl_certificate /etc/letsencrypt/live/cloud-example.com/fullchain.pem; # managed by Certbot
    ssl_certificate_key /etc/letsencrypt/live/cloud-example.com/privkey.pem; # managed by Certbot
    include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
    ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
    
    # HTTP/3 Header
    add_header Alt-Svc 'h3=":$server_port"; ma=86400';
    add_header x-quic 'h3';
    add_header Alt-Svc 'h3-29=":$server_port"';
    
    add_header Strict-Transport-Security "max-age=15768000; includeSubdomains; preload;";

#start
location /.well-known/carddav {
        return 301 $scheme://$host/remote.php/dav;
}

location /.well-known/caldav {
        return 301 $scheme://$host/remote.php/dav;
}
#end

}

server {
    if ($host = cloud-example.com) {
        return 301 https://$host$request_uri;
    } # managed by Certbot


    listen 80;
    server_name cloud-example.com;
    return 404; # managed by Certbot


}
 
server {
    if ($host = www.cloud-example.com) {
        return 301 https://$host$request_uri;
    } # managed by Certbot


    listen 80;
    server_name www.cloud-example.com;
    return 404; # managed by Certbot


}

thx