Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

.htaccess does not handle HTTPS .well_known redirects properly, when running behind a reverse proxy #22375

Closed
gjoliver opened this issue Aug 23, 2020 · 1 comment
Labels
0. Needs triage Pending check for reproducibility or if it fits our roadmap bug

Comments

@gjoliver
Copy link

Steps to reproduce

  1. Configure a reverse proxy in front of your Nextcloud installation for terminating HTTPS requests.
  2. Use Chrome browser and go to Settings -> Overview page.
  3. See the warnings about .well_known redirects not properly set up.

Expected behaviour

.htaccess should redirect to HTTPS URLs when x-forwarded-proto header is https.

Actual behaviour

Instead, .htaccess always redirect to HTTP urls today, since it doesn't respect the x-forwarded-proto header.

Server configuration

RancherOS
Custom Reverse Proxy
MariaDB, Redis
nextcloud:18.0.3-apache docker image, freshly install.
Chrome Browser

A working fix was proposed and shot down here: #22084
The PR thread contains tons of good context and discussion about the problem, and why I think it was the right fix.
Hopefully useful if anyone wants to pick this issue up.

@gjoliver gjoliver added 0. Needs triage Pending check for reproducibility or if it fits our roadmap bug labels Aug 23, 2020
@szaimen
Copy link
Contributor

szaimen commented Jun 9, 2021

@szaimen szaimen closed this as completed Jun 9, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
0. Needs triage Pending check for reproducibility or if it fits our roadmap bug
Projects
None yet
Development

No branches or pull requests

2 participants