-
Notifications
You must be signed in to change notification settings - Fork 704
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Setdomain add a check for private ip ranges #745
Comments
I dont understand this. Are private IP addresses not allowed to be used? And which ones do you recommend using? |
I dont understand the question... The domain that you enter during the setup should have set a public ip-address... |
The main reason for this check is to make the debugging easier during the setup... |
How is the installer determining the IP address now? When I try to install its coming up with the message "It seems like the ip-address is set to an internal or reserved ip-address. This is not supported. (It was found to be set to '10.1.1.17')". The VM I'm running this on is on a private IP, but I have a reverse proxy setup on the dns name I'm using. I also have /etc/hosts setup to point that name to my real public IP address. how are we supposed to specify the real hostname of our systems after this change if the system really is on a private IP? |
This is basically the reason why we introduced this check. You can either try to remove your domain from the /etc/hosts file or try to overwrite it with https://stackoverflow.com/questions/32079364/how-can-you-make-the-docker-container-use-the-host-machines-etc-hosts-file/58994501#58994501 |
Is there a way to avoid this check. I'm using NextCloud internally and I don't have any external IP. |
You already managed to do so before? |
I'm having the same issue as @myfp31. Attempting to set up nextcloud using AIO on an internal network, using Caddy and an internal ACME CA for the reverse proxy (Caddyfile below). This should be a perfectly valid deployment setup, especially for homelab users.
|
Hello, I would say yes, but to be honest, I'm just deploying it successfully three weeks ago in a pure lab (I was able to login to NC web interface as an admin and create users). So I have an internal DNS with the right resolution. But I also understand that providing an AIO implementation for all use cases is quite impossible. Then let me know if you need to keep this filter I will try to deploy the standard NextCloud solution with docker compose method. If needed, I would be able to do some tests Tuesday or Wednesday. In any case, thanks for all this implementation. |
If you were successful, it seems like there is indeed a way to deploy it locally ;) Do you mind creating a PR that adds some documentation on this? In the meanwhile I modified #859 which will allow private ip-addresses when running behind a reverse proxy again after it gets merged and released. |
For sure, I will do a PR if you think it could be useful. I hope it will be understandable. |
Yes, I think it will be useful! Please create the PR and I will help with the details :) |
If I'm not wrong, the change is only in the develop version. With that version, I confirm it works fine, it's just necessary to add caddy root certificate to trusted certificate of nextcloud-aio-mastercontainer.
does it sounds good for you ? |
Hi thanks for your attempt! :) It seems like I've overread that you used self-signed certificates for this which is not really the way how I would do it honestly... And btw: adding the cert to the mastercontainer is probably not needed anymore when #873 is merged since you can simply disable the domain validation then. |
I already documented my ideas in #878 |
If that is true do not continue and print the found ip address into the error message. Should be added before the port open check
Also if the domain that was found is the domain itself, set it to empty.
The text was updated successfully, but these errors were encountered: