I have a blank page, 400 Bad request at / after upping the docker-compose-noproxy

My server OS is Ubuntu 20.01 LTS, running many services behind nginx.

After starting up with docker-compose-noproxy.yml(1) where I just changed the data locations both for the DB and the assets(2) and the port, so it doesn’t interfere with other running service.

My nginx config is pretty simple and looks like this:

server {
listen 80;
listen [::]:80;
server_name squidex.domain.xyz;
return 301 https://$host$request_uri;
}

server {
listen 443 ssl http2;
listen [::]:443 ssl http2;
server_name squidex.domain.xyz;

access_log /var/log/nginx/squidex.domain.xyz.access.log;

location / {
proxy_pass http://localhost:9494;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
}

include /etc/nginx/ssl.conf;
ssl_certificate /etc/letsencrypt/live/squidex.domain.xyz/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/squidex.domain.xyz/privkey.pem;
}

and it’s giving me a 400 Bad Request respose at the / location(or any other).
From the nginx logs:

192.168.1.254 - - [04/Dec/2020:10:17:06 +0100] “GET / HTTP/2.0” 400 0 “-” “Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:83.0) Gecko/20100101 Firefox/83.0”
192.168.1.254 - - [04/Dec/2020:10:17:06 +0100] “GET / HTTP/2.0” 400 0 “-” “Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:83.0) Gecko/20100101 Firefox/83.0”
192.168.1.254 - - [04/Dec/2020:10:17:06 +0100] “GET / HTTP/2.0” 400 0 “-” “Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:83.0) Gecko/20100101 Firefox/83.0”

Meanwhile the docker logs look pretty clean(mostly made of “Information” logs) except this one Warning:

{
“logLevel”: “Warning”,
“message”: “CleanupDefunctSiloEntries operation is not supported by the current implementation of IMembershipTable. Disabling the timer now.”,
“eventId”: {
“id”: 100662
},
“app”: {
“name”: “Squidex”,
“version”: “5.3.0.0”,
“sessionId”: “bc15ea02-a1ec-4f5a-8a33-ac8edd547341”
},
“timestamp”: “2020-12-04T09:23:55Z”,
“category”: “Orleans.Runtime.MembershipService.MembershipTableCleanupAgent”
}

which I don’t know if it has anything to do with the misbehaviour that I’m facing.
Is there any place where I can look further for logs?
Am I missing something in my nginx config file?

ps: I also noticed the WiredTigerLog is pretty heavy right at the start, with 102MB, is it normal?

(1) weirdly the data in .env wasn’t used, fixed that with in config data
(2) does the assets folder need any special readwrite/ownership consideration? Because after upping the docker-compose that folder is empty.

Sorry, I do not have a good answer, if there is no exception in the Squidex logs, it is very likely a config problem somewhere else. Have you also checked your nginx settings?

ps: I also noticed the WiredTigerLog is pretty heavy right at the start, with 102MB, is it normal?

I never had a look to this,so I have no idea.

(1) weirdly the data in .env wasn’t used, fixed that with in config data

This always works in my case.

(2) does the assets folder need any special readwrite/ownership consideration? Because after upping the docker-compose that folder is empty.

I don’t think so. You have mapped it to your host, right?

Have you also checked your nginx settings?

Outside of this service I do already host other services with such simple setup and premises(docker) of this nginx config, without any issues. So I would not know where even look up here. Any suggestion?
Where can I look up how the current nginx config file is setup when the docker-compose-nginx.yml is used?

You have mapped it to your host, right?

Yep, to a mounted external hard drive folder.

I managed to get the docker-compose logs too:

Started Squidex Container.
The SQUIDEX_GOOGLECLIENT variable is not set. Defaulting to a blank string.
The SQUIDEX_GOOGLESECRET variable is not set. Defaulting to a blank string.
The SQUIDEX_GITHUBCLIENT variable is not set. Defaulting to a blank string.
The SQUIDEX_GITHUBSECRET variable is not set. Defaulting to a blank string.
The SQUIDEX_MICROSOFTCLIENT variable is not set. Defaulting to a blank string.
The SQUIDEX_MICROSOFTSECRET variable is not set. Defaulting to a blank string.
Creating network “squidex_internal” with driver “bridge”
Creating squidex_squidex_mongo_1 …
[93B blob data]
[120B blob data]
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:00.197+00:00”},“s”:“I”, “c”:“CONTROL”, “id”:23285, “ctx”:“main”,“msg”:“Automatically disabling TLS 1.0, to force-enable TLS 1.0 specify --sslDisabledProtocols ‘none’”}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:00.201+00:00”},“s”:“W”, “c”:“ASIO”, “id”:22601, “ctx”:“main”,“msg”:“No TransportLayer configured during NetworkInterface startup”}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:00.201+00:00”},“s”:“I”, “c”:“NETWORK”, “id”:4648601, “ctx”:“main”,“msg”:“Implicit TCP FastOpen unavailable. If TCP FastOpen is required, set tcpFastOpenServer, tcpFastOpenClient, and tcpFastOpenQueueSize.”}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:00.202+00:00”},“s”:“I”, “c”:“STORAGE”, “id”:4615611, “ctx”:“initandlisten”,“msg”:“MongoDB starting”,“attr”:{“pid”:1,“port”:27017,“dbPath”:"/data/db",“architecture”:“64-bit”,“host”:“10ef59bee126”}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:00.202+00:00”},“s”:“I”, “c”:“CONTROL”, “id”:23403, “ctx”:“initandlisten”,“msg”:“Build Info”,“attr”:{“buildInfo”:{“version”:“4.4.1”,“gitVersion”:“ad91a93a5a31e175f5cbf8c69561e788bbc55ce1”,“openSSLVersion”:“OpenSSL 1.1.1 11 Sep 2018”,“modules”:[],“allocator”:“tcmalloc”,“environment”:{“distmod”:“ubuntu1804”,“distarch”:“x86_64”,“target_arch”:“x86_64”}}}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:00.202+00:00”},“s”:“I”, “c”:“CONTROL”, “id”:51765, “ctx”:“initandlisten”,“msg”:“Operating System”,“attr”:{“os”:{“name”:“Ubuntu”,“version”:“18.04”}}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:00.202+00:00”},“s”:“I”, “c”:“CONTROL”, “id”:21951, “ctx”:“initandlisten”,“msg”:“Options set by command line”,“attr”:{“options”:{“net”:{“bindIp”:""}}}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:00.204+00:00”},“s”:“I”, “c”:“STORAGE”, “id”:22297, “ctx”:“initandlisten”,“msg”:“Using the XFS filesystem is strongly recommended with the WiredTiger storage engine. See http://dochub.mongodb.org/core/prodnotes-filesystem",“tags”:["startupWarnings”]}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:00.204+00:00”},“s”:“I”, “c”:“STORAGE”, “id”:22315, “ctx”:“initandlisten”,“msg”:“Opening WiredTiger”,“attr”:{“config”:“create,cache_size=2937M,session_max=33000,eviction=(threads_min=4,threads_max=4),config_base=false,statistics=(fast),log=(enabled=true,archive=true,path=journal,compressor=snappy),file_manager=(close_idle_time=100000,close_scan_interval=10,close_handle_minimum=250),statistics_log=(wait=0),verbose=[recovery_progress,checkpoint_progress,compact_progress],”}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.103+00:00”},“s”:“I”, “c”:“STORAGE”, “id”:22430, “ctx”:“initandlisten”,“msg”:“WiredTiger message”,“attr”:{“message”:"[1607073301:103585][1:0x7f154ea1da80], txn-recover: [WT_VERB_RECOVERY | WT_VERB_RECOVERY_PROGRESS] Set global recovery timestamp: (0, 0)"}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.103+00:00”},“s”:“I”, “c”:“STORAGE”, “id”:22430, “ctx”:“initandlisten”,“msg”:“WiredTiger message”,“attr”:{“message”:"[1607073301:103665][1:0x7f154ea1da80], txn-recover: [WT_VERB_RECOVERY | WT_VERB_RECOVERY_PROGRESS] Set global oldest timestamp: (0, 0)"}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.111+00:00”},“s”:“I”, “c”:“STORAGE”, “id”:4795906, “ctx”:“initandlisten”,“msg”:“WiredTiger opened”,“attr”:{“durationMillis”:907}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.112+00:00”},“s”:“I”, “c”:“RECOVERY”, “id”:23987, “ctx”:“initandlisten”,“msg”:“WiredTiger recoveryTimestamp”,“attr”:{“recoveryTimestamp”:{"$timestamp":{“t”:0,“i”:0}}}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.125+00:00”},“s”:“I”, “c”:“STORAGE”, “id”:22262, “ctx”:“initandlisten”,“msg”:“Timestamp monitor starting”}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.129+00:00”},“s”:“W”, “c”:“CONTROL”, “id”:22120, “ctx”:“initandlisten”,“msg”:“Access control is not enabled for the database. Read and write access to data and configuration is unrestricted”,“tags”:[“startupWarnings”]}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.130+00:00”},“s”:“I”, “c”:“STORAGE”, “id”:20320, “ctx”:“initandlisten”,“msg”:“createCollection”,“attr”:{“namespace”:“admin.system.version”,“uuidDisposition”:“provided”,“uuid”:{“uuid”:{"$uuid":“d7e7e014-82ae-4885-9fd5-8df9c8f31b1e”}},“options”:{“uuid”:{"$uuid":“d7e7e014-82ae-4885-9fd5-8df9c8f31b1e”}}}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.142+00:00”},“s”:“I”, “c”:“INDEX”, “id”:20345, “ctx”:“initandlisten”,“msg”:“Index build: done building”,“attr”:{“buildUUID”:null,“namespace”:“admin.system.version”,“index”:“id”,“commitTimestamp”:{"$timestamp":{“t”:0,“i”:0}}}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.142+00:00”},“s”:“I”, “c”:“COMMAND”, “id”:20459, “ctx”:“initandlisten”,“msg”:“Setting featureCompatibilityVersion”,“attr”:{“newVersion”:“4.4”}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.143+00:00”},“s”:“I”, “c”:“STORAGE”, “id”:20536, “ctx”:“initandlisten”,“msg”:“Flow Control is enabled on this deployment”}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.144+00:00”},“s”:“I”, “c”:“STORAGE”, “id”:20320, “ctx”:“initandlisten”,“msg”:“createCollection”,“attr”:{“namespace”:“local.startup_log”,“uuidDisposition”:“generated”,“uuid”:{“uuid”:{"$uuid":“cdbfc292-8d83-4d70-9e16-f37e1fece330”}},“options”:{“capped”:true,“size”:10485760}}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.155+00:00”},“s”:“I”, “c”:“INDEX”, “id”:20345, “ctx”:“initandlisten”,“msg”:“Index build: done building”,“attr”:{“buildUUID”:null,“namespace”:“local.startup_log”,“index”:“id”,“commitTimestamp”:{"$timestamp":{“t”:0,“i”:0}}}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.155+00:00”},“s”:“I”, “c”:“FTDC”, “id”:20625, “ctx”:“initandlisten”,“msg”:“Initializing full-time diagnostic data capture”,“attr”:{“dataDirectory”:"/data/db/diagnostic.data"}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.157+00:00”},“s”:“I”, “c”:“STORAGE”, “id”:20320, “ctx”:“LogicalSessionCacheRefresh”,“msg”:“createCollection”,“attr”:{“namespace”:“config.system.sessions”,“uuidDisposition”:“generated”,“uuid”:{“uuid”:{"$uuid":“baf02c0e-392c-4551-b332-206c63e32ff1”}},“options”:{}}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.159+00:00”},“s”:“I”, “c”:“CONTROL”, “id”:20712, “ctx”:“LogicalSessionCacheReap”,“msg”:“Sessions collection is not set up; waiting until next sessions reap interval”,“attr”:{“error”:“NamespaceNotFound: config.system.sessions does not exist”}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.159+00:00”},“s”:“I”, “c”:“NETWORK”, “id”:23015, “ctx”:“listener”,“msg”:“Listening on”,“attr”:{“address”:"/tmp/mongodb-27017.sock"}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.159+00:00”},“s”:“I”, “c”:“NETWORK”, “id”:23015, “ctx”:“listener”,“msg”:“Listening on”,“attr”:{“address”:“0.0.0.0”}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.159+00:00”},“s”:“I”, “c”:“NETWORK”, “id”:23016, “ctx”:“listener”,“msg”:“Waiting for connections”,“attr”:{“port”:27017,“ssl”:“off”}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.176+00:00”},“s”:“I”, “c”:“INDEX”, “id”:20345, “ctx”:“LogicalSessionCacheRefresh”,“msg”:“Index build: done building”,“attr”:{“buildUUID”:null,“namespace”:“config.system.sessions”,“index”:“id”,“commitTimestamp”:{"$timestamp":{“t”:0,“i”:0}}}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.176+00:00”},“s”:“I”, “c”:“INDEX”, “id”:20345, “ctx”:“LogicalSessionCacheRefresh”,“msg”:“Index build: done building”,“attr”:{“buildUUID”:null,“namespace”:“config.system.sessions”,“index”:“lsidTTLIndex”,“commitTimestamp”:{"$timestamp":{“t”:0,“i”:0}}}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.829+00:00”},“s”:“I”, “c”:“NETWORK”, “id”:22943, “ctx”:“listener”,“msg”:“Connection accepted”,“attr”:{“remote”:“172.21.0.3:55558”,“connectionId”:1,“connectionCount”:1}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.830+00:00”},“s”:“I”, “c”:“NETWORK”, “id”:22943, “ctx”:“listener”,“msg”:“Connection accepted”,“attr”:{“remote”:“172.21.0.3:55556”,“connectionId”:2,“connectionCount”:2}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.895+00:00”},“s”:“I”, “c”:“NETWORK”, “id”:51800, “ctx”:“conn2”,“msg”:“client metadata”,“attr”:{“remote”:“172.21.0.3:55556”,“client”:“conn2”,“doc”:{“driver”:{“name”:“mongo-csharp-driver”,“version”:“2.11.2.0”},“os”:{“type”:“Linux”,“name”:“Linux 5.4.0-53-generic #59-Ubuntu SMP Wed Oct 21 09:38:44 UTC 2020”,“architecture”:“x86_64”,“version”:“5.4.0-53-generic”},“platform”:".NET Core 3.1.9"}}}
squidex_mongo_1 | {“t”:{"$date":“2020-12-04T09:15:01.895+00:00”},“s”:“I”, “c”:“NETWORK”, “id”:51800, “ctx”:“conn1”,“msg”:“client metadata”,“attr”:{“remote”:“172.21.0.3:55558”,“client”:“conn1”,“doc”:{“driver”:{“name”:“mongo-csharp-driver”,“version”:“2.11.2.0”},“os”:{“type”:“Linux”,“name”:“Linux 5.4.0-53-generic #59-Ubuntu SMP Wed Oct 21 09:38:44 UTC 2020”,“architecture”:“x86_64”,“version”:“5.4.0-53-generic”},“platform”:".NET Core 3.1.9"}}}
squidex_squidex_1 | {
squidex_squidex_1 | “logLevel”: “Information”,
squidex_squidex_1 | “message”: “Application started”,
squidex_squidex_1 | “environment”: {
squidex_squidex_1 | “applicationname”: “Squidex”,
squidex_squidex_1 | “aspnetcore_urls”: “http://\u002B:80”,
squidex_squidex_1 | “assets:defaultpagesize”: “200”,
squidex_squidex_1 | “assets:defaultpagesizegraphql”: “20”,
squidex_squidex_1 | “assets:deleterecursive”: “True”,
squidex_squidex_1 | “assets:maxresults”: “200”,
squidex_squidex_1 | “assets:maxsize”: “5242880”,
squidex_squidex_1 | “assetstore:amazons3:accesskey”: “”,
squidex_squidex_1 | “assetstore:amazons3:bucket”: “squidex-test”,
squidex_squidex_1 | “assetstore:amazons3:bucketfolder”: “squidex-assets”,
squidex_squidex_1 | “assetstore:amazons3:forcepathstyle”: “False”,
squidex_squidex_1 | “assetstore:amazons3:regionname”: “”,
squidex_squidex_1 | “assetstore:amazons3:secretkey”: “”,
squidex_squidex_1 | “assetstore:amazons3:serviceurl”: “”,
squidex_squidex_1 | “assetstore:azureblob:connectionstring”: “UseDevelopmentStorage=true”,
squidex_squidex_1 | “assetstore:azureblob:containername”: “squidex-assets”,
squidex_squidex_1 | “assetstore:exposesourceurl”: “False”,
squidex_squidex_1 | “assetstore:folder:path”: “Assets”,
squidex_squidex_1 | “assetstore:ftp:password”: “”,
squidex_squidex_1 | “assetstore:ftp:path”: “Assets”,
squidex_squidex_1 | “assetstore:ftp:serverhost”: “”,
squidex_squidex_1 | “assetstore:ftp:serverport”: “21”,
squidex_squidex_1 | “assetstore:ftp:username”: “”,
squidex_squidex_1 | “assetstore:googlecloud:bucket”: “squidex-assets”,
squidex_squidex_1 | “assetstore:mongodb:bucket”: “fs”,
squidex_squidex_1 | “assetstore:mongodb:configuration”: “mongodb://localhost”,
squidex_squidex_1 | “assetstore:mongodb:database”: “SquidexAssets”,
squidex_squidex_1 | “assetstore:type”: “Folder”,
squidex_squidex_1 | “caching:maxsurrogatekeyssize”: “0”,
squidex_squidex_1 | “caching:replicated:enable”: “True”,
squidex_squidex_1 | “caching:strongetag”: “False”,
squidex_squidex_1 | “contentroot”: “/app”,
squidex_squidex_1 | “contents:defaultpagesize”: “200”,
squidex_squidex_1 | “contents:defaultpagesizegraphql”: “20”,
squidex_squidex_1 | “contents:maxresults”: “200”,
squidex_squidex_1 | “dotnet_running_in_container”: “true”,
squidex_squidex_1 | “email:smtp:enablessl”: “True”,
squidex_squidex_1 | “email:smtp:password”: “”,
squidex_squidex_1 | “email:smtp:port”: “587”,
squidex_squidex_1 | “email:smtp:sender”: “hello@squidex.io”,
squidex_squidex_1 | “email:smtp:server”: “”,
squidex_squidex_1 | “email:smtp:username”: “”,
squidex_squidex_1 | “eventpublishers:alltorabbitmq:configuration”: “amqp://guest:guest@localhost/”,
squidex_squidex_1 | “eventpublishers:alltorabbitmq:enabled”: “False”,
squidex_squidex_1 | “eventpublishers:alltorabbitmq:eventsfilter”: ".
",
squidex_squidex_1 | “eventpublishers:alltorabbitmq:exchange”: “squidex”,
squidex_squidex_1 | “eventpublishers:alltorabbitmq:type”: “RabbitMq”,
squidex_squidex_1 | “eventstore:cosmosdb:configuration”: “https://localhost:8081”,
squidex_squidex_1 | “eventstore:cosmosdb:database”: “Squidex”,
squidex_squidex_1 | “eventstore:cosmosdb:masterkey”: “”,
squidex_squidex_1 | “eventstore:geteventstore:configuration”: “ConnectTo=tcp://admin:changeit@localhost:1113; HeartBeatTimeout=500; MaxReconnections=-1”,
squidex_squidex_1 | “eventstore:geteventstore:prefix”: “squidex”,
squidex_squidex_1 | “eventstore:geteventstore:projectionhost”: “localhost”,
squidex_squidex_1 | “eventstore:mongodb:configuration”: “mongodb://squidex_mongo”,
squidex_squidex_1 | “eventstore:mongodb:database”: “Squidex”,
squidex_squidex_1 | “eventstore:type”: “MongoDB”,
squidex_squidex_1 | “exposedconfiguration:version”: “squidex:version”,
squidex_squidex_1 | “fulltext:elastic:configuration”: “http://localhost:9200”,
squidex_squidex_1 | “fulltext:elastic:indexname”: “squidex”,
squidex_squidex_1 | “fulltext:type”: “default”,
squidex_squidex_1 | “healthz:gc:threshold”: “4096”,
squidex_squidex_1 | “home”: “/root”,
squidex_squidex_1 | “hostname”: “8212bf35a363”,
squidex_squidex_1 | “identity:adminclientid”: “”,
squidex_squidex_1 | “identity:adminclientsecret”: “”,
squidex_squidex_1 | “identity:adminemail”: “”,
squidex_squidex_1 | “identity:adminpassword”: “”,
squidex_squidex_1 | “identity:adminrecreate”: “False”,
squidex_squidex_1 | “identity:allowpasswordauth”: “True”,
squidex_squidex_1 | “identity:githubclient”: “”,
squidex_squidex_1 | “identity:githubsecret”: “”,
squidex_squidex_1 | “identity:googleclient”: “”,
squidex_squidex_1 | “identity:googlesecret”: “”,
squidex_squidex_1 | “identity:lockautomatically”: “False”,
squidex_squidex_1 | “identity:microsoftclient”: “”,
squidex_squidex_1 | “identity:microsoftsecret”: “”,
squidex_squidex_1 | “identity:microsofttenant”: “”,
squidex_squidex_1 | “identity:oidcauthority”: “”,
squidex_squidex_1 | “identity:oidcclient”: “”,
squidex_squidex_1 | “identity:oidcname”: “OIDC”,
squidex_squidex_1 | “identity:oidcscopes:0”: “email”,
squidex_squidex_1 | “identity:oidcsecret”: “”,
squidex_squidex_1 | “identity:privacyurl”: “https://squidex.io/privacy”,
squidex_squidex_1 | “identity:showpii”: “True”,
squidex_squidex_1 | “kafka:bootstrapservers”: “”,
squidex_squidex_1 | “languages:custom”: “”,
squidex_squidex_1 | “logging:colors”: “True”,
squidex_squidex_1 | “logging:datadog”: “False”,
squidex_squidex_1 | “logging:human”: “True”,
squidex_squidex_1 | “logging:level”: “Information”,
squidex_squidex_1 | “logging:logprofiler”: “False”,
squidex_squidex_1 | “logging:logrequests”: “True”,
squidex_squidex_1 | “logging:storeretentationindays”: “90”,
squidex_squidex_1 | “mode:isreadonly”: “False”,
squidex_squidex_1 | “news:appname”: “squidex-website”,
squidex_squidex_1 | “news:clientid”: “squidex-website:default”,
squidex_squidex_1 | “news:clientsecret”: “”,
squidex_squidex_1 | “orleans:clustering”: “Development”,
squidex_squidex_1 | “orleans:gatewayport”: “40000”,
squidex_squidex_1 | “orleans:ipaddress”: “”,
squidex_squidex_1 | “orleans:siloport”: “11111”,
squidex_squidex_1 | “path”: “/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin”,
squidex_squidex_1 | “plugins:0”: “Squidex.Extensions.dll”,
squidex_squidex_1 | “rebuild:apps”: “False”,
squidex_squidex_1 | “rebuild:assetfiles”: “False”,
squidex_squidex_1 | “rebuild:assets”: “False”,
squidex_squidex_1 | “rebuild:contents”: “False”,
squidex_squidex_1 | “rebuild:indexes”: “False”,
squidex_squidex_1 | “rebuild:rules”: “False”,
squidex_squidex_1 | “rebuild:schemas”: “False”,
squidex_squidex_1 | “robots:text”: “User-agent: \nAllow: /api/assets/”,
squidex_squidex_1 | “rules:executiontimeoutinseconds”: “10”,
squidex_squidex_1 | “running_in_container”: “true”,
squidex_squidex_1 | “store:mongodb:configuration”: “mongodb://squidex_mongo”,
squidex_squidex_1 | “store:mongodb:contentdatabase”: “SquidexContent”,
squidex_squidex_1 | “store:mongodb:database”: “Squidex”,
squidex_squidex_1 | “store:type”: “MongoDb”,
squidex_squidex_1 | “translations:deepl:authkey”: “”,
squidex_squidex_1 | “twitter:clientid”: “”,
squidex_squidex_1 | “twitter:clientsecret”: “”,
squidex_squidex_1 | “ui:disablescheduledchanges”: “False”,
squidex_squidex_1 | “ui:google:analyticsid”: “UA-99989790-2”,
squidex_squidex_1 | “ui:hidedatebuttons”: “False”,
squidex_squidex_1 | “ui:hidedatetimemodebutton”: “False”,
squidex_squidex_1 | “ui:hidenews”: “False”,
squidex_squidex_1 | “ui:hideonboarding”: “False”,
squidex_squidex_1 | “ui:map:googlemaps:key”: “AIzaSyB_Z8l3nwUxZhMJykiDUJy6bSHXXlwcYMg”,
squidex_squidex_1 | “ui:map:type”: “OSM”,
squidex_squidex_1 | “ui:onlyadminscancreateapps”: “False”,
squidex_squidex_1 | “ui:redirecttologin”: “False”,
squidex_squidex_1 | “ui:referencesdropdownitemcount”: “100”,
squidex_squidex_1 | “ui:regexsuggestions:email”: “^[a-zA-Z0-9.!#$%\u0026\u2019*\u002B\/=?^\u0060{|}~-]\u002B@[a-zA-Z0-9-]\u002B(?:.[a-zA-Z0-9-]\u002B)$",
squidex_squidex_1 | “ui:regexsuggestions:phone”: "^\(
\\u002B*[1-9]{0,3}\)-[1-9]{0,3}[-. /]\([2-9]\d{2}\)[-. /]\d{3}[-. /]\d{4} ext*\.* \d{0,4}$",
squidex_squidex_1 | “ui:regexsuggestions:slug”: "^[a-z0-9]\u002B(\-[a-z0-9]\u002B)
$",
squidex_squidex_1 | “ui:regexsuggestions:url”: "^(?:http(s)?:\/\/)?[\w.-]\u002B(?:\.[\w\.-]\u002B)\u002B[\w\-\.
~:\/?#%[\]@!\$\u0026\u0027\(\)\*\\u002B,;=.]\u002B$”,
squidex_squidex_1 | “ui:showinfo”: “False”,
squidex_squidex_1 | “urls”: “http://\u002B:80”,
squidex_squidex_1 | “urls:baseurl”: “https://squidex.domain.xyz/”,
squidex_squidex_1 | “urls:enableforwardheaders”: “True”,
squidex_squidex_1 | “urls:enforcehost”: “True”,
squidex_squidex_1 | “urls:enforcehttps”: “False”
squidex_squidex_1 | },
squidex_squidex_1 | “app”: {
squidex_squidex_1 | “name”: “Squidex”,
squidex_squidex_1 | “version”: “5.3.0.0”,
squidex_squidex_1 | “sessionId”: “bc15ea02-a1ec-4f5a-8a33-ac8edd547341”
squidex_squidex_1 | },
squidex_squidex_1 | “timestamp”: “2020-12-04T09:15:02Z”
squidex_squidex_1 | }

There seems to be some worrying message at the top, what do you think?

No, that looks fine.

I think I know what the problem is.

the version you use probably blocks requests with host names that are different from url:baseUrl.

So you can try:

  1. Use a older 5.X version
  2. Wait for a new version
  3. Set the host header when forwarding requests
  4. Set the X-Forwarded-Host header when forwarding requests.
1 Like

YES, option 3 was the fastest with the following nginx instructions:

proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection keep-alive;
proxy_set_header Host $host;

Thank you for helping me figuring out what’s wrong :smiley:

Weird, there’re some http calls that don’t let me login(which was successful from the popup)


What it could be? Should I force somewhere https for the front-end calls?

Due to the increasing number of restrictions in chrome squidex does not run in http mode anymore.

Ensure that your url:baseUrl is also set to https.

Using docker-compose, where can I find this setting?

It is the URLS__BASEURL Env variable.

1 Like

That environment variable is already setup with https at the start, could there be any other variable to force?

You should also enforce a redirect to https.

It is already enforced in nginx, it’s just the front-end that’s using http in some calls

Can you check this endpoint? You should see https everywhere.

https://cloud.squidex.io/identity-server/.well-known/openid-configuration

Perhaps you also need to forward X-Forwarded-Proto

1 Like

Perhaps this is it :smiley: thank you