Zum Hauptinhalt springen
Version: rolling

Common Issues & Help

Check whether the containers are running

docker ps
Admin general

Several containers should be listed here, e.g., for opencloud, traefik, etc.

Accept Self-Signed Certificates

As the local environment is self-signed, you must accept the security risk in your browser.

For Firefox:

You need to click on Advanced

Admin general

Confirm the risk with Accept the risk and Continue

Admin general

Docker Permission Issues

If your Docker Compose setup fails to start and the logs contain messages such as permission denied, it's likely due to incorrect ownership of local directories used by the containers.

Example log output:

opencloud-1 | {"level":"fatal","service":"nats","time":"2025-04-08T09:59:59Z","line":"github.com/opencloud-eu/opencloud/services/nats/pkg/logging/nats.go:33","message":"Can't start JetStream: could not create storage directory - mkdir /var/lib/opencloud/nats: permission denied"}

This error typically occurs when the mounted directories are owned by the wrong user, such as root, instead of the standard Docker user (UID 1000).

Incorrect directory ownership:

drwxr-xr-x  3 root root 4096 Apr  8 09:59 opencloud-data

Correct ownership should be:

drwxr-xr-x  9 1000 1000 4096 Apr  7 07:57 opencloud-data

To resolve this issue, adjust the ownership of the directory using the chown command:

chown -R 1000:1000 opencloud-data
vorsicht

Security Warning

The user with UID 1000 on your host system will have full access to these mounted directories. This means that any local user account with this ID can read, modify, or delete OpenCloud config and data files.

This can pose a security risk in shared or multi-user environments. Make sure to implement proper user and permission management and consider isolating access to these directories.

Ensure you apply this to all relevant folders that are mounted into your containers. This will grant the Docker container the necessary permissions to access and write to these directories.

Change Admin Password Set in .env

If you initially set the OpenCloud admin password using the .env file, please note:

vorsicht

You cannot simply change the password again by editing the .env file.
Once the container is running, password changes must be made via the Web UI or terminal.

Option 1: Change via Web UI

If the current admin password is known:

  1. Log in to the OpenCloud Web Interface.
  2. Navigate to Settings > Security.
  3. Enter your current password and choose a new one.

If the admin password is forgotten or you prefer command-line tools, use the terminal method below.

Option 2: Change via Terminal

If the admin password is forgotten or needs to be changed via the terminal:

Stop the Docker container

First, stop your OpenCloud container:

docker compose stop opencloud

Run the password reset command

Use the following command to reset the password:

sudo docker run -it --rm -v <opencloud-data-path>:/var/lib/opencloud -v <opencloud-config-path>:/etc/opencloud opencloudeu/opencloud:<opencloud-version> idm resetpassword

Replace

<opencloud-data-path> – Docker volume for OpenCloud data

<opencloud-config-path> – Docker volume for OpenCloud config

<opencloud-version> – Use latest or your specific version

🔍 How to find the volume names You can list your current Docker volumes with:

docker volume ls

Look for volumes like:

opencloud-compose_opencloud-data

opencloud-compose_opencloud-config

Example for standard setup

sudo docker run -it --rm -v opencloud-compose_opencloud-data:/var/lib/opencloud -v opencloud-compose_opencloud-config:/etc/opencloud opencloudeu/opencloud:latest idm resetpassword

Start the container again

docker compose up -d

Internal LibreIDM cert expires

🔧 Renewing an expired certificate in internal IDM (OpenCloud)

When using the internal IDM (LibreIDM), the LDAP certificate may expire over time. You can see similar errormessages in your logfiles:

opencloud-1      | 2026-03-10T14:10:36Z WRN core access token not set host.name=3133c92656c8 pkg=rhttp service=frontend traceid=2da2886cf47f0143876953ee33f814a9
opencloud-1 | 2026-03-10T14:10:36Z ERR failed to build subject.session error="invalid key format" service=proxy
opencloud-1 | 2026-03-10T14:10:36Z ERR handleConnection ber.ReadPacket error="remote error: tls: bad certificate" service=idm
opencloud-1 | 2026-03-10T14:10:37Z ERR could not get ldap Connection error="LDAP Result Code 200 \"Network Error\": tls: failed to verify certificate: x509: certificate has expired or is not yet valid: current time 2026-03-10T14:10:37Z is after 2026-03-04T10:02:39Z" service=graph
opencloud-1 | 2026-03-10T14:10:37Z ERR failed to add user error="LDAP Result Code 200 \"Network Error\": tls: failed to verify certificate: x509: certificate has expired or is not yet valid: current time 2026-03-10T14:10:37Z is after 2026-03-04T10:02:39Z" request-id=3133c92656c8/LlC0SVlYb4-000023 service=graph
opencloud-1 | 2026-03-10T14:10:37Z ERR handleConnection ber.ReadPacket error="remote error: tls: bad certificate" service=idm
opencloud-1 | 2026-03-10T14:10:37Z ERR could not create user: backend error error="generalException: failed to add user" request-id=3133c92656c8/LlC0SVlYb4-000023 service=graph
opencloud-1 | 2026-03-10T14:10:37Z WRN Error Response OData Error="failed to add user" service=proxy
opencloud-1 | 2026-03-10T14:10:37Z ERR Error creating user error="500 Internal Server Error" service=proxy
opencloud-1 | 2026-03-10T14:10:37Z ERR Autoprovisioning user failed error="500 Internal Server Error" service=proxy

🛠️ Solution

Navigate to the IDM directory

cd .opencloud/idm

Delete the old certificates

rm ldap.crt ldap.key

Directory structure:

.opencloud/idm
├── idm.boltdb
├── ldap.crt
└── ldap.key

Restart the OpenCloud container

docker compose restart

➡️ The certificates will be automatically regenerated on restart.

⚠️ Recommendation

Admins should avoid using LibreIDM in production and use OpenLDAP instead.