mirror of
https://github.com/linuxserver/reverse-proxy-confs.git
synced 2025-07-05 20:41:32 -07:00
Format files
This commit is contained in:
parent
e4b70cea1d
commit
0eb569982b
16 changed files with 52 additions and 51 deletions
|
@ -11,3 +11,4 @@ trim_trailing_whitespace = false
|
||||||
[{*.conf,*.conf.sample}]
|
[{*.conf,*.conf.sample}]
|
||||||
indent_style = space
|
indent_style = space
|
||||||
indent_size = 4
|
indent_size = 4
|
||||||
|
trim_trailing_whitespace = true
|
||||||
|
|
10
README.md
10
README.md
|
@ -23,8 +23,8 @@ Conversely subdomain reverse proxying does not require special accommodation by
|
||||||
|
|
||||||
Make sure that your default site config contains the following lines in the appropriate spots as seen in the default version:
|
Make sure that your default site config contains the following lines in the appropriate spots as seen in the default version:
|
||||||
|
|
||||||
1) For subfolder methods: `include /config/nginx/proxy-confs/*.subfolder.conf;`
|
1. For subfolder methods: `include /config/nginx/proxy-confs/*.subfolder.conf;`
|
||||||
2) For subdomain methods: `include /config/nginx/proxy-confs/*.subdomain.conf;`
|
2. For subdomain methods: `include /config/nginx/proxy-confs/*.subdomain.conf;`
|
||||||
|
|
||||||
### Ensure you have a custom docker network
|
### Ensure you have a custom docker network
|
||||||
|
|
||||||
|
@ -36,14 +36,14 @@ These confs assume that the swag container can reach other containers via their
|
||||||
|
|
||||||
- If you are using a gui manager like portainer, you can create a custom bridge network in the gui, and select it when creating a new container.
|
- If you are using a gui manager like portainer, you can create a custom bridge network in the gui, and select it when creating a new container.
|
||||||
|
|
||||||
- If you are using unraid, create a custom network in command line via `docker network create [networkname]`, then go to docker service settings (under advanced) and set the option `Preserve user defined networks:` to `Yes`. Then in each container setting, including the swag container, in the network type dropdown, select `Custom : [networkname]`. This is a necessary step as the bridge network that unraid uses by default does not allow container to container communication.
|
- If you are using unraid, create a custom network in command line via `docker network create [networkname]`, then go to docker service settings (under advanced) and set the option `Preserve user defined networks:` to `Yes`. Then in each container setting, including the swag container, in the network type dropdown, select `Custom : [networkname]`. This is a necessary step as the bridge network that unraid uses by default does not allow container to container communication.
|
||||||
|
|
||||||
If the reverse proxied containers are not reachable via dns or they are running on a different machine, you will have to modify these confs to fit your needs.
|
If the reverse proxied containers are not reachable via dns or they are running on a different machine, you will have to modify these confs to fit your needs.
|
||||||
|
|
||||||
### Rename the required proxy configs
|
### Rename the required proxy configs
|
||||||
|
|
||||||
1) Rename the conf files and remove the `.sample` at the end (ie. `sonarr.subfolder.conf`)
|
1. Rename the conf files and remove the `.sample` at the end (ie. `sonarr.subfolder.conf`)
|
||||||
2) Restart the swag container
|
2. Restart the swag container
|
||||||
|
|
||||||
### Make any necessary changes detailed in the config
|
### Make any necessary changes detailed in the config
|
||||||
|
|
||||||
|
|
|
@ -48,10 +48,10 @@ server {
|
||||||
proxy_set_header X-Scheme $scheme;
|
proxy_set_header X-Scheme $scheme;
|
||||||
}
|
}
|
||||||
|
|
||||||
# OPDS feed for eBook reader apps
|
# OPDS feed for eBook reader apps
|
||||||
# Even if you use Authelia, the OPDS feed requires a password to be set for
|
# Even if you use Authelia, the OPDS feed requires a password to be set for
|
||||||
# the user directly in Calibre-Web, as eBook reader apps don't support
|
# the user directly in Calibre-Web, as eBook reader apps don't support
|
||||||
# form-based logins, only HTTP Basic auth.
|
# form-based logins, only HTTP Basic auth.
|
||||||
location /opds/ {
|
location /opds/ {
|
||||||
include /config/nginx/proxy.conf;
|
include /config/nginx/proxy.conf;
|
||||||
include /config/nginx/resolver.conf;
|
include /config/nginx/resolver.conf;
|
||||||
|
|
|
@ -30,11 +30,11 @@ location ^~ /komga/ {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
location ^~ /komga/api {
|
location ^~ /komga/api {
|
||||||
include /config/nginx/proxy.conf;
|
include /config/nginx/proxy.conf;
|
||||||
include /config/nginx/resolver.conf;
|
include /config/nginx/resolver.conf;
|
||||||
set $upstream_app komga;
|
set $upstream_app komga;
|
||||||
set $upstream_port 8080;
|
set $upstream_port 8080;
|
||||||
set $upstream_proto http;
|
set $upstream_proto http;
|
||||||
proxy_pass $upstream_proto://$upstream_app:$upstream_port;
|
proxy_pass $upstream_proto://$upstream_app:$upstream_port;
|
||||||
}
|
}
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# This config have been tested with "TLS_FLAVOR=mail"
|
# This config have been tested with "TLS_FLAVOR=mail"
|
||||||
# To avoid errors you must change in docker-compose ports: 80 and 443, more info: https://mailu.io/1.7/reverse.html
|
# To avoid errors you must change in docker-compose ports: 80 and 443, more info: https://mailu.io/1.7/reverse.html
|
||||||
|
|
||||||
location /admin{
|
location /admin {
|
||||||
return 301 $scheme://$host/admin/;
|
return 301 $scheme://$host/admin/;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -32,7 +32,7 @@ location ^~ /admin/ {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
location /webmail{
|
location /webmail {
|
||||||
return 301 $scheme://$host/webmail/;
|
return 301 $scheme://$host/webmail/;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -9,7 +9,6 @@ location /todo {
|
||||||
}
|
}
|
||||||
|
|
||||||
location ^~ /todo/ {
|
location ^~ /todo/ {
|
||||||
|
|
||||||
# enable the next two lines for http auth
|
# enable the next two lines for http auth
|
||||||
#auth_basic "Restricted";
|
#auth_basic "Restricted";
|
||||||
#auth_basic_user_file /config/nginx/.htpasswd;
|
#auth_basic_user_file /config/nginx/.htpasswd;
|
||||||
|
|
|
@ -18,7 +18,7 @@ location ^~ /.well-known {
|
||||||
# in the Nextcloud `.htaccess` that concern `/.well-known`.
|
# in the Nextcloud `.htaccess` that concern `/.well-known`.
|
||||||
|
|
||||||
location = /.well-known/carddav { return 301 /nextcloud/remote.php/dav/; }
|
location = /.well-known/carddav { return 301 /nextcloud/remote.php/dav/; }
|
||||||
location = /.well-known/caldav { return 301 /nextcloud/remote.php/dav/; }
|
location = /.well-known/caldav { return 301 /nextcloud/remote.php/dav/; }
|
||||||
|
|
||||||
# Let Nextcloud's API for `/.well-known` URIs handle all other
|
# Let Nextcloud's API for `/.well-known` URIs handle all other
|
||||||
# requests by passing them to the front-end controller.
|
# requests by passing them to the front-end controller.
|
||||||
|
|
|
@ -53,7 +53,7 @@ server {
|
||||||
set $upstream_proto http;
|
set $upstream_proto http;
|
||||||
proxy_pass $upstream_proto://$upstream_app:$upstream_port;
|
proxy_pass $upstream_proto://$upstream_app:$upstream_port;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
# This allows access to the documentation for the api
|
# This allows access to the documentation for the api
|
||||||
location ~ (/ombi)?/swagger {
|
location ~ (/ombi)?/swagger {
|
||||||
|
@ -64,9 +64,9 @@ server {
|
||||||
set $upstream_proto http;
|
set $upstream_proto http;
|
||||||
proxy_pass $upstream_proto://$upstream_app:$upstream_port;
|
proxy_pass $upstream_proto://$upstream_app:$upstream_port;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if ($http_referer ~* /ombi) {
|
if ($http_referer ~* /ombi) {
|
||||||
rewrite ^/swagger/(.*) /ombi/swagger/$1? redirect;
|
rewrite ^/swagger/(.*) /ombi/swagger/$1? redirect;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -30,13 +30,13 @@ location ^~ /rclone/ {
|
||||||
rewrite /rclone(.*) $1 break;
|
rewrite /rclone(.*) $1 break;
|
||||||
}
|
}
|
||||||
|
|
||||||
location ^~ /rclone/websockify {
|
location ^~ /rclone/websockify {
|
||||||
include /config/nginx/proxy.conf;
|
include /config/nginx/proxy.conf;
|
||||||
include /config/nginx/resolver.conf;
|
include /config/nginx/resolver.conf;
|
||||||
set $upstream_app rclone;
|
set $upstream_app rclone;
|
||||||
set $upstream_port 5800;
|
set $upstream_port 5800;
|
||||||
set $upstream_proto http;
|
set $upstream_proto http;
|
||||||
proxy_pass $upstream_proto://$upstream_app:$upstream_port/websockify/;
|
proxy_pass $upstream_proto://$upstream_app:$upstream_port/websockify/;
|
||||||
|
|
||||||
rewrite /rclone(.*) $1 break;
|
rewrite /rclone(.*) $1 break;
|
||||||
}
|
}
|
||||||
|
|
|
@ -52,5 +52,5 @@ server {
|
||||||
set $upstream_proto http;
|
set $upstream_proto http;
|
||||||
proxy_pass $upstream_proto://$upstream_app:$upstream_port;
|
proxy_pass $upstream_proto://$upstream_app:$upstream_port;
|
||||||
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -51,7 +51,7 @@ server {
|
||||||
set $upstream_proto http;
|
set $upstream_proto http;
|
||||||
proxy_pass $upstream_proto://$upstream_app:$upstream_port;
|
proxy_pass $upstream_proto://$upstream_app:$upstream_port;
|
||||||
|
|
||||||
proxy_pass_header X-Transmission-Session-Id;
|
proxy_pass_header X-Transmission-Session-Id;
|
||||||
}
|
}
|
||||||
|
|
||||||
location ~ (/transmission)?/rpc {
|
location ~ (/transmission)?/rpc {
|
||||||
|
|
|
@ -33,7 +33,7 @@ location ^~ /transmission {
|
||||||
set $upstream_proto http;
|
set $upstream_proto http;
|
||||||
proxy_pass $upstream_proto://$upstream_app:$upstream_port;
|
proxy_pass $upstream_proto://$upstream_app:$upstream_port;
|
||||||
|
|
||||||
proxy_pass_header X-Transmission-Session-Id;
|
proxy_pass_header X-Transmission-Session-Id;
|
||||||
}
|
}
|
||||||
|
|
||||||
location ^~ /transmission/rpc {
|
location ^~ /transmission/rpc {
|
||||||
|
|
|
@ -33,6 +33,7 @@ location /tvheadend/ {
|
||||||
|
|
||||||
# enable for Authentik (requires authentik-server.conf in the server block)
|
# enable for Authentik (requires authentik-server.conf in the server block)
|
||||||
#include /config/nginx/authentik-location.conf;
|
#include /config/nginx/authentik-location.conf;
|
||||||
|
|
||||||
include /config/nginx/proxy.conf;
|
include /config/nginx/proxy.conf;
|
||||||
include /config/nginx/resolver.conf;
|
include /config/nginx/resolver.conf;
|
||||||
|
|
||||||
|
|
|
@ -23,7 +23,7 @@ location ^~ /youtube-dl/ {
|
||||||
|
|
||||||
include /config/nginx/proxy.conf;
|
include /config/nginx/proxy.conf;
|
||||||
include /config/nginx/resolver.conf;
|
include /config/nginx/resolver.conf;
|
||||||
set $upstream_app youtube-dl-server;
|
set $upstream_app youtube-dl-server;
|
||||||
set $upstream_port 8080;
|
set $upstream_port 8080;
|
||||||
set $upstream_proto http;
|
set $upstream_proto http;
|
||||||
proxy_pass $upstream_proto://$upstream_app:$upstream_port;
|
proxy_pass $upstream_proto://$upstream_app:$upstream_port;
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue