diff --git a/.github/workflows/check_samples.yml b/.github/workflows/check_samples.yml index b5c1825..73d4eb7 100644 --- a/.github/workflows/check_samples.yml +++ b/.github/workflows/check_samples.yml @@ -12,7 +12,7 @@ jobs: steps: - name: Checkout - uses: actions/checkout@v4.1.1 + uses: actions/checkout@v4.1.6 - name: Check Allowed File Names run: | diff --git a/actual-server.subdomain.conf.sample b/actual-server.subdomain.conf.sample new file mode 100644 index 0000000..6c8112f --- /dev/null +++ b/actual-server.subdomain.conf.sample @@ -0,0 +1,46 @@ +## Version 2023/05/31 +# make sure that your actual-server container is named actual-server +# make sure that your dns has a cname set for actual-server + +server { + listen 443 ssl http2; + listen [::]:443 ssl http2; + + server_name actual-server.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app actual-server; + set $upstream_port 5006; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} diff --git a/atuin.subdomain.conf.sample b/atuin.subdomain.conf.sample new file mode 100644 index 0000000..aa9baec --- /dev/null +++ b/atuin.subdomain.conf.sample @@ -0,0 +1,45 @@ +## Version 2024/03/24 +# make sure that your atuin container is named atuin +# make sure that your dns has a cname set for atuin + +server { + listen 443 ssl http2; + listen [::]:443 ssl http2; + + server_name atuin.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app atuin; + set $upstream_port 8888; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + } +} diff --git a/flaresolverr.subdomain.conf.sample b/flaresolverr.subdomain.conf.sample new file mode 100644 index 0000000..c7706e5 --- /dev/null +++ b/flaresolverr.subdomain.conf.sample @@ -0,0 +1,46 @@ +## Version 2024/01/19 +# make sure that your flaresolverr container is named flaresolverr +# make sure that your dns has a cname set for flaresolverr + +server { + listen 443 ssl http2; + listen [::]:443 ssl http2; + + server_name flaresolverr.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app flaresolverr; + set $upstream_port 8191; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} diff --git a/flaresolverr.subfolder.conf.sample b/flaresolverr.subfolder.conf.sample new file mode 100644 index 0000000..8b6afa0 --- /dev/null +++ b/flaresolverr.subfolder.conf.sample @@ -0,0 +1,26 @@ +## Version 2024/01/19 +# make sure that your flaresolverr container is named flaresolverr +# make sure that sonarr is set to work with the base url /flaresolverr/ + +location ^~ /flaresolverr { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app flaresolverr; + set $upstream_port 8191; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + +} diff --git a/forgejo.subdomain.conf.sample b/forgejo.subdomain.conf.sample new file mode 100644 index 0000000..a683671 --- /dev/null +++ b/forgejo.subdomain.conf.sample @@ -0,0 +1,61 @@ +## Version 2024/04/20 +# make sure that your forgejo container is named forgejo +# make sure that your dns has a cname set for forgejo +# edit the following parameters in /data/forgejo/conf/app.ini or set as ENV vars in your container +# [server] +# SSH_DOMAIN = forgejo.example.com +# ROOT_URL = https://forgejo.example.com/ +# DOMAIN = forgejo.example.com + +server { + listen 443 ssl http2; + listen [::]:443 ssl http2; + + server_name forgejo.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app forgejo; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } + + location ~ (/forgejo)?/info/lfs { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app forgejo; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} diff --git a/forgejo.subfolder.conf.sample b/forgejo.subfolder.conf.sample new file mode 100644 index 0000000..d23b337 --- /dev/null +++ b/forgejo.subfolder.conf.sample @@ -0,0 +1,24 @@ +## Version 2024/04/20 +# make sure that your forgejo container is named forgejo +# make sure that forgejo is set to work with the base url /forgejo/ +# The following parameters in /data/forgejo/conf/app.ini should be edited to match your setup +# or set as ENV vars in your container +# [server] +# SSH_DOMAIN = example.com:2222 +# ROOT_URL = https://example.com/forgejo/ +# DOMAIN = example.com + +location /forgejo { + return 301 $scheme://$host/forgejo/; +} + +location ^~ /forgejo/ { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app forgejo; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + rewrite /forgejo(.*) $1 break; +} diff --git a/gatus.subdomain.conf.sample b/gatus.subdomain.conf.sample new file mode 100644 index 0000000..a6831eb --- /dev/null +++ b/gatus.subdomain.conf.sample @@ -0,0 +1,47 @@ +## Version 2024/02/27 +# make sure that your gatus container is named gatus +# make sure that your dns has a cname set for gatus + +server { + listen 443 ssl http2; + listen [::]:443 ssl http2; + + server_name gatus.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app gatus; + set $upstream_port 8080; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } + +} diff --git a/gatus.subfolder.conf.sample b/gatus.subfolder.conf.sample new file mode 100644 index 0000000..cdfb04a --- /dev/null +++ b/gatus.subfolder.conf.sample @@ -0,0 +1,32 @@ +## Version 2024/02/27 +# make sure that your container is named +# make sure that is set to work with the base url // + + +location /gatus { + return 301 $scheme://$host/gatus/; +} + +location ^~ /gatus/ { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app gatus; + set $upstream_port 8080; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + +} + diff --git a/homepage.subdomain.conf.sample b/homepage.subdomain.conf.sample new file mode 100644 index 0000000..eacfccb --- /dev/null +++ b/homepage.subdomain.conf.sample @@ -0,0 +1,50 @@ +## Version 2024/04/09 +# make sure that your homepage container is named homepage +# make sure that your dns has a cname set for homepage + +server { + listen 443 ssl http2; + listen [::]:443 ssl http2; + + server_name homepage.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app homepage; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + # Clear Authorization Header if you are using http auth and normal homepage auth + #proxy_set_header Authorization ""; + + } + +} diff --git a/homepage.subfolder.conf.sample b/homepage.subfolder.conf.sample new file mode 100644 index 0000000..52d3e7f --- /dev/null +++ b/homepage.subfolder.conf.sample @@ -0,0 +1,35 @@ +## Version 2024/04/09 +# make sure that your homepage container is named homepage +# make sure that homepage is set to work with the base url /homepage/ +# homepage requires environment variables set thus: +# environment: +# - "GF_SERVER_ROOT_URL=https://my.domain.com/homepage" +# - "GF_SERVER_DOMAIN=https://my.domain.com/" + +location ^~ /homepage/ { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app homepage; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + # Clear Authorization Header if you are using http auth and normal homepage auth + #proxy_set_header Authorization ""; + + rewrite ^/homepage/(.*)$ /$1 break; + +} diff --git a/influxdb.subdomain.conf.sample b/influxdb.subdomain.conf.sample index e772beb..58e4cce 100644 --- a/influxdb.subdomain.conf.sample +++ b/influxdb.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2023/05/31 +## Version 2024/01/08 # make sure that your influxdb container is named influxdb # make sure that your dns has a cname set for influxdb @@ -41,6 +41,16 @@ server { set $upstream_port 8086; set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } + + location ~ (/influxdb)?/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app influxdb; + set $upstream_port 8086; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + } } - diff --git a/kimai.subdomain.conf.sample b/kimai.subdomain.conf.sample new file mode 100644 index 0000000..4fe36a2 --- /dev/null +++ b/kimai.subdomain.conf.sample @@ -0,0 +1,57 @@ +## Version 2024/03/22 +# make sure that your kimai container is named kimai +# make sure that your dns has a cname set for kimai + +server { + listen 443 ssl http2; + listen [::]:443 ssl http2; + + server_name kimai.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app kimai; + set $upstream_port 80; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } + + location ~ (/kimai)?/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app kimai; + set $upstream_port 80; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } + +} diff --git a/nextcloud.subdomain.conf.sample b/nextcloud.subdomain.conf.sample index 5fb72f8..526efa8 100644 --- a/nextcloud.subdomain.conf.sample +++ b/nextcloud.subdomain.conf.sample @@ -1,9 +1,9 @@ -## Version 2023/06/24 +## Version 2024/04/25 # make sure that your nextcloud container is named nextcloud # make sure that your dns has a cname set for nextcloud # assuming this container is called "swag", edit your nextcloud container's config # located at /config/www/nextcloud/config/config.php and add the following lines before the ");": -# 'trusted_proxies' => ['swag'], +# 'trusted_proxies' => [gethostbyname('swag')], # 'overwrite.cli.url' => 'https://nextcloud.example.com/', # 'overwritehost' => 'nextcloud.example.com', # 'overwriteprotocol' => 'https', diff --git a/nextcloud.subfolder.conf.sample b/nextcloud.subfolder.conf.sample index ca259da..f206d06 100644 --- a/nextcloud.subfolder.conf.sample +++ b/nextcloud.subfolder.conf.sample @@ -1,9 +1,9 @@ -## Version 2023/06/24 +## Version 2024/04/25 # make sure that your nextcloud container is named nextcloud # make sure that nextcloud is set to work with the base url /nextcloud/ # Assuming this container is called "swag", edit your nextcloud container's config # located at /config/www/nextcloud/config/config.php and add the following lines before the ");": -# 'trusted_proxies' => ['swag'], +# 'trusted_proxies' => [gethostbyname('swag')], # 'overwritewebroot' => '/nextcloud', # 'overwrite.cli.url' => 'https://example.com/nextcloud', # diff --git a/open-webui.subdomain.conf.sample b/open-webui.subdomain.conf.sample new file mode 100644 index 0000000..1c4410f --- /dev/null +++ b/open-webui.subdomain.conf.sample @@ -0,0 +1,48 @@ +## Version 2024/03/30 +# make sure that your open-webui container is named open-webui +# make sure that your dns has a cname set for open-webui + +server { + listen 443 ssl http2; + listen [::]:443 ssl http2; + + server_name open-webui.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app open-webui; + set $upstream_port 8080; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } + +} + diff --git a/rallly.subdomain.conf.sample b/rallly.subdomain.conf.sample new file mode 100644 index 0000000..3dcfea1 --- /dev/null +++ b/rallly.subdomain.conf.sample @@ -0,0 +1,46 @@ +## Version 2023/05/31 +# make sure that your rallly container is named rallly +# make sure that your dns has a cname set for rallly + +server { + listen 443 ssl http2; + listen [::]:443 ssl http2; + + server_name rallly.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app rallly; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} diff --git a/uptime-kuma.subdomain.conf.sample b/uptime-kuma.subdomain.conf.sample index d9223cd..b269db0 100644 --- a/uptime-kuma.subdomain.conf.sample +++ b/uptime-kuma.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2023/05/31 +## Version 2024/03/26 # make sure that your uptime-kuma container is named uptime-kuma # make sure that your dns has a cname set for uptime-kuma @@ -43,4 +43,14 @@ server { proxy_pass $upstream_proto://$upstream_app:$upstream_port; } + + location ~ /(status|assets|icon.svg) { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app uptime-kuma; + set $upstream_port 3001; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } } diff --git a/watchstate.subdomain.conf.sample b/watchstate.subdomain.conf.sample new file mode 100644 index 0000000..cb7758b --- /dev/null +++ b/watchstate.subdomain.conf.sample @@ -0,0 +1,58 @@ +## Version 2024/05/06 +# make sure that your radarr container is named watchstate +# make sure that your dns has a cname set for watchstate +# the api endpoint is not behind auth, so please make sure to enable +# "Webhook match backend id" in backend settings + +server { + listen 443 ssl http2; + listen [::]:443 ssl http2; + + server_name watchstate.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app watchstate; + set $upstream_port 8080; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } + + location ~ /v1/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app watchstate; + set $upstream_port 8080; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} diff --git a/yt-dlp-web.subdomain.conf.sample b/yt-dlp-web.subdomain.conf.sample new file mode 100644 index 0000000..8b05faf --- /dev/null +++ b/yt-dlp-web.subdomain.conf.sample @@ -0,0 +1,45 @@ +## Version 2024/02/16 +# make sure that your yt-dlp-web container is named yt-dlp-web +# make sure that your dns has a cname set for yt-dlp-web + +server { + listen 443 ssl http2; + listen [::]:443 ssl http2; + + server_name yt-dlp-web.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app yt-dlp-web; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + } +}