From f151d51c85789aa3120986ba35213d494ec63a21 Mon Sep 17 00:00:00 2001 From: codevski <1435321+codevski@users.noreply.github.com> Date: Fri, 19 Jul 2024 11:19:29 +1000 Subject: [PATCH 01/81] change dashy port --- dashy.subdomain.conf.sample | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/dashy.subdomain.conf.sample b/dashy.subdomain.conf.sample index e4b7607..a07b854 100644 --- a/dashy.subdomain.conf.sample +++ b/dashy.subdomain.conf.sample @@ -38,7 +38,7 @@ server { include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app dashy; - set $upstream_port 80; + set $upstream_port 8080; set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; } From 3e8fefdf0a34d254b70fea7496bda5865e47c2b1 Mon Sep 17 00:00:00 2001 From: geekau Date: Sun, 4 Aug 2024 11:23:04 +1000 Subject: [PATCH 02/81] Add sample configs for whisparr and ddns-updater --- ddns-updater.subdomain.conf.sample | 55 ++++++++++++++++++++++++++++++ ddns-updater.subfolder.conf.sample | 35 +++++++++++++++++++ whisparr.subdomain.conf.sample | 55 ++++++++++++++++++++++++++++++ whisparr.subfolder.conf.sample | 35 +++++++++++++++++++ 4 files changed, 180 insertions(+) create mode 100644 ddns-updater.subdomain.conf.sample create mode 100644 ddns-updater.subfolder.conf.sample create mode 100644 whisparr.subdomain.conf.sample create mode 100644 whisparr.subfolder.conf.sample diff --git a/ddns-updater.subdomain.conf.sample b/ddns-updater.subdomain.conf.sample new file mode 100644 index 0000000..a3e2f2e --- /dev/null +++ b/ddns-updater.subdomain.conf.sample @@ -0,0 +1,55 @@ +# make sure that your ddns-updater container is named ddns-updater +# make sure that your dns has a cname set for ddns-updater + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name ddns-updater.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app ddns-updater; + set $upstream_port 8000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } + + location ~ (/ddns-updater)?/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app ddns-updater; + set $upstream_port 8000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} \ No newline at end of file diff --git a/ddns-updater.subfolder.conf.sample b/ddns-updater.subfolder.conf.sample new file mode 100644 index 0000000..e4cdf9f --- /dev/null +++ b/ddns-updater.subfolder.conf.sample @@ -0,0 +1,35 @@ +# make sure that your ddns-updater container is named ddns-updater +# make sure that ddns-updater is set to work with the base url /ddns-updater/ + +location ^~ /ddns-updater { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app ddns-updater; + set $upstream_port 8000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + +} + +location ^~ /ddns-updater/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app ddns-updater; + set $upstream_port 8000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + +} \ No newline at end of file diff --git a/whisparr.subdomain.conf.sample b/whisparr.subdomain.conf.sample new file mode 100644 index 0000000..5a70b7e --- /dev/null +++ b/whisparr.subdomain.conf.sample @@ -0,0 +1,55 @@ +# make sure that your whisparr container is named whisparr +# make sure that your dns has a cname set for whisparr + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name whisparr.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app whisparr; + set $upstream_port 6969; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } + + location ~ (/whisparr)?/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app whisparr; + set $upstream_port 6969; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} \ No newline at end of file diff --git a/whisparr.subfolder.conf.sample b/whisparr.subfolder.conf.sample new file mode 100644 index 0000000..0b61066 --- /dev/null +++ b/whisparr.subfolder.conf.sample @@ -0,0 +1,35 @@ +# make sure that your whisparr container is named whisparr +# make sure that whisparr is set to work with the base url /whisparr/ + +location ^~ /whisparr { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app whisparr; + set $upstream_port 6969; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + +} + +location ^~ /whisparr/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app whisparr; + set $upstream_port 6969; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + +} \ No newline at end of file From e07e26c755b9c84cd8807f7d97d634290807f226 Mon Sep 17 00:00:00 2001 From: geekau Date: Sun, 4 Aug 2024 12:15:43 +1000 Subject: [PATCH 03/81] Update ddns-updater.subdomain.conf.sample Added version date --- ddns-updater.subdomain.conf.sample | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/ddns-updater.subdomain.conf.sample b/ddns-updater.subdomain.conf.sample index a3e2f2e..e02a809 100644 --- a/ddns-updater.subdomain.conf.sample +++ b/ddns-updater.subdomain.conf.sample @@ -1,3 +1,4 @@ +## Version 2024/08/04 # make sure that your ddns-updater container is named ddns-updater # make sure that your dns has a cname set for ddns-updater @@ -52,4 +53,4 @@ server { proxy_pass $upstream_proto://$upstream_app:$upstream_port; } -} \ No newline at end of file +} From 670eec1795bae8fc6c2f4d6d569ae815f3eaa115 Mon Sep 17 00:00:00 2001 From: geekau Date: Sun, 4 Aug 2024 12:16:14 +1000 Subject: [PATCH 04/81] Update ddns-updater.subfolder.conf.sample added version date --- ddns-updater.subfolder.conf.sample | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/ddns-updater.subfolder.conf.sample b/ddns-updater.subfolder.conf.sample index e4cdf9f..f4ad7e9 100644 --- a/ddns-updater.subfolder.conf.sample +++ b/ddns-updater.subfolder.conf.sample @@ -1,3 +1,4 @@ +## Version 2024/08/04 # make sure that your ddns-updater container is named ddns-updater # make sure that ddns-updater is set to work with the base url /ddns-updater/ @@ -32,4 +33,4 @@ location ^~ /ddns-updater/api { set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; -} \ No newline at end of file +} From c94f57fb1ff313a228a4aa5c827db80ef4b5b341 Mon Sep 17 00:00:00 2001 From: geekau Date: Sun, 4 Aug 2024 12:16:43 +1000 Subject: [PATCH 05/81] Update whisparr.subdomain.conf.sample added version date --- whisparr.subdomain.conf.sample | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/whisparr.subdomain.conf.sample b/whisparr.subdomain.conf.sample index 5a70b7e..a900e3b 100644 --- a/whisparr.subdomain.conf.sample +++ b/whisparr.subdomain.conf.sample @@ -1,3 +1,4 @@ +## Version 2024/08/04 # make sure that your whisparr container is named whisparr # make sure that your dns has a cname set for whisparr @@ -52,4 +53,4 @@ server { proxy_pass $upstream_proto://$upstream_app:$upstream_port; } -} \ No newline at end of file +} From fc36461bb663366708f25e28b4bb4d01376cb6fb Mon Sep 17 00:00:00 2001 From: geekau Date: Sun, 4 Aug 2024 12:17:05 +1000 Subject: [PATCH 06/81] Update whisparr.subfolder.conf.sample added version date --- whisparr.subfolder.conf.sample | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/whisparr.subfolder.conf.sample b/whisparr.subfolder.conf.sample index 0b61066..13d3693 100644 --- a/whisparr.subfolder.conf.sample +++ b/whisparr.subfolder.conf.sample @@ -1,3 +1,4 @@ +## Version 2024/08/04 # make sure that your whisparr container is named whisparr # make sure that whisparr is set to work with the base url /whisparr/ @@ -32,4 +33,4 @@ location ^~ /whisparr/api { set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; -} \ No newline at end of file +} From f646ec25dd68f10949efd36214c87517e1447f77 Mon Sep 17 00:00:00 2001 From: jlssmt Date: Sun, 4 Aug 2024 23:43:19 +0200 Subject: [PATCH 07/81] added dockge configs --- dockge.subdomain.conf.sample | 46 ++++++++++++++++++++++++++++++++++++ dockge.subfolder.conf.sample | 31 ++++++++++++++++++++++++ 2 files changed, 77 insertions(+) create mode 100644 dockge.subdomain.conf.sample create mode 100644 dockge.subfolder.conf.sample diff --git a/dockge.subdomain.conf.sample b/dockge.subdomain.conf.sample new file mode 100644 index 0000000..c3562b9 --- /dev/null +++ b/dockge.subdomain.conf.sample @@ -0,0 +1,46 @@ +## Version 2024/07/16 +# make sure that your dockge container is named dockge +# make sure that your dns has a cname set for dockge + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name dockge.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app dockge; + set $upstream_port 5001; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} diff --git a/dockge.subfolder.conf.sample b/dockge.subfolder.conf.sample new file mode 100644 index 0000000..5dbb617 --- /dev/null +++ b/dockge.subfolder.conf.sample @@ -0,0 +1,31 @@ +## Version 2023/02/05 +# make sure that your dockge container is named dockge +# make sure that dockge is set to work with the base url /dockge/ + + +location /dockge { + return 301 $scheme://$host/dockge/; +} + +location ^~ /dockge/ { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app dockge; + set $upstream_port 5001; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + +} From 381861306a22a56f128e3528d71a63eb1e04c4f1 Mon Sep 17 00:00:00 2001 From: jlssmt Date: Sun, 4 Aug 2024 23:30:21 +0200 Subject: [PATCH 08/81] added paperless configs --- paperless.subdomain.conf.sample | 46 +++++++++++++++++++++++++++++++++ paperless.subfolder.conf.sample | 30 +++++++++++++++++++++ 2 files changed, 76 insertions(+) create mode 100644 paperless.subdomain.conf.sample create mode 100644 paperless.subfolder.conf.sample diff --git a/paperless.subdomain.conf.sample b/paperless.subdomain.conf.sample new file mode 100644 index 0000000..7692091 --- /dev/null +++ b/paperless.subdomain.conf.sample @@ -0,0 +1,46 @@ +## Version 2024/07/16 +# make sure that your paperless container is named paperless +# make sure that your dns has a cname set for paperless + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name paperless.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app paperless; + set $upstream_port 8000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} diff --git a/paperless.subfolder.conf.sample b/paperless.subfolder.conf.sample new file mode 100644 index 0000000..73f6baf --- /dev/null +++ b/paperless.subfolder.conf.sample @@ -0,0 +1,30 @@ +## Version 2023/02/05 +# make sure that your paperless container is named paperless +# make sure that paperless is set to work with the base url /paperless/ + +location /paperless { + return 301 $scheme://$host/paperless/; +} + +location ^~ /paperless/ { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app paperless; + set $upstream_port 8000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + +} From 3215197e9a596a84851975b582cb76e2b5b25e3b Mon Sep 17 00:00:00 2001 From: Zakarot <12112333+Zakarot@users.noreply.github.com> Date: Sun, 18 Aug 2024 19:51:19 -0400 Subject: [PATCH 09/81] Create lubelogger.subdomain.conf.sample --- lubelogger.subdomain.conf.sample | 46 ++++++++++++++++++++++++++++++++ 1 file changed, 46 insertions(+) create mode 100644 lubelogger.subdomain.conf.sample diff --git a/lubelogger.subdomain.conf.sample b/lubelogger.subdomain.conf.sample new file mode 100644 index 0000000..ec0c66b --- /dev/null +++ b/lubelogger.subdomain.conf.sample @@ -0,0 +1,46 @@ +## Version 2024/08/18 +# make sure that your lubelogger container is named lubelogger +# make sure that your dns has a cname set for lubelogger + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name lubelogger.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app lubelogger; + set $upstream_port 8080; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} From e923048e76ff1d3947275ffbd44af764c562f3b1 Mon Sep 17 00:00:00 2001 From: ltp Date: Thu, 22 Aug 2024 19:39:18 -0300 Subject: [PATCH 10/81] restrict access to metrics endpoint in subdomain https://jellyfin.org/docs/general/networking/monitoring/#prometheus-metrics --- jellyfin.subdomain.conf.sample | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) diff --git a/jellyfin.subdomain.conf.sample b/jellyfin.subdomain.conf.sample index 479ca30..da0c45b 100644 --- a/jellyfin.subdomain.conf.sample +++ b/jellyfin.subdomain.conf.sample @@ -37,4 +37,22 @@ server { proxy_pass $upstream_proto://$upstream_app:$upstream_port; } + + # Restrict access to /metrics + # https://jellyfin.org/docs/general/networking/monitoring/#prometheus-metrics + location /jellyfin/metrics { + allow 192.168.0.0/16; + allow 10.0.0.0/8; + allow 172.16.0.0/12 + allow 127.0.0.0/8; + + deny all; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app jellyfin; + set $upstream_port 8096; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + } } From 41d2b0c17a55425c3cfad044f01cef54f3b04450 Mon Sep 17 00:00:00 2001 From: ltp Date: Thu, 22 Aug 2024 20:03:06 -0300 Subject: [PATCH 11/81] update version --- jellyfin.subdomain.conf.sample | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/jellyfin.subdomain.conf.sample b/jellyfin.subdomain.conf.sample index da0c45b..95c7f81 100644 --- a/jellyfin.subdomain.conf.sample +++ b/jellyfin.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2024/08/22 # make sure that your jellyfin container is named jellyfin # make sure that your dns has a cname set for jellyfin # if jellyfin is running in bridge mode and the container is named "jellyfin", the below config should work as is From 5ab73be89b3b00f8a056311d160c059453f3c8fe Mon Sep 17 00:00:00 2001 From: ltp Date: Thu, 22 Aug 2024 20:06:49 -0300 Subject: [PATCH 12/81] fix missing semi colon --- jellyfin.subdomain.conf.sample | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/jellyfin.subdomain.conf.sample b/jellyfin.subdomain.conf.sample index 95c7f81..ffc92c4 100644 --- a/jellyfin.subdomain.conf.sample +++ b/jellyfin.subdomain.conf.sample @@ -43,7 +43,7 @@ server { location /jellyfin/metrics { allow 192.168.0.0/16; allow 10.0.0.0/8; - allow 172.16.0.0/12 + allow 172.16.0.0/12; allow 127.0.0.0/8; deny all; From 7efa252e1316f760a2e644d56ed76a5d5e44fcef Mon Sep 17 00:00:00 2001 From: ltp Date: Fri, 23 Aug 2024 09:44:11 -0300 Subject: [PATCH 13/81] fix metrics path --- jellyfin.subdomain.conf.sample | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/jellyfin.subdomain.conf.sample b/jellyfin.subdomain.conf.sample index ffc92c4..36d1e73 100644 --- a/jellyfin.subdomain.conf.sample +++ b/jellyfin.subdomain.conf.sample @@ -40,7 +40,7 @@ server { # Restrict access to /metrics # https://jellyfin.org/docs/general/networking/monitoring/#prometheus-metrics - location /jellyfin/metrics { + location /metrics { allow 192.168.0.0/16; allow 10.0.0.0/8; allow 172.16.0.0/12; From 9e4091a764e7e34434f7e20f6b4535195fa0d117 Mon Sep 17 00:00:00 2001 From: jlssmt Date: Sun, 18 Aug 2024 19:46:23 +0200 Subject: [PATCH 14/81] restrict vaultwarden admin page to LAN --- vaultwarden.subdomain.conf.sample | 7 +++++++ vaultwarden.subfolder.conf.sample | 7 +++++++ 2 files changed, 14 insertions(+) diff --git a/vaultwarden.subdomain.conf.sample b/vaultwarden.subdomain.conf.sample index c92af40..5630392 100644 --- a/vaultwarden.subdomain.conf.sample +++ b/vaultwarden.subdomain.conf.sample @@ -62,6 +62,13 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # if you enable admin page via ADMIN_TOKEN env variable + # consider restricting access to LAN only via uncommenting the following lines + #allow 10.0.0.0/8; + #allow 172.16.0.0/12; + #allow 192.168.0.0/16; + #deny all; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app vaultwarden; diff --git a/vaultwarden.subfolder.conf.sample b/vaultwarden.subfolder.conf.sample index 2bba167..f97dc89 100644 --- a/vaultwarden.subfolder.conf.sample +++ b/vaultwarden.subfolder.conf.sample @@ -49,6 +49,13 @@ location ~ ^(/vaultwarden)?/admin { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # if you enable admin page via ADMIN_TOKEN env variable + # consider restricting access to LAN only via uncommenting the following lines + #allow 10.0.0.0/8; + #allow 172.16.0.0/12; + #allow 192.168.0.0/16; + #deny all; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app vaultwarden; From b2a44f16ccec90df6ad7fbe89259e7ba59dd1a4f Mon Sep 17 00:00:00 2001 From: jlssmt Date: Sun, 4 Aug 2024 23:48:13 +0200 Subject: [PATCH 15/81] added linkwarden configs --- linkwarden.subdomain.conf.sample | 56 ++++++++++++++++++++++++++++++++ linkwarden.subfolder.conf.sample | 41 +++++++++++++++++++++++ 2 files changed, 97 insertions(+) create mode 100644 linkwarden.subdomain.conf.sample create mode 100644 linkwarden.subfolder.conf.sample diff --git a/linkwarden.subdomain.conf.sample b/linkwarden.subdomain.conf.sample new file mode 100644 index 0000000..7263f65 --- /dev/null +++ b/linkwarden.subdomain.conf.sample @@ -0,0 +1,56 @@ +## Version 2024/07/16 +# make sure that your linkwarden container is named linkwarden +# make sure that your dns has a cname set for linkwarden + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name linkwarden.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app linkwarden; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } + + location ~ (/linkwarden)?/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app linkwarden; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} diff --git a/linkwarden.subfolder.conf.sample b/linkwarden.subfolder.conf.sample new file mode 100644 index 0000000..166b80a --- /dev/null +++ b/linkwarden.subfolder.conf.sample @@ -0,0 +1,41 @@ +## Version 2023/02/05 +# make sure that your linkwarden container is named linkwarden +# make sure that linkwarden is set to work with the base url /linkwarden/ + + +location /linkwarden { + return 301 $scheme://$host/linkwarden/; +} + +location ^~ /linkwarden/ { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app linkwarden; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + +} + +location ~ (/linkwarden)?/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app linkwarden; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + +} From f9e1e48bf659b203d4f0e9271ee7ff95997ca898 Mon Sep 17 00:00:00 2001 From: jlssmt Date: Thu, 12 Sep 2024 16:05:19 +0200 Subject: [PATCH 16/81] added paperless api --- paperless.subdomain.conf.sample | 10 ++++++++++ paperless.subfolder.conf.sample | 10 ++++++++++ 2 files changed, 20 insertions(+) diff --git a/paperless.subdomain.conf.sample b/paperless.subdomain.conf.sample index 7692091..c4f070d 100644 --- a/paperless.subdomain.conf.sample +++ b/paperless.subdomain.conf.sample @@ -43,4 +43,14 @@ server { proxy_pass $upstream_proto://$upstream_app:$upstream_port; } + + location ~ (/paperless)?/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app paperless; + set $upstream_port 8000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } } diff --git a/paperless.subfolder.conf.sample b/paperless.subfolder.conf.sample index 73f6baf..f51996d 100644 --- a/paperless.subfolder.conf.sample +++ b/paperless.subfolder.conf.sample @@ -28,3 +28,13 @@ location ^~ /paperless/ { proxy_pass $upstream_proto://$upstream_app:$upstream_port; } + +location ~ (/paperless)?/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app paperless; + set $upstream_port 8000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + +} From f1c508be7d97c4371f579f9968c0e96960c3f57c Mon Sep 17 00:00:00 2001 From: pagdot Date: Tue, 15 Oct 2024 14:36:46 +0200 Subject: [PATCH 17/81] Update immich.subdomain.conf.sample Immich changed the port in v1.118.0 --- immich.subdomain.conf.sample | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/immich.subdomain.conf.sample b/immich.subdomain.conf.sample index f4ad590..89b6ea2 100644 --- a/immich.subdomain.conf.sample +++ b/immich.subdomain.conf.sample @@ -1,7 +1,7 @@ ## Version 2024/07/16 # make sure that your immich container is named immich # make sure that your dns has a cname set for immich -# immich v1.88+ only +# immich v1.118+ only server { listen 443 ssl; @@ -39,7 +39,7 @@ server { include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app immich; - set $upstream_port 3001; + set $upstream_port 2283; set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; @@ -49,7 +49,7 @@ server { include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app immich; - set $upstream_port 3001; + set $upstream_port 2283; set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; From 57e8d00dd1447ff57dc626f284a75a0984f7ef86 Mon Sep 17 00:00:00 2001 From: pagdot Date: Tue, 15 Oct 2024 15:39:28 +0200 Subject: [PATCH 18/81] immich.subdomain.conf.sample: document port for earlier versions --- immich.subdomain.conf.sample | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/immich.subdomain.conf.sample b/immich.subdomain.conf.sample index 89b6ea2..fe7096c 100644 --- a/immich.subdomain.conf.sample +++ b/immich.subdomain.conf.sample @@ -1,7 +1,7 @@ ## Version 2024/07/16 # make sure that your immich container is named immich # make sure that your dns has a cname set for immich -# immich v1.118+ only +# immich v1.118+ only. For earlier versions, change $upstream_port to 3001 server { listen 443 ssl; From d2b127743700c45d92a48ce1fe4f6170e51f7260 Mon Sep 17 00:00:00 2001 From: pagdot Date: Tue, 15 Oct 2024 16:01:01 +0200 Subject: [PATCH 19/81] immich.subdomain.conf.sample: update version date --- immich.subdomain.conf.sample | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/immich.subdomain.conf.sample b/immich.subdomain.conf.sample index fe7096c..2d9e2d4 100644 --- a/immich.subdomain.conf.sample +++ b/immich.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2024/10/15 # make sure that your immich container is named immich # make sure that your dns has a cname set for immich # immich v1.118+ only. For earlier versions, change $upstream_port to 3001 From ca9340b2739944482c576c6dac361d8ee1cdca88 Mon Sep 17 00:00:00 2001 From: driz <40674481+drizuid@users.noreply.github.com> Date: Thu, 17 Oct 2024 08:23:55 -0400 Subject: [PATCH 20/81] change app name deets --- zwavejs2mqtt.subdomain.conf.sample | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/zwavejs2mqtt.subdomain.conf.sample b/zwavejs2mqtt.subdomain.conf.sample index 1252f6b..a28d20a 100644 --- a/zwavejs2mqtt.subdomain.conf.sample +++ b/zwavejs2mqtt.subdomain.conf.sample @@ -1,12 +1,12 @@ -## Version 2024/07/16 -# make sure that your zwavejs2mqtt container is named zwavejs2mqtt -# make sure that your dns has a cname set for zwavejs2mqtt +## Version 2024/10/17 +# make sure that your zwavejsui container is named zwavejsui +# make sure that your dns has a cname set for zwavejsui server { listen 443 ssl; listen [::]:443 ssl; - server_name zwavejs2mqtt.*; + server_name zwavejsui.*; include /config/nginx/ssl.conf; @@ -37,7 +37,7 @@ server { include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; - set $upstream_app zwavejs2mqtt; + set $upstream_app zwavejsui; set $upstream_port 8091; set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; From 731597e4c3a04f6f4a0b2cc2f283c87993c7a62c Mon Sep 17 00:00:00 2001 From: driz <40674481+drizuid@users.noreply.github.com> Date: Thu, 17 Oct 2024 08:27:00 -0400 Subject: [PATCH 21/81] Update zwavejs2mqtt.subdomain.conf.sample --- zwavejs2mqtt.subdomain.conf.sample | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/zwavejs2mqtt.subdomain.conf.sample b/zwavejs2mqtt.subdomain.conf.sample index a28d20a..efb9184 100644 --- a/zwavejs2mqtt.subdomain.conf.sample +++ b/zwavejs2mqtt.subdomain.conf.sample @@ -1,12 +1,12 @@ ## Version 2024/10/17 -# make sure that your zwavejsui container is named zwavejsui -# make sure that your dns has a cname set for zwavejsui +# make sure that your zwave-js-ui container is named zwave-js-ui +# make sure that your dns has a cname set for zwave-js-ui server { listen 443 ssl; listen [::]:443 ssl; - server_name zwavejsui.*; + server_name zwave-js-ui.*; include /config/nginx/ssl.conf; @@ -37,7 +37,7 @@ server { include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; - set $upstream_app zwavejsui; + set $upstream_app zwave-js-ui; set $upstream_port 8091; set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; From 06e562f718e530b49375103f02adf2ebaa2975bb Mon Sep 17 00:00:00 2001 From: driz <40674481+drizuid@users.noreply.github.com> Date: Thu, 17 Oct 2024 08:32:17 -0400 Subject: [PATCH 22/81] revert change on original file, create new file --- zwavejs2mqtt.subdomain.conf.sample | 14 ++++----- zwavejsui.subdomain.conf.sample | 46 ++++++++++++++++++++++++++++++ 2 files changed, 53 insertions(+), 7 deletions(-) create mode 100644 zwavejsui.subdomain.conf.sample diff --git a/zwavejs2mqtt.subdomain.conf.sample b/zwavejs2mqtt.subdomain.conf.sample index efb9184..3ebff58 100644 --- a/zwavejs2mqtt.subdomain.conf.sample +++ b/zwavejs2mqtt.subdomain.conf.sample @@ -1,12 +1,12 @@ -## Version 2024/10/17 -# make sure that your zwave-js-ui container is named zwave-js-ui -# make sure that your dns has a cname set for zwave-js-ui +## Version 2023/05/31 +# make sure that your zwavejs2mqtt container is named zwavejs2mqtt +# make sure that your dns has a cname set for zwavejs2mqtt server { - listen 443 ssl; - listen [::]:443 ssl; + listen 443 ssl http2; + listen [::]:443 ssl http2; - server_name zwave-js-ui.*; + server_name zwavejs2mqtt.*; include /config/nginx/ssl.conf; @@ -37,7 +37,7 @@ server { include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; - set $upstream_app zwave-js-ui; + set $upstream_app zwavejs2mqtt; set $upstream_port 8091; set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; diff --git a/zwavejsui.subdomain.conf.sample b/zwavejsui.subdomain.conf.sample new file mode 100644 index 0000000..f119199 --- /dev/null +++ b/zwavejsui.subdomain.conf.sample @@ -0,0 +1,46 @@ +## Version 2024/10/17 +# make sure that your zwave-js-ui container is named zwave-js-ui +# make sure that your dns has a cname set for zwave-js-ui + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name zwave-js-ui.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app zwave-js-ui; + set $upstream_port 8091; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} \ No newline at end of file From c0f1af49419b3406eecb7236c6fc7bb112ab7ee0 Mon Sep 17 00:00:00 2001 From: driz <40674481+drizuid@users.noreply.github.com> Date: Thu, 17 Oct 2024 08:33:00 -0400 Subject: [PATCH 23/81] Update zwavejs2mqtt.subdomain.conf.sample --- zwavejs2mqtt.subdomain.conf.sample | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/zwavejs2mqtt.subdomain.conf.sample b/zwavejs2mqtt.subdomain.conf.sample index 3ebff58..1252f6b 100644 --- a/zwavejs2mqtt.subdomain.conf.sample +++ b/zwavejs2mqtt.subdomain.conf.sample @@ -1,10 +1,10 @@ -## Version 2023/05/31 +## Version 2024/07/16 # make sure that your zwavejs2mqtt container is named zwavejs2mqtt # make sure that your dns has a cname set for zwavejs2mqtt server { - listen 443 ssl http2; - listen [::]:443 ssl http2; + listen 443 ssl; + listen [::]:443 ssl; server_name zwavejs2mqtt.*; From 9f0b5b531b679b7656d2ffd9305310c086823f64 Mon Sep 17 00:00:00 2001 From: driz <40674481+drizuid@users.noreply.github.com> Date: Thu, 17 Oct 2024 08:34:57 -0400 Subject: [PATCH 24/81] correct crlf --- zwavejsui.subdomain.conf.sample | 90 ++++++++++++++++----------------- 1 file changed, 45 insertions(+), 45 deletions(-) diff --git a/zwavejsui.subdomain.conf.sample b/zwavejsui.subdomain.conf.sample index f119199..66d1bb9 100644 --- a/zwavejsui.subdomain.conf.sample +++ b/zwavejsui.subdomain.conf.sample @@ -1,46 +1,46 @@ -## Version 2024/10/17 -# make sure that your zwave-js-ui container is named zwave-js-ui -# make sure that your dns has a cname set for zwave-js-ui - -server { - listen 443 ssl; - listen [::]:443 ssl; - - server_name zwave-js-ui.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app zwave-js-ui; - set $upstream_port 8091; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } +## Version 2024/10/17 +# make sure that your zwave-js-ui container is named zwave-js-ui +# make sure that your dns has a cname set for zwave-js-ui + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name zwave-js-ui.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app zwave-js-ui; + set $upstream_port 8091; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } } \ No newline at end of file From 7fe2341520eb694a7fde44f02b3a006aa1989348 Mon Sep 17 00:00:00 2001 From: laur Date: Tue, 22 Oct 2024 17:51:25 +0200 Subject: [PATCH 25/81] recipes.subdomain.conf: remove comment containing dead URL - note our sample already contains the authelia info that's in-line with all other proxy confs; no need for additional instructions --- recipes.subdomain.conf.sample | 3 --- 1 file changed, 3 deletions(-) diff --git a/recipes.subdomain.conf.sample b/recipes.subdomain.conf.sample index 2c772ea..4789c76 100644 --- a/recipes.subdomain.conf.sample +++ b/recipes.subdomain.conf.sample @@ -3,9 +3,6 @@ # make sure that your dns has a cname set for recipes # make sure to mount /media/ in your swag container to point to your Recipes Media directory -# if using Authelia use this one: -# Doc: https://vabene1111.github.io/recipes/install/docker/#using-proxy-authentication - server { listen 443 ssl; listen [::]:443 ssl; From 635b2e914ad72ae4aee91230f67420978a3dd145 Mon Sep 17 00:00:00 2001 From: Bert Van den Abbeele Date: Sat, 26 Oct 2024 18:36:18 +0200 Subject: [PATCH 26/81] Create romm.subdomain.conf.sample create conf file --- romm.subdomain.conf.sample | 55 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 55 insertions(+) create mode 100644 romm.subdomain.conf.sample diff --git a/romm.subdomain.conf.sample b/romm.subdomain.conf.sample new file mode 100644 index 0000000..06317e3 --- /dev/null +++ b/romm.subdomain.conf.sample @@ -0,0 +1,55 @@ +## Version 2024/10/26 +# make sure that your romM container is named romm +# make sure that your dns has a cname set for romm + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name romm.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app romm; + set $upstream_port 8080; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + # Hide version + server_tokens off; + + # Security headers + add_header X-Frame-Options "SAMEORIGIN" always; + add_header X-Content-Type-Options "nosniff" always; + add_header X-XSS-Protection "1; mode=block" always; + add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; + add_header Referrer-Policy "no-referrer-when-downgrade" always; + } +} \ No newline at end of file From f1d1b33c18645acf67439310700fc976ab321bdc Mon Sep 17 00:00:00 2001 From: pagdot Date: Sun, 27 Oct 2024 18:51:25 +0100 Subject: [PATCH 27/81] Update port in maintainerr.subdomain.conf.sample default port changed in v2.0.0 https://github.com/jorenn92/Maintainerr/releases/tag/v2.0.0 --- maintainerr.subdomain.conf.sample | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/maintainerr.subdomain.conf.sample b/maintainerr.subdomain.conf.sample index b596d18..c89d202 100644 --- a/maintainerr.subdomain.conf.sample +++ b/maintainerr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2024/10/27 # make sure that your maintainerr container is named maintainerr # make sure that your dns has a cname set for maintainerr @@ -38,7 +38,7 @@ server { include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app maintainerr; - set $upstream_port 80; + set $upstream_port 6246; set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; From dff308b84b84fbc9597c68cba9de821562478e5c Mon Sep 17 00:00:00 2001 From: pagdot Date: Sun, 27 Oct 2024 18:54:08 +0100 Subject: [PATCH 28/81] Update maintainerr.subdomain.conf.sample --- maintainerr.subdomain.conf.sample | 1 + 1 file changed, 1 insertion(+) diff --git a/maintainerr.subdomain.conf.sample b/maintainerr.subdomain.conf.sample index c89d202..c4dad52 100644 --- a/maintainerr.subdomain.conf.sample +++ b/maintainerr.subdomain.conf.sample @@ -1,6 +1,7 @@ ## Version 2024/10/27 # make sure that your maintainerr container is named maintainerr # make sure that your dns has a cname set for maintainerr +# maintainerr v2.0.0+ only server { listen 443 ssl; From 869771c29b07c285eba322c59fb3617d62458aab Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Mon, 28 Oct 2024 20:34:08 +0000 Subject: [PATCH 29/81] Bump actions/checkout from 4.1.7 to 4.2.2 Bumps [actions/checkout](https://github.com/actions/checkout) from 4.1.7 to 4.2.2. - [Release notes](https://github.com/actions/checkout/releases) - [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md) - [Commits](https://github.com/actions/checkout/compare/v4.1.7...v4.2.2) --- updated-dependencies: - dependency-name: actions/checkout dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] --- .github/workflows/check_samples.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/check_samples.yml b/.github/workflows/check_samples.yml index b9fd5b1..429705d 100644 --- a/.github/workflows/check_samples.yml +++ b/.github/workflows/check_samples.yml @@ -12,7 +12,7 @@ jobs: steps: - name: Checkout - uses: actions/checkout@v4.1.7 + uses: actions/checkout@v4.2.2 - name: Check Allowed File Names run: | From fcbdb3b168b7243a4754cb2d9e680837179ec6a1 Mon Sep 17 00:00:00 2001 From: Timothy Pillow Date: Sat, 2 Nov 2024 12:23:23 +0100 Subject: [PATCH 30/81] Create dnsdist.subdomain.conf.sample --- dnsdist.subdomain.conf.sample | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 dnsdist.subdomain.conf.sample diff --git a/dnsdist.subdomain.conf.sample b/dnsdist.subdomain.conf.sample new file mode 100644 index 0000000..7be044a --- /dev/null +++ b/dnsdist.subdomain.conf.sample @@ -0,0 +1,31 @@ +# make sure that your container is named dnsdist +# make sure that your dns has a cname set for dnsdist + +server { + listen 443 ssl http2; + listen [::]:443 ssl http2; + + server_name dnsdist.*; + + include /config/nginx/ssl.conf; + + server_tokens off; + + location /dns-query { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app dnsdist; + set $upstream_port 443; + set $upstream_proto grpc; + grpc_pass grpcs://$upstream_app:$upstream_port; + + proxy_set_header Host $host; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-Host $host; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $scheme; + proxy_set_header X-Forwarded-Protocol $scheme; + proxy_set_header Range $http_range; + proxy_set_header If-Range $http_if_range; + } +} From e0082b39b21c9229e477fa2afdb350ea16fe91d8 Mon Sep 17 00:00:00 2001 From: Timothy Pillow Date: Sat, 2 Nov 2024 12:32:04 +0100 Subject: [PATCH 31/81] Update dnsdist.subdomain.conf.sample --- dnsdist.subdomain.conf.sample | 1 + 1 file changed, 1 insertion(+) diff --git a/dnsdist.subdomain.conf.sample b/dnsdist.subdomain.conf.sample index 7be044a..b14ce81 100644 --- a/dnsdist.subdomain.conf.sample +++ b/dnsdist.subdomain.conf.sample @@ -1,3 +1,4 @@ +## Version 2024/11/02 # make sure that your container is named dnsdist # make sure that your dns has a cname set for dnsdist From 4427db3045bda1166a087a1cc0d2832c73cb4e06 Mon Sep 17 00:00:00 2001 From: pagdot Date: Wed, 6 Nov 2024 12:43:04 +0100 Subject: [PATCH 32/81] Update maintainerr.subdomain.conf.sample add note about previous port --- maintainerr.subdomain.conf.sample | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/maintainerr.subdomain.conf.sample b/maintainerr.subdomain.conf.sample index c4dad52..ef55649 100644 --- a/maintainerr.subdomain.conf.sample +++ b/maintainerr.subdomain.conf.sample @@ -1,7 +1,7 @@ ## Version 2024/10/27 # make sure that your maintainerr container is named maintainerr # make sure that your dns has a cname set for maintainerr -# maintainerr v2.0.0+ only +# maintainerr v2.0.0+ only. for prior versions, set upstream_port to 80 server { listen 443 ssl; From 4ba5874dcfd45689acc6c8b06819ba97783f7c40 Mon Sep 17 00:00:00 2001 From: jlssmt Date: Sat, 16 Nov 2024 17:58:03 +0100 Subject: [PATCH 33/81] added beszel --- beszel.subdomain.conf.sample | 56 ++++++++++++++++++++++++++++++++++++ beszel.subfolder.conf.sample | 41 ++++++++++++++++++++++++++ 2 files changed, 97 insertions(+) create mode 100644 beszel.subdomain.conf.sample create mode 100644 beszel.subfolder.conf.sample diff --git a/beszel.subdomain.conf.sample b/beszel.subdomain.conf.sample new file mode 100644 index 0000000..65cbaed --- /dev/null +++ b/beszel.subdomain.conf.sample @@ -0,0 +1,56 @@ +## Version 2024/07/16 +# make sure that your beszel container is named beszel +# make sure that your dns has a cname set for beszel + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name beszel.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app beszel; + set $upstream_port 8090; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } + + location ~ (/)?/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app beszel; + set $upstream_port 8090; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} diff --git a/beszel.subfolder.conf.sample b/beszel.subfolder.conf.sample new file mode 100644 index 0000000..050d3e9 --- /dev/null +++ b/beszel.subfolder.conf.sample @@ -0,0 +1,41 @@ +## Version 2023/02/05 +# make sure that your beszel container is named beszel +# make sure that beszel is set to work with the base url /beszel/ + + +location /beszel { + return 301 $scheme://$host/beszel/; +} + +location ^~ /beszel/ { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app beszel; + set $upstream_port 8090; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + +} + +location ^~ /beszel/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app beszel; + set $upstream_port 8090; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + +} From a769b716f3751b4fde4217a94458ad9598bdb5e4 Mon Sep 17 00:00:00 2001 From: jlssmt <42897917+jlssmt@users.noreply.github.com> Date: Tue, 26 Nov 2024 00:07:03 +0100 Subject: [PATCH 34/81] Update beszel.subdomain.conf.sample --- beszel.subdomain.conf.sample | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/beszel.subdomain.conf.sample b/beszel.subdomain.conf.sample index 65cbaed..2c032f9 100644 --- a/beszel.subdomain.conf.sample +++ b/beszel.subdomain.conf.sample @@ -44,7 +44,7 @@ server { } - location ~ (/)?/api { + location ~ (/beszel)?/api { include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app beszel; From 3755ae01f112ba3b9d8f8dbbad4f69832a5217f3 Mon Sep 17 00:00:00 2001 From: Timothy Pillow Date: Tue, 26 Nov 2024 10:45:27 +0100 Subject: [PATCH 35/81] =?UTF-8?q?remove=20redundant=20directives,=20tested?= =?UTF-8?q?=20ok=20=E2=9C=85?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- dnsdist.subdomain.conf.sample | 12 +----------- 1 file changed, 1 insertion(+), 11 deletions(-) diff --git a/dnsdist.subdomain.conf.sample b/dnsdist.subdomain.conf.sample index b14ce81..b2befca 100644 --- a/dnsdist.subdomain.conf.sample +++ b/dnsdist.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/11/02 +## Version 2024/11/26 # make sure that your container is named dnsdist # make sure that your dns has a cname set for dnsdist @@ -8,10 +8,6 @@ server { server_name dnsdist.*; - include /config/nginx/ssl.conf; - - server_tokens off; - location /dns-query { include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; @@ -20,12 +16,6 @@ server { set $upstream_proto grpc; grpc_pass grpcs://$upstream_app:$upstream_port; - proxy_set_header Host $host; - proxy_set_header X-Real-IP $remote_addr; - proxy_set_header X-Forwarded-Host $host; - proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; - proxy_set_header X-Forwarded-Proto $scheme; - proxy_set_header X-Forwarded-Protocol $scheme; proxy_set_header Range $http_range; proxy_set_header If-Range $http_if_range; } From 18707c1177923192abbfbae9d8ab8db37bb80d54 Mon Sep 17 00:00:00 2001 From: Bert Van den Abbeele Date: Wed, 27 Nov 2024 12:21:00 +0100 Subject: [PATCH 36/81] remove optional headers --- romm.subdomain.conf.sample | 9 --------- 1 file changed, 9 deletions(-) diff --git a/romm.subdomain.conf.sample b/romm.subdomain.conf.sample index 06317e3..07c34d4 100644 --- a/romm.subdomain.conf.sample +++ b/romm.subdomain.conf.sample @@ -42,14 +42,5 @@ server { set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; - # Hide version - server_tokens off; - - # Security headers - add_header X-Frame-Options "SAMEORIGIN" always; - add_header X-Content-Type-Options "nosniff" always; - add_header X-XSS-Protection "1; mode=block" always; - add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; - add_header Referrer-Policy "no-referrer-when-downgrade" always; } } \ No newline at end of file From 236833f8089a63f39aadd269a3610f10e4cadc3c Mon Sep 17 00:00:00 2001 From: driz <40674481+drizuid@users.noreply.github.com> Date: Wed, 4 Dec 2024 10:08:46 -0500 Subject: [PATCH 37/81] update port and name --- castopod.subdomain.conf.sample | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/castopod.subdomain.conf.sample b/castopod.subdomain.conf.sample index 7c2042e..ba9caeb 100644 --- a/castopod.subdomain.conf.sample +++ b/castopod.subdomain.conf.sample @@ -1,5 +1,5 @@ ## Version 2024/07/16 -# make sure that your castopod container is named castopod +# make sure that your castopod container is named castopod-app # make sure that your dns has a cname set for castopod server { @@ -37,8 +37,8 @@ server { include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; - set $upstream_app castopod; - set $upstream_port 80; + set $upstream_app castopod-app; + set $upstream_port 8000; set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; From 6f98f4f6846ff2028e6f2df2c46280bb8a91cfdd Mon Sep 17 00:00:00 2001 From: driz <40674481+drizuid@users.noreply.github.com> Date: Wed, 4 Dec 2024 10:10:03 -0500 Subject: [PATCH 38/81] Update castopod.subdomain.conf.sample --- castopod.subdomain.conf.sample | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/castopod.subdomain.conf.sample b/castopod.subdomain.conf.sample index ba9caeb..a825be5 100644 --- a/castopod.subdomain.conf.sample +++ b/castopod.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2024/12/04 # make sure that your castopod container is named castopod-app # make sure that your dns has a cname set for castopod From db5c710a2bac9a69f441b26a21e0f4803fe9bac9 Mon Sep 17 00:00:00 2001 From: Doug Edey Date: Fri, 6 Dec 2024 08:34:36 -0500 Subject: [PATCH 39/81] Add kobo specific location matching for Calibre-web confs --- calibre-web.subdomain.conf.sample | 14 +++++++++++++- calibre-web.subfolder.conf.sample | 13 +++++++++++++ 2 files changed, 26 insertions(+), 1 deletion(-) diff --git a/calibre-web.subdomain.conf.sample b/calibre-web.subdomain.conf.sample index 934f353..a1c5f59 100644 --- a/calibre-web.subdomain.conf.sample +++ b/calibre-web.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2024/12/06 # make sure that your calibre-web container is named calibre-web # make sure that your dns has a cname set for calibre-web @@ -61,4 +61,16 @@ server { proxy_pass $upstream_proto://$upstream_app:$upstream_port; proxy_set_header X-Scheme $scheme; } + + # Feed for Kobo + location /kobo/ { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app calibre-web; + set $upstream_port 8083; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + proxy_set_header X-Scheme $scheme; + proxy_buffer_size 32k; + } } diff --git a/calibre-web.subfolder.conf.sample b/calibre-web.subfolder.conf.sample index e28a272..751ad2a 100644 --- a/calibre-web.subfolder.conf.sample +++ b/calibre-web.subfolder.conf.sample @@ -48,3 +48,16 @@ location ^~ /calibre-web/opds/ { proxy_set_header X-Scheme $scheme; proxy_set_header X-Script-Name /calibre-web; } + +# Feed for Kobo +location ^~ /calibre-web/kobo/ { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app calibre-web; + set $upstream_port 8083; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + proxy_set_header X-Scheme $scheme; + proxy_set_header X-Script-Name /calibre-web; + proxy_buffer_size 32k; +} From ed470885d3ffdc9c1e1db0d44b676d19d63be375 Mon Sep 17 00:00:00 2001 From: aptalca <541623+aptalca@users.noreply.github.com> Date: Thu, 19 Dec 2024 10:15:43 -0500 Subject: [PATCH 40/81] dnsdist: remove http2 --- dnsdist.subdomain.conf.sample | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/dnsdist.subdomain.conf.sample b/dnsdist.subdomain.conf.sample index b2befca..b90bf07 100644 --- a/dnsdist.subdomain.conf.sample +++ b/dnsdist.subdomain.conf.sample @@ -1,10 +1,10 @@ -## Version 2024/11/26 +## Version 2024/12/19 # make sure that your container is named dnsdist # make sure that your dns has a cname set for dnsdist server { - listen 443 ssl http2; - listen [::]:443 ssl http2; + listen 443 ssl; + listen [::]:443 ssl; server_name dnsdist.*; From 92248c030df57316061f3ce9070c2f0429261215 Mon Sep 17 00:00:00 2001 From: driz <40674481+drizuid@users.noreply.github.com> Date: Sat, 21 Dec 2024 17:36:16 -0500 Subject: [PATCH 41/81] support kobo --- calibre-web.subdomain.conf.sample | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/calibre-web.subdomain.conf.sample b/calibre-web.subdomain.conf.sample index 934f353..bb5f3b1 100644 --- a/calibre-web.subdomain.conf.sample +++ b/calibre-web.subdomain.conf.sample @@ -61,4 +61,19 @@ server { proxy_pass $upstream_proto://$upstream_app:$upstream_port; proxy_set_header X-Scheme $scheme; } + + # For kobo e-reader sync support + # you will need to bypass ^/kobo.* in authentik or authelia if they are used. + location /kobo { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app calibre-web; + set $upstream_port 8083; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + proxy_set_header X-Scheme $scheme; + proxy_buffers 4 256k; + proxy_busy_buffers_size 256k; + proxy_buffer_size 128k; + } } From 050574b95b896b5fe44285cc4d767a189cb10e33 Mon Sep 17 00:00:00 2001 From: driz <40674481+drizuid@users.noreply.github.com> Date: Sat, 21 Dec 2024 17:37:37 -0500 Subject: [PATCH 42/81] date --- calibre-web.subdomain.conf.sample | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/calibre-web.subdomain.conf.sample b/calibre-web.subdomain.conf.sample index bb5f3b1..606edc3 100644 --- a/calibre-web.subdomain.conf.sample +++ b/calibre-web.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2024/12/21 # make sure that your calibre-web container is named calibre-web # make sure that your dns has a cname set for calibre-web From d320762625c425442e3ff25d86743068949cedc7 Mon Sep 17 00:00:00 2001 From: driz <40674481+drizuid@users.noreply.github.com> Date: Sat, 21 Dec 2024 17:41:50 -0500 Subject: [PATCH 43/81] undo driz-mistake merge --- calibre-web.subdomain.conf.sample | 14 -------------- 1 file changed, 14 deletions(-) diff --git a/calibre-web.subdomain.conf.sample b/calibre-web.subdomain.conf.sample index 606edc3..53904e8 100644 --- a/calibre-web.subdomain.conf.sample +++ b/calibre-web.subdomain.conf.sample @@ -62,18 +62,4 @@ server { proxy_set_header X-Scheme $scheme; } - # For kobo e-reader sync support - # you will need to bypass ^/kobo.* in authentik or authelia if they are used. - location /kobo { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app calibre-web; - set $upstream_port 8083; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - proxy_set_header X-Scheme $scheme; - proxy_buffers 4 256k; - proxy_busy_buffers_size 256k; - proxy_buffer_size 128k; - } } From 9b6af9b16aee8ede3a952e22020f9da89a17562a Mon Sep 17 00:00:00 2001 From: driz <40674481+drizuid@users.noreply.github.com> Date: Sat, 21 Dec 2024 17:50:20 -0500 Subject: [PATCH 44/81] undo driz mistake merge --- calibre-web.subdomain.conf.sample | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/calibre-web.subdomain.conf.sample b/calibre-web.subdomain.conf.sample index 53904e8..c985652 100644 --- a/calibre-web.subdomain.conf.sample +++ b/calibre-web.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/12/21 +## Version 2024/07/16 # make sure that your calibre-web container is named calibre-web # make sure that your dns has a cname set for calibre-web From 97ea7961a463ef1cb04b09adfc0a27fbe12c737a Mon Sep 17 00:00:00 2001 From: Joel Gillman Date: Fri, 15 Nov 2024 17:42:03 -0600 Subject: [PATCH 45/81] Allow access to Baby Buddy API without auth --- babybuddy.subdomain.conf.sample | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/babybuddy.subdomain.conf.sample b/babybuddy.subdomain.conf.sample index d0aa27d..4f7ee11 100644 --- a/babybuddy.subdomain.conf.sample +++ b/babybuddy.subdomain.conf.sample @@ -43,4 +43,14 @@ server { proxy_pass $upstream_proto://$upstream_app:$upstream_port; } + + location ~ ^/api/ { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app babybuddy; + set $upstream_port 8000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } } From d43ecbce70ca3cce5a328f5b05df7e316c93335a Mon Sep 17 00:00:00 2001 From: Joel Gillman Date: Sun, 29 Dec 2024 12:00:35 -0600 Subject: [PATCH 46/81] Update date on babybuddy subdomain config --- babybuddy.subdomain.conf.sample | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/babybuddy.subdomain.conf.sample b/babybuddy.subdomain.conf.sample index 4f7ee11..af83363 100644 --- a/babybuddy.subdomain.conf.sample +++ b/babybuddy.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2024/12/29 # make sure that your babybuddy container is named babybuddy # make sure that your dns has a cname set for babybuddy From 0d77daf9cbaf6cb7b1dc8c45031070434287d721 Mon Sep 17 00:00:00 2001 From: driz <40674481+drizuid@users.noreply.github.com> Date: Wed, 1 Jan 2025 14:55:03 -0500 Subject: [PATCH 47/81] test for large comic support --- calibre-web.subdomain.conf.sample | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/calibre-web.subdomain.conf.sample b/calibre-web.subdomain.conf.sample index ca6bbde..b75eba3 100644 --- a/calibre-web.subdomain.conf.sample +++ b/calibre-web.subdomain.conf.sample @@ -64,13 +64,15 @@ server { # Feed for Kobo location /kobo/ { - include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app calibre-web; set $upstream_port 8083; set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; + proxy_set_header X-Forwarded-Host $http_host; proxy_set_header X-Scheme $scheme; - proxy_buffer_size 32k; + proxy_buffer_size 128k; + proxy_buffers 4 256k; + proxy_busy_buffers_size 256k; } } \ No newline at end of file From b852188a2b7a81f157cd8164e901174da68627f0 Mon Sep 17 00:00:00 2001 From: driz <40674481+drizuid@users.noreply.github.com> Date: Wed, 1 Jan 2025 14:56:00 -0500 Subject: [PATCH 48/81] for subfolder too... i guess they exist --- calibre-web.subfolder.conf.sample | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/calibre-web.subfolder.conf.sample b/calibre-web.subfolder.conf.sample index 751ad2a..011c6fc 100644 --- a/calibre-web.subfolder.conf.sample +++ b/calibre-web.subfolder.conf.sample @@ -51,7 +51,6 @@ location ^~ /calibre-web/opds/ { # Feed for Kobo location ^~ /calibre-web/kobo/ { - include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app calibre-web; set $upstream_port 8083; @@ -59,5 +58,7 @@ location ^~ /calibre-web/kobo/ { proxy_pass $upstream_proto://$upstream_app:$upstream_port; proxy_set_header X-Scheme $scheme; proxy_set_header X-Script-Name /calibre-web; - proxy_buffer_size 32k; + proxy_buffer_size 128k; + proxy_buffers 4 256k; + proxy_busy_buffers_size 256k; } From dd15bfcb859ca39d7a56b72d221b500266ef5c1c Mon Sep 17 00:00:00 2001 From: Noneangel <1888627+Noneangel@users.noreply.github.com> Date: Thu, 9 Jan 2025 18:38:42 +0100 Subject: [PATCH 49/81] Fix Jellyfin for WebOS --- jellyfin.subdomain.conf.sample | 8 +++++++- jellyfin.subfolder.conf.sample | 5 ++++- 2 files changed, 11 insertions(+), 2 deletions(-) diff --git a/jellyfin.subdomain.conf.sample b/jellyfin.subdomain.conf.sample index 36d1e73..ce586f0 100644 --- a/jellyfin.subdomain.conf.sample +++ b/jellyfin.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/08/22 +## Version 2025/01/09 # make sure that your jellyfin container is named jellyfin # make sure that your dns has a cname set for jellyfin # if jellyfin is running in bridge mode and the container is named "jellyfin", the below config should work as is @@ -22,6 +22,9 @@ server { set $upstream_app jellyfin; set $upstream_port 8096; set $upstream_proto http; + if ($http_user_agent ~ Web0S) { + add_header X-Frame-Options "" always; + } proxy_pass $upstream_proto://$upstream_app:$upstream_port; proxy_set_header Range $http_range; @@ -34,6 +37,9 @@ server { set $upstream_app jellyfin; set $upstream_port 8096; set $upstream_proto http; + if ($http_user_agent ~ Web0S) { + add_header X-Frame-Options "" always; + } proxy_pass $upstream_proto://$upstream_app:$upstream_port; } diff --git a/jellyfin.subfolder.conf.sample b/jellyfin.subfolder.conf.sample index 3d55e1a..5bdce9d 100644 --- a/jellyfin.subfolder.conf.sample +++ b/jellyfin.subfolder.conf.sample @@ -1,4 +1,4 @@ -## Version 2023/02/05 +## Version 2025/01/09 # make sure that your jellyfin container is named jellyfin # if jellyfin is running in bridge mode and the container is named "jellyfin", the below config should work as is # if not, replace the line "set $upstream_app jellyfin;" with "set $upstream_app ;" @@ -15,6 +15,9 @@ location ^~ /jellyfin/ { set $upstream_app jellyfin; set $upstream_port 8096; set $upstream_proto http; + if ($http_user_agent ~ Web0S) { + add_header X-Frame-Options "" always; + } proxy_pass $upstream_proto://$upstream_app:$upstream_port; proxy_set_header Range $http_range; From 2e1f5b70a1338a5d2406c45f7568cbba7c1a3199 Mon Sep 17 00:00:00 2001 From: "J. Scott Elblein" Date: Fri, 10 Jan 2025 23:33:56 -0600 Subject: [PATCH 50/81] Create onetimesecret.subdomain.conf.sample https://github.com/onetimesecret/onetimesecret --- onetimesecret.subdomain.conf.sample | 45 +++++++++++++++++++++++++++++ 1 file changed, 45 insertions(+) create mode 100644 onetimesecret.subdomain.conf.sample diff --git a/onetimesecret.subdomain.conf.sample b/onetimesecret.subdomain.conf.sample new file mode 100644 index 0000000..4559d1c --- /dev/null +++ b/onetimesecret.subdomain.conf.sample @@ -0,0 +1,45 @@ +## Version 2025/01/07 +# make sure that your onetimesecret container is named onetimesecret +# make sure that your dns has a cname set for onetimesecret + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name onetimesecret.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app onetimesecret; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + } +} From 8199d01bfd42503deba4b13a54561db57bd42267 Mon Sep 17 00:00:00 2001 From: "J. Scott Elblein" Date: Fri, 10 Jan 2025 23:47:00 -0600 Subject: [PATCH 51/81] Create cryptgeon.subdomain.conf.sample --- cryptgeon.subdomain.conf.sample | 45 +++++++++++++++++++++++++++++++++ 1 file changed, 45 insertions(+) create mode 100644 cryptgeon.subdomain.conf.sample diff --git a/cryptgeon.subdomain.conf.sample b/cryptgeon.subdomain.conf.sample new file mode 100644 index 0000000..48573c3 --- /dev/null +++ b/cryptgeon.subdomain.conf.sample @@ -0,0 +1,45 @@ +## Version 2025/01/10 +# make sure that your cryptgeon container is named cryptgeon +# make sure that your dns has a cname set for cryptgeon + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name cryptgeon.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app cryptgeon; + set $upstream_port 8000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + } + } From 6f715575e03b570188f6b8f5518f30e57845bfe2 Mon Sep 17 00:00:00 2001 From: Noneangel <1888627+Noneangel@users.noreply.github.com> Date: Sat, 11 Jan 2025 22:37:07 +0100 Subject: [PATCH 52/81] Use Access-Control-Allow-Origin --- jellyfin.subdomain.conf.sample | 10 +++------- jellyfin.subfolder.conf.sample | 6 ++---- 2 files changed, 5 insertions(+), 11 deletions(-) diff --git a/jellyfin.subdomain.conf.sample b/jellyfin.subdomain.conf.sample index ce586f0..53a42d1 100644 --- a/jellyfin.subdomain.conf.sample +++ b/jellyfin.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/01/09 +## Version 2025/01/11 # make sure that your jellyfin container is named jellyfin # make sure that your dns has a cname set for jellyfin # if jellyfin is running in bridge mode and the container is named "jellyfin", the below config should work as is @@ -22,9 +22,7 @@ server { set $upstream_app jellyfin; set $upstream_port 8096; set $upstream_proto http; - if ($http_user_agent ~ Web0S) { - add_header X-Frame-Options "" always; - } + add_header Access-Control-Allow-Origin "luna://com.webos.service.config" always; proxy_pass $upstream_proto://$upstream_app:$upstream_port; proxy_set_header Range $http_range; @@ -37,9 +35,7 @@ server { set $upstream_app jellyfin; set $upstream_port 8096; set $upstream_proto http; - if ($http_user_agent ~ Web0S) { - add_header X-Frame-Options "" always; - } + add_header Access-Control-Allow-Origin "luna://com.webos.service.config" always; proxy_pass $upstream_proto://$upstream_app:$upstream_port; } diff --git a/jellyfin.subfolder.conf.sample b/jellyfin.subfolder.conf.sample index 5bdce9d..72c5ab3 100644 --- a/jellyfin.subfolder.conf.sample +++ b/jellyfin.subfolder.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/01/09 +## Version 2025/01/11 # make sure that your jellyfin container is named jellyfin # if jellyfin is running in bridge mode and the container is named "jellyfin", the below config should work as is # if not, replace the line "set $upstream_app jellyfin;" with "set $upstream_app ;" @@ -15,9 +15,7 @@ location ^~ /jellyfin/ { set $upstream_app jellyfin; set $upstream_port 8096; set $upstream_proto http; - if ($http_user_agent ~ Web0S) { - add_header X-Frame-Options "" always; - } + add_header Access-Control-Allow-Origin "luna://com.webos.service.config" always; proxy_pass $upstream_proto://$upstream_app:$upstream_port; proxy_set_header Range $http_range; From c36380190a49073ebaca09a0fa957dfe33975e23 Mon Sep 17 00:00:00 2001 From: jlssmt Date: Tue, 7 Jan 2025 21:56:17 +0100 Subject: [PATCH 53/81] added hoarder --- hoarder.subdomain.conf.sample | 56 +++++++++++++++++++++++++++++++++++ 1 file changed, 56 insertions(+) create mode 100644 hoarder.subdomain.conf.sample diff --git a/hoarder.subdomain.conf.sample b/hoarder.subdomain.conf.sample new file mode 100644 index 0000000..fa056ca --- /dev/null +++ b/hoarder.subdomain.conf.sample @@ -0,0 +1,56 @@ +## Version 2024/07/16 +# make sure that your hoarder container is named hoarder +# make sure that your dns has a cname set for hoarder + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name hoarder.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app hoarder; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } + + location ~ (/hoarder)?/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app hoarder; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} From 3cfed56ecf8fcdb39431957fce79fa44a7d9a87a Mon Sep 17 00:00:00 2001 From: "J. Scott Elblein" Date: Tue, 14 Jan 2025 21:08:59 -0600 Subject: [PATCH 54/81] Create metabase.subdomain.conf.sample --- metabase.subdomain.conf.sample | 45 ++++++++++++++++++++++++++++++++++ 1 file changed, 45 insertions(+) create mode 100644 metabase.subdomain.conf.sample diff --git a/metabase.subdomain.conf.sample b/metabase.subdomain.conf.sample new file mode 100644 index 0000000..fc07301 --- /dev/null +++ b/metabase.subdomain.conf.sample @@ -0,0 +1,45 @@ +## Version 2025/01/14 +# make sure that your metabase container is named metabase +# make sure that your dns has a cname set for metabase + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name metabase.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app metabase; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + } +} From e666c9696e44d2b93a8ea258eedd5755476863b4 Mon Sep 17 00:00:00 2001 From: Jakub W Date: Wed, 15 Jan 2025 21:20:48 +0100 Subject: [PATCH 55/81] Add pingvin-share.subdomain.conf,sample Nginx reverse proxy configuration for pingvin-share [stonith404/pingvin-share] --- pingvin-share.subdomain.conf.sample | 56 +++++++++++++++++++++++++++++ 1 file changed, 56 insertions(+) create mode 100644 pingvin-share.subdomain.conf.sample diff --git a/pingvin-share.subdomain.conf.sample b/pingvin-share.subdomain.conf.sample new file mode 100644 index 0000000..4eee432 --- /dev/null +++ b/pingvin-share.subdomain.conf.sample @@ -0,0 +1,56 @@ +## Version 2025/01/15 +# make sure that your pingvin-share container is named pingvin-share +# make sure that your dns has a cname set for pingvin-share + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name pingvin-share.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app pingvin-share; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } + + location ~ (/pingvin-share)?/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app pingvin-share; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} \ No newline at end of file From 11f83cff478c94063e18ed57a9e69916f0f1d57c Mon Sep 17 00:00:00 2001 From: driz <40674481+drizuid@users.noreply.github.com> Date: Thu, 16 Jan 2025 09:37:39 -0500 Subject: [PATCH 56/81] update ports IAW upstream documentation, add note for older versions --- frigate.subdomain.conf.sample | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/frigate.subdomain.conf.sample b/frigate.subdomain.conf.sample index beaf31e..b3d2efe 100644 --- a/frigate.subdomain.conf.sample +++ b/frigate.subdomain.conf.sample @@ -1,6 +1,7 @@ ## Version 2024/07/16 # make sure that your frigate container is named frigate # make sure that your dns has a cname set for frigate +# if you are on a version older than 0.14.0 set upstream_port to 5000 and upstream_proto to http server { listen 443 ssl; @@ -38,8 +39,8 @@ server { include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app frigate; - set $upstream_port 5000; - set $upstream_proto http; + set $upstream_port 8971; + set $upstream_proto https; proxy_pass $upstream_proto://$upstream_app:$upstream_port; } From ce46d79aefc7594ff971c42fab9a6574fb3c2020 Mon Sep 17 00:00:00 2001 From: driz <40674481+drizuid@users.noreply.github.com> Date: Thu, 16 Jan 2025 10:00:09 -0500 Subject: [PATCH 57/81] change date --- frigate.subdomain.conf.sample | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/frigate.subdomain.conf.sample b/frigate.subdomain.conf.sample index b3d2efe..a3d64b4 100644 --- a/frigate.subdomain.conf.sample +++ b/frigate.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/01/16 # make sure that your frigate container is named frigate # make sure that your dns has a cname set for frigate # if you are on a version older than 0.14.0 set upstream_port to 5000 and upstream_proto to http From 20c78bb90978e7c71577fd6a5cda89af47c0271c Mon Sep 17 00:00:00 2001 From: "J. Scott Elblein" Date: Fri, 17 Jan 2025 21:42:28 -0600 Subject: [PATCH 58/81] Create asciinema.subdomain.conf.sample --- asciinema.subdomain.conf.sample | 45 +++++++++++++++++++++++++++++++++ 1 file changed, 45 insertions(+) create mode 100644 asciinema.subdomain.conf.sample diff --git a/asciinema.subdomain.conf.sample b/asciinema.subdomain.conf.sample new file mode 100644 index 0000000..670a64e --- /dev/null +++ b/asciinema.subdomain.conf.sample @@ -0,0 +1,45 @@ +## Version 2025/01/17 +# make sure that your asciinema container is named asciinema +# make sure that your dns has a cname set for asciinema + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name asciinema.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app asciinema; + set $upstream_port 4000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + } +} From 72bb6938c39fb0623e1f59c037573d8f2863d7ce Mon Sep 17 00:00:00 2001 From: "J. Scott Elblein" Date: Mon, 20 Jan 2025 16:16:34 -0600 Subject: [PATCH 59/81] Create discount-bandit.subdomain.conf.sample --- discount-bandit.subdomain.conf.sample | 45 +++++++++++++++++++++++++++ 1 file changed, 45 insertions(+) create mode 100644 discount-bandit.subdomain.conf.sample diff --git a/discount-bandit.subdomain.conf.sample b/discount-bandit.subdomain.conf.sample new file mode 100644 index 0000000..908d0f7 --- /dev/null +++ b/discount-bandit.subdomain.conf.sample @@ -0,0 +1,45 @@ +## Version 2025/01/20 +# make sure that your discount-bandit container is named discount-bandit +# make sure that your dns has a cname set for discount-bandit + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name discount-bandit.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app discount-bandit; + set $upstream_port 80; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + } +} From c13da342af56832ba3ec3a57a8a78b71d659e8f2 Mon Sep 17 00:00:00 2001 From: Mr <37304121+IRHM@users.noreply.github.com> Date: Fri, 24 Jan 2025 15:41:30 +0000 Subject: [PATCH 60/81] Create watcharr.subdomain.conf.sample --- watcharr.subdomain.conf.sample | 56 ++++++++++++++++++++++++++++++++++ 1 file changed, 56 insertions(+) create mode 100644 watcharr.subdomain.conf.sample diff --git a/watcharr.subdomain.conf.sample b/watcharr.subdomain.conf.sample new file mode 100644 index 0000000..634241c --- /dev/null +++ b/watcharr.subdomain.conf.sample @@ -0,0 +1,56 @@ +## Version 2025/01/24 +# make sure that your watcharr container is named watcharr +# make sure that your dns has a cname set for watcharr + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name watcharr.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app watcharr; + set $upstream_port 3080; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } + + location ~ (/watcharr)?/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app watcharr; + set $upstream_port 3080; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} From 76ef83271f5e388f854e393ecb7f9df3a69fbfcc Mon Sep 17 00:00:00 2001 From: quietsy Date: Thu, 30 Jan 2025 07:52:09 +0200 Subject: [PATCH 61/81] Add immich-server --- immich-server.subdomain.conf.sample | 57 +++++++++++++++++++++++++++++ 1 file changed, 57 insertions(+) create mode 100644 immich-server.subdomain.conf.sample diff --git a/immich-server.subdomain.conf.sample b/immich-server.subdomain.conf.sample new file mode 100644 index 0000000..d33a301 --- /dev/null +++ b/immich-server.subdomain.conf.sample @@ -0,0 +1,57 @@ +## Version 2025/01/30 +# make sure that your immich container is named immich-server +# make sure that your dns has a cname set for immich-server +# immich v1.118+ only. For earlier versions, change $upstream_port to 3001 + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name immich.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app immich-server; + set $upstream_port 2283; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } + + location ~ (/immich)?/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app immich-server; + set $upstream_port 2283; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} From 495617092efbea2af815b52b9e4573931acc3dbc Mon Sep 17 00:00:00 2001 From: quietsy Date: Thu, 30 Jan 2025 08:05:05 +0200 Subject: [PATCH 62/81] Rename to immich_server --- immich-server.subdomain.conf.sample | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/immich-server.subdomain.conf.sample b/immich-server.subdomain.conf.sample index d33a301..f22d233 100644 --- a/immich-server.subdomain.conf.sample +++ b/immich-server.subdomain.conf.sample @@ -1,6 +1,6 @@ ## Version 2025/01/30 -# make sure that your immich container is named immich-server -# make sure that your dns has a cname set for immich-server +# make sure that your immich container is named immich_server +# make sure that your dns has a cname set for immich # immich v1.118+ only. For earlier versions, change $upstream_port to 3001 server { @@ -38,7 +38,7 @@ server { include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; - set $upstream_app immich-server; + set $upstream_app immich_server; set $upstream_port 2283; set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; @@ -48,7 +48,7 @@ server { location ~ (/immich)?/api { include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; - set $upstream_app immich-server; + set $upstream_app immich_server; set $upstream_port 2283; set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; From e4743c63b540ada28ff2c6c487eb1f2220db0b8b Mon Sep 17 00:00:00 2001 From: quietsy Date: Thu, 30 Jan 2025 08:13:36 +0200 Subject: [PATCH 63/81] Rename file for auto_proxy --- ...r.subdomain.conf.sample => immich_server.subdomain.conf.sample | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename immich-server.subdomain.conf.sample => immich_server.subdomain.conf.sample (100%) diff --git a/immich-server.subdomain.conf.sample b/immich_server.subdomain.conf.sample similarity index 100% rename from immich-server.subdomain.conf.sample rename to immich_server.subdomain.conf.sample From 40ed9faf79b86ea260f7e99b257c7e7069eb4916 Mon Sep 17 00:00:00 2001 From: jlssmt Date: Mon, 3 Feb 2025 22:18:53 +0100 Subject: [PATCH 64/81] add kopia --- kopia.subdomain.conf.sample | 46 +++++++++++++++++++++++++++++++++++++ 1 file changed, 46 insertions(+) create mode 100644 kopia.subdomain.conf.sample diff --git a/kopia.subdomain.conf.sample b/kopia.subdomain.conf.sample new file mode 100644 index 0000000..9c64bc3 --- /dev/null +++ b/kopia.subdomain.conf.sample @@ -0,0 +1,46 @@ +## Version 2024/07/16 +# make sure that your kopia container is named kopia +# make sure that your dns has a cname set for kopia + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name kopia.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app kopia; + set $upstream_port 51515; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} From eec973e23566adcd37b8fba8e804c67110855d2f Mon Sep 17 00:00:00 2001 From: "J. Scott Elblein" Date: Tue, 4 Feb 2025 18:23:50 -0600 Subject: [PATCH 65/81] Update metabase.subdomain.conf.sample Added /api --- metabase.subdomain.conf.sample | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/metabase.subdomain.conf.sample b/metabase.subdomain.conf.sample index fc07301..5aeba70 100644 --- a/metabase.subdomain.conf.sample +++ b/metabase.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/01/14 +## Version 2025/02/04 # make sure that your metabase container is named metabase # make sure that your dns has a cname set for metabase @@ -42,4 +42,13 @@ server { set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; } + + location ~ ^/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app metabase; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + } } From db96605b8d7f1dfc6917c058708c724d819742bb Mon Sep 17 00:00:00 2001 From: "J. Scott Elblein" Date: Fri, 21 Feb 2025 23:09:34 -0600 Subject: [PATCH 66/81] Update asciinema.subdomain.conf.sample Added block for the /dashboard Currently it's an unfinished dash, but author says it's in the works: https://discourse.asciinema.org/t/2-questions-1-post/920/2?u=j_scott_elblein --- asciinema.subdomain.conf.sample | 24 +++++++++++++++++++++++- 1 file changed, 23 insertions(+), 1 deletion(-) diff --git a/asciinema.subdomain.conf.sample b/asciinema.subdomain.conf.sample index 670a64e..af2f327 100644 --- a/asciinema.subdomain.conf.sample +++ b/asciinema.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/01/17 +## Version 2025/02/21 # make sure that your asciinema container is named asciinema # make sure that your dns has a cname set for asciinema @@ -42,4 +42,26 @@ server { set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; } + + location ~ (/asciinema)?/dashboard { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app asciinema; + set $upstream_port 4002; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + } } From 25407e87f60d56509d64d68e3769d4cb42870762 Mon Sep 17 00:00:00 2001 From: aptalca <541623+aptalca@users.noreply.github.com> Date: Mon, 10 Mar 2025 16:03:08 -0400 Subject: [PATCH 67/81] match zwave-js-ui conf name to container and server names --- ...i.subdomain.conf.sample => zwave-js-ui.subdomain.conf.sample | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename zwavejsui.subdomain.conf.sample => zwave-js-ui.subdomain.conf.sample (99%) diff --git a/zwavejsui.subdomain.conf.sample b/zwave-js-ui.subdomain.conf.sample similarity index 99% rename from zwavejsui.subdomain.conf.sample rename to zwave-js-ui.subdomain.conf.sample index 66d1bb9..efb9184 100644 --- a/zwavejsui.subdomain.conf.sample +++ b/zwave-js-ui.subdomain.conf.sample @@ -43,4 +43,4 @@ server { proxy_pass $upstream_proto://$upstream_app:$upstream_port; } -} \ No newline at end of file +} From 6d51d72612bb5b673ac2ee03079cc3cce11cc31f Mon Sep 17 00:00:00 2001 From: Gianmarco Mameli Date: Thu, 20 Mar 2025 16:14:35 +0100 Subject: [PATCH 68/81] Add proxy configuration for Plex library streams --- plex.subdomain.conf.sample | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/plex.subdomain.conf.sample b/plex.subdomain.conf.sample index accc5a7..813cd6d 100644 --- a/plex.subdomain.conf.sample +++ b/plex.subdomain.conf.sample @@ -61,4 +61,12 @@ server { proxy_set_header X-Plex-Device-Vendor $http_x_plex_device_vendor; proxy_set_header X-Plex-Model $http_x_plex_model; } + + location /library/streams/ { + set $upstream_app plex; + set $upstream_port 32400; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + proxy_pass_request_headers off; + } } From b2f335483970def4993db6e73b94bb5fa5fabeb8 Mon Sep 17 00:00:00 2001 From: kinghat Date: Wed, 26 Mar 2025 16:02:55 +0000 Subject: [PATCH 69/81] feat: create spoolman conf samples --- spoolman.subdomain.conf.sample | 46 ++++++++++++++++++++++++++++++++++ spoolman.subfolder.conf.sample | 30 ++++++++++++++++++++++ 2 files changed, 76 insertions(+) create mode 100644 spoolman.subdomain.conf.sample create mode 100644 spoolman.subfolder.conf.sample diff --git a/spoolman.subdomain.conf.sample b/spoolman.subdomain.conf.sample new file mode 100644 index 0000000..c36f308 --- /dev/null +++ b/spoolman.subdomain.conf.sample @@ -0,0 +1,46 @@ +## Version 2025/03/27 +# make sure that your spoolman container is named spoolman +# make sure that your dns has a cname set for spoolman + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name spoolman.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app spoolman; + set $upstream_port 8000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} \ No newline at end of file diff --git a/spoolman.subfolder.conf.sample b/spoolman.subfolder.conf.sample new file mode 100644 index 0000000..4fa88e7 --- /dev/null +++ b/spoolman.subfolder.conf.sample @@ -0,0 +1,30 @@ +## Version 2025/03/27 +# make sure that your spoolman container is named spoolman +# make sure that spoolman is set to work with the base url /spoolman/ + + +location /spoolman { + return 301 $scheme://$host/spoolman/; +} + +location ^~ /spoolman/ { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app spoolman; + set $upstream_port 8000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; +} \ No newline at end of file From e328f57197907b5fcdca67d9242f8411c1150df7 Mon Sep 17 00:00:00 2001 From: Luke Date: Tue, 15 Apr 2025 11:45:43 +0100 Subject: [PATCH 70/81] Create iplayarr.subdomain.conf.sample --- iplayarr.subdomain.conf.sample | 46 ++++++++++++++++++++++++++++++++++ 1 file changed, 46 insertions(+) create mode 100644 iplayarr.subdomain.conf.sample diff --git a/iplayarr.subdomain.conf.sample b/iplayarr.subdomain.conf.sample new file mode 100644 index 0000000..fa0886d --- /dev/null +++ b/iplayarr.subdomain.conf.sample @@ -0,0 +1,46 @@ +## Version 2025/04/15 +# make sure that your iplayarr container is named iplayarr +# make sure that your dns has a cname set for iplayarr + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name iplayarr.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app iplayarr; + set $upstream_port 4404; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} From 06b6e01254e21272c9f081936f0244fd304dcc9f Mon Sep 17 00:00:00 2001 From: RagingCub Date: Sat, 26 Apr 2025 12:34:53 -0400 Subject: [PATCH 71/81] Resolve api incompatibility with authelia for gitea --- gitea.subdomain.conf.sample | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/gitea.subdomain.conf.sample b/gitea.subdomain.conf.sample index 4549b5e..347d79e 100644 --- a/gitea.subdomain.conf.sample +++ b/gitea.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/04/26 # make sure that your gitea container is named gitea # make sure that your dns has a cname set for gitea # edit the following parameters in /data/gitea/conf/app.ini @@ -49,7 +49,7 @@ server { } - location ~ (/gitea)?/info/lfs { + location ~ (/gitea)?/(api|info/lfs) { include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app gitea; From 3a40049ca283da785e33436a6868123f996e319a Mon Sep 17 00:00:00 2001 From: Noneangel <1888627+Noneangel@users.noreply.github.com> Date: Sun, 18 May 2025 19:20:27 +0200 Subject: [PATCH 72/81] Fix Jellyfin CORS --- jellyfin.subdomain.conf.sample | 10 +++++++--- jellyfin.subfolder.conf.sample | 6 ++++-- 2 files changed, 11 insertions(+), 5 deletions(-) diff --git a/jellyfin.subdomain.conf.sample b/jellyfin.subdomain.conf.sample index 53a42d1..d8291a2 100644 --- a/jellyfin.subdomain.conf.sample +++ b/jellyfin.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/01/11 +## Version 2025/05/18 # make sure that your jellyfin container is named jellyfin # make sure that your dns has a cname set for jellyfin # if jellyfin is running in bridge mode and the container is named "jellyfin", the below config should work as is @@ -22,7 +22,9 @@ server { set $upstream_app jellyfin; set $upstream_port 8096; set $upstream_proto http; - add_header Access-Control-Allow-Origin "luna://com.webos.service.config" always; + if ($http_user_agent ~ Web0S) { + add_header Access-Control-Allow-Origin "luna://com.webos.service.config" always; + } proxy_pass $upstream_proto://$upstream_app:$upstream_port; proxy_set_header Range $http_range; @@ -35,7 +37,9 @@ server { set $upstream_app jellyfin; set $upstream_port 8096; set $upstream_proto http; - add_header Access-Control-Allow-Origin "luna://com.webos.service.config" always; + if ($http_user_agent ~ Web0S) { + add_header Access-Control-Allow-Origin "luna://com.webos.service.config" always; + } proxy_pass $upstream_proto://$upstream_app:$upstream_port; } diff --git a/jellyfin.subfolder.conf.sample b/jellyfin.subfolder.conf.sample index 72c5ab3..0e5e01d 100644 --- a/jellyfin.subfolder.conf.sample +++ b/jellyfin.subfolder.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/01/11 +## Version 2025/05/18 # make sure that your jellyfin container is named jellyfin # if jellyfin is running in bridge mode and the container is named "jellyfin", the below config should work as is # if not, replace the line "set $upstream_app jellyfin;" with "set $upstream_app ;" @@ -15,7 +15,9 @@ location ^~ /jellyfin/ { set $upstream_app jellyfin; set $upstream_port 8096; set $upstream_proto http; - add_header Access-Control-Allow-Origin "luna://com.webos.service.config" always; + if ($http_user_agent ~ Web0S) { + add_header Access-Control-Allow-Origin "luna://com.webos.service.config" always; + } proxy_pass $upstream_proto://$upstream_app:$upstream_port; proxy_set_header Range $http_range; From a3faf77c52f342a74928a3fe38c121c46aa3f8ec Mon Sep 17 00:00:00 2001 From: Gianmarco Mameli Date: Fri, 23 May 2025 11:09:29 +0200 Subject: [PATCH 73/81] Update version number in plex.subdomain.conf.sample to 2025/05/23 --- plex.subdomain.conf.sample | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/plex.subdomain.conf.sample b/plex.subdomain.conf.sample index 813cd6d..8ea6dae 100644 --- a/plex.subdomain.conf.sample +++ b/plex.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/05/23 # make sure that your plex container is named plex # make sure that your dns has a cname set for plex # if plex is running in bridge mode and the container is named "plex", the below config should work as is From 65b3c7114fa021490caa1038fe8519cf1d2c2bc3 Mon Sep 17 00:00:00 2001 From: Petar Nikolov Date: Sat, 31 May 2025 19:13:57 +0300 Subject: [PATCH 74/81] Add mailcow proxy conf sample --- mailcow.subdomain.conf.sample | 68 +++++++++++++++++++++++++++++++++++ 1 file changed, 68 insertions(+) create mode 100644 mailcow.subdomain.conf.sample diff --git a/mailcow.subdomain.conf.sample b/mailcow.subdomain.conf.sample new file mode 100644 index 0000000..4782432 --- /dev/null +++ b/mailcow.subdomain.conf.sample @@ -0,0 +1,68 @@ +## Version 2025/05/31 +# make sure that your mailcow container is named mailcow +# make sure that you are aqquainted with the mailcow documentation (https://docs.mailcow.email/) +# make sure you have read the most important entries in the "Get Started" section, "Post Installation Tasks -> Reverse Proxy -> Overview" and "Post Installation Tasks -> Reverse Proxy -> Nginx" sections +# make sure that your dns is configured as per your domain requirements and the mailcow documentation +# make sure to set up a mechanism to copy your SSL certificate after each renewal to /data/assets/ssl/ directory for mailcow to use (see mailcow documentation in "Post Installation Tasks -> Reverse Proxy -> Overview") + +server { + listen 443 ssl; + listen [::]:443 ssl; + + # modify these to match your domain/mailcow configuration + server_name mailcow.* autoconfig.* autodiscover.*; + + include /config/nginx/ssl.conf; + include /config/nginx/proxy.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + #include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/resolver.conf; + set $upstream_app mailcow; + set $upstream_port 8080; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + proxy_buffer_size 128k; + proxy_buffers 64 512k; + proxy_busy_buffers_size 512k; + } + + location /Microsoft-Server-ActiveSync { + include /config/nginx/resolver.conf; + set $upstream_app mailcow; + set $upstream_port 8080; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + proxy_connect_timeout 75; + proxy_send_timeout 3650; + proxy_read_timeout 3650; + proxy_buffers 64 512k; + + client_body_buffer_size 512k; + } +} From c6a0144e5d29f1e9675543d1e52e1f1e7be25a01 Mon Sep 17 00:00:00 2001 From: thespad Date: Sun, 8 Jun 2025 16:41:45 +0100 Subject: [PATCH 75/81] Add tinyauth support for subdomain confs --- _template.subdomain.conf.sample | 8 +++++++- actual-server.subdomain.conf.sample | 8 +++++++- adguard.subdomain.conf.sample | 8 +++++++- adminer.subdomain.conf.sample | 8 +++++++- adminmongo.subdomain.conf.sample | 8 +++++++- airsonic.subdomain.conf.sample | 8 +++++++- apprise-api.subdomain.conf.sample | 8 +++++++- archisteamfarm.subdomain.conf.sample | 8 +++++++- aria2-with-webui.subdomain.conf.sample | 8 +++++++- asciinema.subdomain.conf.sample | 11 +++++++++- atuin.subdomain.conf.sample | 8 +++++++- audiobookshelf.subdomain.conf.sample | 8 +++++++- authelia.subdomain.conf.sample | 2 +- authentik.subdomain.conf.sample | 2 +- babybuddy.subdomain.conf.sample | 8 +++++++- bazarr.subdomain.conf.sample | 8 +++++++- beets.subdomain.conf.sample | 8 +++++++- beszel.subdomain.conf.sample | 8 +++++++- bitwarden.subdomain.conf.sample | 11 +++++++++- boinc.subdomain.conf.sample | 8 +++++++- booksonic.subdomain.conf.sample | 8 +++++++- bookstack.subdomain.conf.sample | 8 +++++++- budge.subdomain.conf.sample | 8 +++++++- cadvisor.subdomain.conf.sample | 8 +++++++- calibre-web.subdomain.conf.sample | 10 ++++++++-- calibre.subdomain.conf.sample | 11 +++++++++- castopod.subdomain.conf.sample | 8 +++++++- changedetection.subdomain.conf.sample | 8 +++++++- chevereto.subdomain.conf.sample | 8 +++++++- chronograf.subdomain.conf.sample | 8 +++++++- cloudbeaver.subdomain.conf.sample | 8 +++++++- code-server.subdomain.conf.sample | 5 ++++- codimd.subdomain.conf.sample | 8 +++++++- collabora.subdomain.conf.sample | 8 +++++++- commento.subdomain.conf.sample | 8 +++++++- couchpotato.subdomain.conf.sample | 8 +++++++- crowdsec-dashboard.subdomain.conf.sample | 8 +++++++- crowdsec.subdomain.conf.sample | 8 +++++++- cryptgeon.subdomain.conf.sample | 8 +++++++- dashy.subdomain.conf.sample | 8 +++++++- ddns-updater.subdomain.conf.sample | 8 +++++++- deluge.subdomain.conf.sample | 8 +++++++- dillinger.subdomain.conf.sample | 8 +++++++- discount-bandit.subdomain.conf.sample | 8 +++++++- dnsdist.subdomain.conf.sample | 2 +- dockge.subdomain.conf.sample | 8 +++++++- documentserver.subdomain.conf.sample | 8 +++++++- dokuwiki.subdomain.conf.sample | 8 +++++++- domoticz.subdomain.conf.sample | 8 +++++++- dozzle.subdomain.conf.sample | 8 +++++++- drone.subdomain.conf.sample | 8 +++++++- dsmrreader.subdomain.conf.sample | 8 +++++++- duplicacy.subdomain.conf.sample | 8 +++++++- duplicati.subdomain.conf.sample | 8 +++++++- emby.subdomain.conf.sample | 2 +- embystat.subdomain.conf.sample | 8 +++++++- emulatorjs.subdomain.conf.sample | 11 +++++++++- esphome.subdomain.conf.sample | 8 +++++++- fenrus.subdomain.conf.sample | 8 +++++++- filebot.subdomain.conf.sample | 8 +++++++- filebrowser.subdomain.conf.sample | 8 +++++++- firefly.subdomain.conf.sample | 8 +++++++- firefox.subdomain.conf.sample | 8 +++++++- flaresolverr.subdomain.conf.sample | 8 +++++++- flexget.subdomain.conf.sample | 8 +++++++- flood.subdomain.conf.sample | 8 +++++++- foldingathome.subdomain.conf.sample | 8 +++++++- forgejo.subdomain.conf.sample | 8 +++++++- foundryvtt.subdomain.conf.sample | 8 +++++++- freshrss.subdomain.conf.sample | 8 +++++++- frigate.subdomain.conf.sample | 8 +++++++- gaps.subdomain.conf.sample | 8 +++++++- gatus.subdomain.conf.sample | 8 +++++++- get_iplayer.subdomain.conf.sample | 8 +++++++- ghost.subdomain.conf.sample | 8 +++++++- gitea.subdomain.conf.sample | 8 +++++++- glances.subdomain.conf.sample | 8 +++++++- gotify.subdomain.conf.sample | 8 +++++++- grafana.subdomain.conf.sample | 8 +++++++- grampsweb.subdomain.conf.sample | 8 +++++++- grav.subdomain.conf.sample | 8 +++++++- graylog.subdomain.conf.sample | 8 +++++++- grocy.subdomain.conf.sample | 8 +++++++- guacamole.subdomain.conf.sample | 8 +++++++- hass-configurator.subdomain.conf.sample | 8 +++++++- headphones.subdomain.conf.sample | 8 +++++++- healthchecks.subdomain.conf.sample | 8 +++++++- hedgedoc.subdomain.conf.sample | 8 +++++++- heimdall.subdomain.conf.sample | 8 +++++++- hoarder.subdomain.conf.sample | 8 +++++++- homarr.subdomain.conf.sample | 8 +++++++- homeassistant.subdomain.conf.sample | 8 +++++++- homebox.subdomain.conf.sample | 8 +++++++- homebridge.subdomain.conf.sample | 8 +++++++- homepage.subdomain.conf.sample | 8 +++++++- homer.subdomain.conf.sample | 8 +++++++- huginn.subdomain.conf.sample | 8 +++++++- immich.subdomain.conf.sample | 10 ++++++++-- immich_server.subdomain.conf.sample | 10 ++++++++-- influxdb.subdomain.conf.sample | 8 +++++++- iplayarr.subdomain.conf.sample | 8 +++++++- it-tools.subdomain.conf.sample | 8 +++++++- jackett.subdomain.conf.sample | 8 +++++++- jdownloader.subdomain.conf.sample | 8 +++++++- jellyfin.subdomain.conf.sample | 2 +- jellyseerr.subdomain.conf.sample | 8 +++++++- jfa-go.subdomain.conf.sample | 8 +++++++- joplin.subdomain.conf.sample | 8 +++++++- kanzi.subdomain.conf.sample | 8 +++++++- kasm.subdomain.conf.sample | 14 ++++++++++++- kavita.subdomain.conf.sample | 8 +++++++- kimai.subdomain.conf.sample | 8 +++++++- komga.subdomain.conf.sample | 8 +++++++- kopia.subdomain.conf.sample | 8 +++++++- lazylibrarian.subdomain.conf.sample | 8 +++++++- leantime.subdomain.conf.sample | 8 +++++++- libreddit.subdomain.conf.sample | 8 +++++++- librespeed.subdomain.conf.sample | 8 +++++++- lidarr.subdomain.conf.sample | 8 +++++++- linkace.subdomain.conf.sample | 8 +++++++- linkstack.subdomain.conf.sample | 8 +++++++- linkwarden.subdomain.conf.sample | 8 +++++++- lldap.subdomain.conf.sample | 8 +++++++- lubelogger.subdomain.conf.sample | 8 +++++++- lychee.subdomain.conf.sample | 8 +++++++- mailu.subdomain.conf.sample | 8 +++++++- maintainerr.subdomain.conf.sample | 8 +++++++- mastodon.subdomain.conf.sample | 8 +++++++- matomo.subdomain.conf.sample | 8 +++++++- mattermost.subdomain.conf.sample | 8 +++++++- mealie.subdomain.conf.sample | 8 +++++++- medusa.subdomain.conf.sample | 8 +++++++- metabase.subdomain.conf.sample | 8 +++++++- metube.subdomain.conf.sample | 8 +++++++- miniflux.subdomain.conf.sample | 8 +++++++- monica.subdomain.conf.sample | 8 +++++++- monitorr.subdomain.conf.sample | 8 +++++++- mstream.subdomain.conf.sample | 8 +++++++- mylar.subdomain.conf.sample | 8 +++++++- n8n.subdomain.conf.sample | 8 +++++++- navidrome.subdomain.conf.sample | 8 +++++++- netboot.subdomain.conf.sample | 8 +++++++- netbox.subdomain.conf.sample | 8 +++++++- netdata.subdomain.conf.sample | 8 +++++++- nextcloud.subdomain.conf.sample | 2 +- nexusoss.subdomain.conf.sample | 11 +++++++++- nocodb.subdomain.conf.sample | 8 +++++++- notifiarr.subdomain.conf.sample | 8 +++++++- ntfy.subdomain.conf.sample | 8 +++++++- nzbget.subdomain.conf.sample | 8 +++++++- nzbhydra.subdomain.conf.sample | 8 +++++++- octoprint.subdomain.conf.sample | 8 +++++++- ombi.subdomain.conf.sample | 8 +++++++- onetimesecret.subdomain.conf.sample | 8 +++++++- oogway.subdomain.conf.sample | 8 +++++++- open-webui.subdomain.conf.sample | 8 +++++++- openhab.subdomain.conf.sample | 8 +++++++- openvpn-as.subdomain.conf.sample | 11 +++++++++- openvscode-server.subdomain.conf.sample | 20 ++++++++++++++++++- organizr.subdomain.conf.sample | 8 +++++++- osticket.subdomain.conf.sample | 8 +++++++- overseerr.subdomain.conf.sample | 8 +++++++- paperless.subdomain.conf.sample | 8 +++++++- papermerge.subdomain.conf.sample | 8 +++++++- partdb.subdomain.conf.sample | 8 +++++++- petio.subdomain.conf.sample | 8 +++++++- pgadmin.subdomain.conf.sample | 8 +++++++- phoneinfoga.subdomain.conf.sample | 8 +++++++- photoprism.subdomain.conf.sample | 8 +++++++- phpmyadmin.subdomain.conf.sample | 8 +++++++- pihole.subdomain.conf.sample | 11 +++++++++- pingvin-share.subdomain.conf.sample | 12 ++++++++--- pinry.subdomain.conf.sample | 8 +++++++- piwigo.subdomain.conf.sample | 8 +++++++- pixelfed.subdomain.conf.sample | 8 +++++++- planka.subdomain.conf.sample | 8 +++++++- plex.subdomain.conf.sample | 8 +++++++- plexwebtools.subdomain.conf.sample | 8 +++++++- podgrab.subdomain.conf.sample | 8 +++++++- portainer.subdomain.conf.sample | 8 +++++++- privatebin.subdomain.conf.sample | 8 +++++++- prometheus.subdomain.conf.sample | 8 +++++++- prowlarr.subdomain.conf.sample | 8 +++++++- pterodactyl.subdomain.conf.sample | 8 +++++++- pterodactylnode.subdomain.conf.sample | 8 +++++++- pwndrop.subdomain.conf.sample | 8 +++++++- pydio-cells.subdomain.conf.sample | 11 +++++++++- pydio.subdomain.conf.sample | 8 +++++++- pyload.subdomain.conf.sample | 8 +++++++- qbittorrent.subdomain.conf.sample | 8 +++++++- quassel-web.subdomain.conf.sample | 8 +++++++- radarr.subdomain.conf.sample | 8 +++++++- rallly.subdomain.conf.sample | 8 +++++++- raneto.subdomain.conf.sample | 8 +++++++- readarr.subdomain.conf.sample | 8 +++++++- recipes.subdomain.conf.sample | 8 +++++++- requestrr.subdomain.conf.sample | 8 +++++++- resilio-sync.subdomain.conf.sample | 8 +++++++- romm.subdomain.conf.sample | 10 ++++++++-- rutorrent.subdomain.conf.sample | 11 +++++++++- sabnzbd.subdomain.conf.sample | 8 +++++++- saltrim.subdomain.conf.sample | 8 +++++++- scrutiny.subdomain.conf.sample | 8 +++++++- semaphore.subdomain.conf.sample | 8 +++++++- shinobi.subdomain.conf.sample | 8 +++++++- shlink.subdomain.conf.sample | 8 +++++++- sickchill.subdomain.conf.sample | 8 +++++++- sickrage.subdomain.conf.sample | 8 +++++++- skyhook.subdomain.conf.sample | 8 +++++++- smokeping.subdomain.conf.sample | 8 +++++++- sonarr.subdomain.conf.sample | 8 +++++++- sonarrtorss.subdomain.conf.sample | 8 +++++++- speedtest-tracker.subdomain.conf.sample | 8 +++++++- spoolman.subdomain.conf.sample | 10 ++++++++-- statping.subdomain.conf.sample | 8 +++++++- stirling-pdf.subdomain.conf.sample | 8 +++++++- storm.subdomain.conf.sample | 8 +++++++- synapse.subdomain.conf.sample | 8 +++++++- synclounge.subdomain.conf.sample | 8 +++++++- syncthing.subdomain.conf.sample | 8 +++++++- taisun.subdomain.conf.sample | 8 +++++++- tasmobackup.subdomain.conf.sample | 8 +++++++- tautulli.subdomain.conf.sample | 8 +++++++- tdarr.subdomain.conf.sample | 8 +++++++- thelounge.subdomain.conf.sample | 8 +++++++- themepark.subdomain.conf.sample | 8 +++++++- transmission.subdomain.conf.sample | 8 +++++++- ubooquity.subdomain.conf.sample | 8 +++++++- unifi-controller.subdomain.conf.sample | 8 +++++++- ...-network-application.subdomain.conf.sample | 8 +++++++- uptime-kuma.subdomain.conf.sample | 8 +++++++- vaultwarden.subdomain.conf.sample | 11 +++++++++- viewtube.subdomain.conf.sample | 8 +++++++- wallabag.subdomain.conf.sample | 8 +++++++- warpgate.subdomain.conf.sample | 8 +++++++- watcharr.subdomain.conf.sample | 10 ++++++++-- watchstate.subdomain.conf.sample | 8 +++++++- webtop.subdomain.conf.sample | 8 +++++++- whisparr.subdomain.conf.sample | 8 +++++++- wikijs.subdomain.conf.sample | 8 +++++++- wizarr.subdomain.conf.sample | 8 +++++++- wordpress.subdomain.conf.sample | 8 +++++++- wrapperr.subdomain.conf.sample | 8 +++++++- yacht.subdomain.conf.sample | 8 +++++++- your-spotify-api.subdomain.conf.sample | 8 +++++++- your-spotify.subdomain.conf.sample | 8 +++++++- yourls.subdomain.conf.sample | 8 +++++++- youtube-dl-server.subdomain.conf.sample | 8 +++++++- yt-dlp-web.subdomain.conf.sample | 8 +++++++- zigbee2mqtt.subdomain.conf.sample | 8 +++++++- znc.subdomain.conf.sample | 8 +++++++- zwave-js-ui.subdomain.conf.sample | 8 +++++++- zwavejs2mqtt.subdomain.conf.sample | 8 +++++++- 253 files changed, 1788 insertions(+), 261 deletions(-) diff --git a/_template.subdomain.conf.sample b/_template.subdomain.conf.sample index 9a097bf..ab4f039 100644 --- a/_template.subdomain.conf.sample +++ b/_template.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # REMOVE THIS LINE BEFORE SUBMITTING: The structure of the file (all of the existing lines) should be kept as close as possible to this template. # REMOVE THIS LINE BEFORE SUBMITTING: Look through this file for and replace them. Review other sample files to see how things are done. # REMOVE THIS LINE BEFORE SUBMITTING: The comment lines at the top of the file (below this line) should explain any prerequisites for using the proxy such as DNS or app settings. @@ -24,6 +24,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -38,6 +41,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app ; diff --git a/actual-server.subdomain.conf.sample b/actual-server.subdomain.conf.sample index ce910a4..231c89a 100644 --- a/actual-server.subdomain.conf.sample +++ b/actual-server.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your actual-server container is named actual-server # make sure that your dns has a cname set for actual-server @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app actual-server; diff --git a/adguard.subdomain.conf.sample b/adguard.subdomain.conf.sample index 9d4d459..e6d1c16 100644 --- a/adguard.subdomain.conf.sample +++ b/adguard.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your adguard container is named adguard # make sure that your dns has a cname set for adguard @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app adguard; diff --git a/adminer.subdomain.conf.sample b/adminer.subdomain.conf.sample index 809a6a4..3bcf48e 100644 --- a/adminer.subdomain.conf.sample +++ b/adminer.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your adminer container is named adminer # make sure that your dns has a cname set for adminer @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth @@ -36,6 +39,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app adminer; diff --git a/adminmongo.subdomain.conf.sample b/adminmongo.subdomain.conf.sample index c1869eb..2ceaf3b 100644 --- a/adminmongo.subdomain.conf.sample +++ b/adminmongo.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your adminmongo container is named adminmongo # make sure that your dns has a cname set for adminmongo @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app adminmongo; diff --git a/airsonic.subdomain.conf.sample b/airsonic.subdomain.conf.sample index 7152705..1fd6efd 100644 --- a/airsonic.subdomain.conf.sample +++ b/airsonic.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your airsonic container is named airsonic # make sure that your dns has a cname set for airsonic # add `server.use-forward-headers=true` to `/config/application.properties` to ensure logs contain real source IP @@ -22,6 +22,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -36,6 +39,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app airsonic; diff --git a/apprise-api.subdomain.conf.sample b/apprise-api.subdomain.conf.sample index ea04b40..f2e2344 100644 --- a/apprise-api.subdomain.conf.sample +++ b/apprise-api.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your apprise-api container is named apprise-api # make sure that your dns has a cname set for apprise-api @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app apprise-api; diff --git a/archisteamfarm.subdomain.conf.sample b/archisteamfarm.subdomain.conf.sample index caeaa64..a4e2596 100644 --- a/archisteamfarm.subdomain.conf.sample +++ b/archisteamfarm.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your archisteamfarm container is named archisteamfarm # make sure that your dns has a cname set for archisteamfarm @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app archisteamfarm; diff --git a/aria2-with-webui.subdomain.conf.sample b/aria2-with-webui.subdomain.conf.sample index 98181a8..be5b8cf 100644 --- a/aria2-with-webui.subdomain.conf.sample +++ b/aria2-with-webui.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your aria2 container is named aria2-with-webui # make sure that your dns has a cname set for aria2 # @@ -25,6 +25,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -39,6 +42,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app aria2-with-webui; diff --git a/asciinema.subdomain.conf.sample b/asciinema.subdomain.conf.sample index af2f327..fd15f54 100644 --- a/asciinema.subdomain.conf.sample +++ b/asciinema.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/02/21 +## Version 2025/06/08 # make sure that your asciinema container is named asciinema # make sure that your dns has a cname set for asciinema @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app asciinema; @@ -57,6 +63,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app asciinema; diff --git a/atuin.subdomain.conf.sample b/atuin.subdomain.conf.sample index 73af032..59d8ef8 100644 --- a/atuin.subdomain.conf.sample +++ b/atuin.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your atuin container is named atuin # make sure that your dns has a cname set for atuin @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app atuin; diff --git a/audiobookshelf.subdomain.conf.sample b/audiobookshelf.subdomain.conf.sample index fb1ad90..f8aa4e7 100644 --- a/audiobookshelf.subdomain.conf.sample +++ b/audiobookshelf.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your audiobookshelf container is named audiobookshelf # make sure that your dns has a cname set for audiobookshelf @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app audiobookshelf; diff --git a/authelia.subdomain.conf.sample b/authelia.subdomain.conf.sample index 032acbb..706a8d9 100644 --- a/authelia.subdomain.conf.sample +++ b/authelia.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your authelia container is named authelia # make sure that your dns has a cname set for authelia diff --git a/authentik.subdomain.conf.sample b/authentik.subdomain.conf.sample index a821731..43295b9 100644 --- a/authentik.subdomain.conf.sample +++ b/authentik.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your authentik container is named authentik-server # make sure that your dns has a cname set for authentik diff --git a/babybuddy.subdomain.conf.sample b/babybuddy.subdomain.conf.sample index af83363..702c148 100644 --- a/babybuddy.subdomain.conf.sample +++ b/babybuddy.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/12/29 +## Version 2025/06/08 # make sure that your babybuddy container is named babybuddy # make sure that your dns has a cname set for babybuddy @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app babybuddy; diff --git a/bazarr.subdomain.conf.sample b/bazarr.subdomain.conf.sample index da168f6..256f57b 100644 --- a/bazarr.subdomain.conf.sample +++ b/bazarr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your bazarr container is named bazarr # make sure that your dns has a cname set for bazarr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app bazarr; diff --git a/beets.subdomain.conf.sample b/beets.subdomain.conf.sample index 04efa76..494262b 100644 --- a/beets.subdomain.conf.sample +++ b/beets.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your beets container is named beets # make sure that your dns has a cname set for beets #First edit beets.yml and enable the reverse proxy settings, under "web" add "reverse_proxy: true" and restart the beets container. @@ -22,6 +22,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -36,6 +39,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app beets; diff --git a/beszel.subdomain.conf.sample b/beszel.subdomain.conf.sample index 2c032f9..4aa83df 100644 --- a/beszel.subdomain.conf.sample +++ b/beszel.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your beszel container is named beszel # make sure that your dns has a cname set for beszel @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app beszel; diff --git a/bitwarden.subdomain.conf.sample b/bitwarden.subdomain.conf.sample index 50e7be2..0f2675d 100644 --- a/bitwarden.subdomain.conf.sample +++ b/bitwarden.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your bitwarden container is named bitwarden # make sure that your dns has a cname set for bitwarden # if you are using bitwarden (the official image), use the bitwarden conf @@ -25,6 +25,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -39,6 +42,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app bitwarden; @@ -62,6 +68,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app bitwarden; diff --git a/boinc.subdomain.conf.sample b/boinc.subdomain.conf.sample index af45bfb..d1bdd04 100644 --- a/boinc.subdomain.conf.sample +++ b/boinc.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your boinc container is named boinc # make sure that your dns has a cname set for boinc @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app boinc; diff --git a/booksonic.subdomain.conf.sample b/booksonic.subdomain.conf.sample index 0d6008b..6c80167 100644 --- a/booksonic.subdomain.conf.sample +++ b/booksonic.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your booksonic container is named booksonic # make sure that your dns has a cname set for booksonic @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app booksonic; diff --git a/bookstack.subdomain.conf.sample b/bookstack.subdomain.conf.sample index 9a6b898..aa9bf97 100644 --- a/bookstack.subdomain.conf.sample +++ b/bookstack.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your bookstack container is named bookstack # make sure that your dns has a cname set for bookstack # Ensure you have the APP_URL Environment Variable set correctly in your Docker Run/Compose or in BookStack Env File (/www/.env) @@ -23,6 +23,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -37,6 +40,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app bookstack; diff --git a/budge.subdomain.conf.sample b/budge.subdomain.conf.sample index 24b7af2..6935d6c 100644 --- a/budge.subdomain.conf.sample +++ b/budge.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your budge container is named budge # make sure that your dns has a cname set for budge @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app budge; diff --git a/cadvisor.subdomain.conf.sample b/cadvisor.subdomain.conf.sample index 905cfd8..407469f 100644 --- a/cadvisor.subdomain.conf.sample +++ b/cadvisor.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your cadvisor container is named cadvisor # make sure that your dns has a cname set for cadvisor @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app cadvisor; diff --git a/calibre-web.subdomain.conf.sample b/calibre-web.subdomain.conf.sample index b75eba3..0535f66 100644 --- a/calibre-web.subdomain.conf.sample +++ b/calibre-web.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/12/06 +## Version 2025/06/08 # make sure that your calibre-web container is named calibre-web # make sure that your dns has a cname set for calibre-web @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -34,6 +37,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; # To use Authelia to log in to Calibre-Web, make sure "Reverse Proxy Login" is # enabled, "Reverse Proxy Header Name" is set to Remote-User, and each Authelia # user also has a corresponding user manually created in Calibre-Web. @@ -75,4 +81,4 @@ server { proxy_buffers 4 256k; proxy_busy_buffers_size 256k; } -} \ No newline at end of file +} diff --git a/calibre.subdomain.conf.sample b/calibre.subdomain.conf.sample index 98cb48f..3fdb407 100644 --- a/calibre.subdomain.conf.sample +++ b/calibre.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your calibre container is named calibre # make sure that your dns has a cname set for calibre # for the content server, go into calibre preferences / sharing over the net / advanced and @@ -24,6 +24,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -38,6 +41,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app calibre; @@ -66,6 +72,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app calibre; diff --git a/castopod.subdomain.conf.sample b/castopod.subdomain.conf.sample index a825be5..3ef2afc 100644 --- a/castopod.subdomain.conf.sample +++ b/castopod.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/12/04 +## Version 2025/06/08 # make sure that your castopod container is named castopod-app # make sure that your dns has a cname set for castopod @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app castopod-app; diff --git a/changedetection.subdomain.conf.sample b/changedetection.subdomain.conf.sample index ae0a5b6..4ff96d8 100644 --- a/changedetection.subdomain.conf.sample +++ b/changedetection.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your changedetection container is named changedetection # make sure that your dns has a cname set for changedetection @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app changedetection; diff --git a/chevereto.subdomain.conf.sample b/chevereto.subdomain.conf.sample index cd9d8e2..89515f9 100644 --- a/chevereto.subdomain.conf.sample +++ b/chevereto.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your chevereto container is named chevereto # make sure that your dns has a cname set for chevereto @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app chevereto; diff --git a/chronograf.subdomain.conf.sample b/chronograf.subdomain.conf.sample index 529ccf5..fd7267e 100644 --- a/chronograf.subdomain.conf.sample +++ b/chronograf.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your chronograf container is named chronograf # make sure that your dns has a cname set for chronograf @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app chronograf; diff --git a/cloudbeaver.subdomain.conf.sample b/cloudbeaver.subdomain.conf.sample index d964544..7bdca7f 100644 --- a/cloudbeaver.subdomain.conf.sample +++ b/cloudbeaver.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your cloudbeaver container is named cloudbeaver # make sure that your dns has a cname set for cloudbeaver @@ -23,6 +23,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -37,6 +40,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app cloudbeaver; diff --git a/code-server.subdomain.conf.sample b/code-server.subdomain.conf.sample index 56e0ffb..effa62f 100644 --- a/code-server.subdomain.conf.sample +++ b/code-server.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your code-server container is named code-server # make sure that your dns has a cname set for code-server @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; diff --git a/codimd.subdomain.conf.sample b/codimd.subdomain.conf.sample index 8de6ea8..5d10bf4 100644 --- a/codimd.subdomain.conf.sample +++ b/codimd.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure you have added the following environmental variables to your run command/compose file # CMD_DOMAIN=codimd.server.com # CMD_PROTOCOL_USESSL=true @@ -22,6 +22,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -36,6 +39,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app codimd; diff --git a/collabora.subdomain.conf.sample b/collabora.subdomain.conf.sample index d21ac2c..c62e6c8 100644 --- a/collabora.subdomain.conf.sample +++ b/collabora.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your collabora container is named collabora # make sure that your dns has a cname set for collabora @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app collabora; diff --git a/commento.subdomain.conf.sample b/commento.subdomain.conf.sample index e4c5226..5f9f274 100644 --- a/commento.subdomain.conf.sample +++ b/commento.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your commento container is named commento # make sure that your dns has a cname set for commento @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app commento; diff --git a/couchpotato.subdomain.conf.sample b/couchpotato.subdomain.conf.sample index d895d48..e27a307 100644 --- a/couchpotato.subdomain.conf.sample +++ b/couchpotato.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your couchpotato container is named couchpotato # make sure that your dns has a cname set for couchpotato @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app couchpotato; diff --git a/crowdsec-dashboard.subdomain.conf.sample b/crowdsec-dashboard.subdomain.conf.sample index e1739bd..32100a5 100644 --- a/crowdsec-dashboard.subdomain.conf.sample +++ b/crowdsec-dashboard.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your crowdsec-dashboard container is named crowdsec-dashboard # make sure that your dns has a cname set for crowdsec-dashboard @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app crowdsec-dashboard; diff --git a/crowdsec.subdomain.conf.sample b/crowdsec.subdomain.conf.sample index 640e913..c9ce4d3 100644 --- a/crowdsec.subdomain.conf.sample +++ b/crowdsec.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your crowdsec container is named crowdsec # make sure that your dns has a cname set for crowdsec @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app crowdsec; diff --git a/cryptgeon.subdomain.conf.sample b/cryptgeon.subdomain.conf.sample index 48573c3..afe5ff0 100644 --- a/cryptgeon.subdomain.conf.sample +++ b/cryptgeon.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/01/10 +## Version 2025/06/08 # make sure that your cryptgeon container is named cryptgeon # make sure that your dns has a cname set for cryptgeon @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app cryptgeon; diff --git a/dashy.subdomain.conf.sample b/dashy.subdomain.conf.sample index 2848270..1b1eee0 100644 --- a/dashy.subdomain.conf.sample +++ b/dashy.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your dashy container is named dashy # make sure that your dns has a cname set for dashy @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app dashy; diff --git a/ddns-updater.subdomain.conf.sample b/ddns-updater.subdomain.conf.sample index e02a809..3709ffa 100644 --- a/ddns-updater.subdomain.conf.sample +++ b/ddns-updater.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/08/04 +## Version 2025/06/08 # make sure that your ddns-updater container is named ddns-updater # make sure that your dns has a cname set for ddns-updater @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app ddns-updater; diff --git a/deluge.subdomain.conf.sample b/deluge.subdomain.conf.sample index b07a8cb..5bec626 100644 --- a/deluge.subdomain.conf.sample +++ b/deluge.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your deluge container is named deluge # make sure that your dns has a cname set for deluge @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app deluge; diff --git a/dillinger.subdomain.conf.sample b/dillinger.subdomain.conf.sample index b3b9d13..8dd8d74 100644 --- a/dillinger.subdomain.conf.sample +++ b/dillinger.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your dillinger container is named dillinger # make sure that your dns has a cname set for dillinger @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app dillinger; diff --git a/discount-bandit.subdomain.conf.sample b/discount-bandit.subdomain.conf.sample index 908d0f7..e24c6e2 100644 --- a/discount-bandit.subdomain.conf.sample +++ b/discount-bandit.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/01/20 +## Version 2025/06/08 # make sure that your discount-bandit container is named discount-bandit # make sure that your dns has a cname set for discount-bandit @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app discount-bandit; diff --git a/dnsdist.subdomain.conf.sample b/dnsdist.subdomain.conf.sample index b90bf07..09566a0 100644 --- a/dnsdist.subdomain.conf.sample +++ b/dnsdist.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/12/19 +## Version 2025/06/08 # make sure that your container is named dnsdist # make sure that your dns has a cname set for dnsdist diff --git a/dockge.subdomain.conf.sample b/dockge.subdomain.conf.sample index c3562b9..3478ae1 100644 --- a/dockge.subdomain.conf.sample +++ b/dockge.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your dockge container is named dockge # make sure that your dns has a cname set for dockge @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app dockge; diff --git a/documentserver.subdomain.conf.sample b/documentserver.subdomain.conf.sample index 1e0695c..2cd169f 100644 --- a/documentserver.subdomain.conf.sample +++ b/documentserver.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your onlyoffice documentserver container is named documentserver # make sure that your dns has a cname set for documentserver @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app documentserver; diff --git a/dokuwiki.subdomain.conf.sample b/dokuwiki.subdomain.conf.sample index 693071e..b2ba9e4 100644 --- a/dokuwiki.subdomain.conf.sample +++ b/dokuwiki.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your dokuwiki container is named dokuwiki # make sure that your dns has a cname set for dokuwiki # complete the setup by appending install.php to URL @@ -22,6 +22,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -36,6 +39,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app dokuwiki; diff --git a/domoticz.subdomain.conf.sample b/domoticz.subdomain.conf.sample index 6031125..ee78af5 100644 --- a/domoticz.subdomain.conf.sample +++ b/domoticz.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your domoticz container is named domoticz # make sure that your dns has a cname set for domoticz @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app domoticz; diff --git a/dozzle.subdomain.conf.sample b/dozzle.subdomain.conf.sample index 7a81d37..05dcb9f 100644 --- a/dozzle.subdomain.conf.sample +++ b/dozzle.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your dozzle container is named dozzle # make sure that your dns has a cname set for dozzle @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app dozzle; diff --git a/drone.subdomain.conf.sample b/drone.subdomain.conf.sample index 7edb180..ec9c501 100644 --- a/drone.subdomain.conf.sample +++ b/drone.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your drone container is named drone # make sure that your dns has a cname set for drone @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app drone; diff --git a/dsmrreader.subdomain.conf.sample b/dsmrreader.subdomain.conf.sample index 46559ab..d67f43d 100644 --- a/dsmrreader.subdomain.conf.sample +++ b/dsmrreader.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your dsmr container is named dsmr # make sure that your dns has a cname set for dsmr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app dsmr; diff --git a/duplicacy.subdomain.conf.sample b/duplicacy.subdomain.conf.sample index bff8005..25f87f3 100644 --- a/duplicacy.subdomain.conf.sample +++ b/duplicacy.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your duplicacy container is named duplicacy # make sure that your dns has a cname set for duplicacy @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app duplicacy; diff --git a/duplicati.subdomain.conf.sample b/duplicati.subdomain.conf.sample index 2198f33..f1b3c41 100644 --- a/duplicati.subdomain.conf.sample +++ b/duplicati.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your duplicati container is named duplicati # make sure that your dns has a cname set for duplicati @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app duplicati; diff --git a/emby.subdomain.conf.sample b/emby.subdomain.conf.sample index 773fe05..fe5ddeb 100644 --- a/emby.subdomain.conf.sample +++ b/emby.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your emby container is named emby # make sure that your dns has a cname set for emby # if emby is running in bridge mode and the container is named "emby", the below config should work as is diff --git a/embystat.subdomain.conf.sample b/embystat.subdomain.conf.sample index e256954..51ea93e 100644 --- a/embystat.subdomain.conf.sample +++ b/embystat.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your embystat container is named embystat # make sure that your dns has a cname set for embystat @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app embystat; diff --git a/emulatorjs.subdomain.conf.sample b/emulatorjs.subdomain.conf.sample index fc806ac..d0d37df 100644 --- a/emulatorjs.subdomain.conf.sample +++ b/emulatorjs.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your emulatorjs container is named emulatorjs # make sure that your dns has a cname set for emulatorjs # In emulatorjs docker arguments, set an env variable for SUBFOLDER=/backend/ @@ -24,6 +24,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -38,6 +41,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app emulatorjs; @@ -64,6 +70,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app emulatorjs; diff --git a/esphome.subdomain.conf.sample b/esphome.subdomain.conf.sample index 688eba8..febc0cd 100644 --- a/esphome.subdomain.conf.sample +++ b/esphome.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your esphome container is named esphome # make sure that your dns has a cname set for esphome @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app esphome; diff --git a/fenrus.subdomain.conf.sample b/fenrus.subdomain.conf.sample index 6e53d74..d2468bc 100644 --- a/fenrus.subdomain.conf.sample +++ b/fenrus.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your fenrus container is named fenrus # make sure that your dns has a cname set for fenrus @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app fenrus; diff --git a/filebot.subdomain.conf.sample b/filebot.subdomain.conf.sample index 2fe39fc..03e53cd 100644 --- a/filebot.subdomain.conf.sample +++ b/filebot.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your filebot container is named filebot # make sure that your dns has a cname set for filebot @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app filebot; diff --git a/filebrowser.subdomain.conf.sample b/filebrowser.subdomain.conf.sample index 87eca86..b6ec60c 100644 --- a/filebrowser.subdomain.conf.sample +++ b/filebrowser.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your filebrowser container is named filebrowser # make sure that your dns has a cname set for filebrowser @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app filebrowser; diff --git a/firefly.subdomain.conf.sample b/firefly.subdomain.conf.sample index 06719e5..b91ecb5 100644 --- a/firefly.subdomain.conf.sample +++ b/firefly.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your firefly container is named firefly # make sure that your dns has a cname set for firefly @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app firefly; diff --git a/firefox.subdomain.conf.sample b/firefox.subdomain.conf.sample index cce671c..95e4de4 100644 --- a/firefox.subdomain.conf.sample +++ b/firefox.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your firefox container is named firefox # make sure that your dns has a cname set for firefox @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app firefox; diff --git a/flaresolverr.subdomain.conf.sample b/flaresolverr.subdomain.conf.sample index 956064b..7057378 100644 --- a/flaresolverr.subdomain.conf.sample +++ b/flaresolverr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your flaresolverr container is named flaresolverr # make sure that your dns has a cname set for flaresolverr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app flaresolverr; diff --git a/flexget.subdomain.conf.sample b/flexget.subdomain.conf.sample index f57f3c4..9eb6677 100644 --- a/flexget.subdomain.conf.sample +++ b/flexget.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your flexget container is named flexget # make sure that your dns has a cname set for flexget @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app flexget; diff --git a/flood.subdomain.conf.sample b/flood.subdomain.conf.sample index 9de2d06..6edb1f9 100644 --- a/flood.subdomain.conf.sample +++ b/flood.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your flood container is named flood # make sure that your dns has a cname set for flood @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app flood; diff --git a/foldingathome.subdomain.conf.sample b/foldingathome.subdomain.conf.sample index 5827591..f94b3b8 100644 --- a/foldingathome.subdomain.conf.sample +++ b/foldingathome.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your foldingathome container is named foldingathome # make sure that your dns has a cname set for foldingathome @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; proxy_buffering off; include /config/nginx/resolver.conf; diff --git a/forgejo.subdomain.conf.sample b/forgejo.subdomain.conf.sample index 1eebde7..659782b 100644 --- a/forgejo.subdomain.conf.sample +++ b/forgejo.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your forgejo container is named forgejo # make sure that your dns has a cname set for forgejo # edit the following parameters in /data/forgejo/conf/app.ini or set as ENV vars in your container @@ -26,6 +26,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -40,6 +43,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app forgejo; diff --git a/foundryvtt.subdomain.conf.sample b/foundryvtt.subdomain.conf.sample index daea7f9..a437bb1 100644 --- a/foundryvtt.subdomain.conf.sample +++ b/foundryvtt.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your foundryvtt container is named foundryvtt # make sure that your dns has a cname set for foundryvtt # Ensure that your Foundry VTT's {userData}/Config/options.json file is configured as follows: @@ -30,6 +30,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -44,6 +47,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app foundryvtt; diff --git a/freshrss.subdomain.conf.sample b/freshrss.subdomain.conf.sample index 85ee48d..51cae85 100644 --- a/freshrss.subdomain.conf.sample +++ b/freshrss.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your freshrss container is named freshrss # make sure that your dns has a cname set for freshrss @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app freshrss; diff --git a/frigate.subdomain.conf.sample b/frigate.subdomain.conf.sample index a3d64b4..885a5ab 100644 --- a/frigate.subdomain.conf.sample +++ b/frigate.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/01/16 +## Version 2025/06/08 # make sure that your frigate container is named frigate # make sure that your dns has a cname set for frigate # if you are on a version older than 0.14.0 set upstream_port to 5000 and upstream_proto to http @@ -22,6 +22,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -36,6 +39,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app frigate; diff --git a/gaps.subdomain.conf.sample b/gaps.subdomain.conf.sample index 8436a20..a840bcd 100644 --- a/gaps.subdomain.conf.sample +++ b/gaps.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your gaps container is named gaps # make sure that your dns has a cname set for gaps @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app gaps; diff --git a/gatus.subdomain.conf.sample b/gatus.subdomain.conf.sample index f6e4311..86470d5 100644 --- a/gatus.subdomain.conf.sample +++ b/gatus.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your gatus container is named gatus # make sure that your dns has a cname set for gatus @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app gatus; diff --git a/get_iplayer.subdomain.conf.sample b/get_iplayer.subdomain.conf.sample index 3660bdf..c65f1fa 100644 --- a/get_iplayer.subdomain.conf.sample +++ b/get_iplayer.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your get_iplayer container is named get_iplayer # make sure that your dns has a cname set for get_iplayer @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app get_iplayer; diff --git a/ghost.subdomain.conf.sample b/ghost.subdomain.conf.sample index 3f74b20..fafe78a 100644 --- a/ghost.subdomain.conf.sample +++ b/ghost.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your ghost container is named ghost # make sure that your dns has a cname set for ghost @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app ghost; diff --git a/gitea.subdomain.conf.sample b/gitea.subdomain.conf.sample index 347d79e..2f4210a 100644 --- a/gitea.subdomain.conf.sample +++ b/gitea.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/04/26 +## Version 2025/06/08 # make sure that your gitea container is named gitea # make sure that your dns has a cname set for gitea # edit the following parameters in /data/gitea/conf/app.ini @@ -26,6 +26,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -40,6 +43,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app gitea; diff --git a/glances.subdomain.conf.sample b/glances.subdomain.conf.sample index e210f74..bb421b2 100644 --- a/glances.subdomain.conf.sample +++ b/glances.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your glances container is named glances # make sure that your dns has a cname set for glances @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app glances; diff --git a/gotify.subdomain.conf.sample b/gotify.subdomain.conf.sample index 7906f8a..8ec79ad 100644 --- a/gotify.subdomain.conf.sample +++ b/gotify.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your gotify container is named gotify # make sure that your dns has a cname set for gotify @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app gotify; diff --git a/grafana.subdomain.conf.sample b/grafana.subdomain.conf.sample index af8a5a2..e81d150 100644 --- a/grafana.subdomain.conf.sample +++ b/grafana.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your grafana container is named grafana # make sure that your dns has a cname set for grafana @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app grafana; diff --git a/grampsweb.subdomain.conf.sample b/grampsweb.subdomain.conf.sample index 4be38c0..737574c 100644 --- a/grampsweb.subdomain.conf.sample +++ b/grampsweb.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your grampsweb container is named grampsweb # make sure that your dns has a cname set for grampsweb @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app grampsweb; diff --git a/grav.subdomain.conf.sample b/grav.subdomain.conf.sample index bd64b4a..5bf2962 100644 --- a/grav.subdomain.conf.sample +++ b/grav.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your grav container is named grav # make sure that your dns has a cname set for grav @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app grav; diff --git a/graylog.subdomain.conf.sample b/graylog.subdomain.conf.sample index 8999525..4efb68b 100644 --- a/graylog.subdomain.conf.sample +++ b/graylog.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your graylog container is named graylog # make sure that your dns has a cname set for graylog # Ensure the upstream_port matches your GRAYLOG_HTTP_BIND_ADDRESS port @@ -23,6 +23,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -37,6 +40,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app graylog; diff --git a/grocy.subdomain.conf.sample b/grocy.subdomain.conf.sample index 9e745a8..9b4a138 100644 --- a/grocy.subdomain.conf.sample +++ b/grocy.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your grocy container is named grocy # make sure that your dns has a cname set for grocy @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app grocy; diff --git a/guacamole.subdomain.conf.sample b/guacamole.subdomain.conf.sample index e810f65..55d7191 100644 --- a/guacamole.subdomain.conf.sample +++ b/guacamole.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your guacamole container is named guacamole # make sure that your dns has a cname set for guacamole @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app guacamole; diff --git a/hass-configurator.subdomain.conf.sample b/hass-configurator.subdomain.conf.sample index 29bf694..c5979d5 100644 --- a/hass-configurator.subdomain.conf.sample +++ b/hass-configurator.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your hass container is named hass # make sure that your dns has a cname set for hass # this proxy configuration file is for the hass-configurator-docker container that is used @@ -23,6 +23,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -37,6 +40,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app hass-configurator; diff --git a/headphones.subdomain.conf.sample b/headphones.subdomain.conf.sample index 83aeaea..947fe45 100644 --- a/headphones.subdomain.conf.sample +++ b/headphones.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your headphones container is named headphones # make sure that your dns has a cname set for headphones @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app headphones; diff --git a/healthchecks.subdomain.conf.sample b/healthchecks.subdomain.conf.sample index e124d66..a32e400 100644 --- a/healthchecks.subdomain.conf.sample +++ b/healthchecks.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your healthchecks container is named healthchecks # make sure that your dns has a cname set for healthchecks # make sure your Healthchecks ALLOWED_HOSTS and SITE_ROOT align with the server_name used in this conf. @@ -22,6 +22,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -36,6 +39,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app healthchecks; diff --git a/hedgedoc.subdomain.conf.sample b/hedgedoc.subdomain.conf.sample index 4d39236..cb946ec 100644 --- a/hedgedoc.subdomain.conf.sample +++ b/hedgedoc.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure you set the following environment variables in your docker arguments # CMD_DOMAIN=hedgedoc.server.com # CMD_URL_ADDPORT=false @@ -23,6 +23,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -37,6 +40,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app hedgedoc; diff --git a/heimdall.subdomain.conf.sample b/heimdall.subdomain.conf.sample index 5636ba5..f1142b9 100644 --- a/heimdall.subdomain.conf.sample +++ b/heimdall.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your heimdall container is named heimdall # make sure that your dns has a cname set for heimdall @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app heimdall; diff --git a/hoarder.subdomain.conf.sample b/hoarder.subdomain.conf.sample index fa056ca..6ab18b5 100644 --- a/hoarder.subdomain.conf.sample +++ b/hoarder.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your hoarder container is named hoarder # make sure that your dns has a cname set for hoarder @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app hoarder; diff --git a/homarr.subdomain.conf.sample b/homarr.subdomain.conf.sample index 2ef3a8a..6119fd4 100644 --- a/homarr.subdomain.conf.sample +++ b/homarr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your homarr container is named homarr # make sure that your dns has a cname set for homarr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app homarr; diff --git a/homeassistant.subdomain.conf.sample b/homeassistant.subdomain.conf.sample index b1483b9..bbe0b50 100644 --- a/homeassistant.subdomain.conf.sample +++ b/homeassistant.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your homeassistant container is named homeassistant # make sure that your dns has a cname set for homeassistant @@ -30,6 +30,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -44,6 +47,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app homeassistant; diff --git a/homebox.subdomain.conf.sample b/homebox.subdomain.conf.sample index d4137d5..38ef9be 100644 --- a/homebox.subdomain.conf.sample +++ b/homebox.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your homebox container is named homebox # make sure that your dns has a cname set for homebox @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app homebox; diff --git a/homebridge.subdomain.conf.sample b/homebridge.subdomain.conf.sample index 8cceeb3..8a140ee 100644 --- a/homebridge.subdomain.conf.sample +++ b/homebridge.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your homebridge container is named homebridge # make sure that your dns has a cname set for homebridge @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app homebridge; # change to host IP if using host networking mode diff --git a/homepage.subdomain.conf.sample b/homepage.subdomain.conf.sample index 6e9238b..23c5a22 100644 --- a/homepage.subdomain.conf.sample +++ b/homepage.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your homepage container is named homepage # make sure that your dns has a cname set for homepage @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app homepage; diff --git a/homer.subdomain.conf.sample b/homer.subdomain.conf.sample index 2a72193..25d386c 100644 --- a/homer.subdomain.conf.sample +++ b/homer.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your homer container is named homer # make sure that your dns has a cname set for homer @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app homer; diff --git a/huginn.subdomain.conf.sample b/huginn.subdomain.conf.sample index 8d93257..1c2c599 100644 --- a/huginn.subdomain.conf.sample +++ b/huginn.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your huginn container is named huginn # make sure that your dns has a cname set for huginn @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app huginn; diff --git a/immich.subdomain.conf.sample b/immich.subdomain.conf.sample index 2d9e2d4..3a0fa95 100644 --- a/immich.subdomain.conf.sample +++ b/immich.subdomain.conf.sample @@ -1,7 +1,7 @@ -## Version 2024/10/15 +## Version 2025/06/08 # make sure that your immich container is named immich # make sure that your dns has a cname set for immich -# immich v1.118+ only. For earlier versions, change $upstream_port to 3001 +# immich v1.118+ only. For earlier versions, change $upstream_port to 3001 server { listen 443 ssl; @@ -22,6 +22,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -36,6 +39,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app immich; diff --git a/immich_server.subdomain.conf.sample b/immich_server.subdomain.conf.sample index f22d233..19c201a 100644 --- a/immich_server.subdomain.conf.sample +++ b/immich_server.subdomain.conf.sample @@ -1,7 +1,7 @@ -## Version 2025/01/30 +## Version 2025/06/08 # make sure that your immich container is named immich_server # make sure that your dns has a cname set for immich -# immich v1.118+ only. For earlier versions, change $upstream_port to 3001 +# immich v1.118+ only. For earlier versions, change $upstream_port to 3001 server { listen 443 ssl; @@ -22,6 +22,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -36,6 +39,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app immich_server; diff --git a/influxdb.subdomain.conf.sample b/influxdb.subdomain.conf.sample index 8b93481..8b56edd 100644 --- a/influxdb.subdomain.conf.sample +++ b/influxdb.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your influxdb container is named influxdb # make sure that your dns has a cname set for influxdb @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app influxdb; diff --git a/iplayarr.subdomain.conf.sample b/iplayarr.subdomain.conf.sample index fa0886d..8b1be49 100644 --- a/iplayarr.subdomain.conf.sample +++ b/iplayarr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/04/15 +## Version 2025/06/08 # make sure that your iplayarr container is named iplayarr # make sure that your dns has a cname set for iplayarr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app iplayarr; diff --git a/it-tools.subdomain.conf.sample b/it-tools.subdomain.conf.sample index b9d4289..28104d4 100644 --- a/it-tools.subdomain.conf.sample +++ b/it-tools.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your it-tools container is named it-tools # make sure that your dns has a cname set for it-tools @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app it-tools; diff --git a/jackett.subdomain.conf.sample b/jackett.subdomain.conf.sample index 9903101..d959b90 100644 --- a/jackett.subdomain.conf.sample +++ b/jackett.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your jackett container is named jackett # make sure that your dns has a cname set for jackett @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app jackett; diff --git a/jdownloader.subdomain.conf.sample b/jdownloader.subdomain.conf.sample index e849e3a..4d510cf 100644 --- a/jdownloader.subdomain.conf.sample +++ b/jdownloader.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your jdownloader container is named jdownloader # make sure that your dns has a cname set for jdownloader @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app jdownloader; diff --git a/jellyfin.subdomain.conf.sample b/jellyfin.subdomain.conf.sample index d8291a2..c749234 100644 --- a/jellyfin.subdomain.conf.sample +++ b/jellyfin.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/05/18 +## Version 2025/06/08 # make sure that your jellyfin container is named jellyfin # make sure that your dns has a cname set for jellyfin # if jellyfin is running in bridge mode and the container is named "jellyfin", the below config should work as is diff --git a/jellyseerr.subdomain.conf.sample b/jellyseerr.subdomain.conf.sample index dc3947c..3a8ede1 100644 --- a/jellyseerr.subdomain.conf.sample +++ b/jellyseerr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your jellyseerr container is named jellyseerr # make sure that your dns has a cname set for jellyseerr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app jellyseerr; diff --git a/jfa-go.subdomain.conf.sample b/jfa-go.subdomain.conf.sample index 99105f0..1c93eda 100644 --- a/jfa-go.subdomain.conf.sample +++ b/jfa-go.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your jfa-go container is named jfa-go # make sure that your dns has a cname set for jfa-go @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app jfa-go; diff --git a/joplin.subdomain.conf.sample b/joplin.subdomain.conf.sample index 1334c4d..858a186 100644 --- a/joplin.subdomain.conf.sample +++ b/joplin.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/06/04 +## Version 2025/06/08 # make sure that your joplin container is named joplin # make sure that your dns has a cname set for joplin @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app joplin; diff --git a/kanzi.subdomain.conf.sample b/kanzi.subdomain.conf.sample index 81ed6d1..c755d1b 100644 --- a/kanzi.subdomain.conf.sample +++ b/kanzi.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your kanzi container is named kanzi # make sure that your dns has a cname set for kanzi @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app kanzi; diff --git a/kasm.subdomain.conf.sample b/kasm.subdomain.conf.sample index 1568f0a..f78d3de 100644 --- a/kasm.subdomain.conf.sample +++ b/kasm.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your kasm container is named kasm # make sure that your dns has a cname set for kasm and kasm-wizard @@ -25,6 +25,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -39,6 +42,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app kasm; @@ -72,6 +78,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -86,6 +95,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app kasm; diff --git a/kavita.subdomain.conf.sample b/kavita.subdomain.conf.sample index 5372c68..8c2e8e0 100644 --- a/kavita.subdomain.conf.sample +++ b/kavita.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your kavita container is named kavita # make sure that your dns has a cname set for kavita @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app kavita; diff --git a/kimai.subdomain.conf.sample b/kimai.subdomain.conf.sample index 9f7cb5f..f95e26a 100644 --- a/kimai.subdomain.conf.sample +++ b/kimai.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your kimai container is named kimai # make sure that your dns has a cname set for kimai @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app kimai; diff --git a/komga.subdomain.conf.sample b/komga.subdomain.conf.sample index c961f02..4ae38a9 100644 --- a/komga.subdomain.conf.sample +++ b/komga.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your komga container is named komga # make sure that your dns has a cname set for komga @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app komga; diff --git a/kopia.subdomain.conf.sample b/kopia.subdomain.conf.sample index 9c64bc3..47b250b 100644 --- a/kopia.subdomain.conf.sample +++ b/kopia.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your kopia container is named kopia # make sure that your dns has a cname set for kopia @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app kopia; diff --git a/lazylibrarian.subdomain.conf.sample b/lazylibrarian.subdomain.conf.sample index ca3a5c3..8926ec3 100644 --- a/lazylibrarian.subdomain.conf.sample +++ b/lazylibrarian.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your lazylibrarian container is named lazylibrarian # make sure that your dns has a cname set for lazylibrarian @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app lazylibrarian; diff --git a/leantime.subdomain.conf.sample b/leantime.subdomain.conf.sample index b7b4740..93a7ff5 100644 --- a/leantime.subdomain.conf.sample +++ b/leantime.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your leantime container is named leantime # make sure that your dns has a cname set for leantime @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app leantime; diff --git a/libreddit.subdomain.conf.sample b/libreddit.subdomain.conf.sample index b3882d5..6971d6b 100644 --- a/libreddit.subdomain.conf.sample +++ b/libreddit.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your libreddit container is named libreddit # make sure that your dns has a cname set for libreddit @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app libreddit; diff --git a/librespeed.subdomain.conf.sample b/librespeed.subdomain.conf.sample index 2b943fe..6ff3199 100644 --- a/librespeed.subdomain.conf.sample +++ b/librespeed.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your librespeed container is named librespeed # make sure that your dns has a cname set for librespeed @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app librespeed; diff --git a/lidarr.subdomain.conf.sample b/lidarr.subdomain.conf.sample index b87734b..7089c52 100644 --- a/lidarr.subdomain.conf.sample +++ b/lidarr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your lidarr container is named lidarr # make sure that your dns has a cname set for lidarr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app lidarr; diff --git a/linkace.subdomain.conf.sample b/linkace.subdomain.conf.sample index fc8d1f7..483c44f 100644 --- a/linkace.subdomain.conf.sample +++ b/linkace.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your linkace container is named linkace # make sure that your dns has a cname set for linkace # use linkace:simple package with included proxy @@ -22,6 +22,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -36,6 +39,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app linkace; diff --git a/linkstack.subdomain.conf.sample b/linkstack.subdomain.conf.sample index 3f66f7f..c8ea10e 100644 --- a/linkstack.subdomain.conf.sample +++ b/linkstack.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your dns has a cname set for linkstack and that your linkstack container is not using a base url server { @@ -20,6 +20,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -34,6 +37,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app linkstack; diff --git a/linkwarden.subdomain.conf.sample b/linkwarden.subdomain.conf.sample index 7263f65..c8c4b16 100644 --- a/linkwarden.subdomain.conf.sample +++ b/linkwarden.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your linkwarden container is named linkwarden # make sure that your dns has a cname set for linkwarden @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app linkwarden; diff --git a/lldap.subdomain.conf.sample b/lldap.subdomain.conf.sample index 37acd1b..5656148 100644 --- a/lldap.subdomain.conf.sample +++ b/lldap.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your lldap container is named lldap # make sure that your dns has a cname set for lldap @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app lldap; diff --git a/lubelogger.subdomain.conf.sample b/lubelogger.subdomain.conf.sample index ec0c66b..2f738a1 100644 --- a/lubelogger.subdomain.conf.sample +++ b/lubelogger.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/08/18 +## Version 2025/06/08 # make sure that your lubelogger container is named lubelogger # make sure that your dns has a cname set for lubelogger @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app lubelogger; diff --git a/lychee.subdomain.conf.sample b/lychee.subdomain.conf.sample index 5cebf11..f635e4c 100644 --- a/lychee.subdomain.conf.sample +++ b/lychee.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your lychee container is named lychee # make sure that your dns has a cname set for lychee @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app lychee; diff --git a/mailu.subdomain.conf.sample b/mailu.subdomain.conf.sample index a15e1b7..71dfe23 100644 --- a/mailu.subdomain.conf.sample +++ b/mailu.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your mailu container is named front # make sure that your dns has a cname set for mailu @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app front; diff --git a/maintainerr.subdomain.conf.sample b/maintainerr.subdomain.conf.sample index ef55649..6977965 100644 --- a/maintainerr.subdomain.conf.sample +++ b/maintainerr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/10/27 +## Version 2025/06/08 # make sure that your maintainerr container is named maintainerr # make sure that your dns has a cname set for maintainerr # maintainerr v2.0.0+ only. for prior versions, set upstream_port to 80 @@ -22,6 +22,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -36,6 +39,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app maintainerr; diff --git a/mastodon.subdomain.conf.sample b/mastodon.subdomain.conf.sample index 5414d76..ebe1fdf 100644 --- a/mastodon.subdomain.conf.sample +++ b/mastodon.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your mastodon container is named mastodon # make sure that your dns has a cname set for mastodon # make sure you set `WEB_DOMAIN=mastodon.example.com` env var for the mastodon container @@ -25,6 +25,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -39,6 +42,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app mastodon; diff --git a/matomo.subdomain.conf.sample b/matomo.subdomain.conf.sample index ddf83d6..93b9f9a 100644 --- a/matomo.subdomain.conf.sample +++ b/matomo.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your matomo container is named matomo # make sure that your dns has a cname set for matomo @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app matomo; diff --git a/mattermost.subdomain.conf.sample b/mattermost.subdomain.conf.sample index fdd9a9f..8520315 100644 --- a/mattermost.subdomain.conf.sample +++ b/mattermost.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # Make sure that your DNS has a CNAME record for "mattermost" and your Mattermost container is using the same subdomain # To learn how to deploy Mattermost via Docker, visit https://docs.mattermost.com/install/install-docker.html @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app mattermost; diff --git a/mealie.subdomain.conf.sample b/mealie.subdomain.conf.sample index 0192241..8a3e079 100644 --- a/mealie.subdomain.conf.sample +++ b/mealie.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # Ensure your DNS has a CNAME set for mealie and that mealie container is named. server { @@ -20,6 +20,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -34,6 +37,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app mealie; diff --git a/medusa.subdomain.conf.sample b/medusa.subdomain.conf.sample index 6e191c9..093229d 100644 --- a/medusa.subdomain.conf.sample +++ b/medusa.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your medusa container is named medusa # make sure that your dns has a cname set for medusa @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app medusa; diff --git a/metabase.subdomain.conf.sample b/metabase.subdomain.conf.sample index 5aeba70..356d4f5 100644 --- a/metabase.subdomain.conf.sample +++ b/metabase.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/02/04 +## Version 2025/06/08 # make sure that your metabase container is named metabase # make sure that your dns has a cname set for metabase @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app metabase; diff --git a/metube.subdomain.conf.sample b/metube.subdomain.conf.sample index 4ee638b..9d7d772 100644 --- a/metube.subdomain.conf.sample +++ b/metube.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your metube container is named metube # make sure that your dns has a cname set for metube @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app metube; diff --git a/miniflux.subdomain.conf.sample b/miniflux.subdomain.conf.sample index 240061c..a4cc8bc 100644 --- a/miniflux.subdomain.conf.sample +++ b/miniflux.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your miniflux container is named miniflux # make sure that your dns has a cname set for miniflux @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app miniflux; diff --git a/monica.subdomain.conf.sample b/monica.subdomain.conf.sample index c90e055..23e0156 100644 --- a/monica.subdomain.conf.sample +++ b/monica.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your monica container is named monica. # make sure that your dns has a cname set for monica. # monica container should have the env var APP_ENV=production set. @@ -24,6 +24,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -38,6 +41,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app monica; diff --git a/monitorr.subdomain.conf.sample b/monitorr.subdomain.conf.sample index 5515ab3..28fd20e 100644 --- a/monitorr.subdomain.conf.sample +++ b/monitorr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your monitorr container is named monitorr # make sure that your dns has a cname set for monitorr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app monitorr; diff --git a/mstream.subdomain.conf.sample b/mstream.subdomain.conf.sample index 3dd06bd..4c97990 100644 --- a/mstream.subdomain.conf.sample +++ b/mstream.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your mstream container is named mstream # make sure that your dns has a cname set for mstream @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app mstream; diff --git a/mylar.subdomain.conf.sample b/mylar.subdomain.conf.sample index ea771db..8d3c7a5 100644 --- a/mylar.subdomain.conf.sample +++ b/mylar.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your mylar container is named mylar # make sure that your dns has a cname set for mylar @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app mylar; diff --git a/n8n.subdomain.conf.sample b/n8n.subdomain.conf.sample index d5af543..57ef9ff 100644 --- a/n8n.subdomain.conf.sample +++ b/n8n.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your n8n container is named n8n # make sure that your dns has a cname set for n8n # add `server.use-forward-headers=true` to `/config/application.properties` to ensure logs contain real source IP @@ -22,6 +22,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -36,6 +39,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app n8n; diff --git a/navidrome.subdomain.conf.sample b/navidrome.subdomain.conf.sample index 21fa309..2165117 100644 --- a/navidrome.subdomain.conf.sample +++ b/navidrome.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your navidrome container is named navidrome # make sure that your dns has a cname set for navidrome @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app navidrome; diff --git a/netboot.subdomain.conf.sample b/netboot.subdomain.conf.sample index 2882979..3a6ff5f 100644 --- a/netboot.subdomain.conf.sample +++ b/netboot.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your netboot container is named netboot # make sure that your dns has a cname set for netboot @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app netboot; diff --git a/netbox.subdomain.conf.sample b/netbox.subdomain.conf.sample index 392a295..5457817 100644 --- a/netbox.subdomain.conf.sample +++ b/netbox.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your container is named netbox # make sure that your dns has a cname set for netbox # make sure your netbox instance is using ALLOWED_HOST=netbox.domain.com (replace with your own domain) @@ -23,6 +23,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -37,6 +40,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app netbox; diff --git a/netdata.subdomain.conf.sample b/netdata.subdomain.conf.sample index 0431358..9e43867 100644 --- a/netdata.subdomain.conf.sample +++ b/netdata.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your netdata container is named netdata # make sure that your dns has a cname set for netdata @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app netdata; diff --git a/nextcloud.subdomain.conf.sample b/nextcloud.subdomain.conf.sample index 903d725..d43300a 100644 --- a/nextcloud.subdomain.conf.sample +++ b/nextcloud.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your nextcloud container is named nextcloud # make sure that your dns has a cname set for nextcloud # assuming this container is called "swag", edit your nextcloud container's config diff --git a/nexusoss.subdomain.conf.sample b/nexusoss.subdomain.conf.sample index 1df0ac5..d171948 100644 --- a/nexusoss.subdomain.conf.sample +++ b/nexusoss.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your nexusoss container is named nexusoss # make sure that your dns has a cname set for nexusoss # make sure that the port for the nexusoss container 8081 (the first location "/") @@ -23,6 +23,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -37,6 +40,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app nexusoss; @@ -59,6 +65,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app nexusoss; diff --git a/nocodb.subdomain.conf.sample b/nocodb.subdomain.conf.sample index b8d804f..c9a9060 100644 --- a/nocodb.subdomain.conf.sample +++ b/nocodb.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your nocodb container is named nocodb # make sure that your dns has a cname set for nocodb @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app nocodb; diff --git a/notifiarr.subdomain.conf.sample b/notifiarr.subdomain.conf.sample index 3560f5b..28526fd 100644 --- a/notifiarr.subdomain.conf.sample +++ b/notifiarr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your notifiarr container is named notifiarr # make sure that your dns has a cname set for notifiarr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -37,6 +40,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app notifiarr; diff --git a/ntfy.subdomain.conf.sample b/ntfy.subdomain.conf.sample index 5062ee2..c009399 100644 --- a/ntfy.subdomain.conf.sample +++ b/ntfy.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your ntfy container is named ntfy # make sure that your dns has a cname set for ntfy @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app ntfy; diff --git a/nzbget.subdomain.conf.sample b/nzbget.subdomain.conf.sample index dd4c489..4a20345 100644 --- a/nzbget.subdomain.conf.sample +++ b/nzbget.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your nzbget container is named nzbget # make sure that your dns has a cname set for nzbget @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app nzbget; diff --git a/nzbhydra.subdomain.conf.sample b/nzbhydra.subdomain.conf.sample index 1e3fd03..1ff798d 100644 --- a/nzbhydra.subdomain.conf.sample +++ b/nzbhydra.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your nzbhydra container is named nzbhydra2 # make sure that your dns has a cname set for nzbhydra @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app nzbhydra2; diff --git a/octoprint.subdomain.conf.sample b/octoprint.subdomain.conf.sample index 1b84429..8af4d9d 100644 --- a/octoprint.subdomain.conf.sample +++ b/octoprint.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your octoprint container is named octoprint # make sure that your dns has a cname set for octoprint @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app octoprint; diff --git a/ombi.subdomain.conf.sample b/ombi.subdomain.conf.sample index 26f5fcf..a136fdf 100644 --- a/ombi.subdomain.conf.sample +++ b/ombi.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your ombi container is named ombi # make sure that your dns has a cname set for ombi @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app ombi; diff --git a/onetimesecret.subdomain.conf.sample b/onetimesecret.subdomain.conf.sample index 4559d1c..51489e9 100644 --- a/onetimesecret.subdomain.conf.sample +++ b/onetimesecret.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/01/07 +## Version 2025/06/08 # make sure that your onetimesecret container is named onetimesecret # make sure that your dns has a cname set for onetimesecret @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app onetimesecret; diff --git a/oogway.subdomain.conf.sample b/oogway.subdomain.conf.sample index 2c02ad6..b638cc9 100644 --- a/oogway.subdomain.conf.sample +++ b/oogway.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your oogway container is named oogway # make sure that your dns has a cname set for oogway @@ -22,6 +22,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -36,6 +39,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app oogway; diff --git a/open-webui.subdomain.conf.sample b/open-webui.subdomain.conf.sample index ecc31c7..4d69602 100644 --- a/open-webui.subdomain.conf.sample +++ b/open-webui.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your open-webui container is named open-webui # make sure that your dns has a cname set for open-webui @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app open-webui; diff --git a/openhab.subdomain.conf.sample b/openhab.subdomain.conf.sample index 4c263f1..2303b5b 100644 --- a/openhab.subdomain.conf.sample +++ b/openhab.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your openhab container is named openhab # make sure that your dns has a cname set for openhab @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app openhab; diff --git a/openvpn-as.subdomain.conf.sample b/openvpn-as.subdomain.conf.sample index 93d9504..8354502 100644 --- a/openvpn-as.subdomain.conf.sample +++ b/openvpn-as.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your openvpn-as container is named openvpn-as # make sure that your dns has a cname set for openvpn-as @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app openvpn-as; @@ -58,6 +64,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app openvpn-as; diff --git a/openvscode-server.subdomain.conf.sample b/openvscode-server.subdomain.conf.sample index d5bfc54..fe3d82c 100644 --- a/openvscode-server.subdomain.conf.sample +++ b/openvscode-server.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your openvscode-server container is named openvscode-server # make sure that your dns has a cname set for openvscode-server # This conf allows accessing internal ports at `PORT` (http) or `PORTs` (https) as subdomain @@ -24,6 +24,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -38,6 +41,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app openvscode-server; @@ -67,6 +73,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -81,6 +90,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app openvscode-server; @@ -109,6 +121,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -123,6 +138,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app openvscode-server; diff --git a/organizr.subdomain.conf.sample b/organizr.subdomain.conf.sample index 9a482d3..ea4095d 100644 --- a/organizr.subdomain.conf.sample +++ b/organizr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your organizr container is named organizr # make sure that your dns has a cname set for organizr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app organizr; diff --git a/osticket.subdomain.conf.sample b/osticket.subdomain.conf.sample index 866834f..ac1b51b 100644 --- a/osticket.subdomain.conf.sample +++ b/osticket.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your osticket container is named osticket # make sure that your dns has a cname set for osticket @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app osticket; diff --git a/overseerr.subdomain.conf.sample b/overseerr.subdomain.conf.sample index e21643c..ea2eb16 100644 --- a/overseerr.subdomain.conf.sample +++ b/overseerr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your overseerr container is named overseerr # make sure that your dns has a cname set for overseerr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app overseerr; diff --git a/paperless.subdomain.conf.sample b/paperless.subdomain.conf.sample index c4f070d..55a9491 100644 --- a/paperless.subdomain.conf.sample +++ b/paperless.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your paperless container is named paperless # make sure that your dns has a cname set for paperless @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app paperless; diff --git a/papermerge.subdomain.conf.sample b/papermerge.subdomain.conf.sample index a1573e7..37c1a03 100644 --- a/papermerge.subdomain.conf.sample +++ b/papermerge.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your papermerge container is named papermerge # make sure that your dns has a cname set for papermerge @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app papermerge; diff --git a/partdb.subdomain.conf.sample b/partdb.subdomain.conf.sample index 1c329d2..bcd6b30 100644 --- a/partdb.subdomain.conf.sample +++ b/partdb.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your partdb container is named partdb # make sure that your dns has a cname set for partdb @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app partdb; diff --git a/petio.subdomain.conf.sample b/petio.subdomain.conf.sample index 3368d9c..e38cc0f 100644 --- a/petio.subdomain.conf.sample +++ b/petio.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your petio container is named petio # make sure that your dns has a cname set for petio @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app petio; diff --git a/pgadmin.subdomain.conf.sample b/pgadmin.subdomain.conf.sample index c66729f..b7c3804 100644 --- a/pgadmin.subdomain.conf.sample +++ b/pgadmin.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your pgadmin container is named pgadmin # make sure that your dns has a cname set for pgadmin @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app pgadmin; diff --git a/phoneinfoga.subdomain.conf.sample b/phoneinfoga.subdomain.conf.sample index 224c0c5..ed96acb 100644 --- a/phoneinfoga.subdomain.conf.sample +++ b/phoneinfoga.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your phoneinfoga container is named phoneinfoga # make sure that your dns has a cname set for phoneinfoga # add command: 'serve' to your docker compose, so the PhoneInfoga web server starts @@ -22,6 +22,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -36,6 +39,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app phoneinfoga; diff --git a/photoprism.subdomain.conf.sample b/photoprism.subdomain.conf.sample index 48a445a..5abdf96 100644 --- a/photoprism.subdomain.conf.sample +++ b/photoprism.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # Ensure your DNS has a CNAME set for Photoprism and that Photoprism container is named. server { @@ -20,6 +20,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -34,6 +37,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app photoprism; diff --git a/phpmyadmin.subdomain.conf.sample b/phpmyadmin.subdomain.conf.sample index 7fa88c0..8163ec1 100644 --- a/phpmyadmin.subdomain.conf.sample +++ b/phpmyadmin.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your phpmyadmin container is named phpmyadmin # make sure that your dns has a cname set for phpmyadmin @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app phpmyadmin; diff --git a/pihole.subdomain.conf.sample b/pihole.subdomain.conf.sample index d2917c5..6773311 100644 --- a/pihole.subdomain.conf.sample +++ b/pihole.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your pihole container is named pihole # make sure that your dns has a cname set for pihole @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app pihole; @@ -59,6 +65,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app pihole; diff --git a/pingvin-share.subdomain.conf.sample b/pingvin-share.subdomain.conf.sample index 4eee432..cc014bf 100644 --- a/pingvin-share.subdomain.conf.sample +++ b/pingvin-share.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/01/15 +## Version 2025/06/08 # make sure that your pingvin-share container is named pingvin-share # make sure that your dns has a cname set for pingvin-share @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app pingvin-share; @@ -51,6 +57,6 @@ server { set $upstream_port 3000; set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; - + } -} \ No newline at end of file +} diff --git a/pinry.subdomain.conf.sample b/pinry.subdomain.conf.sample index bdc9ebc..435d410 100644 --- a/pinry.subdomain.conf.sample +++ b/pinry.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your pinry container is named pinry # make sure that your dns has a cname set for pinry @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app pinry; diff --git a/piwigo.subdomain.conf.sample b/piwigo.subdomain.conf.sample index ceb648d..beac248 100644 --- a/piwigo.subdomain.conf.sample +++ b/piwigo.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your piwigo container is named piwigo # make sure that your dns has a cname set for piwigo @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app piwigo; diff --git a/pixelfed.subdomain.conf.sample b/pixelfed.subdomain.conf.sample index d280b50..53d859d 100644 --- a/pixelfed.subdomain.conf.sample +++ b/pixelfed.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your pixelfed container is named pixelfed # make sure that your dns has a cname set for pixelfed @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app pixelfed; diff --git a/planka.subdomain.conf.sample b/planka.subdomain.conf.sample index a0c4366..5ddbd0e 100644 --- a/planka.subdomain.conf.sample +++ b/planka.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your planka container is named planka # make sure that your dns has a cname set for planka # make sure that the BASE_URL env variable in planka container is set to: BASE_URL="https://planka.example.com" @@ -22,6 +22,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -36,6 +39,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app planka; diff --git a/plex.subdomain.conf.sample b/plex.subdomain.conf.sample index 8ea6dae..f2992f2 100644 --- a/plex.subdomain.conf.sample +++ b/plex.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/05/23 +## Version 2025/06/08 # make sure that your plex container is named plex # make sure that your dns has a cname set for plex # if plex is running in bridge mode and the container is named "plex", the below config should work as is @@ -27,6 +27,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -41,6 +44,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app plex; diff --git a/plexwebtools.subdomain.conf.sample b/plexwebtools.subdomain.conf.sample index 96a2963..f96bb77 100644 --- a/plexwebtools.subdomain.conf.sample +++ b/plexwebtools.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your plex container is named plex # make sure that your dns has a cname set for plexwebtools @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app plex; diff --git a/podgrab.subdomain.conf.sample b/podgrab.subdomain.conf.sample index 686dc82..451909d 100644 --- a/podgrab.subdomain.conf.sample +++ b/podgrab.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your podgrab container is named podgrab # make sure that your dns has a cname set for podgrab @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app podgrab; diff --git a/portainer.subdomain.conf.sample b/portainer.subdomain.conf.sample index a51df6e..d1f91a7 100644 --- a/portainer.subdomain.conf.sample +++ b/portainer.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your portainer container is named portainer # make sure that your dns has a cname set for portainer @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app portainer; diff --git a/privatebin.subdomain.conf.sample b/privatebin.subdomain.conf.sample index 8f8d4df..6d7d45a 100644 --- a/privatebin.subdomain.conf.sample +++ b/privatebin.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your privatebin container is named privatebin # make sure that your dns has a cname set for privatebin @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app privatebin; diff --git a/prometheus.subdomain.conf.sample b/prometheus.subdomain.conf.sample index fe5d77b..9da3104 100644 --- a/prometheus.subdomain.conf.sample +++ b/prometheus.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your prometheus container is named prometheus # make sure that your dns has a cname set for prometheus @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app prometheus; diff --git a/prowlarr.subdomain.conf.sample b/prowlarr.subdomain.conf.sample index dc526cc..f7cd259 100644 --- a/prowlarr.subdomain.conf.sample +++ b/prowlarr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your prowlarr container is named prowlarr # make sure that your dns has a cname set for prowlarr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app prowlarr; diff --git a/pterodactyl.subdomain.conf.sample b/pterodactyl.subdomain.conf.sample index 914fa21..a1ef1ad 100644 --- a/pterodactyl.subdomain.conf.sample +++ b/pterodactyl.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # this is for your actual panel, not nodes # make sure you set your pterodactyl servers "remote" and "api" addresses to the domains you specify here # ensure you have enabled "ssl encryption" and (if necessary) "behind proxy" in your pterodactyl server @@ -24,6 +24,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -37,6 +40,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app pterodactyl; diff --git a/pterodactylnode.subdomain.conf.sample b/pterodactylnode.subdomain.conf.sample index d47f26b..ebc2912 100644 --- a/pterodactylnode.subdomain.conf.sample +++ b/pterodactylnode.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # this is for nodes, not your actual panel # make sure you set your node to use 443 as its API port # make sure that your pterodactylnode container is named pterodactylnode @@ -23,6 +23,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth @@ -38,6 +41,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app pterodactylnode; diff --git a/pwndrop.subdomain.conf.sample b/pwndrop.subdomain.conf.sample index c33b1a6..dfa33ee 100644 --- a/pwndrop.subdomain.conf.sample +++ b/pwndrop.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your pwndrop container is named pwndrop # make sure that your dns has a cname set for pwndrop @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app pwndrop; diff --git a/pydio-cells.subdomain.conf.sample b/pydio-cells.subdomain.conf.sample index fba6c05..1b3b913 100644 --- a/pydio-cells.subdomain.conf.sample +++ b/pydio-cells.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your pydio-cells container is named pydio-cells # make sure that your dns has a cname set for pydio-cells @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app pydio-cells; @@ -61,6 +67,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app pydio-cells; diff --git a/pydio.subdomain.conf.sample b/pydio.subdomain.conf.sample index 2b8cc3e..bf21d59 100644 --- a/pydio.subdomain.conf.sample +++ b/pydio.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your pydio container is named pydio # make sure that your dns has a cname set for pydio @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app pydio; diff --git a/pyload.subdomain.conf.sample b/pyload.subdomain.conf.sample index f1bf84f..9f06623 100644 --- a/pyload.subdomain.conf.sample +++ b/pyload.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your pyload container is named pyload # make sure that your dns has a cname set for pyload @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app pyload; diff --git a/qbittorrent.subdomain.conf.sample b/qbittorrent.subdomain.conf.sample index eb9da24..84eb1ae 100644 --- a/qbittorrent.subdomain.conf.sample +++ b/qbittorrent.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your qbittorrent container is named qbittorrent # make sure that your dns has a cname set for qbittorrent # Api and related location bypasses are now commented out by default @@ -29,6 +29,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -43,6 +46,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app qbittorrent; diff --git a/quassel-web.subdomain.conf.sample b/quassel-web.subdomain.conf.sample index 13bf051..9bf0506 100644 --- a/quassel-web.subdomain.conf.sample +++ b/quassel-web.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your quassel container is named quassel-web # make sure that your dns has a cname set for quassel # make sure Quassel-Web is running on http with -e 'HTTPS'='false' or if you're using -e 'ADVANCED'='true' by editing config.json appropriately @@ -22,6 +22,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -36,6 +39,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app quassel-web; diff --git a/radarr.subdomain.conf.sample b/radarr.subdomain.conf.sample index 03a084d..4d5c46d 100644 --- a/radarr.subdomain.conf.sample +++ b/radarr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your radarr container is named radarr # make sure that your dns has a cname set for radarr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app radarr; diff --git a/rallly.subdomain.conf.sample b/rallly.subdomain.conf.sample index 55c98f5..f877dc2 100644 --- a/rallly.subdomain.conf.sample +++ b/rallly.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your rallly container is named rallly # make sure that your dns has a cname set for rallly @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app rallly; diff --git a/raneto.subdomain.conf.sample b/raneto.subdomain.conf.sample index 483db39..e0eb3d1 100644 --- a/raneto.subdomain.conf.sample +++ b/raneto.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your raneto container is named raneto # make sure that your dns has a cname set for raneto @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app raneto; diff --git a/readarr.subdomain.conf.sample b/readarr.subdomain.conf.sample index a2bc3de..1bc3123 100644 --- a/readarr.subdomain.conf.sample +++ b/readarr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your readarr container is named readarr # make sure that your dns has a cname set for readarr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app readarr; diff --git a/recipes.subdomain.conf.sample b/recipes.subdomain.conf.sample index 4789c76..515a74c 100644 --- a/recipes.subdomain.conf.sample +++ b/recipes.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your recipes container is named recipes # make sure that your dns has a cname set for recipes # make sure to mount /media/ in your swag container to point to your Recipes Media directory @@ -22,6 +22,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + # serve media files location /media/ { alias /media/; @@ -41,6 +44,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app recipes; diff --git a/requestrr.subdomain.conf.sample b/requestrr.subdomain.conf.sample index 629f901..86d2391 100644 --- a/requestrr.subdomain.conf.sample +++ b/requestrr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your requestrr container is named requestrr # make sure that your dns has a cname set for requestrr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app requestrr; diff --git a/resilio-sync.subdomain.conf.sample b/resilio-sync.subdomain.conf.sample index fb63304..5cd20fd 100644 --- a/resilio-sync.subdomain.conf.sample +++ b/resilio-sync.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your resilio-sync container is named resilio-sync # make sure that your dns has a cname set for resilio-sync @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app resilio-sync; diff --git a/romm.subdomain.conf.sample b/romm.subdomain.conf.sample index 07c34d4..46e1c34 100644 --- a/romm.subdomain.conf.sample +++ b/romm.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/10/26 +## Version 2025/06/08 # make sure that your romM container is named romm # make sure that your dns has a cname set for romm @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app romm; @@ -43,4 +49,4 @@ server { proxy_pass $upstream_proto://$upstream_app:$upstream_port; } -} \ No newline at end of file +} diff --git a/rutorrent.subdomain.conf.sample b/rutorrent.subdomain.conf.sample index 7029526..75471bf 100644 --- a/rutorrent.subdomain.conf.sample +++ b/rutorrent.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your rutorrent container is named rutorrent # make sure that your dns has a cname set for rutorrent @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app rutorrent; @@ -58,6 +64,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + # block rpc access by default because it is unprotected # you can comment out the next line to enable remote rpc calls deny all; diff --git a/sabnzbd.subdomain.conf.sample b/sabnzbd.subdomain.conf.sample index 9bc9842..ad820fa 100644 --- a/sabnzbd.subdomain.conf.sample +++ b/sabnzbd.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your sabnzbd container is named sabnzbd # make sure that your dns has a cname set for sabnzbd # edit the sabnzbd.ini host_whitelist to avoid hostname verification issues. This format: @@ -23,6 +23,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -37,6 +40,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app sabnzbd; diff --git a/saltrim.subdomain.conf.sample b/saltrim.subdomain.conf.sample index ac1b127..de4aa5e 100644 --- a/saltrim.subdomain.conf.sample +++ b/saltrim.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your saltrim webserver container is named bar_assistant-webserver-1 or manually change to match the upstream_app below # make sure that your dns has a cname set for saltrim @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app bar_assistant-webserver-1; diff --git a/scrutiny.subdomain.conf.sample b/scrutiny.subdomain.conf.sample index 7376ad8..a3a409b 100644 --- a/scrutiny.subdomain.conf.sample +++ b/scrutiny.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your scrutiny container is named scrutiny # make sure that your dns has a cname set for scrutiny @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app scrutiny; diff --git a/semaphore.subdomain.conf.sample b/semaphore.subdomain.conf.sample index 137042f..3a99fc7 100644 --- a/semaphore.subdomain.conf.sample +++ b/semaphore.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your semaphore container is named semaphore # make sure that your dns has a cname set for semaphore @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app semaphore; diff --git a/shinobi.subdomain.conf.sample b/shinobi.subdomain.conf.sample index 6c7f3c3..492cb52 100644 --- a/shinobi.subdomain.conf.sample +++ b/shinobi.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your shinobi container is named shinobi # make sure that your dns has a cname set for shinobi @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app shinobi; diff --git a/shlink.subdomain.conf.sample b/shlink.subdomain.conf.sample index 94b991c..bbd1395 100644 --- a/shlink.subdomain.conf.sample +++ b/shlink.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your shlink container is named shlink # make sure that your dns has a cname set for shlink @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app shlink; diff --git a/sickchill.subdomain.conf.sample b/sickchill.subdomain.conf.sample index 0bb5adc..f3df9b5 100644 --- a/sickchill.subdomain.conf.sample +++ b/sickchill.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your sickchill container is named sickchill # make sure that your dns has a cname set for sickchill @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app sickchill; diff --git a/sickrage.subdomain.conf.sample b/sickrage.subdomain.conf.sample index b2caec2..4db5616 100644 --- a/sickrage.subdomain.conf.sample +++ b/sickrage.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your sickrage container is named sickrage # make sure that your dns has a cname set for sickrage @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app sickrage; diff --git a/skyhook.subdomain.conf.sample b/skyhook.subdomain.conf.sample index 29ec9e9..33676ad 100644 --- a/skyhook.subdomain.conf.sample +++ b/skyhook.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your skyhook container is named skyhook # make sure that your dns has a cname set for skyhook @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app skyhook; diff --git a/smokeping.subdomain.conf.sample b/smokeping.subdomain.conf.sample index 9590df0..f864429 100644 --- a/smokeping.subdomain.conf.sample +++ b/smokeping.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your smokeping container is named smokeping # make sure that your dns has a cname set for smokeping @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app smokeping; diff --git a/sonarr.subdomain.conf.sample b/sonarr.subdomain.conf.sample index 9276bb3..893274c 100644 --- a/sonarr.subdomain.conf.sample +++ b/sonarr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your sonarr container is named sonarr # make sure that your dns has a cname set for sonarr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app sonarr; diff --git a/sonarrtorss.subdomain.conf.sample b/sonarrtorss.subdomain.conf.sample index 30b457d..d4a1863 100644 --- a/sonarrtorss.subdomain.conf.sample +++ b/sonarrtorss.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your sonarrtorss container is named sonarrtorss # make sure that your dns has a cname set for sonarrtorss @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app sonarrtorss; diff --git a/speedtest-tracker.subdomain.conf.sample b/speedtest-tracker.subdomain.conf.sample index 94c07e8..6278217 100644 --- a/speedtest-tracker.subdomain.conf.sample +++ b/speedtest-tracker.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your speedtest-tracker container is named speedtest-tracker # make sure that your dns has a cname set for speedtest-tracker @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app speedtest-tracker; diff --git a/spoolman.subdomain.conf.sample b/spoolman.subdomain.conf.sample index c36f308..3ee1889 100644 --- a/spoolman.subdomain.conf.sample +++ b/spoolman.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/03/27 +## Version 2025/06/08 # make sure that your spoolman container is named spoolman # make sure that your dns has a cname set for spoolman @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app spoolman; @@ -43,4 +49,4 @@ server { proxy_pass $upstream_proto://$upstream_app:$upstream_port; } -} \ No newline at end of file +} diff --git a/statping.subdomain.conf.sample b/statping.subdomain.conf.sample index 41216c2..d27669f 100644 --- a/statping.subdomain.conf.sample +++ b/statping.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your statping container is named statup # make sure that your dns has a cname set for statping # If you are using the SSL docker-compose.yml on the statping repo, then the container name will be set to statup. @@ -23,6 +23,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -37,6 +40,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app statup; diff --git a/stirling-pdf.subdomain.conf.sample b/stirling-pdf.subdomain.conf.sample index 768f7d5..805ce22 100644 --- a/stirling-pdf.subdomain.conf.sample +++ b/stirling-pdf.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your stirling-pdf container is named stirling-pdf # make sure that your dns has a cname set for stirling-pdf @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app stirling-pdf; diff --git a/storm.subdomain.conf.sample b/storm.subdomain.conf.sample index f776c77..7d91b40 100644 --- a/storm.subdomain.conf.sample +++ b/storm.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # reverse proxy config for a modern deluge interface named storm # https://github.com/relvacode/storm # make sure that your storm container is named storm @@ -23,6 +23,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -37,6 +40,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app storm; diff --git a/synapse.subdomain.conf.sample b/synapse.subdomain.conf.sample index 0e66912..921d9ff 100644 --- a/synapse.subdomain.conf.sample +++ b/synapse.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 server { listen 443 ssl; @@ -23,6 +23,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -37,6 +40,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app synapse; diff --git a/synclounge.subdomain.conf.sample b/synclounge.subdomain.conf.sample index b3914f9..dd3e005 100644 --- a/synclounge.subdomain.conf.sample +++ b/synclounge.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your synclounge container is named synclounge # make sure that your dns has a cname set for synclounge # Use this with SyncLounge v3 and up. @@ -26,6 +26,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -40,6 +43,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app synclounge; diff --git a/syncthing.subdomain.conf.sample b/syncthing.subdomain.conf.sample index 361b9ce..a2dd5f4 100644 --- a/syncthing.subdomain.conf.sample +++ b/syncthing.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your syncthing container is named syncthing # make sure that your dns has a cname set for syncthing @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app syncthing; diff --git a/taisun.subdomain.conf.sample b/taisun.subdomain.conf.sample index 3b1e9b5..d830ea0 100644 --- a/taisun.subdomain.conf.sample +++ b/taisun.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your taisun container is named taisun # make sure that your dns has a cname set for taisun @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app taisun; diff --git a/tasmobackup.subdomain.conf.sample b/tasmobackup.subdomain.conf.sample index 8c8e8fc..8c0ff72 100644 --- a/tasmobackup.subdomain.conf.sample +++ b/tasmobackup.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your tasmobackup container is named tasmobackup # make sure that your dns has a cname set for tasmobackup @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app tasmobackup; diff --git a/tautulli.subdomain.conf.sample b/tautulli.subdomain.conf.sample index f61081c..b2bf9ad 100644 --- a/tautulli.subdomain.conf.sample +++ b/tautulli.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your tautulli container is named tautulli # make sure that your dns has a cname set for tautulli @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app tautulli; diff --git a/tdarr.subdomain.conf.sample b/tdarr.subdomain.conf.sample index 145d5cb..d3ad07a 100644 --- a/tdarr.subdomain.conf.sample +++ b/tdarr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your tdarr container is named tdarr # make sure that your dns has a cname set for tdarr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app tdarr; diff --git a/thelounge.subdomain.conf.sample b/thelounge.subdomain.conf.sample index 26614dd..2ce58c8 100644 --- a/thelounge.subdomain.conf.sample +++ b/thelounge.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your thelounge container is named thelounge # make sure that your dns has a cname set for thelounge @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app thelounge; diff --git a/themepark.subdomain.conf.sample b/themepark.subdomain.conf.sample index 1f7451b..72ccd89 100644 --- a/themepark.subdomain.conf.sample +++ b/themepark.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your theme-park. container is named theme-park. # make sure that your dns has a cname set for themepark. @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + # If you don't want to cache the CSS files you can uncomment the lines below. # add_header Last-Modified $date_gmt; # add_header Cache-Control 'no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0'; diff --git a/transmission.subdomain.conf.sample b/transmission.subdomain.conf.sample index 0a2250c..0c14c92 100644 --- a/transmission.subdomain.conf.sample +++ b/transmission.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # Make sure that DNS has a cname set for transmission # # Some Transmission Chrome extensions cannot handle HTTP/2 proxies as they @@ -29,6 +29,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -43,6 +46,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app transmission; diff --git a/ubooquity.subdomain.conf.sample b/ubooquity.subdomain.conf.sample index a013ed2..7969b84 100644 --- a/ubooquity.subdomain.conf.sample +++ b/ubooquity.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your ubooquity container is named ubooquity # make sure that your dns has a cname set for ubooquity @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app ubooquity; diff --git a/unifi-controller.subdomain.conf.sample b/unifi-controller.subdomain.conf.sample index 8db8241..9e0f928 100644 --- a/unifi-controller.subdomain.conf.sample +++ b/unifi-controller.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your unifi-controller container is named unifi-controller # make sure that your dns has a cname set for unifi # NOTE: If you use the proxy_cookie_path setting in proxy.conf you need to remove HTTPOnly; @@ -23,6 +23,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -37,6 +40,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app unifi-controller; diff --git a/unifi-network-application.subdomain.conf.sample b/unifi-network-application.subdomain.conf.sample index 36004f0..c83c032 100644 --- a/unifi-network-application.subdomain.conf.sample +++ b/unifi-network-application.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your unifi-network-application container is named unifi-network-application # make sure that your dns has a cname set for unifi # NOTE: If you use the proxy_cookie_path setting in proxy.conf you need to remove HTTPOnly; @@ -24,6 +24,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -38,6 +41,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app unifi-network-application; diff --git a/uptime-kuma.subdomain.conf.sample b/uptime-kuma.subdomain.conf.sample index 2ae8c2e..37c60d0 100644 --- a/uptime-kuma.subdomain.conf.sample +++ b/uptime-kuma.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your uptime-kuma container is named uptime-kuma # make sure that your dns has a cname set for uptime-kuma @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app uptime-kuma; diff --git a/vaultwarden.subdomain.conf.sample b/vaultwarden.subdomain.conf.sample index 5630392..60b2739 100644 --- a/vaultwarden.subdomain.conf.sample +++ b/vaultwarden.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your vaultwarden container is named vaultwarden # make sure that your dns has a cname set for vaultwarden # if you are using bitwarden (the official image), use the bitwarden conf @@ -25,6 +25,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -39,6 +42,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app vaultwarden; @@ -62,6 +68,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + # if you enable admin page via ADMIN_TOKEN env variable # consider restricting access to LAN only via uncommenting the following lines #allow 10.0.0.0/8; diff --git a/viewtube.subdomain.conf.sample b/viewtube.subdomain.conf.sample index dd26a77..9c766b4 100644 --- a/viewtube.subdomain.conf.sample +++ b/viewtube.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your viewtube container is named viewtube # make sure that your dns has a cname set for viewtube @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app viewtube; diff --git a/wallabag.subdomain.conf.sample b/wallabag.subdomain.conf.sample index 04752b0..f8647cd 100644 --- a/wallabag.subdomain.conf.sample +++ b/wallabag.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your wallabag container is named wallabag # make sure that your dns has a cname set for wallabag # also, make sure your env var in your docker run or compose match the full domain, incl. https:// @@ -23,6 +23,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -37,6 +40,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app wallabag; diff --git a/warpgate.subdomain.conf.sample b/warpgate.subdomain.conf.sample index de0cda4..998072f 100644 --- a/warpgate.subdomain.conf.sample +++ b/warpgate.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your warpgate container is named warpgate # make sure that your dns has a cname set for warpgate @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app warpgate; diff --git a/watcharr.subdomain.conf.sample b/watcharr.subdomain.conf.sample index 634241c..cb19209 100644 --- a/watcharr.subdomain.conf.sample +++ b/watcharr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/01/24 +## Version 2025/06/08 # make sure that your watcharr container is named watcharr # make sure that your dns has a cname set for watcharr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app watcharr; @@ -51,6 +57,6 @@ server { set $upstream_port 3080; set $upstream_proto http; proxy_pass $upstream_proto://$upstream_app:$upstream_port; - + } } diff --git a/watchstate.subdomain.conf.sample b/watchstate.subdomain.conf.sample index 030e86c..c117379 100644 --- a/watchstate.subdomain.conf.sample +++ b/watchstate.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your radarr container is named watchstate # make sure that your dns has a cname set for watchstate # the api endpoint is not behind auth, so please make sure to enable @@ -23,6 +23,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -37,6 +40,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app watchstate; diff --git a/webtop.subdomain.conf.sample b/webtop.subdomain.conf.sample index 54e9ca2..cf49a69 100644 --- a/webtop.subdomain.conf.sample +++ b/webtop.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that you have a cname set for the webtop # set up authentication here, for better security @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app webtop; diff --git a/whisparr.subdomain.conf.sample b/whisparr.subdomain.conf.sample index a900e3b..cf1a4b8 100644 --- a/whisparr.subdomain.conf.sample +++ b/whisparr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/08/04 +## Version 2025/06/08 # make sure that your whisparr container is named whisparr # make sure that your dns has a cname set for whisparr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app whisparr; diff --git a/wikijs.subdomain.conf.sample b/wikijs.subdomain.conf.sample index da68a1e..f75ef79 100644 --- a/wikijs.subdomain.conf.sample +++ b/wikijs.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your wikijs container is named wikijs # make sure that your dns has a cname set for wikijs @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app wikijs; diff --git a/wizarr.subdomain.conf.sample b/wizarr.subdomain.conf.sample index ca71932..9fafc45 100644 --- a/wizarr.subdomain.conf.sample +++ b/wizarr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your wizarr container is named wizarr # make sure that your dns has a cname set for wizarr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app wizarr; diff --git a/wordpress.subdomain.conf.sample b/wordpress.subdomain.conf.sample index 2d61aa9..9a141e9 100644 --- a/wordpress.subdomain.conf.sample +++ b/wordpress.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your wordpress container is named wordpress # make sure that your dns has a cname set for wordpress @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app wordpress; diff --git a/wrapperr.subdomain.conf.sample b/wrapperr.subdomain.conf.sample index 938ecc5..478174c 100644 --- a/wrapperr.subdomain.conf.sample +++ b/wrapperr.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your wrapperr container is named wrapperr # make sure that your dns has a cname set for wrapperr @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app wrapperr; diff --git a/yacht.subdomain.conf.sample b/yacht.subdomain.conf.sample index a3132ec..b0554a7 100644 --- a/yacht.subdomain.conf.sample +++ b/yacht.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your yacht container is named yacht # make sure that your dns has a cname set for yacht @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app yacht; diff --git a/your-spotify-api.subdomain.conf.sample b/your-spotify-api.subdomain.conf.sample index df287e3..0b4a418 100644 --- a/your-spotify-api.subdomain.conf.sample +++ b/your-spotify-api.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # https://github.com/Yooooomi/your_spotify # this is not a standalone config, it requires configured your-spotify web container for full functionality. # it uses server URLs for api callbacks, thus a server is required @@ -25,6 +25,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -39,6 +42,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app your-spotify-server; diff --git a/your-spotify.subdomain.conf.sample b/your-spotify.subdomain.conf.sample index 7d153c3..9714e86 100644 --- a/your-spotify.subdomain.conf.sample +++ b/your-spotify.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # https://github.com/Yooooomi/your_spotify # this is not a standalone config, it requires configured your-spotify api container for full functionality. # it uses server URLs for api callbacks, thus a server is required @@ -25,6 +25,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -39,6 +42,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app your-spotify-web; diff --git a/yourls.subdomain.conf.sample b/yourls.subdomain.conf.sample index 74767be..134763e 100644 --- a/yourls.subdomain.conf.sample +++ b/yourls.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your yourls container is named yourls # make sure that your dns has a cname set for yourls if necessary @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app yourls; diff --git a/youtube-dl-server.subdomain.conf.sample b/youtube-dl-server.subdomain.conf.sample index 9659c27..8f65a0a 100644 --- a/youtube-dl-server.subdomain.conf.sample +++ b/youtube-dl-server.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your youtube-dl-server container is named youtube-dl-server # make sure that your dns has a cname set for youtube-dl-server @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app youtube-dl-server; diff --git a/yt-dlp-web.subdomain.conf.sample b/yt-dlp-web.subdomain.conf.sample index 7915fa0..a287410 100644 --- a/yt-dlp-web.subdomain.conf.sample +++ b/yt-dlp-web.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your yt-dlp-web container is named yt-dlp-web # make sure that your dns has a cname set for yt-dlp-web @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app yt-dlp-web; diff --git a/zigbee2mqtt.subdomain.conf.sample b/zigbee2mqtt.subdomain.conf.sample index f487b9b..62fd269 100644 --- a/zigbee2mqtt.subdomain.conf.sample +++ b/zigbee2mqtt.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your zigbee2mqtt container is named zigbee2mqtt # make sure that your dns has a cname set for zigbee2mqtt @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app zigbee2mqtt; diff --git a/znc.subdomain.conf.sample b/znc.subdomain.conf.sample index c6ada29..dc49097 100644 --- a/znc.subdomain.conf.sample +++ b/znc.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your znc container is named znc # make sure that your dns has a cname set for znc @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app znc; diff --git a/zwave-js-ui.subdomain.conf.sample b/zwave-js-ui.subdomain.conf.sample index efb9184..c2ecb50 100644 --- a/zwave-js-ui.subdomain.conf.sample +++ b/zwave-js-ui.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/10/17 +## Version 2025/06/08 # make sure that your zwave-js-ui container is named zwave-js-ui # make sure that your dns has a cname set for zwave-js-ui @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app zwave-js-ui; diff --git a/zwavejs2mqtt.subdomain.conf.sample b/zwavejs2mqtt.subdomain.conf.sample index 1252f6b..092da65 100644 --- a/zwavejs2mqtt.subdomain.conf.sample +++ b/zwavejs2mqtt.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/06/08 # make sure that your zwavejs2mqtt container is named zwavejs2mqtt # make sure that your dns has a cname set for zwavejs2mqtt @@ -21,6 +21,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -35,6 +38,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app zwavejs2mqtt; From 8de27ee89990991f2081d5233a20d44b4ff005b9 Mon Sep 17 00:00:00 2001 From: jlssmt Date: Sun, 8 Jun 2025 17:50:35 +0200 Subject: [PATCH 76/81] add tinyauth --- tinyauth.subdomain.conf.sample | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 tinyauth.subdomain.conf.sample diff --git a/tinyauth.subdomain.conf.sample b/tinyauth.subdomain.conf.sample new file mode 100644 index 0000000..4f24a90 --- /dev/null +++ b/tinyauth.subdomain.conf.sample @@ -0,0 +1,25 @@ +## Version 2025/06/08 +# make sure that your tinyauth container is named tinyauth +# make sure that your dns has a cname set for tinyauth + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name tinyauth.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + location / { + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app tinyauth; + set $upstream_port 3000; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} From 02b39a5dd376e2d28eca32236897af0fd4a7c69c Mon Sep 17 00:00:00 2001 From: bobokun <12660469+bobokun@users.noreply.github.com> Date: Sat, 12 Jul 2025 22:47:23 -0400 Subject: [PATCH 77/81] Create qbit-manage.subdomain.conf.sample --- qbit-manage.subdomain.conf.sample | 47 +++++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) create mode 100644 qbit-manage.subdomain.conf.sample diff --git a/qbit-manage.subdomain.conf.sample b/qbit-manage.subdomain.conf.sample new file mode 100644 index 0000000..4ca544c --- /dev/null +++ b/qbit-manage.subdomain.conf.sample @@ -0,0 +1,47 @@ +## Version 2024/07/16 +# make sure that your qbit-manage container is named qbit-manage +# make sure that your dns has a cname set for qbit-manage +# qbit-manage v4.5.0+ only + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name qbit-manage.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + # enable for ldap auth (requires ldap-location.conf in the location block) + #include /config/nginx/ldap-server.conf; + + # enable for Authelia (requires authelia-location.conf in the location block) + #include /config/nginx/authelia-server.conf; + + # enable for Authentik (requires authentik-location.conf in the location block) + # include /config/nginx/authentik-server.conf; + + location / { + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + # include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app qbit-manage; + set $upstream_port 8080; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + } + +} From a720c7c8848018a37f6a1d3904cf2c4f6984d012 Mon Sep 17 00:00:00 2001 From: bobokun <12660469+bobokun@users.noreply.github.com> Date: Sat, 12 Jul 2025 22:49:00 -0400 Subject: [PATCH 78/81] Update qbit-manage.subdomain.conf.sample --- qbit-manage.subdomain.conf.sample | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/qbit-manage.subdomain.conf.sample b/qbit-manage.subdomain.conf.sample index 4ca544c..09d1632 100644 --- a/qbit-manage.subdomain.conf.sample +++ b/qbit-manage.subdomain.conf.sample @@ -20,7 +20,7 @@ server { #include /config/nginx/authelia-server.conf; # enable for Authentik (requires authentik-location.conf in the location block) - # include /config/nginx/authentik-server.conf; + #include /config/nginx/authentik-server.conf; location / { # enable the next two lines for http auth @@ -34,7 +34,7 @@ server { #include /config/nginx/authelia-location.conf; # enable for Authentik (requires authentik-server.conf in the server block) - # include /config/nginx/authentik-location.conf; + #include /config/nginx/authentik-location.conf; include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; From 8c1ca7540a7d26b3f6c14616614b423478eebca2 Mon Sep 17 00:00:00 2001 From: bobokun <12660469+bobokun@users.noreply.github.com> Date: Sat, 12 Jul 2025 22:54:51 -0400 Subject: [PATCH 79/81] Update date to be current --- qbit-manage.subdomain.conf.sample | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/qbit-manage.subdomain.conf.sample b/qbit-manage.subdomain.conf.sample index 09d1632..0afe3ea 100644 --- a/qbit-manage.subdomain.conf.sample +++ b/qbit-manage.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2024/07/16 +## Version 2025/07/12 # make sure that your qbit-manage container is named qbit-manage # make sure that your dns has a cname set for qbit-manage # qbit-manage v4.5.0+ only From 95c9e126729b8bfec9b87a99f02ca5d1dcd4da6d Mon Sep 17 00:00:00 2001 From: thespad Date: Fri, 18 Jul 2025 20:19:26 +0100 Subject: [PATCH 80/81] Add quic support --- _template.subdomain.conf.sample | 4 +++- actual-server.subdomain.conf.sample | 4 +++- adguard.subdomain.conf.sample | 4 +++- adminer.subdomain.conf.sample | 4 +++- adminmongo.subdomain.conf.sample | 4 +++- airsonic.subdomain.conf.sample | 4 +++- apprise-api.subdomain.conf.sample | 4 +++- archisteamfarm.subdomain.conf.sample | 4 +++- aria2-with-webui.subdomain.conf.sample | 4 +++- asciinema.subdomain.conf.sample | 4 +++- atuin.subdomain.conf.sample | 4 +++- audiobookshelf.subdomain.conf.sample | 4 +++- authelia.subdomain.conf.sample | 4 +++- authentik.subdomain.conf.sample | 4 +++- babybuddy.subdomain.conf.sample | 4 +++- bazarr.subdomain.conf.sample | 4 +++- beets.subdomain.conf.sample | 4 +++- beszel.subdomain.conf.sample | 4 +++- bitwarden.subdomain.conf.sample | 4 +++- boinc.subdomain.conf.sample | 4 +++- booksonic.subdomain.conf.sample | 4 +++- bookstack.subdomain.conf.sample | 4 +++- budge.subdomain.conf.sample | 4 +++- cadvisor.subdomain.conf.sample | 4 +++- calibre-web.subdomain.conf.sample | 4 +++- calibre.subdomain.conf.sample | 4 +++- castopod.subdomain.conf.sample | 4 +++- changedetection.subdomain.conf.sample | 4 +++- chevereto.subdomain.conf.sample | 4 +++- chronograf.subdomain.conf.sample | 4 +++- cloudbeaver.subdomain.conf.sample | 4 +++- code-server.subdomain.conf.sample | 4 +++- codimd.subdomain.conf.sample | 4 +++- collabora.subdomain.conf.sample | 4 +++- commento.subdomain.conf.sample | 4 +++- couchpotato.subdomain.conf.sample | 4 +++- crowdsec-dashboard.subdomain.conf.sample | 4 +++- crowdsec.subdomain.conf.sample | 4 +++- cryptgeon.subdomain.conf.sample | 4 +++- dashy.subdomain.conf.sample | 4 +++- ddns-updater.subdomain.conf.sample | 4 +++- deluge.subdomain.conf.sample | 4 +++- dillinger.subdomain.conf.sample | 4 +++- discount-bandit.subdomain.conf.sample | 4 +++- dnsdist.subdomain.conf.sample | 4 +++- dockge.subdomain.conf.sample | 4 +++- documentserver.subdomain.conf.sample | 4 +++- dokuwiki.subdomain.conf.sample | 4 +++- domoticz.subdomain.conf.sample | 4 +++- dozzle.subdomain.conf.sample | 4 +++- drone.subdomain.conf.sample | 4 +++- dsmrreader.subdomain.conf.sample | 4 +++- duplicacy.subdomain.conf.sample | 4 +++- duplicati.subdomain.conf.sample | 4 +++- emby.subdomain.conf.sample | 4 +++- embystat.subdomain.conf.sample | 4 +++- emulatorjs.subdomain.conf.sample | 4 +++- esphome.subdomain.conf.sample | 4 +++- fenrus.subdomain.conf.sample | 4 +++- filebot.subdomain.conf.sample | 4 +++- filebrowser.subdomain.conf.sample | 4 +++- firefly.subdomain.conf.sample | 4 +++- firefox.subdomain.conf.sample | 4 +++- flaresolverr.subdomain.conf.sample | 4 +++- flexget.subdomain.conf.sample | 4 +++- flood.subdomain.conf.sample | 4 +++- foldingathome.subdomain.conf.sample | 4 +++- forgejo.subdomain.conf.sample | 4 +++- foundryvtt.subdomain.conf.sample | 4 +++- freshrss.subdomain.conf.sample | 4 +++- frigate.subdomain.conf.sample | 4 +++- gaps.subdomain.conf.sample | 4 +++- gatus.subdomain.conf.sample | 4 +++- get_iplayer.subdomain.conf.sample | 4 +++- ghost.subdomain.conf.sample | 4 +++- gitea.subdomain.conf.sample | 4 +++- glances.subdomain.conf.sample | 4 +++- gotify.subdomain.conf.sample | 4 +++- grafana.subdomain.conf.sample | 4 +++- grampsweb.subdomain.conf.sample | 4 +++- grav.subdomain.conf.sample | 4 +++- graylog.subdomain.conf.sample | 4 +++- grocy.subdomain.conf.sample | 4 +++- guacamole.subdomain.conf.sample | 4 +++- hass-configurator.subdomain.conf.sample | 4 +++- headphones.subdomain.conf.sample | 4 +++- healthchecks.subdomain.conf.sample | 4 +++- hedgedoc.subdomain.conf.sample | 4 +++- heimdall.subdomain.conf.sample | 4 +++- hoarder.subdomain.conf.sample | 4 +++- homarr.subdomain.conf.sample | 4 +++- homeassistant.subdomain.conf.sample | 4 +++- homebox.subdomain.conf.sample | 4 +++- homebridge.subdomain.conf.sample | 4 +++- homepage.subdomain.conf.sample | 4 +++- homer.subdomain.conf.sample | 4 +++- huginn.subdomain.conf.sample | 4 +++- immich.subdomain.conf.sample | 4 +++- immich_server.subdomain.conf.sample | 4 +++- influxdb.subdomain.conf.sample | 4 +++- iplayarr.subdomain.conf.sample | 4 +++- it-tools.subdomain.conf.sample | 4 +++- jackett.subdomain.conf.sample | 4 +++- jdownloader.subdomain.conf.sample | 4 +++- jellyfin.subdomain.conf.sample | 4 +++- jellyseerr.subdomain.conf.sample | 4 +++- jfa-go.subdomain.conf.sample | 4 +++- joplin.subdomain.conf.sample | 4 +++- kanzi.subdomain.conf.sample | 4 +++- kasm.subdomain.conf.sample | 6 +++++- kavita.subdomain.conf.sample | 4 +++- kimai.subdomain.conf.sample | 4 +++- komga.subdomain.conf.sample | 4 +++- kopia.subdomain.conf.sample | 4 +++- lazylibrarian.subdomain.conf.sample | 4 +++- leantime.subdomain.conf.sample | 4 +++- libreddit.subdomain.conf.sample | 4 +++- librespeed.subdomain.conf.sample | 4 +++- lidarr.subdomain.conf.sample | 4 +++- linkace.subdomain.conf.sample | 4 +++- linkstack.subdomain.conf.sample | 4 +++- linkwarden.subdomain.conf.sample | 4 +++- lldap.subdomain.conf.sample | 4 +++- lubelogger.subdomain.conf.sample | 4 +++- lychee.subdomain.conf.sample | 4 +++- mailu.subdomain.conf.sample | 4 +++- maintainerr.subdomain.conf.sample | 4 +++- mastodon.subdomain.conf.sample | 4 +++- matomo.subdomain.conf.sample | 4 +++- mattermost.subdomain.conf.sample | 4 +++- mealie.subdomain.conf.sample | 4 +++- medusa.subdomain.conf.sample | 4 +++- metabase.subdomain.conf.sample | 4 +++- metube.subdomain.conf.sample | 4 +++- miniflux.subdomain.conf.sample | 4 +++- monica.subdomain.conf.sample | 4 +++- monitorr.subdomain.conf.sample | 4 +++- mstream.subdomain.conf.sample | 4 +++- mylar.subdomain.conf.sample | 4 +++- n8n.subdomain.conf.sample | 4 +++- navidrome.subdomain.conf.sample | 4 +++- netboot.subdomain.conf.sample | 4 +++- netbox.subdomain.conf.sample | 4 +++- netdata.subdomain.conf.sample | 4 +++- nextcloud.subdomain.conf.sample | 4 +++- nexusoss.subdomain.conf.sample | 4 +++- nocodb.subdomain.conf.sample | 4 +++- notifiarr.subdomain.conf.sample | 4 +++- ntfy.subdomain.conf.sample | 4 +++- nzbget.subdomain.conf.sample | 4 +++- nzbhydra.subdomain.conf.sample | 4 +++- octoprint.subdomain.conf.sample | 4 +++- ombi.subdomain.conf.sample | 4 +++- onetimesecret.subdomain.conf.sample | 4 +++- oogway.subdomain.conf.sample | 4 +++- open-webui.subdomain.conf.sample | 4 +++- openhab.subdomain.conf.sample | 4 +++- openvpn-as.subdomain.conf.sample | 4 +++- openvscode-server.subdomain.conf.sample | 8 +++++++- organizr.subdomain.conf.sample | 4 +++- osticket.subdomain.conf.sample | 4 +++- overseerr.subdomain.conf.sample | 4 +++- paperless.subdomain.conf.sample | 4 +++- papermerge.subdomain.conf.sample | 4 +++- partdb.subdomain.conf.sample | 4 +++- petio.subdomain.conf.sample | 4 +++- pgadmin.subdomain.conf.sample | 4 +++- phoneinfoga.subdomain.conf.sample | 4 +++- photoprism.subdomain.conf.sample | 4 +++- phpmyadmin.subdomain.conf.sample | 4 +++- pihole.subdomain.conf.sample | 4 +++- pingvin-share.subdomain.conf.sample | 4 +++- pinry.subdomain.conf.sample | 4 +++- piwigo.subdomain.conf.sample | 4 +++- pixelfed.subdomain.conf.sample | 4 +++- planka.subdomain.conf.sample | 4 +++- plex.subdomain.conf.sample | 4 +++- plexwebtools.subdomain.conf.sample | 4 +++- podgrab.subdomain.conf.sample | 4 +++- portainer.subdomain.conf.sample | 4 +++- privatebin.subdomain.conf.sample | 4 +++- prometheus.subdomain.conf.sample | 4 +++- prowlarr.subdomain.conf.sample | 4 +++- pterodactyl.subdomain.conf.sample | 4 +++- pterodactylnode.subdomain.conf.sample | 4 +++- pwndrop.subdomain.conf.sample | 4 +++- pydio-cells.subdomain.conf.sample | 4 +++- pydio.subdomain.conf.sample | 4 +++- pyload.subdomain.conf.sample | 4 +++- qbittorrent.subdomain.conf.sample | 4 +++- quassel-web.subdomain.conf.sample | 4 +++- radarr.subdomain.conf.sample | 4 +++- rallly.subdomain.conf.sample | 4 +++- raneto.subdomain.conf.sample | 4 +++- readarr.subdomain.conf.sample | 4 +++- recipes.subdomain.conf.sample | 4 +++- requestrr.subdomain.conf.sample | 4 +++- resilio-sync.subdomain.conf.sample | 4 +++- romm.subdomain.conf.sample | 4 +++- rutorrent.subdomain.conf.sample | 4 +++- sabnzbd.subdomain.conf.sample | 4 +++- saltrim.subdomain.conf.sample | 4 +++- scrutiny.subdomain.conf.sample | 4 +++- semaphore.subdomain.conf.sample | 4 +++- shinobi.subdomain.conf.sample | 4 +++- shlink.subdomain.conf.sample | 4 +++- sickchill.subdomain.conf.sample | 4 +++- sickrage.subdomain.conf.sample | 4 +++- skyhook.subdomain.conf.sample | 4 +++- smokeping.subdomain.conf.sample | 4 +++- sonarr.subdomain.conf.sample | 4 +++- sonarrtorss.subdomain.conf.sample | 4 +++- speedtest-tracker.subdomain.conf.sample | 4 +++- spoolman.subdomain.conf.sample | 4 +++- statping.subdomain.conf.sample | 4 +++- stirling-pdf.subdomain.conf.sample | 4 +++- storm.subdomain.conf.sample | 4 +++- synapse.subdomain.conf.sample | 4 +++- synclounge.subdomain.conf.sample | 4 +++- syncthing.subdomain.conf.sample | 4 +++- taisun.subdomain.conf.sample | 4 +++- tasmobackup.subdomain.conf.sample | 4 +++- tautulli.subdomain.conf.sample | 4 +++- tdarr.subdomain.conf.sample | 4 +++- thelounge.subdomain.conf.sample | 4 +++- themepark.subdomain.conf.sample | 4 +++- tinyauth.subdomain.conf.sample | 4 +++- transmission.subdomain.conf.sample | 4 +++- ubooquity.subdomain.conf.sample | 4 +++- unifi-controller.subdomain.conf.sample | 4 +++- unifi-network-application.subdomain.conf.sample | 4 +++- uptime-kuma.subdomain.conf.sample | 4 +++- vaultwarden.subdomain.conf.sample | 4 +++- viewtube.subdomain.conf.sample | 4 +++- wallabag.subdomain.conf.sample | 4 +++- warpgate.subdomain.conf.sample | 4 +++- watcharr.subdomain.conf.sample | 4 +++- watchstate.subdomain.conf.sample | 4 +++- webtop.subdomain.conf.sample | 4 +++- whisparr.subdomain.conf.sample | 4 +++- wikijs.subdomain.conf.sample | 4 +++- wizarr.subdomain.conf.sample | 4 +++- wordpress.subdomain.conf.sample | 4 +++- wrapperr.subdomain.conf.sample | 4 +++- yacht.subdomain.conf.sample | 4 +++- your-spotify-api.subdomain.conf.sample | 4 +++- your-spotify.subdomain.conf.sample | 4 +++- yourls.subdomain.conf.sample | 4 +++- youtube-dl-server.subdomain.conf.sample | 4 +++- yt-dlp-web.subdomain.conf.sample | 4 +++- zigbee2mqtt.subdomain.conf.sample | 4 +++- znc.subdomain.conf.sample | 4 +++- zwave-js-ui.subdomain.conf.sample | 4 +++- zwavejs2mqtt.subdomain.conf.sample | 4 +++- 254 files changed, 768 insertions(+), 254 deletions(-) diff --git a/_template.subdomain.conf.sample b/_template.subdomain.conf.sample index ab4f039..855e94d 100644 --- a/_template.subdomain.conf.sample +++ b/_template.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # REMOVE THIS LINE BEFORE SUBMITTING: The structure of the file (all of the existing lines) should be kept as close as possible to this template. # REMOVE THIS LINE BEFORE SUBMITTING: Look through this file for and replace them. Review other sample files to see how things are done. # REMOVE THIS LINE BEFORE SUBMITTING: The comment lines at the top of the file (below this line) should explain any prerequisites for using the proxy such as DNS or app settings. @@ -7,7 +7,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name .*; diff --git a/actual-server.subdomain.conf.sample b/actual-server.subdomain.conf.sample index 231c89a..4fc719d 100644 --- a/actual-server.subdomain.conf.sample +++ b/actual-server.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your actual-server container is named actual-server # make sure that your dns has a cname set for actual-server server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name actual-server.*; diff --git a/adguard.subdomain.conf.sample b/adguard.subdomain.conf.sample index e6d1c16..ab618d8 100644 --- a/adguard.subdomain.conf.sample +++ b/adguard.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your adguard container is named adguard # make sure that your dns has a cname set for adguard server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name adguard.*; diff --git a/adminer.subdomain.conf.sample b/adminer.subdomain.conf.sample index 3bcf48e..e60eb41 100644 --- a/adminer.subdomain.conf.sample +++ b/adminer.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your adminer container is named adminer # make sure that your dns has a cname set for adminer server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name adminer.*; diff --git a/adminmongo.subdomain.conf.sample b/adminmongo.subdomain.conf.sample index 2ceaf3b..c2bd8ea 100644 --- a/adminmongo.subdomain.conf.sample +++ b/adminmongo.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your adminmongo container is named adminmongo # make sure that your dns has a cname set for adminmongo server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name adminmongo.*; diff --git a/airsonic.subdomain.conf.sample b/airsonic.subdomain.conf.sample index 1fd6efd..6fa79ba 100644 --- a/airsonic.subdomain.conf.sample +++ b/airsonic.subdomain.conf.sample @@ -1,11 +1,13 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your airsonic container is named airsonic # make sure that your dns has a cname set for airsonic # add `server.use-forward-headers=true` to `/config/application.properties` to ensure logs contain real source IP server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name airsonic.*; diff --git a/apprise-api.subdomain.conf.sample b/apprise-api.subdomain.conf.sample index f2e2344..4e65486 100644 --- a/apprise-api.subdomain.conf.sample +++ b/apprise-api.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your apprise-api container is named apprise-api # make sure that your dns has a cname set for apprise-api server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name apprise-api.*; diff --git a/archisteamfarm.subdomain.conf.sample b/archisteamfarm.subdomain.conf.sample index a4e2596..9e0170b 100644 --- a/archisteamfarm.subdomain.conf.sample +++ b/archisteamfarm.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your archisteamfarm container is named archisteamfarm # make sure that your dns has a cname set for archisteamfarm server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name archisteamfarm.*; diff --git a/aria2-with-webui.subdomain.conf.sample b/aria2-with-webui.subdomain.conf.sample index be5b8cf..6e75fcc 100644 --- a/aria2-with-webui.subdomain.conf.sample +++ b/aria2-with-webui.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your aria2 container is named aria2-with-webui # make sure that your dns has a cname set for aria2 # @@ -8,7 +8,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name aria2.*; diff --git a/asciinema.subdomain.conf.sample b/asciinema.subdomain.conf.sample index fd15f54..8a1e687 100644 --- a/asciinema.subdomain.conf.sample +++ b/asciinema.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your asciinema container is named asciinema # make sure that your dns has a cname set for asciinema server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name asciinema.*; diff --git a/atuin.subdomain.conf.sample b/atuin.subdomain.conf.sample index 59d8ef8..03670f5 100644 --- a/atuin.subdomain.conf.sample +++ b/atuin.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your atuin container is named atuin # make sure that your dns has a cname set for atuin server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name atuin.*; diff --git a/audiobookshelf.subdomain.conf.sample b/audiobookshelf.subdomain.conf.sample index f8aa4e7..b737e91 100644 --- a/audiobookshelf.subdomain.conf.sample +++ b/audiobookshelf.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your audiobookshelf container is named audiobookshelf # make sure that your dns has a cname set for audiobookshelf server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name audiobookshelf.*; diff --git a/authelia.subdomain.conf.sample b/authelia.subdomain.conf.sample index 706a8d9..0c8276a 100644 --- a/authelia.subdomain.conf.sample +++ b/authelia.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your authelia container is named authelia # make sure that your dns has a cname set for authelia server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name authelia.*; diff --git a/authentik.subdomain.conf.sample b/authentik.subdomain.conf.sample index 43295b9..5b6c9cc 100644 --- a/authentik.subdomain.conf.sample +++ b/authentik.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your authentik container is named authentik-server # make sure that your dns has a cname set for authentik server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name authentik.*; diff --git a/babybuddy.subdomain.conf.sample b/babybuddy.subdomain.conf.sample index 702c148..84fd70f 100644 --- a/babybuddy.subdomain.conf.sample +++ b/babybuddy.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your babybuddy container is named babybuddy # make sure that your dns has a cname set for babybuddy server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name babybuddy.*; diff --git a/bazarr.subdomain.conf.sample b/bazarr.subdomain.conf.sample index 256f57b..76d7346 100644 --- a/bazarr.subdomain.conf.sample +++ b/bazarr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your bazarr container is named bazarr # make sure that your dns has a cname set for bazarr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name bazarr.*; diff --git a/beets.subdomain.conf.sample b/beets.subdomain.conf.sample index 494262b..145f735 100644 --- a/beets.subdomain.conf.sample +++ b/beets.subdomain.conf.sample @@ -1,11 +1,13 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your beets container is named beets # make sure that your dns has a cname set for beets #First edit beets.yml and enable the reverse proxy settings, under "web" add "reverse_proxy: true" and restart the beets container. server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name beets.*; diff --git a/beszel.subdomain.conf.sample b/beszel.subdomain.conf.sample index 4aa83df..3cc6b0e 100644 --- a/beszel.subdomain.conf.sample +++ b/beszel.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your beszel container is named beszel # make sure that your dns has a cname set for beszel server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name beszel.*; diff --git a/bitwarden.subdomain.conf.sample b/bitwarden.subdomain.conf.sample index 0f2675d..a5dd48a 100644 --- a/bitwarden.subdomain.conf.sample +++ b/bitwarden.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your bitwarden container is named bitwarden # make sure that your dns has a cname set for bitwarden # if you are using bitwarden (the official image), use the bitwarden conf @@ -8,7 +8,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name bitwarden.*; diff --git a/boinc.subdomain.conf.sample b/boinc.subdomain.conf.sample index d1bdd04..ccad6c5 100644 --- a/boinc.subdomain.conf.sample +++ b/boinc.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your boinc container is named boinc # make sure that your dns has a cname set for boinc server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name boinc.*; diff --git a/booksonic.subdomain.conf.sample b/booksonic.subdomain.conf.sample index 6c80167..8d8b4c5 100644 --- a/booksonic.subdomain.conf.sample +++ b/booksonic.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your booksonic container is named booksonic # make sure that your dns has a cname set for booksonic server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name booksonic.*; diff --git a/bookstack.subdomain.conf.sample b/bookstack.subdomain.conf.sample index aa9bf97..be6cb12 100644 --- a/bookstack.subdomain.conf.sample +++ b/bookstack.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your bookstack container is named bookstack # make sure that your dns has a cname set for bookstack # Ensure you have the APP_URL Environment Variable set correctly in your Docker Run/Compose or in BookStack Env File (/www/.env) @@ -6,7 +6,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name bookstack.*; diff --git a/budge.subdomain.conf.sample b/budge.subdomain.conf.sample index 6935d6c..7b40d2e 100644 --- a/budge.subdomain.conf.sample +++ b/budge.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your budge container is named budge # make sure that your dns has a cname set for budge server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name budge.*; diff --git a/cadvisor.subdomain.conf.sample b/cadvisor.subdomain.conf.sample index 407469f..a61c13f 100644 --- a/cadvisor.subdomain.conf.sample +++ b/cadvisor.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your cadvisor container is named cadvisor # make sure that your dns has a cname set for cadvisor server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name cadvisor.*; diff --git a/calibre-web.subdomain.conf.sample b/calibre-web.subdomain.conf.sample index 0535f66..b5109bd 100644 --- a/calibre-web.subdomain.conf.sample +++ b/calibre-web.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your calibre-web container is named calibre-web # make sure that your dns has a cname set for calibre-web server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name calibre-web.*; diff --git a/calibre.subdomain.conf.sample b/calibre.subdomain.conf.sample index 3fdb407..08a54df 100644 --- a/calibre.subdomain.conf.sample +++ b/calibre.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your calibre container is named calibre # make sure that your dns has a cname set for calibre # for the content server, go into calibre preferences / sharing over the net / advanced and @@ -7,7 +7,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name calibre.*; diff --git a/castopod.subdomain.conf.sample b/castopod.subdomain.conf.sample index 3ef2afc..f15e3ef 100644 --- a/castopod.subdomain.conf.sample +++ b/castopod.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your castopod container is named castopod-app # make sure that your dns has a cname set for castopod server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name castopod.*; diff --git a/changedetection.subdomain.conf.sample b/changedetection.subdomain.conf.sample index 4ff96d8..80d865f 100644 --- a/changedetection.subdomain.conf.sample +++ b/changedetection.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your changedetection container is named changedetection # make sure that your dns has a cname set for changedetection server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name changedetection.*; diff --git a/chevereto.subdomain.conf.sample b/chevereto.subdomain.conf.sample index 89515f9..e0383dc 100644 --- a/chevereto.subdomain.conf.sample +++ b/chevereto.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your chevereto container is named chevereto # make sure that your dns has a cname set for chevereto server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name chevereto.*; diff --git a/chronograf.subdomain.conf.sample b/chronograf.subdomain.conf.sample index fd7267e..5bd86f4 100644 --- a/chronograf.subdomain.conf.sample +++ b/chronograf.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your chronograf container is named chronograf # make sure that your dns has a cname set for chronograf server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name chronograf.*; diff --git a/cloudbeaver.subdomain.conf.sample b/cloudbeaver.subdomain.conf.sample index 7bdca7f..b67cbc0 100644 --- a/cloudbeaver.subdomain.conf.sample +++ b/cloudbeaver.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your cloudbeaver container is named cloudbeaver # make sure that your dns has a cname set for cloudbeaver server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name cloudbeaver.*; diff --git a/code-server.subdomain.conf.sample b/code-server.subdomain.conf.sample index effa62f..b97619f 100644 --- a/code-server.subdomain.conf.sample +++ b/code-server.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your code-server container is named code-server # make sure that your dns has a cname set for code-server server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name code-server.* "~^[0-9]{1,10}\.code-server\..*$"; diff --git a/codimd.subdomain.conf.sample b/codimd.subdomain.conf.sample index 5d10bf4..d47be0b 100644 --- a/codimd.subdomain.conf.sample +++ b/codimd.subdomain.conf.sample @@ -1,11 +1,13 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure you have added the following environmental variables to your run command/compose file # CMD_DOMAIN=codimd.server.com # CMD_PROTOCOL_USESSL=true server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name codimd.*; diff --git a/collabora.subdomain.conf.sample b/collabora.subdomain.conf.sample index c62e6c8..e953e03 100644 --- a/collabora.subdomain.conf.sample +++ b/collabora.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your collabora container is named collabora # make sure that your dns has a cname set for collabora server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name collabora.*; diff --git a/commento.subdomain.conf.sample b/commento.subdomain.conf.sample index 5f9f274..d49cfa1 100644 --- a/commento.subdomain.conf.sample +++ b/commento.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your commento container is named commento # make sure that your dns has a cname set for commento server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name commento.*; diff --git a/couchpotato.subdomain.conf.sample b/couchpotato.subdomain.conf.sample index e27a307..a4d8711 100644 --- a/couchpotato.subdomain.conf.sample +++ b/couchpotato.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your couchpotato container is named couchpotato # make sure that your dns has a cname set for couchpotato server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name couchpotato.*; diff --git a/crowdsec-dashboard.subdomain.conf.sample b/crowdsec-dashboard.subdomain.conf.sample index 32100a5..979e6b3 100644 --- a/crowdsec-dashboard.subdomain.conf.sample +++ b/crowdsec-dashboard.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your crowdsec-dashboard container is named crowdsec-dashboard # make sure that your dns has a cname set for crowdsec-dashboard server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name crowdsec-dashboard.*; diff --git a/crowdsec.subdomain.conf.sample b/crowdsec.subdomain.conf.sample index c9ce4d3..e0aa7de 100644 --- a/crowdsec.subdomain.conf.sample +++ b/crowdsec.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your crowdsec container is named crowdsec # make sure that your dns has a cname set for crowdsec server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name crowdsec.*; diff --git a/cryptgeon.subdomain.conf.sample b/cryptgeon.subdomain.conf.sample index afe5ff0..8d591b0 100644 --- a/cryptgeon.subdomain.conf.sample +++ b/cryptgeon.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your cryptgeon container is named cryptgeon # make sure that your dns has a cname set for cryptgeon server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name cryptgeon.*; diff --git a/dashy.subdomain.conf.sample b/dashy.subdomain.conf.sample index 1b1eee0..0370e09 100644 --- a/dashy.subdomain.conf.sample +++ b/dashy.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your dashy container is named dashy # make sure that your dns has a cname set for dashy server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name dashy.*; diff --git a/ddns-updater.subdomain.conf.sample b/ddns-updater.subdomain.conf.sample index 3709ffa..557d320 100644 --- a/ddns-updater.subdomain.conf.sample +++ b/ddns-updater.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your ddns-updater container is named ddns-updater # make sure that your dns has a cname set for ddns-updater server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name ddns-updater.*; diff --git a/deluge.subdomain.conf.sample b/deluge.subdomain.conf.sample index 5bec626..422a8aa 100644 --- a/deluge.subdomain.conf.sample +++ b/deluge.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your deluge container is named deluge # make sure that your dns has a cname set for deluge server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name deluge.*; diff --git a/dillinger.subdomain.conf.sample b/dillinger.subdomain.conf.sample index 8dd8d74..1ca4e2b 100644 --- a/dillinger.subdomain.conf.sample +++ b/dillinger.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your dillinger container is named dillinger # make sure that your dns has a cname set for dillinger server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name dillinger.*; diff --git a/discount-bandit.subdomain.conf.sample b/discount-bandit.subdomain.conf.sample index e24c6e2..20f5897 100644 --- a/discount-bandit.subdomain.conf.sample +++ b/discount-bandit.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your discount-bandit container is named discount-bandit # make sure that your dns has a cname set for discount-bandit server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name discount-bandit.*; diff --git a/dnsdist.subdomain.conf.sample b/dnsdist.subdomain.conf.sample index 09566a0..9ecc4f1 100644 --- a/dnsdist.subdomain.conf.sample +++ b/dnsdist.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your container is named dnsdist # make sure that your dns has a cname set for dnsdist server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name dnsdist.*; diff --git a/dockge.subdomain.conf.sample b/dockge.subdomain.conf.sample index 3478ae1..5c49136 100644 --- a/dockge.subdomain.conf.sample +++ b/dockge.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your dockge container is named dockge # make sure that your dns has a cname set for dockge server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name dockge.*; diff --git a/documentserver.subdomain.conf.sample b/documentserver.subdomain.conf.sample index 2cd169f..81885ca 100644 --- a/documentserver.subdomain.conf.sample +++ b/documentserver.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your onlyoffice documentserver container is named documentserver # make sure that your dns has a cname set for documentserver server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name documentserver.*; diff --git a/dokuwiki.subdomain.conf.sample b/dokuwiki.subdomain.conf.sample index b2ba9e4..1764d08 100644 --- a/dokuwiki.subdomain.conf.sample +++ b/dokuwiki.subdomain.conf.sample @@ -1,11 +1,13 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your dokuwiki container is named dokuwiki # make sure that your dns has a cname set for dokuwiki # complete the setup by appending install.php to URL server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name dokuwiki.*; diff --git a/domoticz.subdomain.conf.sample b/domoticz.subdomain.conf.sample index ee78af5..9a64e97 100644 --- a/domoticz.subdomain.conf.sample +++ b/domoticz.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your domoticz container is named domoticz # make sure that your dns has a cname set for domoticz server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name domoticz.*; diff --git a/dozzle.subdomain.conf.sample b/dozzle.subdomain.conf.sample index 05dcb9f..a64638f 100644 --- a/dozzle.subdomain.conf.sample +++ b/dozzle.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your dozzle container is named dozzle # make sure that your dns has a cname set for dozzle server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name dozzle.*; diff --git a/drone.subdomain.conf.sample b/drone.subdomain.conf.sample index ec9c501..b1c0819 100644 --- a/drone.subdomain.conf.sample +++ b/drone.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your drone container is named drone # make sure that your dns has a cname set for drone server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name drone.*; diff --git a/dsmrreader.subdomain.conf.sample b/dsmrreader.subdomain.conf.sample index d67f43d..8744738 100644 --- a/dsmrreader.subdomain.conf.sample +++ b/dsmrreader.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your dsmr container is named dsmr # make sure that your dns has a cname set for dsmr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name dsmr.*; diff --git a/duplicacy.subdomain.conf.sample b/duplicacy.subdomain.conf.sample index 25f87f3..2d040b7 100644 --- a/duplicacy.subdomain.conf.sample +++ b/duplicacy.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your duplicacy container is named duplicacy # make sure that your dns has a cname set for duplicacy server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name duplicacy.*; diff --git a/duplicati.subdomain.conf.sample b/duplicati.subdomain.conf.sample index f1b3c41..94a7ded 100644 --- a/duplicati.subdomain.conf.sample +++ b/duplicati.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your duplicati container is named duplicati # make sure that your dns has a cname set for duplicati server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name duplicati.*; diff --git a/emby.subdomain.conf.sample b/emby.subdomain.conf.sample index fe5ddeb..04aab92 100644 --- a/emby.subdomain.conf.sample +++ b/emby.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your emby container is named emby # make sure that your dns has a cname set for emby # if emby is running in bridge mode and the container is named "emby", the below config should work as is @@ -9,7 +9,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name emby.*; diff --git a/embystat.subdomain.conf.sample b/embystat.subdomain.conf.sample index 51ea93e..26e58d7 100644 --- a/embystat.subdomain.conf.sample +++ b/embystat.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your embystat container is named embystat # make sure that your dns has a cname set for embystat server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name embystat.*; diff --git a/emulatorjs.subdomain.conf.sample b/emulatorjs.subdomain.conf.sample index d0d37df..4a1da24 100644 --- a/emulatorjs.subdomain.conf.sample +++ b/emulatorjs.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your emulatorjs container is named emulatorjs # make sure that your dns has a cname set for emulatorjs # In emulatorjs docker arguments, set an env variable for SUBFOLDER=/backend/ @@ -7,7 +7,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name emulatorjs.*; diff --git a/esphome.subdomain.conf.sample b/esphome.subdomain.conf.sample index febc0cd..66169a2 100644 --- a/esphome.subdomain.conf.sample +++ b/esphome.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your esphome container is named esphome # make sure that your dns has a cname set for esphome server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name esphome.*; diff --git a/fenrus.subdomain.conf.sample b/fenrus.subdomain.conf.sample index d2468bc..53c4b75 100644 --- a/fenrus.subdomain.conf.sample +++ b/fenrus.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your fenrus container is named fenrus # make sure that your dns has a cname set for fenrus server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name fenrus.*; diff --git a/filebot.subdomain.conf.sample b/filebot.subdomain.conf.sample index 03e53cd..59963ee 100644 --- a/filebot.subdomain.conf.sample +++ b/filebot.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your filebot container is named filebot # make sure that your dns has a cname set for filebot server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name filebot.*; diff --git a/filebrowser.subdomain.conf.sample b/filebrowser.subdomain.conf.sample index b6ec60c..dcbc4ff 100644 --- a/filebrowser.subdomain.conf.sample +++ b/filebrowser.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your filebrowser container is named filebrowser # make sure that your dns has a cname set for filebrowser server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name filebrowser.*; diff --git a/firefly.subdomain.conf.sample b/firefly.subdomain.conf.sample index b91ecb5..70dc162 100644 --- a/firefly.subdomain.conf.sample +++ b/firefly.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your firefly container is named firefly # make sure that your dns has a cname set for firefly server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name firefly.*; diff --git a/firefox.subdomain.conf.sample b/firefox.subdomain.conf.sample index 95e4de4..a7347b4 100644 --- a/firefox.subdomain.conf.sample +++ b/firefox.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your firefox container is named firefox # make sure that your dns has a cname set for firefox server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name firefox.*; diff --git a/flaresolverr.subdomain.conf.sample b/flaresolverr.subdomain.conf.sample index 7057378..ee9c825 100644 --- a/flaresolverr.subdomain.conf.sample +++ b/flaresolverr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your flaresolverr container is named flaresolverr # make sure that your dns has a cname set for flaresolverr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name flaresolverr.*; diff --git a/flexget.subdomain.conf.sample b/flexget.subdomain.conf.sample index 9eb6677..45dacc0 100644 --- a/flexget.subdomain.conf.sample +++ b/flexget.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your flexget container is named flexget # make sure that your dns has a cname set for flexget server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name flexget.*; diff --git a/flood.subdomain.conf.sample b/flood.subdomain.conf.sample index 6edb1f9..633bdd2 100644 --- a/flood.subdomain.conf.sample +++ b/flood.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your flood container is named flood # make sure that your dns has a cname set for flood server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name flood.*; diff --git a/foldingathome.subdomain.conf.sample b/foldingathome.subdomain.conf.sample index f94b3b8..39eb643 100644 --- a/foldingathome.subdomain.conf.sample +++ b/foldingathome.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your foldingathome container is named foldingathome # make sure that your dns has a cname set for foldingathome server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name foldingathome.*; diff --git a/forgejo.subdomain.conf.sample b/forgejo.subdomain.conf.sample index 659782b..e401211 100644 --- a/forgejo.subdomain.conf.sample +++ b/forgejo.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your forgejo container is named forgejo # make sure that your dns has a cname set for forgejo # edit the following parameters in /data/forgejo/conf/app.ini or set as ENV vars in your container @@ -9,7 +9,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name forgejo.*; diff --git a/foundryvtt.subdomain.conf.sample b/foundryvtt.subdomain.conf.sample index a437bb1..4df44a7 100644 --- a/foundryvtt.subdomain.conf.sample +++ b/foundryvtt.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your foundryvtt container is named foundryvtt # make sure that your dns has a cname set for foundryvtt # Ensure that your Foundry VTT's {userData}/Config/options.json file is configured as follows: @@ -13,7 +13,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name foundryvtt.*; diff --git a/freshrss.subdomain.conf.sample b/freshrss.subdomain.conf.sample index 51cae85..11a7090 100644 --- a/freshrss.subdomain.conf.sample +++ b/freshrss.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your freshrss container is named freshrss # make sure that your dns has a cname set for freshrss server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name freshrss.*; diff --git a/frigate.subdomain.conf.sample b/frigate.subdomain.conf.sample index 885a5ab..955622d 100644 --- a/frigate.subdomain.conf.sample +++ b/frigate.subdomain.conf.sample @@ -1,11 +1,13 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your frigate container is named frigate # make sure that your dns has a cname set for frigate # if you are on a version older than 0.14.0 set upstream_port to 5000 and upstream_proto to http server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name frigate.*; diff --git a/gaps.subdomain.conf.sample b/gaps.subdomain.conf.sample index a840bcd..3e05ffa 100644 --- a/gaps.subdomain.conf.sample +++ b/gaps.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your gaps container is named gaps # make sure that your dns has a cname set for gaps server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name gaps.*; diff --git a/gatus.subdomain.conf.sample b/gatus.subdomain.conf.sample index 86470d5..457a040 100644 --- a/gatus.subdomain.conf.sample +++ b/gatus.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your gatus container is named gatus # make sure that your dns has a cname set for gatus server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name gatus.*; diff --git a/get_iplayer.subdomain.conf.sample b/get_iplayer.subdomain.conf.sample index c65f1fa..ff6d1ef 100644 --- a/get_iplayer.subdomain.conf.sample +++ b/get_iplayer.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your get_iplayer container is named get_iplayer # make sure that your dns has a cname set for get_iplayer server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name get_iplayer.*; diff --git a/ghost.subdomain.conf.sample b/ghost.subdomain.conf.sample index fafe78a..20d718b 100644 --- a/ghost.subdomain.conf.sample +++ b/ghost.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your ghost container is named ghost # make sure that your dns has a cname set for ghost server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name ghost.*; diff --git a/gitea.subdomain.conf.sample b/gitea.subdomain.conf.sample index 2f4210a..7c1024f 100644 --- a/gitea.subdomain.conf.sample +++ b/gitea.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your gitea container is named gitea # make sure that your dns has a cname set for gitea # edit the following parameters in /data/gitea/conf/app.ini @@ -9,7 +9,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name gitea.*; diff --git a/glances.subdomain.conf.sample b/glances.subdomain.conf.sample index bb421b2..a32221f 100644 --- a/glances.subdomain.conf.sample +++ b/glances.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your glances container is named glances # make sure that your dns has a cname set for glances server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name glances.*; diff --git a/gotify.subdomain.conf.sample b/gotify.subdomain.conf.sample index 8ec79ad..209f65f 100644 --- a/gotify.subdomain.conf.sample +++ b/gotify.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your gotify container is named gotify # make sure that your dns has a cname set for gotify server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name gotify.*; diff --git a/grafana.subdomain.conf.sample b/grafana.subdomain.conf.sample index e81d150..894497d 100644 --- a/grafana.subdomain.conf.sample +++ b/grafana.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your grafana container is named grafana # make sure that your dns has a cname set for grafana server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name grafana.*; diff --git a/grampsweb.subdomain.conf.sample b/grampsweb.subdomain.conf.sample index 737574c..b125e1a 100644 --- a/grampsweb.subdomain.conf.sample +++ b/grampsweb.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your grampsweb container is named grampsweb # make sure that your dns has a cname set for grampsweb server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name grampsweb.*; diff --git a/grav.subdomain.conf.sample b/grav.subdomain.conf.sample index 5bf2962..c59b760 100644 --- a/grav.subdomain.conf.sample +++ b/grav.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your grav container is named grav # make sure that your dns has a cname set for grav server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name grav.*; diff --git a/graylog.subdomain.conf.sample b/graylog.subdomain.conf.sample index 4efb68b..5f77013 100644 --- a/graylog.subdomain.conf.sample +++ b/graylog.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your graylog container is named graylog # make sure that your dns has a cname set for graylog # Ensure the upstream_port matches your GRAYLOG_HTTP_BIND_ADDRESS port @@ -6,7 +6,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name graylog.*; diff --git a/grocy.subdomain.conf.sample b/grocy.subdomain.conf.sample index 9b4a138..8bb6001 100644 --- a/grocy.subdomain.conf.sample +++ b/grocy.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your grocy container is named grocy # make sure that your dns has a cname set for grocy server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name grocy.*; diff --git a/guacamole.subdomain.conf.sample b/guacamole.subdomain.conf.sample index 55d7191..d237b28 100644 --- a/guacamole.subdomain.conf.sample +++ b/guacamole.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your guacamole container is named guacamole # make sure that your dns has a cname set for guacamole server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name guacamole.*; diff --git a/hass-configurator.subdomain.conf.sample b/hass-configurator.subdomain.conf.sample index c5979d5..a3fe8ac 100644 --- a/hass-configurator.subdomain.conf.sample +++ b/hass-configurator.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your hass container is named hass # make sure that your dns has a cname set for hass # this proxy configuration file is for the hass-configurator-docker container that is used @@ -6,7 +6,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name hass-configurator.*; diff --git a/headphones.subdomain.conf.sample b/headphones.subdomain.conf.sample index 947fe45..15d64ca 100644 --- a/headphones.subdomain.conf.sample +++ b/headphones.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your headphones container is named headphones # make sure that your dns has a cname set for headphones server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name headphones.*; diff --git a/healthchecks.subdomain.conf.sample b/healthchecks.subdomain.conf.sample index a32e400..c8aa6ba 100644 --- a/healthchecks.subdomain.conf.sample +++ b/healthchecks.subdomain.conf.sample @@ -1,11 +1,13 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your healthchecks container is named healthchecks # make sure that your dns has a cname set for healthchecks # make sure your Healthchecks ALLOWED_HOSTS and SITE_ROOT align with the server_name used in this conf. server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name healthchecks.*; diff --git a/hedgedoc.subdomain.conf.sample b/hedgedoc.subdomain.conf.sample index cb946ec..4e89680 100644 --- a/hedgedoc.subdomain.conf.sample +++ b/hedgedoc.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure you set the following environment variables in your docker arguments # CMD_DOMAIN=hedgedoc.server.com # CMD_URL_ADDPORT=false @@ -6,7 +6,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name hedgedoc.*; diff --git a/heimdall.subdomain.conf.sample b/heimdall.subdomain.conf.sample index f1142b9..3543e79 100644 --- a/heimdall.subdomain.conf.sample +++ b/heimdall.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your heimdall container is named heimdall # make sure that your dns has a cname set for heimdall server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name heimdall.*; diff --git a/hoarder.subdomain.conf.sample b/hoarder.subdomain.conf.sample index 6ab18b5..160a6a6 100644 --- a/hoarder.subdomain.conf.sample +++ b/hoarder.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your hoarder container is named hoarder # make sure that your dns has a cname set for hoarder server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name hoarder.*; diff --git a/homarr.subdomain.conf.sample b/homarr.subdomain.conf.sample index 6119fd4..66b1cf0 100644 --- a/homarr.subdomain.conf.sample +++ b/homarr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your homarr container is named homarr # make sure that your dns has a cname set for homarr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name homarr.*; diff --git a/homeassistant.subdomain.conf.sample b/homeassistant.subdomain.conf.sample index bbe0b50..b7e5a2b 100644 --- a/homeassistant.subdomain.conf.sample +++ b/homeassistant.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your homeassistant container is named homeassistant # make sure that your dns has a cname set for homeassistant @@ -13,7 +13,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name homeassistant.*; diff --git a/homebox.subdomain.conf.sample b/homebox.subdomain.conf.sample index 38ef9be..3ed9df2 100644 --- a/homebox.subdomain.conf.sample +++ b/homebox.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your homebox container is named homebox # make sure that your dns has a cname set for homebox server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name homebox.*; diff --git a/homebridge.subdomain.conf.sample b/homebridge.subdomain.conf.sample index 8a140ee..07faba9 100644 --- a/homebridge.subdomain.conf.sample +++ b/homebridge.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your homebridge container is named homebridge # make sure that your dns has a cname set for homebridge server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name homebridge.*; diff --git a/homepage.subdomain.conf.sample b/homepage.subdomain.conf.sample index 23c5a22..a7ee602 100644 --- a/homepage.subdomain.conf.sample +++ b/homepage.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your homepage container is named homepage # make sure that your dns has a cname set for homepage server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name homepage.*; diff --git a/homer.subdomain.conf.sample b/homer.subdomain.conf.sample index 25d386c..e8e7d66 100644 --- a/homer.subdomain.conf.sample +++ b/homer.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your homer container is named homer # make sure that your dns has a cname set for homer server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name homer.*; diff --git a/huginn.subdomain.conf.sample b/huginn.subdomain.conf.sample index 1c2c599..935bb97 100644 --- a/huginn.subdomain.conf.sample +++ b/huginn.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your huginn container is named huginn # make sure that your dns has a cname set for huginn server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name huginn.*; diff --git a/immich.subdomain.conf.sample b/immich.subdomain.conf.sample index 3a0fa95..2930940 100644 --- a/immich.subdomain.conf.sample +++ b/immich.subdomain.conf.sample @@ -1,11 +1,13 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your immich container is named immich # make sure that your dns has a cname set for immich # immich v1.118+ only. For earlier versions, change $upstream_port to 3001 server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name immich.*; diff --git a/immich_server.subdomain.conf.sample b/immich_server.subdomain.conf.sample index 19c201a..34bc4a9 100644 --- a/immich_server.subdomain.conf.sample +++ b/immich_server.subdomain.conf.sample @@ -1,11 +1,13 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your immich container is named immich_server # make sure that your dns has a cname set for immich # immich v1.118+ only. For earlier versions, change $upstream_port to 3001 server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name immich.*; diff --git a/influxdb.subdomain.conf.sample b/influxdb.subdomain.conf.sample index 8b56edd..f289e76 100644 --- a/influxdb.subdomain.conf.sample +++ b/influxdb.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your influxdb container is named influxdb # make sure that your dns has a cname set for influxdb server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name influxdb.*; diff --git a/iplayarr.subdomain.conf.sample b/iplayarr.subdomain.conf.sample index 8b1be49..65dd217 100644 --- a/iplayarr.subdomain.conf.sample +++ b/iplayarr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your iplayarr container is named iplayarr # make sure that your dns has a cname set for iplayarr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name iplayarr.*; diff --git a/it-tools.subdomain.conf.sample b/it-tools.subdomain.conf.sample index 28104d4..ffaa1bc 100644 --- a/it-tools.subdomain.conf.sample +++ b/it-tools.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your it-tools container is named it-tools # make sure that your dns has a cname set for it-tools server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name it-tools.*; diff --git a/jackett.subdomain.conf.sample b/jackett.subdomain.conf.sample index d959b90..c761222 100644 --- a/jackett.subdomain.conf.sample +++ b/jackett.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your jackett container is named jackett # make sure that your dns has a cname set for jackett server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name jackett.*; diff --git a/jdownloader.subdomain.conf.sample b/jdownloader.subdomain.conf.sample index 4d510cf..3a695e9 100644 --- a/jdownloader.subdomain.conf.sample +++ b/jdownloader.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your jdownloader container is named jdownloader # make sure that your dns has a cname set for jdownloader server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name jdownloader.*; diff --git a/jellyfin.subdomain.conf.sample b/jellyfin.subdomain.conf.sample index c749234..4f667c3 100644 --- a/jellyfin.subdomain.conf.sample +++ b/jellyfin.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your jellyfin container is named jellyfin # make sure that your dns has a cname set for jellyfin # if jellyfin is running in bridge mode and the container is named "jellyfin", the below config should work as is @@ -8,7 +8,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name jellyfin.*; diff --git a/jellyseerr.subdomain.conf.sample b/jellyseerr.subdomain.conf.sample index 3a8ede1..ad0e9fa 100644 --- a/jellyseerr.subdomain.conf.sample +++ b/jellyseerr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your jellyseerr container is named jellyseerr # make sure that your dns has a cname set for jellyseerr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name jellyseerr.*; diff --git a/jfa-go.subdomain.conf.sample b/jfa-go.subdomain.conf.sample index 1c93eda..f02cb06 100644 --- a/jfa-go.subdomain.conf.sample +++ b/jfa-go.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your jfa-go container is named jfa-go # make sure that your dns has a cname set for jfa-go server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name jfa-go.*; diff --git a/joplin.subdomain.conf.sample b/joplin.subdomain.conf.sample index 858a186..7269cb0 100644 --- a/joplin.subdomain.conf.sample +++ b/joplin.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your joplin container is named joplin # make sure that your dns has a cname set for joplin server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name joplin.*; diff --git a/kanzi.subdomain.conf.sample b/kanzi.subdomain.conf.sample index c755d1b..41a3a9b 100644 --- a/kanzi.subdomain.conf.sample +++ b/kanzi.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your kanzi container is named kanzi # make sure that your dns has a cname set for kanzi server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name kanzi.*; diff --git a/kasm.subdomain.conf.sample b/kasm.subdomain.conf.sample index f78d3de..58dc673 100644 --- a/kasm.subdomain.conf.sample +++ b/kasm.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your kasm container is named kasm # make sure that your dns has a cname set for kasm and kasm-wizard @@ -8,7 +8,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name kasm.*; @@ -61,7 +63,9 @@ server { server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name kasm-wizard.*; diff --git a/kavita.subdomain.conf.sample b/kavita.subdomain.conf.sample index 8c2e8e0..c401eb6 100644 --- a/kavita.subdomain.conf.sample +++ b/kavita.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your kavita container is named kavita # make sure that your dns has a cname set for kavita server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name kavita.*; diff --git a/kimai.subdomain.conf.sample b/kimai.subdomain.conf.sample index f95e26a..9d40050 100644 --- a/kimai.subdomain.conf.sample +++ b/kimai.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your kimai container is named kimai # make sure that your dns has a cname set for kimai server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name kimai.*; diff --git a/komga.subdomain.conf.sample b/komga.subdomain.conf.sample index 4ae38a9..0fee672 100644 --- a/komga.subdomain.conf.sample +++ b/komga.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your komga container is named komga # make sure that your dns has a cname set for komga server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name komga.*; diff --git a/kopia.subdomain.conf.sample b/kopia.subdomain.conf.sample index 47b250b..e400af7 100644 --- a/kopia.subdomain.conf.sample +++ b/kopia.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your kopia container is named kopia # make sure that your dns has a cname set for kopia server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name kopia.*; diff --git a/lazylibrarian.subdomain.conf.sample b/lazylibrarian.subdomain.conf.sample index 8926ec3..762da03 100644 --- a/lazylibrarian.subdomain.conf.sample +++ b/lazylibrarian.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your lazylibrarian container is named lazylibrarian # make sure that your dns has a cname set for lazylibrarian server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name lazylibrarian.*; diff --git a/leantime.subdomain.conf.sample b/leantime.subdomain.conf.sample index 93a7ff5..aa29afd 100644 --- a/leantime.subdomain.conf.sample +++ b/leantime.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your leantime container is named leantime # make sure that your dns has a cname set for leantime server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name leantime.*; diff --git a/libreddit.subdomain.conf.sample b/libreddit.subdomain.conf.sample index 6971d6b..73b52c3 100644 --- a/libreddit.subdomain.conf.sample +++ b/libreddit.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your libreddit container is named libreddit # make sure that your dns has a cname set for libreddit server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name libreddit.*; diff --git a/librespeed.subdomain.conf.sample b/librespeed.subdomain.conf.sample index 6ff3199..3b2732e 100644 --- a/librespeed.subdomain.conf.sample +++ b/librespeed.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your librespeed container is named librespeed # make sure that your dns has a cname set for librespeed server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name librespeed.*; diff --git a/lidarr.subdomain.conf.sample b/lidarr.subdomain.conf.sample index 7089c52..2b3f98f 100644 --- a/lidarr.subdomain.conf.sample +++ b/lidarr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your lidarr container is named lidarr # make sure that your dns has a cname set for lidarr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name lidarr.*; diff --git a/linkace.subdomain.conf.sample b/linkace.subdomain.conf.sample index 483c44f..7471854 100644 --- a/linkace.subdomain.conf.sample +++ b/linkace.subdomain.conf.sample @@ -1,11 +1,13 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your linkace container is named linkace # make sure that your dns has a cname set for linkace # use linkace:simple package with included proxy server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name linkace.*; diff --git a/linkstack.subdomain.conf.sample b/linkstack.subdomain.conf.sample index c8ea10e..8f26100 100644 --- a/linkstack.subdomain.conf.sample +++ b/linkstack.subdomain.conf.sample @@ -1,9 +1,11 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your dns has a cname set for linkstack and that your linkstack container is not using a base url server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name linkstack.*; diff --git a/linkwarden.subdomain.conf.sample b/linkwarden.subdomain.conf.sample index c8c4b16..da1f34a 100644 --- a/linkwarden.subdomain.conf.sample +++ b/linkwarden.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your linkwarden container is named linkwarden # make sure that your dns has a cname set for linkwarden server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name linkwarden.*; diff --git a/lldap.subdomain.conf.sample b/lldap.subdomain.conf.sample index 5656148..384254b 100644 --- a/lldap.subdomain.conf.sample +++ b/lldap.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your lldap container is named lldap # make sure that your dns has a cname set for lldap server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name lldap.*; diff --git a/lubelogger.subdomain.conf.sample b/lubelogger.subdomain.conf.sample index 2f738a1..29f8c3d 100644 --- a/lubelogger.subdomain.conf.sample +++ b/lubelogger.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your lubelogger container is named lubelogger # make sure that your dns has a cname set for lubelogger server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name lubelogger.*; diff --git a/lychee.subdomain.conf.sample b/lychee.subdomain.conf.sample index f635e4c..34c6fdf 100644 --- a/lychee.subdomain.conf.sample +++ b/lychee.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your lychee container is named lychee # make sure that your dns has a cname set for lychee server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name lychee.*; diff --git a/mailu.subdomain.conf.sample b/mailu.subdomain.conf.sample index 71dfe23..4743bbe 100644 --- a/mailu.subdomain.conf.sample +++ b/mailu.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your mailu container is named front # make sure that your dns has a cname set for mailu server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name mailu.*; diff --git a/maintainerr.subdomain.conf.sample b/maintainerr.subdomain.conf.sample index 6977965..c39de39 100644 --- a/maintainerr.subdomain.conf.sample +++ b/maintainerr.subdomain.conf.sample @@ -1,11 +1,13 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your maintainerr container is named maintainerr # make sure that your dns has a cname set for maintainerr # maintainerr v2.0.0+ only. for prior versions, set upstream_port to 80 server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name maintainerr.*; diff --git a/mastodon.subdomain.conf.sample b/mastodon.subdomain.conf.sample index ebe1fdf..9a4113f 100644 --- a/mastodon.subdomain.conf.sample +++ b/mastodon.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your mastodon container is named mastodon # make sure that your dns has a cname set for mastodon # make sure you set `WEB_DOMAIN=mastodon.example.com` env var for the mastodon container @@ -8,7 +8,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name mastodon.*; diff --git a/matomo.subdomain.conf.sample b/matomo.subdomain.conf.sample index 93b9f9a..a46e9b9 100644 --- a/matomo.subdomain.conf.sample +++ b/matomo.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your matomo container is named matomo # make sure that your dns has a cname set for matomo server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name matomo.*; diff --git a/mattermost.subdomain.conf.sample b/mattermost.subdomain.conf.sample index 8520315..b73a4cc 100644 --- a/mattermost.subdomain.conf.sample +++ b/mattermost.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # Make sure that your DNS has a CNAME record for "mattermost" and your Mattermost container is using the same subdomain # To learn how to deploy Mattermost via Docker, visit https://docs.mattermost.com/install/install-docker.html server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name mattermost.*; diff --git a/mealie.subdomain.conf.sample b/mealie.subdomain.conf.sample index 8a3e079..2a4a04e 100644 --- a/mealie.subdomain.conf.sample +++ b/mealie.subdomain.conf.sample @@ -1,9 +1,11 @@ -## Version 2025/06/08 +## Version 2025/07/18 # Ensure your DNS has a CNAME set for mealie and that mealie container is named. server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name mealie.*; diff --git a/medusa.subdomain.conf.sample b/medusa.subdomain.conf.sample index 093229d..5106a4c 100644 --- a/medusa.subdomain.conf.sample +++ b/medusa.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your medusa container is named medusa # make sure that your dns has a cname set for medusa server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name medusa.*; diff --git a/metabase.subdomain.conf.sample b/metabase.subdomain.conf.sample index 356d4f5..445bc70 100644 --- a/metabase.subdomain.conf.sample +++ b/metabase.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your metabase container is named metabase # make sure that your dns has a cname set for metabase server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name metabase.*; diff --git a/metube.subdomain.conf.sample b/metube.subdomain.conf.sample index 9d7d772..c07e263 100644 --- a/metube.subdomain.conf.sample +++ b/metube.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your metube container is named metube # make sure that your dns has a cname set for metube server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name metube.*; diff --git a/miniflux.subdomain.conf.sample b/miniflux.subdomain.conf.sample index a4cc8bc..e83ab5b 100644 --- a/miniflux.subdomain.conf.sample +++ b/miniflux.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your miniflux container is named miniflux # make sure that your dns has a cname set for miniflux server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name miniflux.*; diff --git a/monica.subdomain.conf.sample b/monica.subdomain.conf.sample index 23e0156..6744a49 100644 --- a/monica.subdomain.conf.sample +++ b/monica.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your monica container is named monica. # make sure that your dns has a cname set for monica. # monica container should have the env var APP_ENV=production set. @@ -7,7 +7,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name monica.*; diff --git a/monitorr.subdomain.conf.sample b/monitorr.subdomain.conf.sample index 28fd20e..d7658c3 100644 --- a/monitorr.subdomain.conf.sample +++ b/monitorr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your monitorr container is named monitorr # make sure that your dns has a cname set for monitorr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name monitorr.*; diff --git a/mstream.subdomain.conf.sample b/mstream.subdomain.conf.sample index 4c97990..01a42d2 100644 --- a/mstream.subdomain.conf.sample +++ b/mstream.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your mstream container is named mstream # make sure that your dns has a cname set for mstream server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name mstream.*; diff --git a/mylar.subdomain.conf.sample b/mylar.subdomain.conf.sample index 8d3c7a5..2fbf545 100644 --- a/mylar.subdomain.conf.sample +++ b/mylar.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your mylar container is named mylar # make sure that your dns has a cname set for mylar server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name mylar.*; diff --git a/n8n.subdomain.conf.sample b/n8n.subdomain.conf.sample index 57ef9ff..093a181 100644 --- a/n8n.subdomain.conf.sample +++ b/n8n.subdomain.conf.sample @@ -1,11 +1,13 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your n8n container is named n8n # make sure that your dns has a cname set for n8n # add `server.use-forward-headers=true` to `/config/application.properties` to ensure logs contain real source IP server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name n8n.*; diff --git a/navidrome.subdomain.conf.sample b/navidrome.subdomain.conf.sample index 2165117..9542268 100644 --- a/navidrome.subdomain.conf.sample +++ b/navidrome.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your navidrome container is named navidrome # make sure that your dns has a cname set for navidrome server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name navidrome.*; diff --git a/netboot.subdomain.conf.sample b/netboot.subdomain.conf.sample index 3a6ff5f..f0aae38 100644 --- a/netboot.subdomain.conf.sample +++ b/netboot.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your netboot container is named netboot # make sure that your dns has a cname set for netboot server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name netboot.*; diff --git a/netbox.subdomain.conf.sample b/netbox.subdomain.conf.sample index 5457817..2065832 100644 --- a/netbox.subdomain.conf.sample +++ b/netbox.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your container is named netbox # make sure that your dns has a cname set for netbox # make sure your netbox instance is using ALLOWED_HOST=netbox.domain.com (replace with your own domain) @@ -6,7 +6,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name netbox.*; diff --git a/netdata.subdomain.conf.sample b/netdata.subdomain.conf.sample index 9e43867..3def484 100644 --- a/netdata.subdomain.conf.sample +++ b/netdata.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your netdata container is named netdata # make sure that your dns has a cname set for netdata server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name netdata.*; diff --git a/nextcloud.subdomain.conf.sample b/nextcloud.subdomain.conf.sample index d43300a..7d99f85 100644 --- a/nextcloud.subdomain.conf.sample +++ b/nextcloud.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your nextcloud container is named nextcloud # make sure that your dns has a cname set for nextcloud # assuming this container is called "swag", edit your nextcloud container's config @@ -16,7 +16,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name nextcloud.*; diff --git a/nexusoss.subdomain.conf.sample b/nexusoss.subdomain.conf.sample index d171948..d67f065 100644 --- a/nexusoss.subdomain.conf.sample +++ b/nexusoss.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your nexusoss container is named nexusoss # make sure that your dns has a cname set for nexusoss # make sure that the port for the nexusoss container 8081 (the first location "/") @@ -6,7 +6,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name nexusoss.*; diff --git a/nocodb.subdomain.conf.sample b/nocodb.subdomain.conf.sample index c9a9060..314e6fd 100644 --- a/nocodb.subdomain.conf.sample +++ b/nocodb.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your nocodb container is named nocodb # make sure that your dns has a cname set for nocodb server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name nocodb.*; diff --git a/notifiarr.subdomain.conf.sample b/notifiarr.subdomain.conf.sample index 28526fd..7f90da2 100644 --- a/notifiarr.subdomain.conf.sample +++ b/notifiarr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your notifiarr container is named notifiarr # make sure that your dns has a cname set for notifiarr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name notifiarr.*; diff --git a/ntfy.subdomain.conf.sample b/ntfy.subdomain.conf.sample index c009399..7454b6f 100644 --- a/ntfy.subdomain.conf.sample +++ b/ntfy.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your ntfy container is named ntfy # make sure that your dns has a cname set for ntfy server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name ntfy.*; diff --git a/nzbget.subdomain.conf.sample b/nzbget.subdomain.conf.sample index 4a20345..02fcc4f 100644 --- a/nzbget.subdomain.conf.sample +++ b/nzbget.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your nzbget container is named nzbget # make sure that your dns has a cname set for nzbget server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name nzbget.*; diff --git a/nzbhydra.subdomain.conf.sample b/nzbhydra.subdomain.conf.sample index 1ff798d..753f92c 100644 --- a/nzbhydra.subdomain.conf.sample +++ b/nzbhydra.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your nzbhydra container is named nzbhydra2 # make sure that your dns has a cname set for nzbhydra server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name nzbhydra.*; diff --git a/octoprint.subdomain.conf.sample b/octoprint.subdomain.conf.sample index 8af4d9d..2d683c1 100644 --- a/octoprint.subdomain.conf.sample +++ b/octoprint.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your octoprint container is named octoprint # make sure that your dns has a cname set for octoprint server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name octoprint.*; diff --git a/ombi.subdomain.conf.sample b/ombi.subdomain.conf.sample index a136fdf..e166364 100644 --- a/ombi.subdomain.conf.sample +++ b/ombi.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your ombi container is named ombi # make sure that your dns has a cname set for ombi server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name ombi.*; diff --git a/onetimesecret.subdomain.conf.sample b/onetimesecret.subdomain.conf.sample index 51489e9..155e1a3 100644 --- a/onetimesecret.subdomain.conf.sample +++ b/onetimesecret.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your onetimesecret container is named onetimesecret # make sure that your dns has a cname set for onetimesecret server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name onetimesecret.*; diff --git a/oogway.subdomain.conf.sample b/oogway.subdomain.conf.sample index b638cc9..e7eb141 100644 --- a/oogway.subdomain.conf.sample +++ b/oogway.subdomain.conf.sample @@ -1,11 +1,13 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your oogway container is named oogway # make sure that your dns has a cname set for oogway server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name oogway.*; diff --git a/open-webui.subdomain.conf.sample b/open-webui.subdomain.conf.sample index 4d69602..4897f24 100644 --- a/open-webui.subdomain.conf.sample +++ b/open-webui.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your open-webui container is named open-webui # make sure that your dns has a cname set for open-webui server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name open-webui.*; diff --git a/openhab.subdomain.conf.sample b/openhab.subdomain.conf.sample index 2303b5b..bb8b11e 100644 --- a/openhab.subdomain.conf.sample +++ b/openhab.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your openhab container is named openhab # make sure that your dns has a cname set for openhab server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name openhab.*; diff --git a/openvpn-as.subdomain.conf.sample b/openvpn-as.subdomain.conf.sample index 8354502..ef7d35a 100644 --- a/openvpn-as.subdomain.conf.sample +++ b/openvpn-as.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your openvpn-as container is named openvpn-as # make sure that your dns has a cname set for openvpn-as server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name openvpn-as.*; diff --git a/openvscode-server.subdomain.conf.sample b/openvscode-server.subdomain.conf.sample index fe3d82c..e7c1726 100644 --- a/openvscode-server.subdomain.conf.sample +++ b/openvscode-server.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your openvscode-server container is named openvscode-server # make sure that your dns has a cname set for openvscode-server # This conf allows accessing internal ports at `PORT` (http) or `PORTs` (https) as subdomain @@ -7,7 +7,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name openvscode-server.*; @@ -56,7 +58,9 @@ server { server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name "~^(?[0-9]{1,10})\.openvscode-server\..*$"; @@ -104,7 +108,9 @@ server { server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name "~^(?[0-9]{1,10})s\.openvscode-server\..*$"; diff --git a/organizr.subdomain.conf.sample b/organizr.subdomain.conf.sample index ea4095d..08509dd 100644 --- a/organizr.subdomain.conf.sample +++ b/organizr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your organizr container is named organizr # make sure that your dns has a cname set for organizr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name organizr.*; diff --git a/osticket.subdomain.conf.sample b/osticket.subdomain.conf.sample index ac1b51b..a34db31 100644 --- a/osticket.subdomain.conf.sample +++ b/osticket.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your osticket container is named osticket # make sure that your dns has a cname set for osticket server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name osticket.*; diff --git a/overseerr.subdomain.conf.sample b/overseerr.subdomain.conf.sample index ea2eb16..13fb834 100644 --- a/overseerr.subdomain.conf.sample +++ b/overseerr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your overseerr container is named overseerr # make sure that your dns has a cname set for overseerr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name overseerr.*; diff --git a/paperless.subdomain.conf.sample b/paperless.subdomain.conf.sample index 55a9491..5d9907e 100644 --- a/paperless.subdomain.conf.sample +++ b/paperless.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your paperless container is named paperless # make sure that your dns has a cname set for paperless server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name paperless.*; diff --git a/papermerge.subdomain.conf.sample b/papermerge.subdomain.conf.sample index 37c1a03..9f2aed3 100644 --- a/papermerge.subdomain.conf.sample +++ b/papermerge.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your papermerge container is named papermerge # make sure that your dns has a cname set for papermerge server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name papermerge.*; diff --git a/partdb.subdomain.conf.sample b/partdb.subdomain.conf.sample index bcd6b30..975a59a 100644 --- a/partdb.subdomain.conf.sample +++ b/partdb.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your partdb container is named partdb # make sure that your dns has a cname set for partdb server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name partdb.*; diff --git a/petio.subdomain.conf.sample b/petio.subdomain.conf.sample index e38cc0f..5c732b6 100644 --- a/petio.subdomain.conf.sample +++ b/petio.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your petio container is named petio # make sure that your dns has a cname set for petio server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name petio.*; diff --git a/pgadmin.subdomain.conf.sample b/pgadmin.subdomain.conf.sample index b7c3804..46b4b98 100644 --- a/pgadmin.subdomain.conf.sample +++ b/pgadmin.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your pgadmin container is named pgadmin # make sure that your dns has a cname set for pgadmin server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name pgadmin.*; diff --git a/phoneinfoga.subdomain.conf.sample b/phoneinfoga.subdomain.conf.sample index ed96acb..31f9bc8 100644 --- a/phoneinfoga.subdomain.conf.sample +++ b/phoneinfoga.subdomain.conf.sample @@ -1,11 +1,13 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your phoneinfoga container is named phoneinfoga # make sure that your dns has a cname set for phoneinfoga # add command: 'serve' to your docker compose, so the PhoneInfoga web server starts server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name phoneinfoga.*; diff --git a/photoprism.subdomain.conf.sample b/photoprism.subdomain.conf.sample index 5abdf96..657db94 100644 --- a/photoprism.subdomain.conf.sample +++ b/photoprism.subdomain.conf.sample @@ -1,9 +1,11 @@ -## Version 2025/06/08 +## Version 2025/07/18 # Ensure your DNS has a CNAME set for Photoprism and that Photoprism container is named. server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name photoprism.*; diff --git a/phpmyadmin.subdomain.conf.sample b/phpmyadmin.subdomain.conf.sample index 8163ec1..e92af1e 100644 --- a/phpmyadmin.subdomain.conf.sample +++ b/phpmyadmin.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your phpmyadmin container is named phpmyadmin # make sure that your dns has a cname set for phpmyadmin server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name phpmyadmin.*; diff --git a/pihole.subdomain.conf.sample b/pihole.subdomain.conf.sample index 6773311..342f3c7 100644 --- a/pihole.subdomain.conf.sample +++ b/pihole.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your pihole container is named pihole # make sure that your dns has a cname set for pihole server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name pihole.*; diff --git a/pingvin-share.subdomain.conf.sample b/pingvin-share.subdomain.conf.sample index cc014bf..98562fa 100644 --- a/pingvin-share.subdomain.conf.sample +++ b/pingvin-share.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your pingvin-share container is named pingvin-share # make sure that your dns has a cname set for pingvin-share server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name pingvin-share.*; diff --git a/pinry.subdomain.conf.sample b/pinry.subdomain.conf.sample index 435d410..6e1aa95 100644 --- a/pinry.subdomain.conf.sample +++ b/pinry.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your pinry container is named pinry # make sure that your dns has a cname set for pinry server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name pinry.*; diff --git a/piwigo.subdomain.conf.sample b/piwigo.subdomain.conf.sample index beac248..f1e8205 100644 --- a/piwigo.subdomain.conf.sample +++ b/piwigo.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your piwigo container is named piwigo # make sure that your dns has a cname set for piwigo server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name piwigo.*; diff --git a/pixelfed.subdomain.conf.sample b/pixelfed.subdomain.conf.sample index 53d859d..8676381 100644 --- a/pixelfed.subdomain.conf.sample +++ b/pixelfed.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your pixelfed container is named pixelfed # make sure that your dns has a cname set for pixelfed server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name pixelfed.*; diff --git a/planka.subdomain.conf.sample b/planka.subdomain.conf.sample index 5ddbd0e..0d1e4ed 100644 --- a/planka.subdomain.conf.sample +++ b/planka.subdomain.conf.sample @@ -1,11 +1,13 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your planka container is named planka # make sure that your dns has a cname set for planka # make sure that the BASE_URL env variable in planka container is set to: BASE_URL="https://planka.example.com" server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name planka.*; diff --git a/plex.subdomain.conf.sample b/plex.subdomain.conf.sample index f2992f2..78a94af 100644 --- a/plex.subdomain.conf.sample +++ b/plex.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your plex container is named plex # make sure that your dns has a cname set for plex # if plex is running in bridge mode and the container is named "plex", the below config should work as is @@ -8,7 +8,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name plex.*; diff --git a/plexwebtools.subdomain.conf.sample b/plexwebtools.subdomain.conf.sample index f96bb77..92904b0 100644 --- a/plexwebtools.subdomain.conf.sample +++ b/plexwebtools.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your plex container is named plex # make sure that your dns has a cname set for plexwebtools server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name plexwebtools.*; diff --git a/podgrab.subdomain.conf.sample b/podgrab.subdomain.conf.sample index 451909d..9614984 100644 --- a/podgrab.subdomain.conf.sample +++ b/podgrab.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your podgrab container is named podgrab # make sure that your dns has a cname set for podgrab server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name podgrab.*; diff --git a/portainer.subdomain.conf.sample b/portainer.subdomain.conf.sample index d1f91a7..4119144 100644 --- a/portainer.subdomain.conf.sample +++ b/portainer.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your portainer container is named portainer # make sure that your dns has a cname set for portainer server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name portainer.*; diff --git a/privatebin.subdomain.conf.sample b/privatebin.subdomain.conf.sample index 6d7d45a..c6c578e 100644 --- a/privatebin.subdomain.conf.sample +++ b/privatebin.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your privatebin container is named privatebin # make sure that your dns has a cname set for privatebin server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name privatebin.*; diff --git a/prometheus.subdomain.conf.sample b/prometheus.subdomain.conf.sample index 9da3104..1b2ab86 100644 --- a/prometheus.subdomain.conf.sample +++ b/prometheus.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your prometheus container is named prometheus # make sure that your dns has a cname set for prometheus server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name prometheus.*; diff --git a/prowlarr.subdomain.conf.sample b/prowlarr.subdomain.conf.sample index f7cd259..681d76f 100644 --- a/prowlarr.subdomain.conf.sample +++ b/prowlarr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your prowlarr container is named prowlarr # make sure that your dns has a cname set for prowlarr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name prowlarr.*; diff --git a/pterodactyl.subdomain.conf.sample b/pterodactyl.subdomain.conf.sample index a1ef1ad..4d33bf5 100644 --- a/pterodactyl.subdomain.conf.sample +++ b/pterodactyl.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # this is for your actual panel, not nodes # make sure you set your pterodactyl servers "remote" and "api" addresses to the domains you specify here # ensure you have enabled "ssl encryption" and (if necessary) "behind proxy" in your pterodactyl server @@ -7,7 +7,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name pterodactyl.*; diff --git a/pterodactylnode.subdomain.conf.sample b/pterodactylnode.subdomain.conf.sample index ebc2912..85bf09b 100644 --- a/pterodactylnode.subdomain.conf.sample +++ b/pterodactylnode.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # this is for nodes, not your actual panel # make sure you set your node to use 443 as its API port # make sure that your pterodactylnode container is named pterodactylnode @@ -6,7 +6,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name pterodactylnode.*; diff --git a/pwndrop.subdomain.conf.sample b/pwndrop.subdomain.conf.sample index dfa33ee..10704b0 100644 --- a/pwndrop.subdomain.conf.sample +++ b/pwndrop.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your pwndrop container is named pwndrop # make sure that your dns has a cname set for pwndrop server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name pwndrop.*; diff --git a/pydio-cells.subdomain.conf.sample b/pydio-cells.subdomain.conf.sample index 1b3b913..adcad50 100644 --- a/pydio-cells.subdomain.conf.sample +++ b/pydio-cells.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your pydio-cells container is named pydio-cells # make sure that your dns has a cname set for pydio-cells server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name pydio-cells.*; diff --git a/pydio.subdomain.conf.sample b/pydio.subdomain.conf.sample index bf21d59..517e0d0 100644 --- a/pydio.subdomain.conf.sample +++ b/pydio.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your pydio container is named pydio # make sure that your dns has a cname set for pydio server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name pydio.*; diff --git a/pyload.subdomain.conf.sample b/pyload.subdomain.conf.sample index 9f06623..2f653cd 100644 --- a/pyload.subdomain.conf.sample +++ b/pyload.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your pyload container is named pyload # make sure that your dns has a cname set for pyload server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name pyload.*; diff --git a/qbittorrent.subdomain.conf.sample b/qbittorrent.subdomain.conf.sample index 84eb1ae..c67a1be 100644 --- a/qbittorrent.subdomain.conf.sample +++ b/qbittorrent.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your qbittorrent container is named qbittorrent # make sure that your dns has a cname set for qbittorrent # Api and related location bypasses are now commented out by default @@ -12,7 +12,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name qbittorrent.*; diff --git a/quassel-web.subdomain.conf.sample b/quassel-web.subdomain.conf.sample index 9bf0506..d61f587 100644 --- a/quassel-web.subdomain.conf.sample +++ b/quassel-web.subdomain.conf.sample @@ -1,11 +1,13 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your quassel container is named quassel-web # make sure that your dns has a cname set for quassel # make sure Quassel-Web is running on http with -e 'HTTPS'='false' or if you're using -e 'ADVANCED'='true' by editing config.json appropriately server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name quassel.*; diff --git a/radarr.subdomain.conf.sample b/radarr.subdomain.conf.sample index 4d5c46d..3b5add0 100644 --- a/radarr.subdomain.conf.sample +++ b/radarr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your radarr container is named radarr # make sure that your dns has a cname set for radarr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name radarr.*; diff --git a/rallly.subdomain.conf.sample b/rallly.subdomain.conf.sample index f877dc2..40b712f 100644 --- a/rallly.subdomain.conf.sample +++ b/rallly.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your rallly container is named rallly # make sure that your dns has a cname set for rallly server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name rallly.*; diff --git a/raneto.subdomain.conf.sample b/raneto.subdomain.conf.sample index e0eb3d1..4630a20 100644 --- a/raneto.subdomain.conf.sample +++ b/raneto.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your raneto container is named raneto # make sure that your dns has a cname set for raneto server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name raneto.*; diff --git a/readarr.subdomain.conf.sample b/readarr.subdomain.conf.sample index 1bc3123..a1cb1c6 100644 --- a/readarr.subdomain.conf.sample +++ b/readarr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your readarr container is named readarr # make sure that your dns has a cname set for readarr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name readarr.*; diff --git a/recipes.subdomain.conf.sample b/recipes.subdomain.conf.sample index 515a74c..52d3555 100644 --- a/recipes.subdomain.conf.sample +++ b/recipes.subdomain.conf.sample @@ -1,11 +1,13 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your recipes container is named recipes # make sure that your dns has a cname set for recipes # make sure to mount /media/ in your swag container to point to your Recipes Media directory server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name recipes.*; diff --git a/requestrr.subdomain.conf.sample b/requestrr.subdomain.conf.sample index 86d2391..700fb04 100644 --- a/requestrr.subdomain.conf.sample +++ b/requestrr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your requestrr container is named requestrr # make sure that your dns has a cname set for requestrr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name requestrr.*; diff --git a/resilio-sync.subdomain.conf.sample b/resilio-sync.subdomain.conf.sample index 5cd20fd..287a9f9 100644 --- a/resilio-sync.subdomain.conf.sample +++ b/resilio-sync.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your resilio-sync container is named resilio-sync # make sure that your dns has a cname set for resilio-sync server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name resilio-sync.*; diff --git a/romm.subdomain.conf.sample b/romm.subdomain.conf.sample index 46e1c34..b9bc217 100644 --- a/romm.subdomain.conf.sample +++ b/romm.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your romM container is named romm # make sure that your dns has a cname set for romm server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name romm.*; diff --git a/rutorrent.subdomain.conf.sample b/rutorrent.subdomain.conf.sample index 75471bf..6051a46 100644 --- a/rutorrent.subdomain.conf.sample +++ b/rutorrent.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your rutorrent container is named rutorrent # make sure that your dns has a cname set for rutorrent server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name rutorrent.*; diff --git a/sabnzbd.subdomain.conf.sample b/sabnzbd.subdomain.conf.sample index ad820fa..6e372d6 100644 --- a/sabnzbd.subdomain.conf.sample +++ b/sabnzbd.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your sabnzbd container is named sabnzbd # make sure that your dns has a cname set for sabnzbd # edit the sabnzbd.ini host_whitelist to avoid hostname verification issues. This format: @@ -6,7 +6,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name sabnzbd.*; diff --git a/saltrim.subdomain.conf.sample b/saltrim.subdomain.conf.sample index de4aa5e..30b6150 100644 --- a/saltrim.subdomain.conf.sample +++ b/saltrim.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your saltrim webserver container is named bar_assistant-webserver-1 or manually change to match the upstream_app below # make sure that your dns has a cname set for saltrim server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name saltrim.*; diff --git a/scrutiny.subdomain.conf.sample b/scrutiny.subdomain.conf.sample index a3a409b..25cf36b 100644 --- a/scrutiny.subdomain.conf.sample +++ b/scrutiny.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your scrutiny container is named scrutiny # make sure that your dns has a cname set for scrutiny server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name scrutiny.*; diff --git a/semaphore.subdomain.conf.sample b/semaphore.subdomain.conf.sample index 3a99fc7..87ec40d 100644 --- a/semaphore.subdomain.conf.sample +++ b/semaphore.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your semaphore container is named semaphore # make sure that your dns has a cname set for semaphore server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name semaphore.*; diff --git a/shinobi.subdomain.conf.sample b/shinobi.subdomain.conf.sample index 492cb52..e8f5195 100644 --- a/shinobi.subdomain.conf.sample +++ b/shinobi.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your shinobi container is named shinobi # make sure that your dns has a cname set for shinobi server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name shinobi.*; diff --git a/shlink.subdomain.conf.sample b/shlink.subdomain.conf.sample index bbd1395..668edb5 100644 --- a/shlink.subdomain.conf.sample +++ b/shlink.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your shlink container is named shlink # make sure that your dns has a cname set for shlink server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name shlink.*; diff --git a/sickchill.subdomain.conf.sample b/sickchill.subdomain.conf.sample index f3df9b5..a4fe84c 100644 --- a/sickchill.subdomain.conf.sample +++ b/sickchill.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your sickchill container is named sickchill # make sure that your dns has a cname set for sickchill server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name sickchill.*; diff --git a/sickrage.subdomain.conf.sample b/sickrage.subdomain.conf.sample index 4db5616..4356de8 100644 --- a/sickrage.subdomain.conf.sample +++ b/sickrage.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your sickrage container is named sickrage # make sure that your dns has a cname set for sickrage server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name sickrage.*; diff --git a/skyhook.subdomain.conf.sample b/skyhook.subdomain.conf.sample index 33676ad..8c89b83 100644 --- a/skyhook.subdomain.conf.sample +++ b/skyhook.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your skyhook container is named skyhook # make sure that your dns has a cname set for skyhook server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name skyhook.*; diff --git a/smokeping.subdomain.conf.sample b/smokeping.subdomain.conf.sample index f864429..fa0340b 100644 --- a/smokeping.subdomain.conf.sample +++ b/smokeping.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your smokeping container is named smokeping # make sure that your dns has a cname set for smokeping server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name smokeping.*; diff --git a/sonarr.subdomain.conf.sample b/sonarr.subdomain.conf.sample index 893274c..7b7f640 100644 --- a/sonarr.subdomain.conf.sample +++ b/sonarr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your sonarr container is named sonarr # make sure that your dns has a cname set for sonarr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name sonarr.*; diff --git a/sonarrtorss.subdomain.conf.sample b/sonarrtorss.subdomain.conf.sample index d4a1863..42a58d3 100644 --- a/sonarrtorss.subdomain.conf.sample +++ b/sonarrtorss.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your sonarrtorss container is named sonarrtorss # make sure that your dns has a cname set for sonarrtorss server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name sonarrtorss.*; diff --git a/speedtest-tracker.subdomain.conf.sample b/speedtest-tracker.subdomain.conf.sample index 6278217..822621b 100644 --- a/speedtest-tracker.subdomain.conf.sample +++ b/speedtest-tracker.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your speedtest-tracker container is named speedtest-tracker # make sure that your dns has a cname set for speedtest-tracker server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name speedtest-tracker.*; diff --git a/spoolman.subdomain.conf.sample b/spoolman.subdomain.conf.sample index 3ee1889..523c498 100644 --- a/spoolman.subdomain.conf.sample +++ b/spoolman.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your spoolman container is named spoolman # make sure that your dns has a cname set for spoolman server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name spoolman.*; diff --git a/statping.subdomain.conf.sample b/statping.subdomain.conf.sample index d27669f..d822b16 100644 --- a/statping.subdomain.conf.sample +++ b/statping.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your statping container is named statup # make sure that your dns has a cname set for statping # If you are using the SSL docker-compose.yml on the statping repo, then the container name will be set to statup. @@ -6,7 +6,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name statping.*; diff --git a/stirling-pdf.subdomain.conf.sample b/stirling-pdf.subdomain.conf.sample index 805ce22..90385dd 100644 --- a/stirling-pdf.subdomain.conf.sample +++ b/stirling-pdf.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your stirling-pdf container is named stirling-pdf # make sure that your dns has a cname set for stirling-pdf server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name stirling-pdf.*; diff --git a/storm.subdomain.conf.sample b/storm.subdomain.conf.sample index 7d91b40..f6e422e 100644 --- a/storm.subdomain.conf.sample +++ b/storm.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # reverse proxy config for a modern deluge interface named storm # https://github.com/relvacode/storm # make sure that your storm container is named storm @@ -6,7 +6,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name storm.*; diff --git a/synapse.subdomain.conf.sample b/synapse.subdomain.conf.sample index 921d9ff..443fd66 100644 --- a/synapse.subdomain.conf.sample +++ b/synapse.subdomain.conf.sample @@ -1,8 +1,10 @@ -## Version 2025/06/08 +## Version 2025/07/18 server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; # For the federation port listen 8448 ssl; diff --git a/synclounge.subdomain.conf.sample b/synclounge.subdomain.conf.sample index dd3e005..b652279 100644 --- a/synclounge.subdomain.conf.sample +++ b/synclounge.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your synclounge container is named synclounge # make sure that your dns has a cname set for synclounge # Use this with SyncLounge v3 and up. @@ -6,7 +6,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; listen 80; listen [::]:80; diff --git a/syncthing.subdomain.conf.sample b/syncthing.subdomain.conf.sample index a2dd5f4..cdc3d45 100644 --- a/syncthing.subdomain.conf.sample +++ b/syncthing.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your syncthing container is named syncthing # make sure that your dns has a cname set for syncthing server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name syncthing.*; diff --git a/taisun.subdomain.conf.sample b/taisun.subdomain.conf.sample index d830ea0..1e20ef0 100644 --- a/taisun.subdomain.conf.sample +++ b/taisun.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your taisun container is named taisun # make sure that your dns has a cname set for taisun server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name taisun.*; diff --git a/tasmobackup.subdomain.conf.sample b/tasmobackup.subdomain.conf.sample index 8c0ff72..c76147e 100644 --- a/tasmobackup.subdomain.conf.sample +++ b/tasmobackup.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your tasmobackup container is named tasmobackup # make sure that your dns has a cname set for tasmobackup server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name tasmobackup.*; diff --git a/tautulli.subdomain.conf.sample b/tautulli.subdomain.conf.sample index b2bf9ad..fa48707 100644 --- a/tautulli.subdomain.conf.sample +++ b/tautulli.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your tautulli container is named tautulli # make sure that your dns has a cname set for tautulli server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name tautulli.*; diff --git a/tdarr.subdomain.conf.sample b/tdarr.subdomain.conf.sample index d3ad07a..03f6ca6 100644 --- a/tdarr.subdomain.conf.sample +++ b/tdarr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your tdarr container is named tdarr # make sure that your dns has a cname set for tdarr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name tdarr.*; diff --git a/thelounge.subdomain.conf.sample b/thelounge.subdomain.conf.sample index 2ce58c8..d5c0f13 100644 --- a/thelounge.subdomain.conf.sample +++ b/thelounge.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your thelounge container is named thelounge # make sure that your dns has a cname set for thelounge server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name thelounge.*; diff --git a/themepark.subdomain.conf.sample b/themepark.subdomain.conf.sample index 72ccd89..7c2f232 100644 --- a/themepark.subdomain.conf.sample +++ b/themepark.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your theme-park. container is named theme-park. # make sure that your dns has a cname set for themepark. server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name themepark.*; diff --git a/tinyauth.subdomain.conf.sample b/tinyauth.subdomain.conf.sample index 4f24a90..24eb3ee 100644 --- a/tinyauth.subdomain.conf.sample +++ b/tinyauth.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your tinyauth container is named tinyauth # make sure that your dns has a cname set for tinyauth server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name tinyauth.*; diff --git a/transmission.subdomain.conf.sample b/transmission.subdomain.conf.sample index 0c14c92..272d0dc 100644 --- a/transmission.subdomain.conf.sample +++ b/transmission.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # Make sure that DNS has a cname set for transmission # # Some Transmission Chrome extensions cannot handle HTTP/2 proxies as they @@ -12,7 +12,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name transmission.*; diff --git a/ubooquity.subdomain.conf.sample b/ubooquity.subdomain.conf.sample index 7969b84..4438cae 100644 --- a/ubooquity.subdomain.conf.sample +++ b/ubooquity.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your ubooquity container is named ubooquity # make sure that your dns has a cname set for ubooquity server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name ubooquity.*; diff --git a/unifi-controller.subdomain.conf.sample b/unifi-controller.subdomain.conf.sample index 9e0f928..35f332a 100644 --- a/unifi-controller.subdomain.conf.sample +++ b/unifi-controller.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your unifi-controller container is named unifi-controller # make sure that your dns has a cname set for unifi # NOTE: If you use the proxy_cookie_path setting in proxy.conf you need to remove HTTPOnly; @@ -6,7 +6,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name unifi.*; diff --git a/unifi-network-application.subdomain.conf.sample b/unifi-network-application.subdomain.conf.sample index c83c032..aa80325 100644 --- a/unifi-network-application.subdomain.conf.sample +++ b/unifi-network-application.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your unifi-network-application container is named unifi-network-application # make sure that your dns has a cname set for unifi # NOTE: If you use the proxy_cookie_path setting in proxy.conf you need to remove HTTPOnly; @@ -7,7 +7,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name unifi.*; diff --git a/uptime-kuma.subdomain.conf.sample b/uptime-kuma.subdomain.conf.sample index 37c60d0..a0a17d5 100644 --- a/uptime-kuma.subdomain.conf.sample +++ b/uptime-kuma.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your uptime-kuma container is named uptime-kuma # make sure that your dns has a cname set for uptime-kuma server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name uptime-kuma.*; diff --git a/vaultwarden.subdomain.conf.sample b/vaultwarden.subdomain.conf.sample index 60b2739..761607b 100644 --- a/vaultwarden.subdomain.conf.sample +++ b/vaultwarden.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your vaultwarden container is named vaultwarden # make sure that your dns has a cname set for vaultwarden # if you are using bitwarden (the official image), use the bitwarden conf @@ -8,7 +8,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name vaultwarden.*; diff --git a/viewtube.subdomain.conf.sample b/viewtube.subdomain.conf.sample index 9c766b4..8e1a291 100644 --- a/viewtube.subdomain.conf.sample +++ b/viewtube.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your viewtube container is named viewtube # make sure that your dns has a cname set for viewtube server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name viewtube.*; diff --git a/wallabag.subdomain.conf.sample b/wallabag.subdomain.conf.sample index f8647cd..73de4a6 100644 --- a/wallabag.subdomain.conf.sample +++ b/wallabag.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your wallabag container is named wallabag # make sure that your dns has a cname set for wallabag # also, make sure your env var in your docker run or compose match the full domain, incl. https:// @@ -6,7 +6,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name wallabag.*; diff --git a/warpgate.subdomain.conf.sample b/warpgate.subdomain.conf.sample index 998072f..872898a 100644 --- a/warpgate.subdomain.conf.sample +++ b/warpgate.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your warpgate container is named warpgate # make sure that your dns has a cname set for warpgate server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name warpgate.*; diff --git a/watcharr.subdomain.conf.sample b/watcharr.subdomain.conf.sample index cb19209..8f9beb8 100644 --- a/watcharr.subdomain.conf.sample +++ b/watcharr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your watcharr container is named watcharr # make sure that your dns has a cname set for watcharr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name watcharr.*; diff --git a/watchstate.subdomain.conf.sample b/watchstate.subdomain.conf.sample index c117379..5f16843 100644 --- a/watchstate.subdomain.conf.sample +++ b/watchstate.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your radarr container is named watchstate # make sure that your dns has a cname set for watchstate # the api endpoint is not behind auth, so please make sure to enable @@ -6,7 +6,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name watchstate.*; diff --git a/webtop.subdomain.conf.sample b/webtop.subdomain.conf.sample index cf49a69..362e29a 100644 --- a/webtop.subdomain.conf.sample +++ b/webtop.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that you have a cname set for the webtop # set up authentication here, for better security server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name webtop.*; diff --git a/whisparr.subdomain.conf.sample b/whisparr.subdomain.conf.sample index cf1a4b8..bc443f5 100644 --- a/whisparr.subdomain.conf.sample +++ b/whisparr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your whisparr container is named whisparr # make sure that your dns has a cname set for whisparr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name whisparr.*; diff --git a/wikijs.subdomain.conf.sample b/wikijs.subdomain.conf.sample index f75ef79..1071ace 100644 --- a/wikijs.subdomain.conf.sample +++ b/wikijs.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your wikijs container is named wikijs # make sure that your dns has a cname set for wikijs server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name wikijs.*; diff --git a/wizarr.subdomain.conf.sample b/wizarr.subdomain.conf.sample index 9fafc45..84e00df 100644 --- a/wizarr.subdomain.conf.sample +++ b/wizarr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your wizarr container is named wizarr # make sure that your dns has a cname set for wizarr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name wizarr.*; diff --git a/wordpress.subdomain.conf.sample b/wordpress.subdomain.conf.sample index 9a141e9..79489cd 100644 --- a/wordpress.subdomain.conf.sample +++ b/wordpress.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your wordpress container is named wordpress # make sure that your dns has a cname set for wordpress server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name wordpress.*; diff --git a/wrapperr.subdomain.conf.sample b/wrapperr.subdomain.conf.sample index 478174c..ff49588 100644 --- a/wrapperr.subdomain.conf.sample +++ b/wrapperr.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your wrapperr container is named wrapperr # make sure that your dns has a cname set for wrapperr server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name wrapperr.*; diff --git a/yacht.subdomain.conf.sample b/yacht.subdomain.conf.sample index b0554a7..7d46933 100644 --- a/yacht.subdomain.conf.sample +++ b/yacht.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your yacht container is named yacht # make sure that your dns has a cname set for yacht server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name yacht.*; diff --git a/your-spotify-api.subdomain.conf.sample b/your-spotify-api.subdomain.conf.sample index 0b4a418..ae613e0 100644 --- a/your-spotify-api.subdomain.conf.sample +++ b/your-spotify-api.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # https://github.com/Yooooomi/your_spotify # this is not a standalone config, it requires configured your-spotify web container for full functionality. # it uses server URLs for api callbacks, thus a server is required @@ -8,7 +8,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name your-spotify-server.*; diff --git a/your-spotify.subdomain.conf.sample b/your-spotify.subdomain.conf.sample index 9714e86..bc0bd15 100644 --- a/your-spotify.subdomain.conf.sample +++ b/your-spotify.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/06/08 +## Version 2025/07/18 # https://github.com/Yooooomi/your_spotify # this is not a standalone config, it requires configured your-spotify api container for full functionality. # it uses server URLs for api callbacks, thus a server is required @@ -8,7 +8,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name your-spotify.*; diff --git a/yourls.subdomain.conf.sample b/yourls.subdomain.conf.sample index 134763e..ee8edd7 100644 --- a/yourls.subdomain.conf.sample +++ b/yourls.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your yourls container is named yourls # make sure that your dns has a cname set for yourls if necessary server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name yourls.*; diff --git a/youtube-dl-server.subdomain.conf.sample b/youtube-dl-server.subdomain.conf.sample index 8f65a0a..f4a9ce7 100644 --- a/youtube-dl-server.subdomain.conf.sample +++ b/youtube-dl-server.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your youtube-dl-server container is named youtube-dl-server # make sure that your dns has a cname set for youtube-dl-server server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name youtube-dl-server.*; diff --git a/yt-dlp-web.subdomain.conf.sample b/yt-dlp-web.subdomain.conf.sample index a287410..88f8dc4 100644 --- a/yt-dlp-web.subdomain.conf.sample +++ b/yt-dlp-web.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your yt-dlp-web container is named yt-dlp-web # make sure that your dns has a cname set for yt-dlp-web server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name yt-dlp-web.*; diff --git a/zigbee2mqtt.subdomain.conf.sample b/zigbee2mqtt.subdomain.conf.sample index 62fd269..88e065d 100644 --- a/zigbee2mqtt.subdomain.conf.sample +++ b/zigbee2mqtt.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your zigbee2mqtt container is named zigbee2mqtt # make sure that your dns has a cname set for zigbee2mqtt server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name zigbee2mqtt.*; diff --git a/znc.subdomain.conf.sample b/znc.subdomain.conf.sample index dc49097..bb944f1 100644 --- a/znc.subdomain.conf.sample +++ b/znc.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your znc container is named znc # make sure that your dns has a cname set for znc server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name znc.*; diff --git a/zwave-js-ui.subdomain.conf.sample b/zwave-js-ui.subdomain.conf.sample index c2ecb50..1c56a28 100644 --- a/zwave-js-ui.subdomain.conf.sample +++ b/zwave-js-ui.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your zwave-js-ui container is named zwave-js-ui # make sure that your dns has a cname set for zwave-js-ui server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name zwave-js-ui.*; diff --git a/zwavejs2mqtt.subdomain.conf.sample b/zwavejs2mqtt.subdomain.conf.sample index 092da65..f845e39 100644 --- a/zwavejs2mqtt.subdomain.conf.sample +++ b/zwavejs2mqtt.subdomain.conf.sample @@ -1,10 +1,12 @@ -## Version 2025/06/08 +## Version 2025/07/18 # make sure that your zwavejs2mqtt container is named zwavejs2mqtt # make sure that your dns has a cname set for zwavejs2mqtt server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name zwavejs2mqtt.*; From b5acd79700578ee8892de39d69d5edc3323e27a5 Mon Sep 17 00:00:00 2001 From: thespad Date: Fri, 18 Jul 2025 20:43:04 +0100 Subject: [PATCH 81/81] Add missing confs --- mailcow.subdomain.conf.sample | 10 +++++++++- qbit-manage.subdomain.conf.sample | 10 +++++++++- 2 files changed, 18 insertions(+), 2 deletions(-) diff --git a/mailcow.subdomain.conf.sample b/mailcow.subdomain.conf.sample index 4782432..bb9ba49 100644 --- a/mailcow.subdomain.conf.sample +++ b/mailcow.subdomain.conf.sample @@ -1,4 +1,4 @@ -## Version 2025/05/31 +## Version 2025/07/18 # make sure that your mailcow container is named mailcow # make sure that you are aqquainted with the mailcow documentation (https://docs.mailcow.email/) # make sure you have read the most important entries in the "Get Started" section, "Post Installation Tasks -> Reverse Proxy -> Overview" and "Post Installation Tasks -> Reverse Proxy -> Nginx" sections @@ -7,7 +7,9 @@ server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; # modify these to match your domain/mailcow configuration server_name mailcow.* autoconfig.* autodiscover.*; @@ -26,6 +28,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -40,6 +45,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/resolver.conf; set $upstream_app mailcow; set $upstream_port 8080; diff --git a/qbit-manage.subdomain.conf.sample b/qbit-manage.subdomain.conf.sample index 0afe3ea..ed59bcc 100644 --- a/qbit-manage.subdomain.conf.sample +++ b/qbit-manage.subdomain.conf.sample @@ -1,11 +1,13 @@ -## Version 2025/07/12 +## Version 2025/07/18 # make sure that your qbit-manage container is named qbit-manage # make sure that your dns has a cname set for qbit-manage # qbit-manage v4.5.0+ only server { listen 443 ssl; +# listen 443 quic; listen [::]:443 ssl; +# listen [::]:443 quic; server_name qbit-manage.*; @@ -22,6 +24,9 @@ server { # enable for Authentik (requires authentik-location.conf in the location block) #include /config/nginx/authentik-server.conf; + # enable for Tinyauth (requires tinyauth-location.conf in the location block) + #include /config/nginx/tinyauth-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -36,6 +41,9 @@ server { # enable for Authentik (requires authentik-server.conf in the server block) #include /config/nginx/authentik-location.conf; + # enable for Tinyauth (requires tinyauth-server.conf in the server block) + #include /config/nginx/tinyauth-location.conf; + include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; set $upstream_app qbit-manage;