Remove ^~

This commit is contained in:
Eric Nemchik 2019-06-09 19:04:18 -05:00
commit e75129b38a
41 changed files with 59 additions and 59 deletions

View file

@ -1,6 +1,6 @@
# set the CONTEXT_PATH variable to /airsonic in airsonic container. # set the CONTEXT_PATH variable to /airsonic in airsonic container.
location ^~ /airsonic { location /airsonic {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -3,7 +3,7 @@
location /bazarr { location /bazarr {
return 301 $scheme://$host/bazarr/; return 301 $scheme://$host/bazarr/;
} }
location ^~ /bazarr/ { location /bazarr/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -12,19 +12,19 @@ server {
set $upstream_collabora collabora; set $upstream_collabora collabora;
# static files # static files
location ^~ /loleaflet { location /loleaflet {
proxy_pass https://$upstream_collabora:9980; proxy_pass https://$upstream_collabora:9980;
proxy_set_header Host $http_host; proxy_set_header Host $http_host;
} }
# WOPI discovery URL # WOPI discovery URL
location ^~ /hosting/discovery { location /hosting/discovery {
proxy_pass https://$upstream_collabora:9980; proxy_pass https://$upstream_collabora:9980;
proxy_set_header Host $http_host; proxy_set_header Host $http_host;
} }
# Capabilities # Capabilities
location ^~ /hosting/capabilities { location /hosting/capabilities {
proxy_pass https://$upstream_collabora:9980; proxy_pass https://$upstream_collabora:9980;
proxy_set_header Host $http_host; proxy_set_header Host $http_host;
} }
@ -45,7 +45,7 @@ server {
} }
# Admin Console websocket # Admin Console websocket
location ^~ /lool/adminws { location /lool/adminws {
proxy_pass https://$upstream_collabora:9980; proxy_pass https://$upstream_collabora:9980;
proxy_set_header Upgrade $http_upgrade; proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "Upgrade"; proxy_set_header Connection "Upgrade";

View file

@ -1,6 +1,6 @@
# first go into couchpotato settings, under "General" set the URL Base to /couchpotato and restart the couchpotato container # first go into couchpotato settings, under "General" set the URL Base to /couchpotato and restart the couchpotato container
location ^~ /couchpotato { location /couchpotato {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -3,7 +3,7 @@
location /deluge { location /deluge {
return 301 $scheme://$host/deluge/; return 301 $scheme://$host/deluge/;
} }
location ^~ /deluge/ { location /deluge/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -1,6 +1,6 @@
# set the WEBROOT variable to domoticz for the domoticz container. # set the WEBROOT variable to domoticz for the domoticz container.
location ^~ /domoticz/ { location /domoticz/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -3,7 +3,7 @@
location /duplicati { location /duplicati {
return 301 $scheme://$host/duplicati/; return 301 $scheme://$host/duplicati/;
} }
location ^~ /duplicati/ { location /duplicati/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -7,7 +7,7 @@
location /emby { location /emby {
return 301 $scheme://$host/emby/; return 301 $scheme://$host/emby/;
} }
location ^~ /emby/ { location /emby/ {
include /config/nginx/proxy.conf; include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s; resolver 127.0.0.11 valid=30s;
set $upstream_emby emby; set $upstream_emby emby;
@ -17,7 +17,7 @@ location ^~ /emby/ {
proxy_set_header If-Range $http_if_range; proxy_set_header If-Range $http_if_range;
} }
location ^~ /embywebsocket { location /embywebsocket {
include /config/nginx/proxy.conf; include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s; resolver 127.0.0.11 valid=30s;
set $upstream_emby emby; set $upstream_emby emby;

View file

@ -3,7 +3,7 @@
location /flood { location /flood {
return 301 $scheme://$host/flood/; return 301 $scheme://$host/flood/;
} }
location ^~ /flood/ { location /flood/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -8,7 +8,7 @@ location /gitea {
return 301 $scheme://$host/gitea/; return 301 $scheme://$host/gitea/;
} }
location ^~ /gitea/ { location /gitea/ {
include /config/nginx/proxy.conf; include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s; resolver 127.0.0.11 valid=30s;
set $upstream_gitea gitea; set $upstream_gitea gitea;

View file

@ -3,7 +3,7 @@
location /glances { location /glances {
return 301 $scheme://$host/glances/; return 301 $scheme://$host/glances/;
} }
location ^~ /glances/ { location /glances/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -3,7 +3,7 @@
location /guacamole { location /guacamole {
return 301 $scheme://$host/guacamole/; return 301 $scheme://$host/guacamole/;
} }
location ^~ /guacamole/ { location /guacamole/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -1,6 +1,6 @@
# first stop the headphones container and edit the config.ini for headphones and set http_root to /headphones and then start the headphones container # first stop the headphones container and edit the config.ini for headphones and set http_root to /headphones and then start the headphones container
location ^~ /headphones { location /headphones {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -3,7 +3,7 @@
location /kanzi { location /kanzi {
return 301 $scheme://$host/kanzi/; return 301 $scheme://$host/kanzi/;
} }
location ^~ /kanzi/ { location /kanzi/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -1,6 +1,6 @@
# first go into lazylibrarian settings, under "Interface" set the URL Base to /lazylibrarian and restart the lazylibrarian container # first go into lazylibrarian settings, under "Interface" set the URL Base to /lazylibrarian and restart the lazylibrarian container
location ^~ /lazylibrarian { location /lazylibrarian {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -1,6 +1,6 @@
# first go into lidarr settings, under "General" set the URL Base to /lidarr and restart the lidarr container # first go into lidarr settings, under "General" set the URL Base to /lidarr and restart the lidarr container
location ^~ /lidarr { location /lidarr {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;
@ -15,7 +15,7 @@ location ^~ /lidarr {
proxy_pass http://$upstream_lidarr:8686; proxy_pass http://$upstream_lidarr:8686;
} }
location ^~ /lidarr/api { location /lidarr/api {
include /config/nginx/proxy.conf; include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s; resolver 127.0.0.11 valid=30s;
set $upstream_lidarr lidarr; set $upstream_lidarr lidarr;

View file

@ -1,6 +1,6 @@
# first go into medusa settings, under "Interface" set the URL Base to /medusa and restart the medusa container # first go into medusa settings, under "Interface" set the URL Base to /medusa and restart the medusa container
location ^~ /medusa { location /medusa {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -3,7 +3,7 @@
location /monitorr { location /monitorr {
return 301 $scheme://$host/monitorr/; return 301 $scheme://$host/monitorr/;
} }
location ^~ /monitorr/ { location /monitorr/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -1,6 +1,6 @@
# first stop the mylar container and edit the config.ini for mylar and set http_root to /mylar and then start the mylar container # first stop the mylar container and edit the config.ini for mylar and set http_root to /mylar and then start the mylar container
location ^~ /mylar { location /mylar {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -1,11 +1,11 @@
# works with https://github.com/breakall/mytinytodo-docker # works with https://github.com/breakall/mytinytodo-docker
# set the mtt_url to 'https://your.domain.com/todo/' in db/config.php # set the mtt_url to 'https://your.domain.com/todo/' in db/config.php
location ^~ /todo { location /todo {
return 301 $scheme://$host/todo/; return 301 $scheme://$host/todo/;
} }
location ^~ /todo/ { location /todo/ {
# enable the next two lines for http auth # enable the next two lines for http auth
# auth_basic "Restricted"; # auth_basic "Restricted";

View file

@ -3,7 +3,7 @@
location /netdata { location /netdata {
return 301 $scheme://$host/netdata/; return 301 $scheme://$host/netdata/;
} }
location ^~ /netdata/ { location /netdata/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -23,7 +23,7 @@ location /nextcloud {
return 301 $scheme://$host/nextcloud/; return 301 $scheme://$host/nextcloud/;
} }
location ^~ /nextcloud/ { location /nextcloud/ {
include /config/nginx/proxy.conf; include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s; resolver 127.0.0.11 valid=30s;
set $upstream_nextcloud nextcloud; set $upstream_nextcloud nextcloud;

View file

@ -1,6 +1,6 @@
# nzbget does not require a base url setting # nzbget does not require a base url setting
location ^~ /nzbget { location /nzbget {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -1,6 +1,6 @@
# first go into nzbhydra settings, set the URL Base to /nzbhydra, then disable CSRF protection on the same page and restart the nzbhydra container # first go into nzbhydra settings, set the URL Base to /nzbhydra, then disable CSRF protection on the same page and restart the nzbhydra container
location ^~ /nzbhydra { location /nzbhydra {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;
@ -15,7 +15,7 @@ location ^~ /nzbhydra {
proxy_pass http://$upstream_nzbhydra:5076; proxy_pass http://$upstream_nzbhydra:5076;
} }
location ^~ /nzbhydra/api { location /nzbhydra/api {
include /config/nginx/proxy.conf; include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s; resolver 127.0.0.11 valid=30s;
set $upstream_nzbhydra hydra2; set $upstream_nzbhydra hydra2;

View file

@ -4,7 +4,7 @@ location /ombi {
return 301 $scheme://$host/ombi/; return 301 $scheme://$host/ombi/;
} }
location ^~ /ombi/ { location /ombi/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;
@ -20,7 +20,7 @@ location ^~ /ombi/ {
} }
# This allows access to the actual api # This allows access to the actual api
location ^~ /ombi/api { location /ombi/api {
include /config/nginx/proxy.conf; include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s; resolver 127.0.0.11 valid=30s;
set $upstream_ombi ombi; set $upstream_ombi ombi;
@ -31,7 +31,7 @@ if ($http_referer ~* /ombi) {
} }
# This allows access to the documentation for the api # This allows access to the documentation for the api
location ^~ /ombi/swagger { location /ombi/swagger {
include /config/nginx/proxy.conf; include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s; resolver 127.0.0.11 valid=30s;
set $upstream_ombi ombi; set $upstream_ombi ombi;

View file

@ -3,7 +3,7 @@
location /phpmyadmin { location /phpmyadmin {
return 301 $scheme://$host/phpmyadmin/; return 301 $scheme://$host/phpmyadmin/;
} }
location ^~ /phpmyadmin/ { location /phpmyadmin/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -3,7 +3,7 @@
location /pihole { location /pihole {
return 301 $scheme://$host/pihole/; return 301 $scheme://$host/pihole/;
} }
location ^~ /pihole/ { location /pihole/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;
@ -23,7 +23,7 @@ location ^~ /pihole/ {
location /pihole/admin { location /pihole/admin {
return 301 $scheme://$host/pihole/admin/; return 301 $scheme://$host/pihole/admin/;
} }
location ^~ /pihole/admin/ { location /pihole/admin/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -6,7 +6,7 @@
location /plex { location /plex {
return 301 $scheme://$host/plex/; return 301 $scheme://$host/plex/;
} }
location ^~ /plex/ { location /plex/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -3,7 +3,7 @@
location /plexwebtools { location /plexwebtools {
return 301 $scheme://$host/plexwebtools/; return 301 $scheme://$host/plexwebtools/;
} }
location ^~ /plexwebtools/ { location /plexwebtools/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -3,7 +3,7 @@
location /portainer { location /portainer {
return 301 $scheme://$host/portainer/; return 301 $scheme://$host/portainer/;
} }
location ^~ /portainer/ { location /portainer/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;
@ -20,7 +20,7 @@ location ^~ /portainer/ {
proxy_hide_header X-Frame-Options; # Possibly nott needed after Portainer 1.20.0 proxy_hide_header X-Frame-Options; # Possibly nott needed after Portainer 1.20.0
} }
location ^~ /portainer/api/websocket/ { location /portainer/api/websocket/ {
include /config/nginx/proxy.conf; include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s; resolver 127.0.0.11 valid=30s;
set $upstream_portainer portainer; set $upstream_portainer portainer;

View file

@ -3,7 +3,7 @@
location /qbittorrent { location /qbittorrent {
return 301 $scheme://$host/qbittorrent/; return 301 $scheme://$host/qbittorrent/;
} }
location ^~ /qbittorrent/ { location /qbittorrent/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -1,7 +1,7 @@
# Set base-url with docker run command env variable -e 'URL_BASE'='/quassel' and make sure Quassel-Web is running on http # Set base-url with docker run command env variable -e 'URL_BASE'='/quassel' and make sure Quassel-Web is running on http
# with -e 'HTTPS'='false' or if you're using -e 'ADVANCED'='true' by editing config.json appropriately # with -e 'HTTPS'='false' or if you're using -e 'ADVANCED'='true' by editing config.json appropriately
location ^~ /quassel { location /quassel {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -1,6 +1,6 @@
# first go into radarr settings, under "General" set the URL Base to /radarr and restart the radarr container # first go into radarr settings, under "General" set the URL Base to /radarr and restart the radarr container
location ^~ /radarr { location /radarr {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;
@ -15,7 +15,7 @@ location ^~ /radarr {
proxy_pass http://$upstream_radarr:7878; proxy_pass http://$upstream_radarr:7878;
} }
location ^~ /radarr/api { location /radarr/api {
include /config/nginx/proxy.conf; include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s; resolver 127.0.0.11 valid=30s;
set $upstream_radarr radarr; set $upstream_radarr radarr;

View file

@ -3,7 +3,7 @@
location /rutorrent { location /rutorrent {
return 301 $scheme://$host/rutorrent/; return 301 $scheme://$host/rutorrent/;
} }
location ^~ /rutorrent/ { location /rutorrent/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;
@ -19,7 +19,7 @@ location ^~ /rutorrent/ {
proxy_pass http://$upstream_rutorrent:80; proxy_pass http://$upstream_rutorrent:80;
} }
location ^~ /rutorrent/RPC2 { location /rutorrent/RPC2 {
include /config/nginx/proxy.conf; include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s; resolver 127.0.0.11 valid=30s;
set $upstream_rutorrent rutorrent; set $upstream_rutorrent rutorrent;

View file

@ -1,6 +1,6 @@
# sabnzbd already uses the base url /sabnzbd by default so you don't need to do anything extra # sabnzbd already uses the base url /sabnzbd by default so you don't need to do anything extra
location ^~ /sabnzbd { location /sabnzbd {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;
@ -15,7 +15,7 @@ location ^~ /sabnzbd {
proxy_pass http://$upstream_sabnzbd:8080; proxy_pass http://$upstream_sabnzbd:8080;
} }
location ^~ /sabnzbd/api { location /sabnzbd/api {
include /config/nginx/proxy.conf; include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s; resolver 127.0.0.11 valid=30s;
set $upstream_sabnzbd sabnzbd; set $upstream_sabnzbd sabnzbd;

View file

@ -1,6 +1,6 @@
# first stop the sickrage container and edit the config.ini for sickrage and set web_root to /sickrage and then start the sickrage container # first stop the sickrage container and edit the config.ini for sickrage and set web_root to /sickrage and then start the sickrage container
location ^~ /sickrage { location /sickrage {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -1,6 +1,6 @@
# first go into sonarr settings, under "General" set the URL Base to /sonarr and restart the sonarr container # first go into sonarr settings, under "General" set the URL Base to /sonarr and restart the sonarr container
location ^~ /sonarr { location /sonarr {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;
@ -15,7 +15,7 @@ location ^~ /sonarr {
proxy_pass http://$upstream_sonarr:8989; proxy_pass http://$upstream_sonarr:8989;
} }
location ^~ /sonarr/api { location /sonarr/api {
include /config/nginx/proxy.conf; include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s; resolver 127.0.0.11 valid=30s;
set $upstream_sonarr sonarr; set $upstream_sonarr sonarr;

View file

@ -1,6 +1,6 @@
# first go into tautulli settings, under "Web Interface", click on show advanced, set the HTTP root to /tautulli and restart the tautulli container # first go into tautulli settings, under "Web Interface", click on show advanced, set the HTTP root to /tautulli and restart the tautulli container
location ^~ /tautulli { location /tautulli {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;
@ -15,7 +15,7 @@ location ^~ /tautulli {
proxy_pass http://$upstream_tautulli:8181; proxy_pass http://$upstream_tautulli:8181;
} }
location ^~ /tautulli/api { location /tautulli/api {
include /config/nginx/proxy.conf; include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s; resolver 127.0.0.11 valid=30s;
set $upstream_tautulli tautulli; set $upstream_tautulli tautulli;

View file

@ -3,7 +3,7 @@
location /thelounge { location /thelounge {
return 301 $scheme://$host/thelounge/; return 301 $scheme://$host/thelounge/;
} }
location ^~ /thelounge/ { location /thelounge/ {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;

View file

@ -1,6 +1,6 @@
# transmission does not require a base url setting # transmission does not require a base url setting
location ^~ /transmission { location /transmission {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;
@ -16,7 +16,7 @@ location ^~ /transmission {
proxy_pass http://$upstream_transmission:9091; proxy_pass http://$upstream_transmission:9091;
} }
location ^~ /transmission/rpc { location /transmission/rpc {
include /config/nginx/proxy.conf; include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s; resolver 127.0.0.11 valid=30s;
set $upstream_transmission transmission; set $upstream_transmission transmission;

View file

@ -1,6 +1,6 @@
# set the reverse proxy prefix in the admin gui to ubooquity. # set the reverse proxy prefix in the admin gui to ubooquity.
location ^~ /ubooquity { location /ubooquity {
# enable the next two lines for http auth # enable the next two lines for http auth
#auth_basic "Restricted"; #auth_basic "Restricted";
#auth_basic_user_file /config/nginx/.htpasswd; #auth_basic_user_file /config/nginx/.htpasswd;
@ -15,7 +15,7 @@
proxy_pass http://$upstream_ubooquity:2202; proxy_pass http://$upstream_ubooquity:2202;
} }
location ^~ /ubooquity/admin { location /ubooquity/admin {
include /config/nginx/proxy.conf; include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s; resolver 127.0.0.11 valid=30s;
set $upstream_ubooquity ubooquity; set $upstream_ubooquity ubooquity;