mirror of
https://github.com/linuxserver/reverse-proxy-confs.git
synced 2025-07-06 04:51:33 -07:00
add authelia subdomain conf and add auth support
This commit is contained in:
parent
14eb015b45
commit
eb5510831b
140 changed files with 713 additions and 0 deletions
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app adguard;
|
||||
|
|
|
@ -12,6 +12,9 @@ location ^~ /adminer/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app adminer;
|
||||
|
|
|
@ -14,6 +14,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -23,6 +26,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app airsonic;
|
||||
|
|
|
@ -9,6 +9,9 @@ location ^~ /airsonic {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app airsonic;
|
||||
|
|
23
authelia.subdomain.conf.sample
Normal file
23
authelia.subdomain.conf.sample
Normal file
|
@ -0,0 +1,23 @@
|
|||
# make sure that your dns has a cname set for authelia
|
||||
|
||||
server {
|
||||
listen 443 ssl;
|
||||
listen [::]:443 ssl;
|
||||
|
||||
server_name authelia.*;
|
||||
|
||||
include /config/nginx/ssl.conf;
|
||||
|
||||
client_max_body_size 0;
|
||||
|
||||
location / {
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app authelia;
|
||||
set $upstream_port 9091;
|
||||
set $upstream_proto http;
|
||||
proxy_pass $upstream_proto://$upstream_app:$upstream_port;
|
||||
|
||||
}
|
||||
}
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app bazarr;
|
||||
|
|
|
@ -12,6 +12,9 @@ location ^~ /bazarr/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app bazarr;
|
||||
|
|
|
@ -14,6 +14,9 @@ server {
|
|||
#enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
#enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -23,6 +26,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app beets;
|
||||
|
|
|
@ -9,6 +9,9 @@ location /beets {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app beets;
|
||||
|
|
|
@ -14,6 +14,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -23,6 +26,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app bitwarden;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
proxy_buffering off;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app booksonic;
|
||||
|
|
|
@ -9,6 +9,9 @@ location ^~ /booksonic {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app booksonic;
|
||||
|
|
|
@ -21,6 +21,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app bookstack;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app calibre-web;
|
||||
|
|
|
@ -12,6 +12,9 @@ location ^~ /calibre-web/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app calibre-web;
|
||||
set $upstream_port 8083;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app calibre;
|
||||
set $upstream_port 8080;
|
||||
|
|
|
@ -12,6 +12,9 @@ location ^~ /calibre/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app calibre;
|
||||
set $upstream_port 8080;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app code-server;
|
||||
|
|
|
@ -15,6 +15,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -24,6 +27,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app codimd;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app couchpotato;
|
||||
|
|
|
@ -9,6 +9,9 @@ location ^~ /couchpotato {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app couchpotato;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app deluge;
|
||||
|
|
|
@ -12,6 +12,9 @@ location ^~ /deluge/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app deluge;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app dillinger;
|
||||
|
|
|
@ -14,6 +14,9 @@ server {
|
|||
#enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
#enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -23,6 +26,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app documentserver;
|
||||
|
|
|
@ -14,6 +14,9 @@ server {
|
|||
#enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
#enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -23,6 +26,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app dokuwiki;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app domoticz;
|
||||
|
|
|
@ -9,6 +9,9 @@ location ^~ /domoticz/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app domoticz;
|
||||
|
|
|
@ -12,6 +12,9 @@ location ^~ /dozzle/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
chunked_transfer_encoding off;
|
||||
proxy_buffering off;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app duplicati;
|
||||
set $upstream_port 8200;
|
||||
|
|
|
@ -12,6 +12,9 @@ location ^~ /duplicati/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app duplicati;
|
||||
set $upstream_port 8200;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app embystat;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app flood;
|
||||
|
|
|
@ -12,6 +12,9 @@ location ^~ /flood/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app flood;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
proxy_buffering off;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app freshrss;
|
||||
|
|
|
@ -13,6 +13,9 @@ location ^~ /freshrss/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app freshrss;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
#enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
#enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app ghost;
|
||||
|
|
|
@ -10,6 +10,9 @@ location /blog {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app ghost;
|
||||
|
|
|
@ -17,6 +17,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -26,6 +29,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app gitea;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app glances;
|
||||
|
|
|
@ -12,6 +12,9 @@ location ^~ /glances/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app glances;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app gotify;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app grafana;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app grocy;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
proxy_buffering off;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
|
|
|
@ -12,6 +12,9 @@ location ^~ /guacamole/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
proxy_buffering off;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app headphones;
|
||||
|
|
|
@ -9,6 +9,9 @@ location ^~ /headphones {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app headphones;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app heimdall;
|
||||
|
|
|
@ -9,6 +9,9 @@ location / {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app heimdall;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app homeassistant;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app jackett;
|
||||
|
|
|
@ -9,6 +9,9 @@ location ^~ /jackett {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app jackett;
|
||||
|
|
|
@ -13,6 +13,9 @@ location ^~ /jenkins/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
# This is the maximum upload size
|
||||
client_max_body_size 10m;
|
||||
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app kanzi;
|
||||
|
|
|
@ -12,6 +12,9 @@ location ^~ /kanzi/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app kanzi;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app lazylibrarian;
|
||||
|
|
|
@ -9,6 +9,9 @@ location ^~ /lazylibrarian {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app lazylibrarian;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app librespeed;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app lidarr;
|
||||
|
|
|
@ -9,6 +9,9 @@ location ^~ /lidarr {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app lidarr;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app lychee;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -21,6 +24,9 @@ server {
|
|||
# enable the next two lines for ldap auth
|
||||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
|
|
|
@ -14,6 +14,9 @@ location ^~ /admin/ {
|
|||
# enable the next two lines for ldap auth, also customize and enable ldap.conf in the default conf
|
||||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
|
@ -35,6 +38,9 @@ location ^~ /webmail/ {
|
|||
# enable the next two lines for ldap auth, also customize and enable ldap.conf in the default conf
|
||||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection "upgrade";
|
||||
|
|
|
@ -9,6 +9,9 @@ location ^~ /medusa {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection "upgrade";
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app monitorr;
|
||||
|
|
|
@ -12,6 +12,9 @@ location ^~ /monitorr/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app monitorr;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app mstream;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app mylar;
|
||||
|
|
|
@ -9,6 +9,9 @@ location ^~ /mylar {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app mylar;
|
||||
|
|
|
@ -14,6 +14,9 @@ location ^~ /todo/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app mytinytodo;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app netboot;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app netdata;
|
||||
|
|
|
@ -12,6 +12,9 @@ location ^~ /netdata/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app netdata;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app nzbget;
|
||||
|
|
|
@ -9,6 +9,9 @@ location /nzbget {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app nzbget;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app nzbhydra2;
|
||||
|
|
|
@ -9,6 +9,9 @@ location ^~ /nzbhydra {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app nzbhydra2;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app ombi;
|
||||
|
|
|
@ -13,6 +13,9 @@ location ^~ /ombi/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app ombi;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app openvpn-as;
|
||||
|
@ -40,6 +46,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app openvpn-as;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app organizr;
|
||||
|
|
|
@ -9,6 +9,9 @@ location / {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app organizr;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app osticket;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app phpmyadmin;
|
||||
|
|
|
@ -12,6 +12,9 @@ location ^~ /phpmyadmin/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app phpmyadmin;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app pihole;
|
||||
|
@ -41,6 +47,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app pihole;
|
||||
|
|
|
@ -12,6 +12,9 @@ location ^~ /pihole/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app pihole;
|
||||
|
@ -35,6 +38,9 @@ location ^~ /pihole/admin/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app pihole;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app piwigo;
|
||||
|
|
|
@ -18,6 +18,9 @@ server {
|
|||
|
||||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -27,6 +30,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app plex;
|
||||
|
|
|
@ -18,6 +18,9 @@ location ^~ /plex/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app plex;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app plex;
|
||||
|
|
|
@ -12,6 +12,9 @@ location ^~ /plexwebtools/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app plex;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app portainer;
|
||||
set $upstream_port 9000;
|
||||
|
@ -42,6 +48,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app portainer;
|
||||
set $upstream_port 9000;
|
||||
|
|
|
@ -12,6 +12,9 @@ location ^~ /portainer/ {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app portainer;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app prometheus;
|
||||
|
|
|
@ -13,6 +13,9 @@ server {
|
|||
# enable for ldap auth, fill in ldap details in ldap.conf
|
||||
#include /config/nginx/ldap.conf;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-server.conf;
|
||||
|
||||
location / {
|
||||
# enable the next two lines for http auth
|
||||
#auth_basic "Restricted";
|
||||
|
@ -22,6 +25,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app pydio-cells;
|
||||
|
@ -39,6 +45,9 @@ server {
|
|||
#auth_request /auth;
|
||||
#error_page 401 =200 /login;
|
||||
|
||||
# enable for Authelia
|
||||
#include /config/nginx/authelia-location.conf;
|
||||
|
||||
include /config/nginx/proxy.conf;
|
||||
resolver 127.0.0.11 valid=30s;
|
||||
set $upstream_app pydio-cells;
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue