diff --git a/adguard.subdomain.conf.sample b/adguard.subdomain.conf.sample index 6f409df..75566b4 100644 --- a/adguard.subdomain.conf.sample +++ b/adguard.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app adguard; diff --git a/adminer.subfolder.conf.sample b/adminer.subfolder.conf.sample index ec0f55a..6d99f9f 100644 --- a/adminer.subfolder.conf.sample +++ b/adminer.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /adminer/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app adminer; diff --git a/airsonic.subdomain.conf.sample b/airsonic.subdomain.conf.sample index 9b93dd5..4256323 100644 --- a/airsonic.subdomain.conf.sample +++ b/airsonic.subdomain.conf.sample @@ -14,6 +14,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -23,6 +26,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app airsonic; diff --git a/airsonic.subfolder.conf.sample b/airsonic.subfolder.conf.sample index 44be55c..df250de 100644 --- a/airsonic.subfolder.conf.sample +++ b/airsonic.subfolder.conf.sample @@ -9,6 +9,9 @@ location ^~ /airsonic { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app airsonic; diff --git a/authelia.subdomain.conf.sample b/authelia.subdomain.conf.sample new file mode 100644 index 0000000..cac5c4e --- /dev/null +++ b/authelia.subdomain.conf.sample @@ -0,0 +1,23 @@ +# make sure that your dns has a cname set for authelia + +server { + listen 443 ssl; + listen [::]:443 ssl; + + server_name authelia.*; + + include /config/nginx/ssl.conf; + + client_max_body_size 0; + + location / { + + include /config/nginx/proxy.conf; + resolver 127.0.0.11 valid=30s; + set $upstream_app authelia; + set $upstream_port 9091; + set $upstream_proto http; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; + + } +} \ No newline at end of file diff --git a/bazarr.subdomain.conf.sample b/bazarr.subdomain.conf.sample index c8054a1..4e8d190 100644 --- a/bazarr.subdomain.conf.sample +++ b/bazarr.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app bazarr; diff --git a/bazarr.subfolder.conf.sample b/bazarr.subfolder.conf.sample index a9bec6e..8b7b7df 100644 --- a/bazarr.subfolder.conf.sample +++ b/bazarr.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /bazarr/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app bazarr; diff --git a/beets.subdomain.conf.sample b/beets.subdomain.conf.sample index 38d604e..4ddcbe6 100644 --- a/beets.subdomain.conf.sample +++ b/beets.subdomain.conf.sample @@ -14,6 +14,9 @@ server { #enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { #enable the next two lines for http auth #auth_basic "Restricted"; @@ -23,6 +26,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app beets; diff --git a/beets.subfolder.conf.sample b/beets.subfolder.conf.sample index 559e70d..c04b234 100644 --- a/beets.subfolder.conf.sample +++ b/beets.subfolder.conf.sample @@ -9,6 +9,9 @@ location /beets { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app beets; diff --git a/bitwarden.subdomain.conf.sample b/bitwarden.subdomain.conf.sample index 59daab6..c37a13c 100644 --- a/bitwarden.subdomain.conf.sample +++ b/bitwarden.subdomain.conf.sample @@ -14,6 +14,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -23,6 +26,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app bitwarden; diff --git a/boinc.subdomain.conf.sample b/boinc.subdomain.conf.sample index 8be90cd..974a403 100644 --- a/boinc.subdomain.conf.sample +++ b/boinc.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; proxy_buffering off; resolver 127.0.0.11 valid=30s; diff --git a/booksonic.subdomain.conf.sample b/booksonic.subdomain.conf.sample index 9f60aa5..97e4b03 100644 --- a/booksonic.subdomain.conf.sample +++ b/booksonic.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app booksonic; diff --git a/booksonic.subfolder.conf.sample b/booksonic.subfolder.conf.sample index 203c2be..e888eba 100644 --- a/booksonic.subfolder.conf.sample +++ b/booksonic.subfolder.conf.sample @@ -9,6 +9,9 @@ location ^~ /booksonic { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app booksonic; diff --git a/bookstack.subdomain.conf.sample b/bookstack.subdomain.conf.sample index 0bba432..adc69c0 100644 --- a/bookstack.subdomain.conf.sample +++ b/bookstack.subdomain.conf.sample @@ -21,6 +21,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app bookstack; diff --git a/calibre-web.subdomain.conf.sample b/calibre-web.subdomain.conf.sample index 54e122a..9c0f37c 100644 --- a/calibre-web.subdomain.conf.sample +++ b/calibre-web.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app calibre-web; diff --git a/calibre-web.subfolder.conf.sample b/calibre-web.subfolder.conf.sample index 42bfd0e..596a6dd 100644 --- a/calibre-web.subfolder.conf.sample +++ b/calibre-web.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /calibre-web/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + resolver 127.0.0.11 valid=30s; set $upstream_app calibre-web; set $upstream_port 8083; diff --git a/calibre.subdomain.conf.sample b/calibre.subdomain.conf.sample index 8bc93e2..40fa5a7 100644 --- a/calibre.subdomain.conf.sample +++ b/calibre.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + resolver 127.0.0.11 valid=30s; set $upstream_app calibre; set $upstream_port 8080; diff --git a/calibre.subfolder.conf.sample b/calibre.subfolder.conf.sample index 94b48d5..5078c2d 100644 --- a/calibre.subfolder.conf.sample +++ b/calibre.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /calibre/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + resolver 127.0.0.11 valid=30s; set $upstream_app calibre; set $upstream_port 8080; diff --git a/code-server.subdomain.conf.sample b/code-server.subdomain.conf.sample index abeb37a..dfb41ac 100644 --- a/code-server.subdomain.conf.sample +++ b/code-server.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app code-server; diff --git a/codimd.subdomain.conf.sample b/codimd.subdomain.conf.sample index 8472978..f2eaea9 100644 --- a/codimd.subdomain.conf.sample +++ b/codimd.subdomain.conf.sample @@ -15,6 +15,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -24,6 +27,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app codimd; diff --git a/couchpotato.subdomain.conf.sample b/couchpotato.subdomain.conf.sample index d72a016..57a1e91 100644 --- a/couchpotato.subdomain.conf.sample +++ b/couchpotato.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app couchpotato; diff --git a/couchpotato.subfolder.conf.sample b/couchpotato.subfolder.conf.sample index 24aae5f..28caa42 100644 --- a/couchpotato.subfolder.conf.sample +++ b/couchpotato.subfolder.conf.sample @@ -9,6 +9,9 @@ location ^~ /couchpotato { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app couchpotato; diff --git a/deluge.subdomain.conf.sample b/deluge.subdomain.conf.sample index 1bf40cd..74601c4 100644 --- a/deluge.subdomain.conf.sample +++ b/deluge.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app deluge; diff --git a/deluge.subfolder.conf.sample b/deluge.subfolder.conf.sample index 13b550d..8604189 100644 --- a/deluge.subfolder.conf.sample +++ b/deluge.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /deluge/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app deluge; diff --git a/dillinger.subdomain.conf.sample b/dillinger.subdomain.conf.sample index 16d1e48..afdee13 100644 --- a/dillinger.subdomain.conf.sample +++ b/dillinger.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app dillinger; diff --git a/documentserver.subdomain.conf.sample b/documentserver.subdomain.conf.sample index 6d80844..6d60850 100644 --- a/documentserver.subdomain.conf.sample +++ b/documentserver.subdomain.conf.sample @@ -14,6 +14,9 @@ server { #enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { #enable the next two lines for http auth #auth_basic "Restricted"; @@ -23,6 +26,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app documentserver; diff --git a/dokuwiki.subdomain.conf.sample b/dokuwiki.subdomain.conf.sample index a2655e3..8bc5695 100644 --- a/dokuwiki.subdomain.conf.sample +++ b/dokuwiki.subdomain.conf.sample @@ -14,6 +14,9 @@ server { #enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { #enable the next two lines for http auth #auth_basic "Restricted"; @@ -23,6 +26,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app dokuwiki; diff --git a/domoticz.subdomain.conf.sample b/domoticz.subdomain.conf.sample index 9dc19aa..2d31de4 100644 --- a/domoticz.subdomain.conf.sample +++ b/domoticz.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app domoticz; diff --git a/domoticz.subfolder.conf.sample b/domoticz.subfolder.conf.sample index ecd50c8..978d328 100644 --- a/domoticz.subfolder.conf.sample +++ b/domoticz.subfolder.conf.sample @@ -9,6 +9,9 @@ location ^~ /domoticz/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app domoticz; diff --git a/dozzle.subfolder.conf.sample b/dozzle.subfolder.conf.sample index b433de0..4f435fc 100644 --- a/dozzle.subfolder.conf.sample +++ b/dozzle.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /dozzle/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; chunked_transfer_encoding off; proxy_buffering off; diff --git a/duplicati.subdomain.conf.sample b/duplicati.subdomain.conf.sample index 7e9a4d3..6e9f6c7 100644 --- a/duplicati.subdomain.conf.sample +++ b/duplicati.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + resolver 127.0.0.11 valid=30s; set $upstream_app duplicati; set $upstream_port 8200; diff --git a/duplicati.subfolder.conf.sample b/duplicati.subfolder.conf.sample index c7d580c..a254b67 100644 --- a/duplicati.subfolder.conf.sample +++ b/duplicati.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /duplicati/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + resolver 127.0.0.11 valid=30s; set $upstream_app duplicati; set $upstream_port 8200; diff --git a/embystat.subdomain.conf.sample b/embystat.subdomain.conf.sample index 37e0d4b..57b87f2 100644 --- a/embystat.subdomain.conf.sample +++ b/embystat.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app embystat; diff --git a/flood.subdomain.conf.sample b/flood.subdomain.conf.sample index bb37158..8c1882b 100644 --- a/flood.subdomain.conf.sample +++ b/flood.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app flood; diff --git a/flood.subfolder.conf.sample b/flood.subfolder.conf.sample index b6dff64..bf77198 100644 --- a/flood.subfolder.conf.sample +++ b/flood.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /flood/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app flood; diff --git a/foldingathome.subdomain.conf.sample b/foldingathome.subdomain.conf.sample index fba1b6d..d48358c 100644 --- a/foldingathome.subdomain.conf.sample +++ b/foldingathome.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; proxy_buffering off; resolver 127.0.0.11 valid=30s; diff --git a/freshrss.subdomain.conf.sample b/freshrss.subdomain.conf.sample index 7620169..be5dfba 100644 --- a/freshrss.subdomain.conf.sample +++ b/freshrss.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app freshrss; diff --git a/freshrss.subfolder.conf.sample b/freshrss.subfolder.conf.sample index d7b0ae7..f5f3344 100644 --- a/freshrss.subfolder.conf.sample +++ b/freshrss.subfolder.conf.sample @@ -13,6 +13,9 @@ location ^~ /freshrss/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app freshrss; diff --git a/ghost.subdomain.conf.sample b/ghost.subdomain.conf.sample index 370cbfe..5eda845 100644 --- a/ghost.subdomain.conf.sample +++ b/ghost.subdomain.conf.sample @@ -13,6 +13,9 @@ server { #enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { #enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app ghost; diff --git a/ghost.subfolder.conf.sample b/ghost.subfolder.conf.sample index b6310f7..bb31785 100644 --- a/ghost.subfolder.conf.sample +++ b/ghost.subfolder.conf.sample @@ -10,6 +10,9 @@ location /blog { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app ghost; diff --git a/gitea.subdomain.conf.sample b/gitea.subdomain.conf.sample index c957cb3..c68b6f2 100644 --- a/gitea.subdomain.conf.sample +++ b/gitea.subdomain.conf.sample @@ -17,6 +17,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -26,6 +29,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app gitea; diff --git a/glances.subdomain.conf.sample b/glances.subdomain.conf.sample index fd619e9..6daf6e4 100644 --- a/glances.subdomain.conf.sample +++ b/glances.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app glances; diff --git a/glances.subfolder.conf.sample b/glances.subfolder.conf.sample index 611a6e3..e964cb8 100644 --- a/glances.subfolder.conf.sample +++ b/glances.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /glances/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app glances; diff --git a/gotify.subdomain.conf.sample b/gotify.subdomain.conf.sample index c4d439a..10e5e57 100644 --- a/gotify.subdomain.conf.sample +++ b/gotify.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app gotify; diff --git a/grafana.subdomain.conf.sample b/grafana.subdomain.conf.sample index 5190106..0645c0d 100644 --- a/grafana.subdomain.conf.sample +++ b/grafana.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app grafana; diff --git a/grocy.subdomain.conf.sample b/grocy.subdomain.conf.sample index 6bd603c..2bada88 100644 --- a/grocy.subdomain.conf.sample +++ b/grocy.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app grocy; diff --git a/guacamole.subdomain.conf.sample b/guacamole.subdomain.conf.sample index 3b449b0..681b60a 100644 --- a/guacamole.subdomain.conf.sample +++ b/guacamole.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; proxy_buffering off; resolver 127.0.0.11 valid=30s; diff --git a/guacamole.subfolder.conf.sample b/guacamole.subfolder.conf.sample index 074461d..378eb46 100644 --- a/guacamole.subfolder.conf.sample +++ b/guacamole.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /guacamole/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; proxy_buffering off; resolver 127.0.0.11 valid=30s; diff --git a/headphones.subdomain.conf.sample b/headphones.subdomain.conf.sample index 68daa69..36b5901 100644 --- a/headphones.subdomain.conf.sample +++ b/headphones.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app headphones; diff --git a/headphones.subfolder.conf.sample b/headphones.subfolder.conf.sample index 7c4c56d..c2e854e 100644 --- a/headphones.subfolder.conf.sample +++ b/headphones.subfolder.conf.sample @@ -9,6 +9,9 @@ location ^~ /headphones { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app headphones; diff --git a/heimdall.subdomain.conf.sample b/heimdall.subdomain.conf.sample index 1f97e69..5773997 100644 --- a/heimdall.subdomain.conf.sample +++ b/heimdall.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app heimdall; diff --git a/heimdall.subfolder.conf.sample b/heimdall.subfolder.conf.sample index 50b92d0..79ae53f 100644 --- a/heimdall.subfolder.conf.sample +++ b/heimdall.subfolder.conf.sample @@ -9,6 +9,9 @@ location / { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app heimdall; diff --git a/homeassistant.subdomain.conf.sample b/homeassistant.subdomain.conf.sample index 07d8fd1..a5f8adc 100644 --- a/homeassistant.subdomain.conf.sample +++ b/homeassistant.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app homeassistant; diff --git a/jackett.subdomain.conf.sample b/jackett.subdomain.conf.sample index 69b4ecd..4fd1969 100644 --- a/jackett.subdomain.conf.sample +++ b/jackett.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app jackett; diff --git a/jackett.subfolder.conf.sample b/jackett.subfolder.conf.sample index f67020e..3ad98ca 100644 --- a/jackett.subfolder.conf.sample +++ b/jackett.subfolder.conf.sample @@ -9,6 +9,9 @@ location ^~ /jackett { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app jackett; diff --git a/jenkins.subfolder.conf.sample b/jenkins.subfolder.conf.sample index cfef5ce..6dae4f5 100644 --- a/jenkins.subfolder.conf.sample +++ b/jenkins.subfolder.conf.sample @@ -13,6 +13,9 @@ location ^~ /jenkins/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + # This is the maximum upload size client_max_body_size 10m; diff --git a/kanzi.subdomain.conf.sample b/kanzi.subdomain.conf.sample index bf92ef4..e60463d 100644 --- a/kanzi.subdomain.conf.sample +++ b/kanzi.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app kanzi; diff --git a/kanzi.subfolder.conf.sample b/kanzi.subfolder.conf.sample index 6227cfd..1814716 100644 --- a/kanzi.subfolder.conf.sample +++ b/kanzi.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /kanzi/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app kanzi; diff --git a/lazylibrarian.subdomain.conf.sample b/lazylibrarian.subdomain.conf.sample index ada4918..fcb23b4 100644 --- a/lazylibrarian.subdomain.conf.sample +++ b/lazylibrarian.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app lazylibrarian; diff --git a/lazylibrarian.subfolder.conf.sample b/lazylibrarian.subfolder.conf.sample index 682822a..06002b7 100644 --- a/lazylibrarian.subfolder.conf.sample +++ b/lazylibrarian.subfolder.conf.sample @@ -9,6 +9,9 @@ location ^~ /lazylibrarian { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app lazylibrarian; diff --git a/librespeed.subdomain.conf.sample b/librespeed.subdomain.conf.sample index e66804b..8864afe 100644 --- a/librespeed.subdomain.conf.sample +++ b/librespeed.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app librespeed; diff --git a/lidarr.subdomain.conf.sample b/lidarr.subdomain.conf.sample index 36d267c..452798e 100644 --- a/lidarr.subdomain.conf.sample +++ b/lidarr.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app lidarr; diff --git a/lidarr.subfolder.conf.sample b/lidarr.subfolder.conf.sample index f1ffee6..a27a07f 100644 --- a/lidarr.subfolder.conf.sample +++ b/lidarr.subfolder.conf.sample @@ -9,6 +9,9 @@ location ^~ /lidarr { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app lidarr; diff --git a/lychee.subdomain.conf.sample b/lychee.subdomain.conf.sample index 4c6619e..b18e8b0 100644 --- a/lychee.subdomain.conf.sample +++ b/lychee.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app lychee; diff --git a/mailu.subdomain.conf.sample b/mailu.subdomain.conf.sample index a8a44de..5108d3e 100644 --- a/mailu.subdomain.conf.sample +++ b/mailu.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -21,6 +24,9 @@ server { # enable the next two lines for ldap auth #auth_request /auth; #error_page 401 =200 /login; + + # enable for Authelia + #include /config/nginx/authelia-location.conf; include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; diff --git a/mailu.subfolder.conf.sample b/mailu.subfolder.conf.sample index ae033e8..1e664f4 100644 --- a/mailu.subfolder.conf.sample +++ b/mailu.subfolder.conf.sample @@ -14,6 +14,9 @@ location ^~ /admin/ { # enable the next two lines for ldap auth, also customize and enable ldap.conf in the default conf #auth_request /auth; #error_page 401 =200 /login; + + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; @@ -35,6 +38,9 @@ location ^~ /webmail/ { # enable the next two lines for ldap auth, also customize and enable ldap.conf in the default conf #auth_request /auth; #error_page 401 =200 /login; + + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; diff --git a/medusa.subdomain.conf.sample b/medusa.subdomain.conf.sample index a9bbcd2..c8d1f38 100644 --- a/medusa.subdomain.conf.sample +++ b/medusa.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade"; diff --git a/medusa.subfolder.conf.sample b/medusa.subfolder.conf.sample index 1935744..1deb9f0 100644 --- a/medusa.subfolder.conf.sample +++ b/medusa.subfolder.conf.sample @@ -9,6 +9,9 @@ location ^~ /medusa { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade"; diff --git a/monitorr.subdomain.conf.sample b/monitorr.subdomain.conf.sample index 79572fb..fe12d2a 100644 --- a/monitorr.subdomain.conf.sample +++ b/monitorr.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app monitorr; diff --git a/monitorr.subfolder.conf.sample b/monitorr.subfolder.conf.sample index da4fde2..c93d98e 100644 --- a/monitorr.subfolder.conf.sample +++ b/monitorr.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /monitorr/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app monitorr; diff --git a/mstream.subdomain.conf.sample b/mstream.subdomain.conf.sample index c1da8e2..4f5d8d7 100644 --- a/mstream.subdomain.conf.sample +++ b/mstream.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app mstream; diff --git a/mylar.subdomain.conf.sample b/mylar.subdomain.conf.sample index 2438a30..f6a82c4 100644 --- a/mylar.subdomain.conf.sample +++ b/mylar.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app mylar; diff --git a/mylar.subfolder.conf.sample b/mylar.subfolder.conf.sample index d1bd203..307e998 100644 --- a/mylar.subfolder.conf.sample +++ b/mylar.subfolder.conf.sample @@ -9,6 +9,9 @@ location ^~ /mylar { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app mylar; diff --git a/mytinytodo.subfolder.conf.sample b/mytinytodo.subfolder.conf.sample index bb727e1..18917af 100644 --- a/mytinytodo.subfolder.conf.sample +++ b/mytinytodo.subfolder.conf.sample @@ -14,6 +14,9 @@ location ^~ /todo/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app mytinytodo; diff --git a/netboot.subdomain.conf.sample b/netboot.subdomain.conf.sample index 19b5d7b..0b4ddfd 100644 --- a/netboot.subdomain.conf.sample +++ b/netboot.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app netboot; diff --git a/netdata.subdomain.conf.sample b/netdata.subdomain.conf.sample index 3d14ea5..88e12eb 100644 --- a/netdata.subdomain.conf.sample +++ b/netdata.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app netdata; diff --git a/netdata.subfolder.conf.sample b/netdata.subfolder.conf.sample index f41325e..a6794ca 100644 --- a/netdata.subfolder.conf.sample +++ b/netdata.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /netdata/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app netdata; diff --git a/nzbget.subdomain.conf.sample b/nzbget.subdomain.conf.sample index 97f7376..3e69158 100644 --- a/nzbget.subdomain.conf.sample +++ b/nzbget.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app nzbget; diff --git a/nzbget.subfolder.conf.sample b/nzbget.subfolder.conf.sample index 906331d..e48d176 100644 --- a/nzbget.subfolder.conf.sample +++ b/nzbget.subfolder.conf.sample @@ -9,6 +9,9 @@ location /nzbget { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app nzbget; diff --git a/nzbhydra.subdomain.conf.sample b/nzbhydra.subdomain.conf.sample index bb4e3ce..1d868f4 100644 --- a/nzbhydra.subdomain.conf.sample +++ b/nzbhydra.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app nzbhydra2; diff --git a/nzbhydra.subfolder.conf.sample b/nzbhydra.subfolder.conf.sample index d2bf22c..23f189c 100644 --- a/nzbhydra.subfolder.conf.sample +++ b/nzbhydra.subfolder.conf.sample @@ -9,6 +9,9 @@ location ^~ /nzbhydra { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app nzbhydra2; diff --git a/ombi.subdomain.conf.sample b/ombi.subdomain.conf.sample index 862aa10..7afa6f5 100644 --- a/ombi.subdomain.conf.sample +++ b/ombi.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app ombi; diff --git a/ombi.subfolder.conf.sample b/ombi.subfolder.conf.sample index 1cea015..bc46bb6 100644 --- a/ombi.subfolder.conf.sample +++ b/ombi.subfolder.conf.sample @@ -13,6 +13,9 @@ location ^~ /ombi/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app ombi; diff --git a/openvpn-as.subdomain.conf.sample b/openvpn-as.subdomain.conf.sample index 3b0803d..e4e5ab6 100644 --- a/openvpn-as.subdomain.conf.sample +++ b/openvpn-as.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app openvpn-as; @@ -40,6 +46,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app openvpn-as; diff --git a/organizr.subdomain.conf.sample b/organizr.subdomain.conf.sample index 4bd4ff3..a7d981b 100644 --- a/organizr.subdomain.conf.sample +++ b/organizr.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app organizr; diff --git a/organizr.subfolder.conf.sample b/organizr.subfolder.conf.sample index aae5aff..3cfd948 100644 --- a/organizr.subfolder.conf.sample +++ b/organizr.subfolder.conf.sample @@ -9,6 +9,9 @@ location / { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app organizr; diff --git a/osticket.subdomain.conf.sample b/osticket.subdomain.conf.sample index f79c597..665f177 100644 --- a/osticket.subdomain.conf.sample +++ b/osticket.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app osticket; diff --git a/phpmyadmin.subdomain.conf.sample b/phpmyadmin.subdomain.conf.sample index 83844e4..1ba1218 100644 --- a/phpmyadmin.subdomain.conf.sample +++ b/phpmyadmin.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app phpmyadmin; diff --git a/phpmyadmin.subfolder.conf.sample b/phpmyadmin.subfolder.conf.sample index c9ddee0..a105038 100644 --- a/phpmyadmin.subfolder.conf.sample +++ b/phpmyadmin.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /phpmyadmin/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app phpmyadmin; diff --git a/pihole.subdomain.conf.sample b/pihole.subdomain.conf.sample index 145d7cf..2396d79 100644 --- a/pihole.subdomain.conf.sample +++ b/pihole.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app pihole; @@ -41,6 +47,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app pihole; diff --git a/pihole.subfolder.conf.sample b/pihole.subfolder.conf.sample index b6c5877..aa21ab0 100644 --- a/pihole.subfolder.conf.sample +++ b/pihole.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /pihole/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app pihole; @@ -35,6 +38,9 @@ location ^~ /pihole/admin/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app pihole; diff --git a/piwigo.subdomain.conf.sample b/piwigo.subdomain.conf.sample index e333945..6a24a11 100644 --- a/piwigo.subdomain.conf.sample +++ b/piwigo.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app piwigo; diff --git a/plex.subdomain.conf.sample b/plex.subdomain.conf.sample index aa43513..5ee4c4b 100644 --- a/plex.subdomain.conf.sample +++ b/plex.subdomain.conf.sample @@ -18,6 +18,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + + # enable for Authelia + #include /config/nginx/authelia-server.conf; location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -27,6 +30,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app plex; diff --git a/plex.subfolder.conf.sample b/plex.subfolder.conf.sample index 9953ba6..ca12263 100644 --- a/plex.subfolder.conf.sample +++ b/plex.subfolder.conf.sample @@ -18,6 +18,9 @@ location ^~ /plex/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app plex; diff --git a/plexwebtools.subdomain.conf.sample b/plexwebtools.subdomain.conf.sample index 247f152..cd53f10 100644 --- a/plexwebtools.subdomain.conf.sample +++ b/plexwebtools.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app plex; diff --git a/plexwebtools.subfolder.conf.sample b/plexwebtools.subfolder.conf.sample index 7c880dd..72b9339 100644 --- a/plexwebtools.subfolder.conf.sample +++ b/plexwebtools.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /plexwebtools/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app plex; diff --git a/portainer.subdomain.conf.sample b/portainer.subdomain.conf.sample index 4b9ca34..da6e7c2 100644 --- a/portainer.subdomain.conf.sample +++ b/portainer.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + resolver 127.0.0.11 valid=30s; set $upstream_app portainer; set $upstream_port 9000; @@ -42,6 +48,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + resolver 127.0.0.11 valid=30s; set $upstream_app portainer; set $upstream_port 9000; diff --git a/portainer.subfolder.conf.sample b/portainer.subfolder.conf.sample index 00adcd4..dc3f49d 100644 --- a/portainer.subfolder.conf.sample +++ b/portainer.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /portainer/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app portainer; diff --git a/prometheus.subdomain.conf.sample b/prometheus.subdomain.conf.sample index b93b816..60c0ff8 100644 --- a/prometheus.subdomain.conf.sample +++ b/prometheus.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app prometheus; diff --git a/pydio-cells.subdomain.conf.sample b/pydio-cells.subdomain.conf.sample index 65c56e7..deb639b 100644 --- a/pydio-cells.subdomain.conf.sample +++ b/pydio-cells.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app pydio-cells; @@ -39,6 +45,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app pydio-cells; diff --git a/pydio.subdomain.conf.sample b/pydio.subdomain.conf.sample index 97617f2..0c64614 100644 --- a/pydio.subdomain.conf.sample +++ b/pydio.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app pydio; diff --git a/pyload.subdomain.conf.sample b/pyload.subdomain.conf.sample index 4822cd7..7f9b6d3 100644 --- a/pyload.subdomain.conf.sample +++ b/pyload.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app pyload; diff --git a/qbittorrent.subdomain.conf.sample b/qbittorrent.subdomain.conf.sample index c8b691e..432add4 100644 --- a/qbittorrent.subdomain.conf.sample +++ b/qbittorrent.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app qbittorrent; diff --git a/qbittorrent.subfolder.conf.sample b/qbittorrent.subfolder.conf.sample index 1ac7896..ef1aa89 100644 --- a/qbittorrent.subfolder.conf.sample +++ b/qbittorrent.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /qbittorrent/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app qbittorrent; diff --git a/quassel-web.subdomain.conf.sample b/quassel-web.subdomain.conf.sample index 3358c07..0eeb0d0 100644 --- a/quassel-web.subdomain.conf.sample +++ b/quassel-web.subdomain.conf.sample @@ -14,6 +14,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -23,6 +26,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app quassel-web; diff --git a/quassel-web.subfolder.conf.sample b/quassel-web.subfolder.conf.sample index cbe5891..4748d50 100644 --- a/quassel-web.subfolder.conf.sample +++ b/quassel-web.subfolder.conf.sample @@ -10,6 +10,9 @@ location ^~ /quassel { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app quassel-web; diff --git a/radarr.subdomain.conf.sample b/radarr.subdomain.conf.sample index cccfccf..bdc4732 100644 --- a/radarr.subdomain.conf.sample +++ b/radarr.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app radarr; diff --git a/radarr.subfolder.conf.sample b/radarr.subfolder.conf.sample index a2a3f88..38a17bd 100644 --- a/radarr.subfolder.conf.sample +++ b/radarr.subfolder.conf.sample @@ -9,6 +9,9 @@ location ^~ /radarr { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app radarr; diff --git a/raneto.subdomain.conf.sample b/raneto.subdomain.conf.sample index 945a6db..2d7bc76 100644 --- a/raneto.subdomain.conf.sample +++ b/raneto.subdomain.conf.sample @@ -12,6 +12,9 @@ server { #enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { #enable the next two lines for http auth #auth_basic "Restricted"; @@ -21,6 +24,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app raneto; diff --git a/requestrr.subdomain.conf.sample b/requestrr.subdomain.conf.sample index 99d0e2e..e63d26f 100644 --- a/requestrr.subdomain.conf.sample +++ b/requestrr.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app requestrr; diff --git a/resilio-sync.subdomain.conf.sample b/resilio-sync.subdomain.conf.sample index 58fb60b..9d30f0b 100644 --- a/resilio-sync.subdomain.conf.sample +++ b/resilio-sync.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app resilio-sync; diff --git a/rutorrent.subdomain.conf.sample b/rutorrent.subdomain.conf.sample index a8183ef..e5cab0e 100644 --- a/rutorrent.subdomain.conf.sample +++ b/rutorrent.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app rutorrent; diff --git a/rutorrent.subfolder.conf.sample b/rutorrent.subfolder.conf.sample index dd74886..069da2d 100644 --- a/rutorrent.subfolder.conf.sample +++ b/rutorrent.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /rutorrent/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app rutorrent; diff --git a/sabnzbd.subdomain.conf.sample b/sabnzbd.subdomain.conf.sample index f6f6d9f..2f334aa 100644 --- a/sabnzbd.subdomain.conf.sample +++ b/sabnzbd.subdomain.conf.sample @@ -15,6 +15,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -24,6 +27,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app sabnzbd; diff --git a/sabnzbd.subfolder.conf.sample b/sabnzbd.subfolder.conf.sample index d916a08..2ce4e92 100644 --- a/sabnzbd.subfolder.conf.sample +++ b/sabnzbd.subfolder.conf.sample @@ -9,6 +9,9 @@ location ^~ /sabnzbd { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app sabnzbd; diff --git a/scope.subfolder.conf.sample b/scope.subfolder.conf.sample index 853c361..e48bede 100644 --- a/scope.subfolder.conf.sample +++ b/scope.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /scope/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app scope; diff --git a/sickrage.subdomain.conf.sample b/sickrage.subdomain.conf.sample index 3c6882f..eaf981d 100644 --- a/sickrage.subdomain.conf.sample +++ b/sickrage.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app sickrage; diff --git a/sickrage.subfolder.conf.sample b/sickrage.subfolder.conf.sample index 5f8ea3b..382c6cf 100644 --- a/sickrage.subfolder.conf.sample +++ b/sickrage.subfolder.conf.sample @@ -9,6 +9,9 @@ location ^~ /sickrage { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app sickrage; diff --git a/smokeping.subdomain.conf.sample b/smokeping.subdomain.conf.sample index a3d642e..3178d6b 100644 --- a/smokeping.subdomain.conf.sample +++ b/smokeping.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app smokeping; diff --git a/smokeping.subfolder.conf.sample b/smokeping.subfolder.conf.sample index f265640..381e6ce 100644 --- a/smokeping.subfolder.conf.sample +++ b/smokeping.subfolder.conf.sample @@ -9,6 +9,9 @@ location ^~ /smokeping { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app smokeping; diff --git a/sonarr.subdomain.conf.sample b/sonarr.subdomain.conf.sample index 5ff6e37..c3bc803 100644 --- a/sonarr.subdomain.conf.sample +++ b/sonarr.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app sonarr; diff --git a/sonarr.subfolder.conf.sample b/sonarr.subfolder.conf.sample index 3f34059..2c73446 100644 --- a/sonarr.subfolder.conf.sample +++ b/sonarr.subfolder.conf.sample @@ -9,6 +9,9 @@ location ^~ /sonarr { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app sonarr; diff --git a/statping.subdomain.conf.sample b/statping.subdomain.conf.sample index 1e99282..56ef96d 100644 --- a/statping.subdomain.conf.sample +++ b/statping.subdomain.conf.sample @@ -15,6 +15,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -24,6 +27,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app statup; diff --git a/synclounge.subdomain.conf.sample b/synclounge.subdomain.conf.sample index 9b9f00c..3a7a23f 100644 --- a/synclounge.subdomain.conf.sample +++ b/synclounge.subdomain.conf.sample @@ -18,6 +18,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -27,6 +30,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app synclounge; diff --git a/synclounge.subfolder.conf.sample b/synclounge.subfolder.conf.sample index b959338..77eefeb 100644 --- a/synclounge.subfolder.conf.sample +++ b/synclounge.subfolder.conf.sample @@ -43,6 +43,9 @@ location /slweb { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app synclounge; diff --git a/syncthing.subdomain.conf.sample b/syncthing.subdomain.conf.sample index a674ff6..259eb13 100644 --- a/syncthing.subdomain.conf.sample +++ b/syncthing.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app syncthing; diff --git a/taisun.subdomain.conf.sample b/taisun.subdomain.conf.sample index 5836787..1dac9c5 100644 --- a/taisun.subdomain.conf.sample +++ b/taisun.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app taisun; diff --git a/tautulli.subdomain.conf.sample b/tautulli.subdomain.conf.sample index ff5efcf..fe053c9 100644 --- a/tautulli.subdomain.conf.sample +++ b/tautulli.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app tautulli; diff --git a/tautulli.subfolder.conf.sample b/tautulli.subfolder.conf.sample index 6a70ef5..45abc7a 100644 --- a/tautulli.subfolder.conf.sample +++ b/tautulli.subfolder.conf.sample @@ -9,6 +9,9 @@ location ^~ /tautulli { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app tautulli; diff --git a/tdarr.subdomain.conf.sample b/tdarr.subdomain.conf.sample index 806801d..df24656 100644 --- a/tdarr.subdomain.conf.sample +++ b/tdarr.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app tdarr; diff --git a/thelounge.subdomain.conf.sample b/thelounge.subdomain.conf.sample index 9eb9578..41a6d39 100644 --- a/thelounge.subdomain.conf.sample +++ b/thelounge.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app thelounge; diff --git a/thelounge.subfolder.conf.sample b/thelounge.subfolder.conf.sample index a3b663d..23bebda 100644 --- a/thelounge.subfolder.conf.sample +++ b/thelounge.subfolder.conf.sample @@ -12,6 +12,9 @@ location ^~ /thelounge/ { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app thelounge; diff --git a/transmission.subdomain.conf.sample b/transmission.subdomain.conf.sample index 5d9147d..625ff67 100644 --- a/transmission.subdomain.conf.sample +++ b/transmission.subdomain.conf.sample @@ -23,6 +23,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -32,6 +35,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app transmission; diff --git a/transmission.subfolder.conf.sample b/transmission.subfolder.conf.sample index 5f81280..24a1898 100644 --- a/transmission.subfolder.conf.sample +++ b/transmission.subfolder.conf.sample @@ -19,6 +19,9 @@ location ^~ /transmission { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app transmission; diff --git a/tt-rss.subdomain.conf.sample b/tt-rss.subdomain.conf.sample index 2d8072e..0d5131b 100644 --- a/tt-rss.subdomain.conf.sample +++ b/tt-rss.subdomain.conf.sample @@ -14,6 +14,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -23,6 +26,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + resolver 127.0.0.11 valid=30s; set $upstream_app tt-rss; set $upstream_port 80; diff --git a/ubooquity.subdomain.conf.sample b/ubooquity.subdomain.conf.sample index 51b2a13..523d77e 100644 --- a/ubooquity.subdomain.conf.sample +++ b/ubooquity.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app ubooquity; diff --git a/ubooquity.subfolder.conf.sample b/ubooquity.subfolder.conf.sample index fb0d76c..8cb29de 100644 --- a/ubooquity.subfolder.conf.sample +++ b/ubooquity.subfolder.conf.sample @@ -9,6 +9,9 @@ #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app ubooquity; diff --git a/unifi-controller.subdomain.conf.sample b/unifi-controller.subdomain.conf.sample index 0ba727d..14b9d5a 100644 --- a/unifi-controller.subdomain.conf.sample +++ b/unifi-controller.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app unifi-controller; @@ -40,6 +46,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app unifi-controller; diff --git a/znc.subdomain.conf.sample b/znc.subdomain.conf.sample index 3ab36f5..542eb10 100644 --- a/znc.subdomain.conf.sample +++ b/znc.subdomain.conf.sample @@ -13,6 +13,9 @@ server { # enable for ldap auth, fill in ldap details in ldap.conf #include /config/nginx/ldap.conf; + # enable for Authelia + #include /config/nginx/authelia-server.conf; + location / { # enable the next two lines for http auth #auth_basic "Restricted"; @@ -22,6 +25,9 @@ server { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app znc; diff --git a/znc.subfolder.conf.sample b/znc.subfolder.conf.sample index 5c7b47b..160c3d0 100644 --- a/znc.subfolder.conf.sample +++ b/znc.subfolder.conf.sample @@ -9,6 +9,9 @@ location /znc { #auth_request /auth; #error_page 401 =200 /login; + # enable for Authelia, also enable authelia-server.conf in the default site config + #include /config/nginx/authelia-location.conf; + include /config/nginx/proxy.conf; resolver 127.0.0.11 valid=30s; set $upstream_app znc;