From 228bb42aea40974324c1dffd31125238038aeb49 Mon Sep 17 00:00:00 2001 From: thelamer Date: Mon, 1 Sep 2025 14:35:28 -0400 Subject: [PATCH 1/2] step 1 --- .gitignore | 20 +- _template.subdomain.conf.sample | 71 -- _template.subfolder.conf.sample | 48 -- actual-server.subdomain.conf.sample | 54 -- adminer.subdomain.conf.sample | 55 -- adminer.subfolder.conf.sample | 30 - adminmongo.subdomain.conf.sample | 53 -- airsonic.subdomain.conf.sample | 55 -- airsonic.subfolder.conf.sample | 27 - apprise-api.subdomain.conf.sample | 55 -- archisteamfarm.subdomain.conf.sample | 54 -- atuin.subdomain.conf.sample | 53 -- audiobookshelf.subdomain.conf.sample | 54 -- audiobookshelf.subfolder.conf.sample | 27 - autobrr.subdomain.conf.sample | 54 -- autobrr.subfolder.conf.sample | 31 - babybuddy.subdomain.conf.sample | 64 -- bazarr.subdomain.conf.sample | 64 -- beets.subdomain.conf.sample | 55 -- beszel.subdomain.conf.sample | 64 -- boinc.subdomain.conf.sample | 55 -- booksonic.subdomain.conf.sample | 54 -- booksonic.subfolder.conf.sample | 27 - bookstack.subdomain.conf.sample | 56 -- budge.subdomain.conf.sample | 55 -- cadvisor.subdomain.conf.sample | 64 -- castopod.subdomain.conf.sample | 54 -- changedetection.subdomain.conf.sample | 54 -- chevereto.subdomain.conf.sample | 53 -- chronograf.subdomain.conf.sample | 54 -- chronograf.subfolder.conf.sample | 32 - cloudbeaver.subdomain.conf.sample | 56 -- codimd.subdomain.conf.sample | 55 -- collabora.subdomain.conf.sample | 54 -- commento.subdomain.conf.sample | 54 -- config_data.yml | 705 ++++++++++++++++++ couchpotato.subdomain.conf.sample | 54 -- couchpotato.subfolder.conf.sample | 26 - crontabui.subfolder.conf.sample | 31 - crowdsec-dashboard.subdomain.conf.sample | 58 -- crowdsec.subdomain.conf.sample | 54 -- cryptgeon.subdomain.conf.sample | 53 -- .../adguard.subdomain.conf.sample | 0 .../aria2-with-webui.subdomain.conf.sample | 0 .../asciinema.subdomain.conf.sample | 0 .../authelia.subdomain.conf.sample | 0 .../authentik.subdomain.conf.sample | 0 .../bazarr.subfolder.conf.sample | 0 .../beets.subfolder.conf.sample | 0 .../beszel.subfolder.conf.sample | 0 .../bitwarden.subdomain.conf.sample | 0 .../boinc.subfolder.conf.sample | 0 .../calibre-web.subdomain.conf.sample | 0 .../calibre-web.subfolder.conf.sample | 0 .../calibre.subdomain.conf.sample | 0 .../calibre.subfolder.conf.sample | 0 .../code-server.subdomain.conf.sample | 0 .../deluge.subfolder.conf.sample | 0 .../dozzle.subfolder.conf.sample | 0 .../emby.subdomain.conf.sample | 0 .../emby.subfolder.conf.sample | 0 .../emulatorjs.subdomain.conf.sample | 0 .../filebrowser.subdomain.conf.sample | 0 .../filebrowser.subfolder.conf.sample | 0 .../flexget.subfolder.conf.sample | 0 .../freshrss.subfolder.conf.sample | 0 .../gaps.subfolder.conf.sample | 0 .../gitea.subdomain.conf.sample | 0 .../grafana.subfolder.conf.sample | 0 .../homeassistant.subdomain.conf.sample | 0 .../jackett.subdomain.conf.sample | 0 .../jackett.subfolder.conf.sample | 0 .../jdownloader.subdomain.conf.sample | 0 .../jellyfin.subdomain.conf.sample | 0 .../jenkins.subfolder.conf.sample | 0 .../jfa-go.subfolder.conf.sample | 0 .../kasm.subdomain.conf.sample | 0 .../mailcow.subdomain.conf.sample | 0 .../mailu.subfolder.conf.sample | 0 .../metabase.subdomain.conf.sample | 0 .../monica.subfolder.conf.sample | 0 .../mytinytodo.subfolder.conf.sample | 0 .../nextcloud.subdomain.conf.sample | 0 .../nextcloud.subfolder.conf.sample | 0 .../nexusoss.subdomain.conf.sample | 0 .../nzbget.subdomain.conf.sample | 0 .../nzbget.subfolder.conf.sample | 0 .../nzbhydra.subdomain.conf.sample | 0 .../nzbhydra.subfolder.conf.sample | 0 .../ombi.subdomain.conf.sample | 0 .../ombi.subfolder.conf.sample | 0 .../openvpn-as.subdomain.conf.sample | 0 .../openvscode-server.subdomain.conf.sample | 0 .../organizr-auth.subfolder.conf.sample | 0 .../organizr.subdomain.conf.sample | 0 .../organizr.subfolder.conf.sample | 0 .../pihole.subdomain.conf.sample | 0 .../pihole.subfolder.conf.sample | 0 .../plex.subdomain.conf.sample | 0 .../plex.subfolder.conf.sample | 0 .../plexwebtools.subdomain.conf.sample | 0 .../plexwebtools.subfolder.conf.sample | 0 .../portainer.subdomain.conf.sample | 0 .../portainer.subfolder.conf.sample | 0 .../prometheus.subdomain.conf.sample | 0 .../prowlarr.subdomain.conf.sample | 0 .../prowlarr.subfolder.conf.sample | 0 .../pterodactylnode.subdomain.conf.sample | 0 .../pydio-cells.subdomain.conf.sample | 0 .../rclone.subfolder.conf.sample | 0 .../recipes.subdomain.conf.sample | 0 .../rutorrent.subdomain.conf.sample | 0 .../rutorrent.subfolder.conf.sample | 0 .../sonarrtorss.subdomain.conf.sample | 0 .../sonarrtorss.subfolder.conf.sample | 0 .../synapse.subdomain.conf.sample | 0 .../synclounge.subdomain.conf.sample | 0 .../synclounge.subfolder.conf.sample | 0 .../syncthing.subdomain.conf.sample | 0 .../syncthing.subfolder.conf.sample | 0 .../tautulli.subdomain.conf.sample | 0 .../tautulli.subfolder.conf.sample | 0 .../themepark.subfolder.conf.sample | 0 .../transmission.subdomain.conf.sample | 0 .../transmission.subfolder.conf.sample | 0 .../tvheadend.subfolder.conf.sample | 0 .../ubooquity.subdomain.conf.sample | 0 .../ubooquity.subfolder.conf.sample | 0 .../uptime-kuma.subdomain.conf.sample | 0 .../vaultwarden.subdomain.conf.sample | 0 .../vaultwarden.subfolder.conf.sample | 0 .../watchstate.subdomain.conf.sample | 0 .../wikijs.subdomain.conf.sample | 0 .../wordpress.subfolder.conf.sample | 0 .../youtube-dl.subfolder.conf.sample | 0 dashy.subdomain.conf.sample | 53 -- ddns-updater.subdomain.conf.sample | 64 -- ddns-updater.subfolder.conf.sample | 36 - deluge.subdomain.conf.sample | 54 -- dillinger.subdomain.conf.sample | 54 -- discount-bandit.subdomain.conf.sample | 53 -- dnsdist.subdomain.conf.sample | 24 - dockge.subdomain.conf.sample | 54 -- dockge.subfolder.conf.sample | 31 - documentserver.subdomain.conf.sample | 54 -- dokuwiki.subdomain.conf.sample | 55 -- dokuwiki.subfolder.conf.sample | 32 - domoticz.subdomain.conf.sample | 54 -- domoticz.subfolder.conf.sample | 27 - dozzle.subdomain.conf.sample | 54 -- drone.subdomain.conf.sample | 53 -- dsmrreader.subdomain.conf.sample | 54 -- duplicacy.subdomain.conf.sample | 54 -- duplicati.subdomain.conf.sample | 54 -- duplicati.subfolder.conf.sample | 32 - embystat.subdomain.conf.sample | 54 -- esphome.subdomain.conf.sample | 54 -- fenrus.subdomain.conf.sample | 53 -- filebot.subdomain.conf.sample | 62 -- filebot.subfolder.conf.sample | 31 - firefly.subdomain.conf.sample | 53 -- firefox.subdomain.conf.sample | 54 -- flaresolverr.subdomain.conf.sample | 54 -- flaresolverr.subfolder.conf.sample | 26 - flexget.subdomain.conf.sample | 54 -- flood.subdomain.conf.sample | 54 -- flood.subfolder.conf.sample | 31 - foldingathome.subdomain.conf.sample | 55 -- forgejo.subdomain.conf.sample | 69 -- forgejo.subfolder.conf.sample | 24 - foundryvtt.subdomain.conf.sample | 63 -- freshrss.subdomain.conf.sample | 59 -- frigate.subdomain.conf.sample | 55 -- gaps.subdomain.conf.sample | 55 -- gatus.subdomain.conf.sample | 55 -- gatus.subfolder.conf.sample | 32 - generate_configs.py | 103 +++ get_iplayer.subdomain.conf.sample | 54 -- ghost.subdomain.conf.sample | 54 -- ghost.subfolder.conf.sample | 28 - gitea.subfolder.conf.sample | 23 - glances.subdomain.conf.sample | 54 -- glances.subfolder.conf.sample | 31 - gotify.subdomain.conf.sample | 54 -- gotify.subfolder.conf.sample | 30 - grafana.subdomain.conf.sample | 70 -- grampsweb.subdomain.conf.sample | 64 -- grav.subdomain.conf.sample | 55 -- graylog.subdomain.conf.sample | 57 -- grocy.subdomain.conf.sample | 63 -- guacamole.subdomain.conf.sample | 55 -- guacamole.subfolder.conf.sample | 32 - hass-configurator.subdomain.conf.sample | 55 -- headphones.subdomain.conf.sample | 54 -- headphones.subfolder.conf.sample | 27 - healthchecks.subdomain.conf.sample | 54 -- hedgedoc.subdomain.conf.sample | 56 -- heimdall.subdomain.conf.sample | 57 -- heimdall.subfolder.conf.sample | 26 - hoarder.subdomain.conf.sample | 64 -- homarr.subdomain.conf.sample | 53 -- homebox.subdomain.conf.sample | 64 -- homebridge.subdomain.conf.sample | 54 -- homepage.subdomain.conf.sample | 58 -- homepage.subfolder.conf.sample | 35 - homer.subdomain.conf.sample | 53 -- huginn.subdomain.conf.sample | 54 -- immich.subdomain.conf.sample | 65 -- immich_server.subdomain.conf.sample | 65 -- influxdb.subdomain.conf.sample | 64 -- iplayarr.subdomain.conf.sample | 54 -- it-tools.subdomain.conf.sample | 53 -- jellyfin.subfolder.conf.sample | 25 - jellyseerr.subdomain.conf.sample | 54 -- jfa-go.subdomain.conf.sample | 54 -- joplin.subdomain.conf.sample | 54 -- kanzi.subdomain.conf.sample | 54 -- kanzi.subfolder.conf.sample | 31 - kavita.subdomain.conf.sample | 65 -- kavita.subfolder.conf.sample | 40 - kimai.subdomain.conf.sample | 65 -- komga.subdomain.conf.sample | 64 -- komga.subfolder.conf.sample | 40 - kopia.subdomain.conf.sample | 54 -- lazylibrarian.subdomain.conf.sample | 54 -- lazylibrarian.subfolder.conf.sample | 26 - leantime.subdomain.conf.sample | 55 -- libreddit.subdomain.conf.sample | 53 -- librespeed.subdomain.conf.sample | 54 -- lidarr.subdomain.conf.sample | 64 -- lidarr.subfolder.conf.sample | 36 - linkace.subdomain.conf.sample | 54 -- linkstack.subdomain.conf.sample | 52 -- linkwarden.subdomain.conf.sample | 64 -- linkwarden.subfolder.conf.sample | 41 - lldap.subdomain.conf.sample | 54 -- lubelogger.subdomain.conf.sample | 54 -- lychee.subdomain.conf.sample | 54 -- lychee.subfolder.conf.sample | 31 - mailu.subdomain.conf.sample | 54 -- maintainerr.subdomain.conf.sample | 56 -- mastodon.subdomain.conf.sample | 58 -- matomo.subdomain.conf.sample | 54 -- mattermost.subdomain.conf.sample | 53 -- mealie.subdomain.conf.sample | 53 -- medusa.subdomain.conf.sample | 54 -- medusa.subfolder.conf.sample | 26 - metube.subdomain.conf.sample | 54 -- metube.subfolder.conf.sample | 27 - miniflux.subdomain.conf.sample | 54 -- miniflux.subfolder.conf.sample | 31 - monica.subdomain.conf.sample | 56 -- monitorr.subdomain.conf.sample | 54 -- monitorr.subfolder.conf.sample | 30 - mstream.subdomain.conf.sample | 54 -- mylar.subdomain.conf.sample | 54 -- mylar.subfolder.conf.sample | 27 - n8n.subdomain.conf.sample | 55 -- navidrome.subdomain.conf.sample | 54 -- netboot.subdomain.conf.sample | 54 -- netbox.subdomain.conf.sample | 57 -- netdata.subdomain.conf.sample | 54 -- netdata.subfolder.conf.sample | 31 - nocodb.subdomain.conf.sample | 53 -- notifiarr.subdomain.conf.sample | 55 -- ntfy.subdomain.conf.sample | 55 -- octoprint.subdomain.conf.sample | 55 -- onetimesecret.subdomain.conf.sample | 53 -- oogway.subdomain.conf.sample | 55 -- open-webui.subdomain.conf.sample | 56 -- openhab.subdomain.conf.sample | 53 -- osticket.subdomain.conf.sample | 54 -- overseerr.subdomain.conf.sample | 64 -- paperless.subdomain.conf.sample | 64 -- paperless.subfolder.conf.sample | 40 - papermerge.subdomain.conf.sample | 54 -- partdb.subdomain.conf.sample | 55 -- petio.subdomain.conf.sample | 53 -- petio.subfolder.conf.sample | 30 - phoneinfoga.subdomain.conf.sample | 54 -- photoprism.subdomain.conf.sample | 53 -- phpmyadmin.subdomain.conf.sample | 54 -- phpmyadmin.subfolder.conf.sample | 31 - picard.subfolder.conf.sample | 31 - pingvin-share.subdomain.conf.sample | 64 -- pinry.subdomain.conf.sample | 54 -- piwigo.subdomain.conf.sample | 54 -- pixelfed.subdomain.conf.sample | 53 -- planka.subdomain.conf.sample | 54 -- planka.subfolder.conf.sample | 30 - podgrab.subdomain.conf.sample | 54 -- privatebin.subdomain.conf.sample | 54 -- pterodactyl.subdomain.conf.sample | 56 -- pwndrop.subdomain.conf.sample | 54 -- pydio.subdomain.conf.sample | 54 -- pyload.subdomain.conf.sample | 54 -- pyload.subfolder.conf.sample | 28 - qbit-manage.subdomain.conf.sample | 55 -- qbittorrent.subdomain.conf.sample | 170 ----- qbittorrent.subfolder.conf.sample | 148 ---- quassel-web.subdomain.conf.sample | 55 -- quassel-web.subfolder.conf.sample | 28 - qui.subdomain.conf.sample | 54 -- qui.subfolder.conf.sample | 31 - radarr.subdomain.conf.sample | 64 -- radarr.subfolder.conf.sample | 36 - rallly.subdomain.conf.sample | 54 -- raneto.subdomain.conf.sample | 54 -- readarr.subdomain.conf.sample | 64 -- readarr.subfolder.conf.sample | 36 - requestrr.subdomain.conf.sample | 54 -- resilio-sync.subdomain.conf.sample | 54 -- romm.subdomain.conf.sample | 54 -- sabnzbd.subdomain.conf.sample | 66 -- sabnzbd.subfolder.conf.sample | 37 - saltrim.subdomain.conf.sample | 53 -- scope.subfolder.conf.sample | 31 - scrutiny.subdomain.conf.sample | 54 -- semaphore.subdomain.conf.sample | 58 -- semaphore.subfolder.conf.sample | 46 -- shinobi.subdomain.conf.sample | 54 -- shinobi.subfolder.conf.sample | 32 - shlink.subdomain.conf.sample | 53 -- sickchill.subdomain.conf.sample | 54 -- sickchill.subfolder.conf.sample | 27 - sickrage.subdomain.conf.sample | 54 -- sickrage.subfolder.conf.sample | 27 - skyhook.subdomain.conf.sample | 54 -- slskd.subfolder.conf.sample | 27 - smokeping.subdomain.conf.sample | 54 -- smokeping.subfolder.conf.sample | 27 - sonarr.subdomain.conf.sample | 64 -- sonarr.subfolder.conf.sample | 36 - speedtest-tracker.subdomain.conf.sample | 55 -- spoolman.subdomain.conf.sample | 54 -- spoolman.subfolder.conf.sample | 30 - statping.subdomain.conf.sample | 56 -- stirling-pdf.subdomain.conf.sample | 55 -- storm.subdomain.conf.sample | 59 -- taisun.subdomain.conf.sample | 55 -- tasmobackup.subdomain.conf.sample | 54 -- tdarr.subdomain.conf.sample | 54 -- .../subdomain.conf.j2 | 48 +- templates/subfolder.conf.j2 | 49 ++ thelounge.subdomain.conf.sample | 54 -- thelounge.subfolder.conf.sample | 31 - themepark.subdomain.conf.sample | 60 -- tinyauth.subdomain.conf.sample | 27 - unifi-controller.subdomain.conf.sample | 57 -- ...-network-application.subdomain.conf.sample | 58 -- viewtube.subdomain.conf.sample | 55 -- wallabag.subdomain.conf.sample | 56 -- warpgate.subdomain.conf.sample | 55 -- watcharr.subdomain.conf.sample | 64 -- webtop.subdomain.conf.sample | 55 -- webtop.subfolder.conf.sample | 29 - whisparr.subdomain.conf.sample | 64 -- whisparr.subfolder.conf.sample | 36 - wizarr.subdomain.conf.sample | 53 -- wordpress.subdomain.conf.sample | 54 -- wrapperr.subdomain.conf.sample | 54 -- yacht.subdomain.conf.sample | 54 -- your-spotify-api.subdomain.conf.sample | 59 -- your-spotify.subdomain.conf.sample | 61 -- yourls.subdomain.conf.sample | 54 -- youtube-dl-server.subdomain.conf.sample | 54 -- yt-dlp-web.subdomain.conf.sample | 53 -- zigbee2mqtt.subdomain.conf.sample | 55 -- znc.subdomain.conf.sample | 54 -- znc.subfolder.conf.sample | 27 - zwave-js-ui.subdomain.conf.sample | 54 -- zwavejs2mqtt.subdomain.conf.sample | 54 -- 372 files changed, 910 insertions(+), 13885 deletions(-) delete mode 100644 _template.subdomain.conf.sample delete mode 100644 _template.subfolder.conf.sample delete mode 100644 actual-server.subdomain.conf.sample delete mode 100644 adminer.subdomain.conf.sample delete mode 100644 adminer.subfolder.conf.sample delete mode 100644 adminmongo.subdomain.conf.sample delete mode 100644 airsonic.subdomain.conf.sample delete mode 100644 airsonic.subfolder.conf.sample delete mode 100644 apprise-api.subdomain.conf.sample delete mode 100644 archisteamfarm.subdomain.conf.sample delete mode 100644 atuin.subdomain.conf.sample delete mode 100644 audiobookshelf.subdomain.conf.sample delete mode 100644 audiobookshelf.subfolder.conf.sample delete mode 100644 autobrr.subdomain.conf.sample delete mode 100644 autobrr.subfolder.conf.sample delete mode 100644 babybuddy.subdomain.conf.sample delete mode 100644 bazarr.subdomain.conf.sample delete mode 100644 beets.subdomain.conf.sample delete mode 100644 beszel.subdomain.conf.sample delete mode 100644 boinc.subdomain.conf.sample delete mode 100644 booksonic.subdomain.conf.sample delete mode 100644 booksonic.subfolder.conf.sample delete mode 100644 bookstack.subdomain.conf.sample delete mode 100644 budge.subdomain.conf.sample delete mode 100644 cadvisor.subdomain.conf.sample delete mode 100644 castopod.subdomain.conf.sample delete mode 100644 changedetection.subdomain.conf.sample delete mode 100644 chevereto.subdomain.conf.sample delete mode 100644 chronograf.subdomain.conf.sample delete mode 100644 chronograf.subfolder.conf.sample delete mode 100644 cloudbeaver.subdomain.conf.sample delete mode 100644 codimd.subdomain.conf.sample delete mode 100644 collabora.subdomain.conf.sample delete mode 100644 commento.subdomain.conf.sample create mode 100644 config_data.yml delete mode 100644 couchpotato.subdomain.conf.sample delete mode 100644 couchpotato.subfolder.conf.sample delete mode 100644 crontabui.subfolder.conf.sample delete mode 100644 crowdsec-dashboard.subdomain.conf.sample delete mode 100644 crowdsec.subdomain.conf.sample delete mode 100644 cryptgeon.subdomain.conf.sample rename adguard.subdomain.conf.sample => custom_configs/adguard.subdomain.conf.sample (100%) rename aria2-with-webui.subdomain.conf.sample => custom_configs/aria2-with-webui.subdomain.conf.sample (100%) rename asciinema.subdomain.conf.sample => custom_configs/asciinema.subdomain.conf.sample (100%) rename authelia.subdomain.conf.sample => custom_configs/authelia.subdomain.conf.sample (100%) rename authentik.subdomain.conf.sample => custom_configs/authentik.subdomain.conf.sample (100%) rename bazarr.subfolder.conf.sample => custom_configs/bazarr.subfolder.conf.sample (100%) rename beets.subfolder.conf.sample => custom_configs/beets.subfolder.conf.sample (100%) rename beszel.subfolder.conf.sample => custom_configs/beszel.subfolder.conf.sample (100%) rename bitwarden.subdomain.conf.sample => custom_configs/bitwarden.subdomain.conf.sample (100%) rename boinc.subfolder.conf.sample => custom_configs/boinc.subfolder.conf.sample (100%) rename calibre-web.subdomain.conf.sample => custom_configs/calibre-web.subdomain.conf.sample (100%) rename calibre-web.subfolder.conf.sample => custom_configs/calibre-web.subfolder.conf.sample (100%) rename calibre.subdomain.conf.sample => custom_configs/calibre.subdomain.conf.sample (100%) rename calibre.subfolder.conf.sample => custom_configs/calibre.subfolder.conf.sample (100%) rename code-server.subdomain.conf.sample => custom_configs/code-server.subdomain.conf.sample (100%) rename deluge.subfolder.conf.sample => custom_configs/deluge.subfolder.conf.sample (100%) rename dozzle.subfolder.conf.sample => custom_configs/dozzle.subfolder.conf.sample (100%) rename emby.subdomain.conf.sample => custom_configs/emby.subdomain.conf.sample (100%) rename emby.subfolder.conf.sample => custom_configs/emby.subfolder.conf.sample (100%) rename emulatorjs.subdomain.conf.sample => custom_configs/emulatorjs.subdomain.conf.sample (100%) rename filebrowser.subdomain.conf.sample => custom_configs/filebrowser.subdomain.conf.sample (100%) rename filebrowser.subfolder.conf.sample => custom_configs/filebrowser.subfolder.conf.sample (100%) rename flexget.subfolder.conf.sample => custom_configs/flexget.subfolder.conf.sample (100%) rename freshrss.subfolder.conf.sample => custom_configs/freshrss.subfolder.conf.sample (100%) rename gaps.subfolder.conf.sample => custom_configs/gaps.subfolder.conf.sample (100%) rename gitea.subdomain.conf.sample => custom_configs/gitea.subdomain.conf.sample (100%) rename grafana.subfolder.conf.sample => custom_configs/grafana.subfolder.conf.sample (100%) rename homeassistant.subdomain.conf.sample => custom_configs/homeassistant.subdomain.conf.sample (100%) rename jackett.subdomain.conf.sample => custom_configs/jackett.subdomain.conf.sample (100%) rename jackett.subfolder.conf.sample => custom_configs/jackett.subfolder.conf.sample (100%) rename jdownloader.subdomain.conf.sample => custom_configs/jdownloader.subdomain.conf.sample (100%) rename jellyfin.subdomain.conf.sample => custom_configs/jellyfin.subdomain.conf.sample (100%) rename jenkins.subfolder.conf.sample => custom_configs/jenkins.subfolder.conf.sample (100%) rename jfa-go.subfolder.conf.sample => custom_configs/jfa-go.subfolder.conf.sample (100%) rename kasm.subdomain.conf.sample => custom_configs/kasm.subdomain.conf.sample (100%) rename mailcow.subdomain.conf.sample => custom_configs/mailcow.subdomain.conf.sample (100%) rename mailu.subfolder.conf.sample => custom_configs/mailu.subfolder.conf.sample (100%) rename metabase.subdomain.conf.sample => custom_configs/metabase.subdomain.conf.sample (100%) rename monica.subfolder.conf.sample => custom_configs/monica.subfolder.conf.sample (100%) rename mytinytodo.subfolder.conf.sample => custom_configs/mytinytodo.subfolder.conf.sample (100%) rename nextcloud.subdomain.conf.sample => custom_configs/nextcloud.subdomain.conf.sample (100%) rename nextcloud.subfolder.conf.sample => custom_configs/nextcloud.subfolder.conf.sample (100%) rename nexusoss.subdomain.conf.sample => custom_configs/nexusoss.subdomain.conf.sample (100%) rename nzbget.subdomain.conf.sample => custom_configs/nzbget.subdomain.conf.sample (100%) rename nzbget.subfolder.conf.sample => custom_configs/nzbget.subfolder.conf.sample (100%) rename nzbhydra.subdomain.conf.sample => custom_configs/nzbhydra.subdomain.conf.sample (100%) rename nzbhydra.subfolder.conf.sample => custom_configs/nzbhydra.subfolder.conf.sample (100%) rename ombi.subdomain.conf.sample => custom_configs/ombi.subdomain.conf.sample (100%) rename ombi.subfolder.conf.sample => custom_configs/ombi.subfolder.conf.sample (100%) rename openvpn-as.subdomain.conf.sample => custom_configs/openvpn-as.subdomain.conf.sample (100%) rename openvscode-server.subdomain.conf.sample => custom_configs/openvscode-server.subdomain.conf.sample (100%) rename organizr-auth.subfolder.conf.sample => custom_configs/organizr-auth.subfolder.conf.sample (100%) rename organizr.subdomain.conf.sample => custom_configs/organizr.subdomain.conf.sample (100%) rename organizr.subfolder.conf.sample => custom_configs/organizr.subfolder.conf.sample (100%) rename pihole.subdomain.conf.sample => custom_configs/pihole.subdomain.conf.sample (100%) rename pihole.subfolder.conf.sample => custom_configs/pihole.subfolder.conf.sample (100%) rename plex.subdomain.conf.sample => custom_configs/plex.subdomain.conf.sample (100%) rename plex.subfolder.conf.sample => custom_configs/plex.subfolder.conf.sample (100%) rename plexwebtools.subdomain.conf.sample => custom_configs/plexwebtools.subdomain.conf.sample (100%) rename plexwebtools.subfolder.conf.sample => custom_configs/plexwebtools.subfolder.conf.sample (100%) rename portainer.subdomain.conf.sample => custom_configs/portainer.subdomain.conf.sample (100%) rename portainer.subfolder.conf.sample => custom_configs/portainer.subfolder.conf.sample (100%) rename prometheus.subdomain.conf.sample => custom_configs/prometheus.subdomain.conf.sample (100%) rename prowlarr.subdomain.conf.sample => custom_configs/prowlarr.subdomain.conf.sample (100%) rename prowlarr.subfolder.conf.sample => custom_configs/prowlarr.subfolder.conf.sample (100%) rename pterodactylnode.subdomain.conf.sample => custom_configs/pterodactylnode.subdomain.conf.sample (100%) rename pydio-cells.subdomain.conf.sample => custom_configs/pydio-cells.subdomain.conf.sample (100%) rename rclone.subfolder.conf.sample => custom_configs/rclone.subfolder.conf.sample (100%) rename recipes.subdomain.conf.sample => custom_configs/recipes.subdomain.conf.sample (100%) rename rutorrent.subdomain.conf.sample => custom_configs/rutorrent.subdomain.conf.sample (100%) rename rutorrent.subfolder.conf.sample => custom_configs/rutorrent.subfolder.conf.sample (100%) rename sonarrtorss.subdomain.conf.sample => custom_configs/sonarrtorss.subdomain.conf.sample (100%) rename sonarrtorss.subfolder.conf.sample => custom_configs/sonarrtorss.subfolder.conf.sample (100%) rename synapse.subdomain.conf.sample => custom_configs/synapse.subdomain.conf.sample (100%) rename synclounge.subdomain.conf.sample => custom_configs/synclounge.subdomain.conf.sample (100%) rename synclounge.subfolder.conf.sample => custom_configs/synclounge.subfolder.conf.sample (100%) rename syncthing.subdomain.conf.sample => custom_configs/syncthing.subdomain.conf.sample (100%) rename syncthing.subfolder.conf.sample => custom_configs/syncthing.subfolder.conf.sample (100%) rename tautulli.subdomain.conf.sample => custom_configs/tautulli.subdomain.conf.sample (100%) rename tautulli.subfolder.conf.sample => custom_configs/tautulli.subfolder.conf.sample (100%) rename themepark.subfolder.conf.sample => custom_configs/themepark.subfolder.conf.sample (100%) rename transmission.subdomain.conf.sample => custom_configs/transmission.subdomain.conf.sample (100%) rename transmission.subfolder.conf.sample => custom_configs/transmission.subfolder.conf.sample (100%) rename tvheadend.subfolder.conf.sample => custom_configs/tvheadend.subfolder.conf.sample (100%) rename ubooquity.subdomain.conf.sample => custom_configs/ubooquity.subdomain.conf.sample (100%) rename ubooquity.subfolder.conf.sample => custom_configs/ubooquity.subfolder.conf.sample (100%) rename uptime-kuma.subdomain.conf.sample => custom_configs/uptime-kuma.subdomain.conf.sample (100%) rename vaultwarden.subdomain.conf.sample => custom_configs/vaultwarden.subdomain.conf.sample (100%) rename vaultwarden.subfolder.conf.sample => custom_configs/vaultwarden.subfolder.conf.sample (100%) rename watchstate.subdomain.conf.sample => custom_configs/watchstate.subdomain.conf.sample (100%) rename wikijs.subdomain.conf.sample => custom_configs/wikijs.subdomain.conf.sample (100%) rename wordpress.subfolder.conf.sample => custom_configs/wordpress.subfolder.conf.sample (100%) rename youtube-dl.subfolder.conf.sample => custom_configs/youtube-dl.subfolder.conf.sample (100%) delete mode 100644 dashy.subdomain.conf.sample delete mode 100644 ddns-updater.subdomain.conf.sample delete mode 100644 ddns-updater.subfolder.conf.sample delete mode 100644 deluge.subdomain.conf.sample delete mode 100644 dillinger.subdomain.conf.sample delete mode 100644 discount-bandit.subdomain.conf.sample delete mode 100644 dnsdist.subdomain.conf.sample delete mode 100644 dockge.subdomain.conf.sample delete mode 100644 dockge.subfolder.conf.sample delete mode 100644 documentserver.subdomain.conf.sample delete mode 100644 dokuwiki.subdomain.conf.sample delete mode 100644 dokuwiki.subfolder.conf.sample delete mode 100644 domoticz.subdomain.conf.sample delete mode 100644 domoticz.subfolder.conf.sample delete mode 100644 dozzle.subdomain.conf.sample delete mode 100644 drone.subdomain.conf.sample delete mode 100644 dsmrreader.subdomain.conf.sample delete mode 100644 duplicacy.subdomain.conf.sample delete mode 100644 duplicati.subdomain.conf.sample delete mode 100644 duplicati.subfolder.conf.sample delete mode 100644 embystat.subdomain.conf.sample delete mode 100644 esphome.subdomain.conf.sample delete mode 100644 fenrus.subdomain.conf.sample delete mode 100644 filebot.subdomain.conf.sample delete mode 100644 filebot.subfolder.conf.sample delete mode 100644 firefly.subdomain.conf.sample delete mode 100644 firefox.subdomain.conf.sample delete mode 100644 flaresolverr.subdomain.conf.sample delete mode 100644 flaresolverr.subfolder.conf.sample delete mode 100644 flexget.subdomain.conf.sample delete mode 100644 flood.subdomain.conf.sample delete mode 100644 flood.subfolder.conf.sample delete mode 100644 foldingathome.subdomain.conf.sample delete mode 100644 forgejo.subdomain.conf.sample delete mode 100644 forgejo.subfolder.conf.sample delete mode 100644 foundryvtt.subdomain.conf.sample delete mode 100644 freshrss.subdomain.conf.sample delete mode 100644 frigate.subdomain.conf.sample delete mode 100644 gaps.subdomain.conf.sample delete mode 100644 gatus.subdomain.conf.sample delete mode 100644 gatus.subfolder.conf.sample create mode 100644 generate_configs.py delete mode 100644 get_iplayer.subdomain.conf.sample delete mode 100644 ghost.subdomain.conf.sample delete mode 100644 ghost.subfolder.conf.sample delete mode 100644 gitea.subfolder.conf.sample delete mode 100644 glances.subdomain.conf.sample delete mode 100644 glances.subfolder.conf.sample delete mode 100644 gotify.subdomain.conf.sample delete mode 100644 gotify.subfolder.conf.sample delete mode 100644 grafana.subdomain.conf.sample delete mode 100644 grampsweb.subdomain.conf.sample delete mode 100644 grav.subdomain.conf.sample delete mode 100644 graylog.subdomain.conf.sample delete mode 100644 grocy.subdomain.conf.sample delete mode 100644 guacamole.subdomain.conf.sample delete mode 100644 guacamole.subfolder.conf.sample delete mode 100644 hass-configurator.subdomain.conf.sample delete mode 100644 headphones.subdomain.conf.sample delete mode 100644 headphones.subfolder.conf.sample delete mode 100644 healthchecks.subdomain.conf.sample delete mode 100644 hedgedoc.subdomain.conf.sample delete mode 100644 heimdall.subdomain.conf.sample delete mode 100644 heimdall.subfolder.conf.sample delete mode 100644 hoarder.subdomain.conf.sample delete mode 100644 homarr.subdomain.conf.sample delete mode 100644 homebox.subdomain.conf.sample delete mode 100644 homebridge.subdomain.conf.sample delete mode 100644 homepage.subdomain.conf.sample delete mode 100644 homepage.subfolder.conf.sample delete mode 100644 homer.subdomain.conf.sample delete mode 100644 huginn.subdomain.conf.sample delete mode 100644 immich.subdomain.conf.sample delete mode 100644 immich_server.subdomain.conf.sample delete mode 100644 influxdb.subdomain.conf.sample delete mode 100644 iplayarr.subdomain.conf.sample delete mode 100644 it-tools.subdomain.conf.sample delete mode 100644 jellyfin.subfolder.conf.sample delete mode 100644 jellyseerr.subdomain.conf.sample delete mode 100644 jfa-go.subdomain.conf.sample delete mode 100644 joplin.subdomain.conf.sample delete mode 100644 kanzi.subdomain.conf.sample delete mode 100644 kanzi.subfolder.conf.sample delete mode 100644 kavita.subdomain.conf.sample delete mode 100644 kavita.subfolder.conf.sample delete mode 100644 kimai.subdomain.conf.sample delete mode 100644 komga.subdomain.conf.sample delete mode 100644 komga.subfolder.conf.sample delete mode 100644 kopia.subdomain.conf.sample delete mode 100644 lazylibrarian.subdomain.conf.sample delete mode 100644 lazylibrarian.subfolder.conf.sample delete mode 100644 leantime.subdomain.conf.sample delete mode 100644 libreddit.subdomain.conf.sample delete mode 100644 librespeed.subdomain.conf.sample delete mode 100644 lidarr.subdomain.conf.sample delete mode 100644 lidarr.subfolder.conf.sample delete mode 100644 linkace.subdomain.conf.sample delete mode 100644 linkstack.subdomain.conf.sample delete mode 100644 linkwarden.subdomain.conf.sample delete mode 100644 linkwarden.subfolder.conf.sample delete mode 100644 lldap.subdomain.conf.sample delete mode 100644 lubelogger.subdomain.conf.sample delete mode 100644 lychee.subdomain.conf.sample delete mode 100644 lychee.subfolder.conf.sample delete mode 100644 mailu.subdomain.conf.sample delete mode 100644 maintainerr.subdomain.conf.sample delete mode 100644 mastodon.subdomain.conf.sample delete mode 100644 matomo.subdomain.conf.sample delete mode 100644 mattermost.subdomain.conf.sample delete mode 100644 mealie.subdomain.conf.sample delete mode 100644 medusa.subdomain.conf.sample delete mode 100644 medusa.subfolder.conf.sample delete mode 100644 metube.subdomain.conf.sample delete mode 100644 metube.subfolder.conf.sample delete mode 100644 miniflux.subdomain.conf.sample delete mode 100644 miniflux.subfolder.conf.sample delete mode 100644 monica.subdomain.conf.sample delete mode 100644 monitorr.subdomain.conf.sample delete mode 100644 monitorr.subfolder.conf.sample delete mode 100644 mstream.subdomain.conf.sample delete mode 100644 mylar.subdomain.conf.sample delete mode 100644 mylar.subfolder.conf.sample delete mode 100644 n8n.subdomain.conf.sample delete mode 100644 navidrome.subdomain.conf.sample delete mode 100644 netboot.subdomain.conf.sample delete mode 100644 netbox.subdomain.conf.sample delete mode 100644 netdata.subdomain.conf.sample delete mode 100644 netdata.subfolder.conf.sample delete mode 100644 nocodb.subdomain.conf.sample delete mode 100644 notifiarr.subdomain.conf.sample delete mode 100644 ntfy.subdomain.conf.sample delete mode 100644 octoprint.subdomain.conf.sample delete mode 100644 onetimesecret.subdomain.conf.sample delete mode 100644 oogway.subdomain.conf.sample delete mode 100644 open-webui.subdomain.conf.sample delete mode 100644 openhab.subdomain.conf.sample delete mode 100644 osticket.subdomain.conf.sample delete mode 100644 overseerr.subdomain.conf.sample delete mode 100644 paperless.subdomain.conf.sample delete mode 100644 paperless.subfolder.conf.sample delete mode 100644 papermerge.subdomain.conf.sample delete mode 100644 partdb.subdomain.conf.sample delete mode 100644 petio.subdomain.conf.sample delete mode 100644 petio.subfolder.conf.sample delete mode 100644 phoneinfoga.subdomain.conf.sample delete mode 100644 photoprism.subdomain.conf.sample delete mode 100644 phpmyadmin.subdomain.conf.sample delete mode 100644 phpmyadmin.subfolder.conf.sample delete mode 100644 picard.subfolder.conf.sample delete mode 100644 pingvin-share.subdomain.conf.sample delete mode 100644 pinry.subdomain.conf.sample delete mode 100644 piwigo.subdomain.conf.sample delete mode 100644 pixelfed.subdomain.conf.sample delete mode 100644 planka.subdomain.conf.sample delete mode 100644 planka.subfolder.conf.sample delete mode 100644 podgrab.subdomain.conf.sample delete mode 100644 privatebin.subdomain.conf.sample delete mode 100644 pterodactyl.subdomain.conf.sample delete mode 100644 pwndrop.subdomain.conf.sample delete mode 100644 pydio.subdomain.conf.sample delete mode 100644 pyload.subdomain.conf.sample delete mode 100644 pyload.subfolder.conf.sample delete mode 100644 qbit-manage.subdomain.conf.sample delete mode 100644 qbittorrent.subdomain.conf.sample delete mode 100644 qbittorrent.subfolder.conf.sample delete mode 100644 quassel-web.subdomain.conf.sample delete mode 100644 quassel-web.subfolder.conf.sample delete mode 100644 qui.subdomain.conf.sample delete mode 100644 qui.subfolder.conf.sample delete mode 100644 radarr.subdomain.conf.sample delete mode 100644 radarr.subfolder.conf.sample delete mode 100644 rallly.subdomain.conf.sample delete mode 100644 raneto.subdomain.conf.sample delete mode 100644 readarr.subdomain.conf.sample delete mode 100644 readarr.subfolder.conf.sample delete mode 100644 requestrr.subdomain.conf.sample delete mode 100644 resilio-sync.subdomain.conf.sample delete mode 100644 romm.subdomain.conf.sample delete mode 100644 sabnzbd.subdomain.conf.sample delete mode 100644 sabnzbd.subfolder.conf.sample delete mode 100644 saltrim.subdomain.conf.sample delete mode 100644 scope.subfolder.conf.sample delete mode 100644 scrutiny.subdomain.conf.sample delete mode 100644 semaphore.subdomain.conf.sample delete mode 100644 semaphore.subfolder.conf.sample delete mode 100644 shinobi.subdomain.conf.sample delete mode 100644 shinobi.subfolder.conf.sample delete mode 100644 shlink.subdomain.conf.sample delete mode 100644 sickchill.subdomain.conf.sample delete mode 100644 sickchill.subfolder.conf.sample delete mode 100644 sickrage.subdomain.conf.sample delete mode 100644 sickrage.subfolder.conf.sample delete mode 100644 skyhook.subdomain.conf.sample delete mode 100644 slskd.subfolder.conf.sample delete mode 100644 smokeping.subdomain.conf.sample delete mode 100644 smokeping.subfolder.conf.sample delete mode 100644 sonarr.subdomain.conf.sample delete mode 100644 sonarr.subfolder.conf.sample delete mode 100644 speedtest-tracker.subdomain.conf.sample delete mode 100644 spoolman.subdomain.conf.sample delete mode 100644 spoolman.subfolder.conf.sample delete mode 100644 statping.subdomain.conf.sample delete mode 100644 stirling-pdf.subdomain.conf.sample delete mode 100644 storm.subdomain.conf.sample delete mode 100644 taisun.subdomain.conf.sample delete mode 100644 tasmobackup.subdomain.conf.sample delete mode 100644 tdarr.subdomain.conf.sample rename pgadmin.subdomain.conf.sample => templates/subdomain.conf.j2 (58%) create mode 100644 templates/subfolder.conf.j2 delete mode 100644 thelounge.subdomain.conf.sample delete mode 100644 thelounge.subfolder.conf.sample delete mode 100644 themepark.subdomain.conf.sample delete mode 100644 tinyauth.subdomain.conf.sample delete mode 100644 unifi-controller.subdomain.conf.sample delete mode 100644 unifi-network-application.subdomain.conf.sample delete mode 100644 viewtube.subdomain.conf.sample delete mode 100644 wallabag.subdomain.conf.sample delete mode 100644 warpgate.subdomain.conf.sample delete mode 100644 watcharr.subdomain.conf.sample delete mode 100644 webtop.subdomain.conf.sample delete mode 100644 webtop.subfolder.conf.sample delete mode 100644 whisparr.subdomain.conf.sample delete mode 100644 whisparr.subfolder.conf.sample delete mode 100644 wizarr.subdomain.conf.sample delete mode 100644 wordpress.subdomain.conf.sample delete mode 100644 wrapperr.subdomain.conf.sample delete mode 100644 yacht.subdomain.conf.sample delete mode 100644 your-spotify-api.subdomain.conf.sample delete mode 100644 your-spotify.subdomain.conf.sample delete mode 100644 yourls.subdomain.conf.sample delete mode 100644 youtube-dl-server.subdomain.conf.sample delete mode 100644 yt-dlp-web.subdomain.conf.sample delete mode 100644 zigbee2mqtt.subdomain.conf.sample delete mode 100644 znc.subdomain.conf.sample delete mode 100644 znc.subfolder.conf.sample delete mode 100644 zwave-js-ui.subdomain.conf.sample delete mode 100644 zwavejs2mqtt.subdomain.conf.sample diff --git a/.gitignore b/.gitignore index 4d6f44d2b..2bd0268b4 100644 --- a/.gitignore +++ b/.gitignore @@ -1,12 +1,26 @@ -# Ignore everything +# Ignore everything by default * -# Do NOT ignore allowed files +# Do NOT ignore these standard project files !.editorconfig !.gitattributes !.github !.github/** !.gitignore -!*.conf.sample !LICENSE !README.md + +# Do NOT ignore the files needed to generate the configs +!generate_configs.py +!config_data.yml +!templates/ +!templates/** +!custom_configs/ +!custom_configs/** + +# Explicitly ignore the output directory and common Python artifacts. +output/ +__pycache__/ +*.pyc +venv/ +.venv/ diff --git a/_template.subdomain.conf.sample b/_template.subdomain.conf.sample deleted file mode 100644 index 855e94d97..000000000 --- a/_template.subdomain.conf.sample +++ /dev/null @@ -1,71 +0,0 @@ -## Version 2025/07/18 -# REMOVE THIS LINE BEFORE SUBMITTING: The structure of the file (all of the existing lines) should be kept as close as possible to this template. -# REMOVE THIS LINE BEFORE SUBMITTING: Look through this file for and replace them. Review other sample files to see how things are done. -# REMOVE THIS LINE BEFORE SUBMITTING: The comment lines at the top of the file (below this line) should explain any prerequisites for using the proxy such as DNS or app settings. -# make sure that your container is named -# make sure that your dns has a cname set for - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name .*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ; - set $upstream_port ; - set $upstream_proto ; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # REMOVE THIS LINE BEFORE SUBMITTING: Additional proxy settings such as headers go below this line, leave the blank line above. - } - - # REMOVE THIS LINE BEFORE SUBMITTING: Some proxies require one or more additional location blocks for things like API or RPC endpoints. - # REMOVE THIS LINE BEFORE SUBMITTING: If the proxy you are making a sample for does not require an additional location block please remove the commented out section below. - # location ~ (/)?/api { - # include /config/nginx/proxy.conf; - # include /config/nginx/resolver.conf; - # set $upstream_app ; - # set $upstream_port ; - # set $upstream_proto ; - # proxy_pass $upstream_proto://$upstream_app:$upstream_port; - # - # # REMOVE THIS LINE BEFORE SUBMITTING: Additional proxy settings such as headers go below this line, leave the blank line above. - # } -} diff --git a/_template.subfolder.conf.sample b/_template.subfolder.conf.sample deleted file mode 100644 index 2f8eff6be..000000000 --- a/_template.subfolder.conf.sample +++ /dev/null @@ -1,48 +0,0 @@ -## Version 2023/02/05 -# REMOVE THIS LINE BEFORE SUBMITTING: The structure of the file (all of the existing lines) should be kept as close as possible to this template. -# REMOVE THIS LINE BEFORE SUBMITTING: Look through this file for and replace them. Review other sample files to see how things are done. -# REMOVE THIS LINE BEFORE SUBMITTING: The comment lines at the top of the file (below this line) should explain any prerequisites for using the proxy such as DNS or app settings. -# make sure that your container is named -# make sure that is set to work with the base url // - - -location / { - return 301 $scheme://$host//; -} - -location ^~ // { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ; - set $upstream_port ; - set $upstream_proto ; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # REMOVE THIS LINE BEFORE SUBMITTING: Additional proxy settings such as headers go below this line, leave the blank line above. -} - -# REMOVE THIS LINE BEFORE SUBMITTING: Some proxies require one or more additional location blocks for things like API or RPC endpoints. -# REMOVE THIS LINE BEFORE SUBMITTING: If the proxy you are making a sample for does not require an additional location block please remove the commented out section below. -# location ^~ //api { -# include /config/nginx/proxy.conf; -# include /config/nginx/resolver.conf; -# set $upstream_app ; -# set $upstream_port ; -# set $upstream_proto ; -# proxy_pass $upstream_proto://$upstream_app:$upstream_port; -# -# # REMOVE THIS LINE BEFORE SUBMITTING: Additional proxy settings such as headers go below this line, leave the blank line above. -# } diff --git a/actual-server.subdomain.conf.sample b/actual-server.subdomain.conf.sample deleted file mode 100644 index 4fc719dd9..000000000 --- a/actual-server.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your actual-server container is named actual-server -# make sure that your dns has a cname set for actual-server - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name actual-server.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app actual-server; - set $upstream_port 5006; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/adminer.subdomain.conf.sample b/adminer.subdomain.conf.sample deleted file mode 100644 index e60eb41a4..000000000 --- a/adminer.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your adminer container is named adminer -# make sure that your dns has a cname set for adminer - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name adminer.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app adminer; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/adminer.subfolder.conf.sample b/adminer.subfolder.conf.sample deleted file mode 100644 index e8b02243d..000000000 --- a/adminer.subfolder.conf.sample +++ /dev/null @@ -1,30 +0,0 @@ -## Version 2023/02/05 -# make sure that your adminer container is named adminer -# adminer does not require a base url setting - -location /adminer { - return 301 $scheme://$host/adminer/; -} - -location ^~ /adminer/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app adminer; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/adminmongo.subdomain.conf.sample b/adminmongo.subdomain.conf.sample deleted file mode 100644 index c2bd8ea62..000000000 --- a/adminmongo.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your adminmongo container is named adminmongo -# make sure that your dns has a cname set for adminmongo - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name adminmongo.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app adminmongo; - set $upstream_port 1234; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/airsonic.subdomain.conf.sample b/airsonic.subdomain.conf.sample deleted file mode 100644 index 6fa79ba62..000000000 --- a/airsonic.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your airsonic container is named airsonic -# make sure that your dns has a cname set for airsonic -# add `server.use-forward-headers=true` to `/config/application.properties` to ensure logs contain real source IP - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name airsonic.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app airsonic; - set $upstream_port 4040; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/airsonic.subfolder.conf.sample b/airsonic.subfolder.conf.sample deleted file mode 100644 index 54b4f88d8..000000000 --- a/airsonic.subfolder.conf.sample +++ /dev/null @@ -1,27 +0,0 @@ -## Version 2023/02/05 -# make sure that your airsonic container is named airsonic -# make sure that airsonic is set to work with the base url /airsonic/ -# set the CONTEXT_PATH variable to /airsonic in airsonic container. - -location ^~ /airsonic { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app airsonic; - set $upstream_port 4040; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/apprise-api.subdomain.conf.sample b/apprise-api.subdomain.conf.sample deleted file mode 100644 index 4e65486e9..000000000 --- a/apprise-api.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your apprise-api container is named apprise-api -# make sure that your dns has a cname set for apprise-api - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name apprise-api.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app apprise-api; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} diff --git a/archisteamfarm.subdomain.conf.sample b/archisteamfarm.subdomain.conf.sample deleted file mode 100644 index 9e0170bef..000000000 --- a/archisteamfarm.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your archisteamfarm container is named archisteamfarm -# make sure that your dns has a cname set for archisteamfarm - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name archisteamfarm.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app archisteamfarm; - set $upstream_port 1242; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/atuin.subdomain.conf.sample b/atuin.subdomain.conf.sample deleted file mode 100644 index 03670f51e..000000000 --- a/atuin.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your atuin container is named atuin -# make sure that your dns has a cname set for atuin - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name atuin.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app atuin; - set $upstream_port 8888; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/audiobookshelf.subdomain.conf.sample b/audiobookshelf.subdomain.conf.sample deleted file mode 100644 index b737e9127..000000000 --- a/audiobookshelf.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your audiobookshelf container is named audiobookshelf -# make sure that your dns has a cname set for audiobookshelf - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name audiobookshelf.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app audiobookshelf; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/audiobookshelf.subfolder.conf.sample b/audiobookshelf.subfolder.conf.sample deleted file mode 100644 index f97b5c33a..000000000 --- a/audiobookshelf.subfolder.conf.sample +++ /dev/null @@ -1,27 +0,0 @@ -## Version 2023/02/05 -# make sure that your audiobookshelf container is named audiobookshelf -# make sure that audiobookshelf is set to work with the base url /audiobookshelf/ -# set the CONTEXT_PATH variable to /audiobookshelf in audiobookshelf container. - -location ^~ /audiobookshelf { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app audiobookshelf; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/autobrr.subdomain.conf.sample b/autobrr.subdomain.conf.sample deleted file mode 100644 index f08bd5d7f..000000000 --- a/autobrr.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/08/23 -# make sure that your autobrr container is named autobrr -# make sure that your dns has a cname set for autobrr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name autobrr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app autobrr; - set $upstream_port 7474; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/autobrr.subfolder.conf.sample b/autobrr.subfolder.conf.sample deleted file mode 100644 index 43b046535..000000000 --- a/autobrr.subfolder.conf.sample +++ /dev/null @@ -1,31 +0,0 @@ -## Version 2025/08/23 -# make sure that your autobrr container is named autobrr -# make sure that autobrr is set to work with the base url /autobrr/ - - -location /autobrr { - return 301 $scheme://$host/autobrr/; -} - -location ^~ /autobrr/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app autobrr; - set $upstream_port 7474; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/babybuddy.subdomain.conf.sample b/babybuddy.subdomain.conf.sample deleted file mode 100644 index 84fd70f5b..000000000 --- a/babybuddy.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your babybuddy container is named babybuddy -# make sure that your dns has a cname set for babybuddy - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name babybuddy.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app babybuddy; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ ^/api/ { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app babybuddy; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/bazarr.subdomain.conf.sample b/bazarr.subdomain.conf.sample deleted file mode 100644 index 76d7346cf..000000000 --- a/bazarr.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your bazarr container is named bazarr -# make sure that your dns has a cname set for bazarr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name bazarr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app bazarr; - set $upstream_port 6767; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/bazarr)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app bazarr; - set $upstream_port 6767; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/beets.subdomain.conf.sample b/beets.subdomain.conf.sample deleted file mode 100644 index 145f73570..000000000 --- a/beets.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your beets container is named beets -# make sure that your dns has a cname set for beets -#First edit beets.yml and enable the reverse proxy settings, under "web" add "reverse_proxy: true" and restart the beets container. - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name beets.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app beets; - set $upstream_port 8337; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/beszel.subdomain.conf.sample b/beszel.subdomain.conf.sample deleted file mode 100644 index 3cc6b0e34..000000000 --- a/beszel.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your beszel container is named beszel -# make sure that your dns has a cname set for beszel - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name beszel.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app beszel; - set $upstream_port 8090; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/beszel)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app beszel; - set $upstream_port 8090; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/boinc.subdomain.conf.sample b/boinc.subdomain.conf.sample deleted file mode 100644 index ccad6c5fd..000000000 --- a/boinc.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your boinc container is named boinc -# make sure that your dns has a cname set for boinc - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name boinc.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app boinc; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_buffering off; - } -} diff --git a/booksonic.subdomain.conf.sample b/booksonic.subdomain.conf.sample deleted file mode 100644 index 8d8b4c5d8..000000000 --- a/booksonic.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your booksonic container is named booksonic -# make sure that your dns has a cname set for booksonic - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name booksonic.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app booksonic; - set $upstream_port 4040; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/booksonic.subfolder.conf.sample b/booksonic.subfolder.conf.sample deleted file mode 100644 index 37dfdf9cc..000000000 --- a/booksonic.subfolder.conf.sample +++ /dev/null @@ -1,27 +0,0 @@ -## Version 2023/02/05 -# make sure that your booksonic container is named booksonic -# make sure that booksonic is set to work with the base url /booksonic/ -# set the CONTEXT_PATH variable to /booksonic in booksonic container. - -location ^~ /booksonic { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app booksonic; - set $upstream_port 4040; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/bookstack.subdomain.conf.sample b/bookstack.subdomain.conf.sample deleted file mode 100644 index be6cb12f2..000000000 --- a/bookstack.subdomain.conf.sample +++ /dev/null @@ -1,56 +0,0 @@ -## Version 2025/07/18 -# make sure that your bookstack container is named bookstack -# make sure that your dns has a cname set for bookstack -# Ensure you have the APP_URL Environment Variable set correctly in your Docker Run/Compose or in BookStack Env File (/www/.env) -# https://github.com/linuxserver/docker-bookstack#docker - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name bookstack.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app bookstack; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/budge.subdomain.conf.sample b/budge.subdomain.conf.sample deleted file mode 100644 index 7b40d2ef6..000000000 --- a/budge.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your budge container is named budge -# make sure that your dns has a cname set for budge - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name budge.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app budge; - set $upstream_port 443; - set $upstream_proto https; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} diff --git a/cadvisor.subdomain.conf.sample b/cadvisor.subdomain.conf.sample deleted file mode 100644 index a61c13f93..000000000 --- a/cadvisor.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your cadvisor container is named cadvisor -# make sure that your dns has a cname set for cadvisor - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name cadvisor.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app cadvisor; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/cadvisor)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app cadvisor; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/castopod.subdomain.conf.sample b/castopod.subdomain.conf.sample deleted file mode 100644 index f15e3ef43..000000000 --- a/castopod.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your castopod container is named castopod-app -# make sure that your dns has a cname set for castopod - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name castopod.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app castopod-app; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/changedetection.subdomain.conf.sample b/changedetection.subdomain.conf.sample deleted file mode 100644 index 80d865ff1..000000000 --- a/changedetection.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your changedetection container is named changedetection -# make sure that your dns has a cname set for changedetection - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name changedetection.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app changedetection; - set $upstream_port 5000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/chevereto.subdomain.conf.sample b/chevereto.subdomain.conf.sample deleted file mode 100644 index e0383dc31..000000000 --- a/chevereto.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your chevereto container is named chevereto -# make sure that your dns has a cname set for chevereto - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name chevereto.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app chevereto; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/chronograf.subdomain.conf.sample b/chronograf.subdomain.conf.sample deleted file mode 100644 index 5bd86f440..000000000 --- a/chronograf.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your chronograf container is named chronograf -# make sure that your dns has a cname set for chronograf - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name chronograf.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app chronograf; - set $upstream_port 8888; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/chronograf.subfolder.conf.sample b/chronograf.subfolder.conf.sample deleted file mode 100644 index 0510f341a..000000000 --- a/chronograf.subfolder.conf.sample +++ /dev/null @@ -1,32 +0,0 @@ -## Version 2023/02/05 -# make sure that your chronograf container is named chronograf -# make sure that chronograf is set to work with the base url /chronograf/ -# add BASE_PATH=/chronograf environment variable to your docker compose/run - -location /chronograf { - return 301 $scheme://$host/chronograf/; -} - -location ^~ /chronograf/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app chronograf; - set $upstream_port 8888; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - #rewrite /chronograf(.*) $1 break; -} diff --git a/cloudbeaver.subdomain.conf.sample b/cloudbeaver.subdomain.conf.sample deleted file mode 100644 index b67cbc05b..000000000 --- a/cloudbeaver.subdomain.conf.sample +++ /dev/null @@ -1,56 +0,0 @@ -## Version 2025/07/18 -# make sure that your cloudbeaver container is named cloudbeaver -# make sure that your dns has a cname set for cloudbeaver - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name cloudbeaver.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 75M; - proxy_redirect off; - proxy_buffering off; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app cloudbeaver; - set $upstream_port 8978; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/codimd.subdomain.conf.sample b/codimd.subdomain.conf.sample deleted file mode 100644 index d47be0be2..000000000 --- a/codimd.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure you have added the following environmental variables to your run command/compose file -# CMD_DOMAIN=codimd.server.com -# CMD_PROTOCOL_USESSL=true - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name codimd.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app codimd; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/collabora.subdomain.conf.sample b/collabora.subdomain.conf.sample deleted file mode 100644 index e953e0399..000000000 --- a/collabora.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your collabora container is named collabora -# make sure that your dns has a cname set for collabora - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name collabora.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app collabora; - set $upstream_port 9980; - set $upstream_proto https; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/commento.subdomain.conf.sample b/commento.subdomain.conf.sample deleted file mode 100644 index d49cfa1ae..000000000 --- a/commento.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your commento container is named commento -# make sure that your dns has a cname set for commento - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name commento.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app commento; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/config_data.yml b/config_data.yml new file mode 100644 index 000000000..3fe302a34 --- /dev/null +++ b/config_data.yml @@ -0,0 +1,705 @@ +subdomains: + - name: actual-server + port: 5006 + - name: adminer + port: 8080 + - name: adminmongo + port: 1234 + - name: airsonic + port: 4040 + - name: apprise-api + port: 8000 + - name: archisteamfarm + port: 1242 + - name: atuin + port: 8888 + - name: audiobookshelf + port: 80 + - name: autobrr + port: 7474 + - name: beets + port: 8337 + - name: booksonic + port: 4040 + - name: bookstack + port: 80 + - name: castopod + port: 8000 + - name: changedetection + port: 5000 + - name: chevereto + port: 80 + - name: chronograf + port: 8888 + - name: codimd + port: 3000 + - name: commento + port: 8080 + - name: couchpotato + port: 5050 + - name: crowdsec + port: 8080 + - name: cryptgeon + port: 8000 + - name: dashy + port: 8080 + - name: deluge + port: 8112 + - name: dillinger + port: 8080 + - name: discount-bandit + port: 80 + - name: dockge + port: 5001 + - name: documentserver + port: 80 + - name: dokuwiki + port: 80 + - name: domoticz + port: 8080 + - name: dozzle + port: 8080 + - name: drone + port: 80 + - name: dsmrreader + port: 80 + - name: duplicacy + port: 3875 + - name: duplicati + port: 8200 + - name: embystat + port: 6555 + - name: esphome + port: 6052 + - name: fenrus + port: 3000 + - name: firefly + port: 8080 + - name: firefox + port: 3000 + - name: flaresolverr + port: 8191 + - name: flexget + port: 5050 + - name: flood + port: 3000 + - name: get_iplayer + port: 1935 + - name: ghost + port: 2368 + - name: glances + port: 61208 + - name: gotify + port: 80 + - name: grav + port: 80 + - name: graylog + port: 9000 + - name: hass-configurator + port: 3218 + - name: headphones + port: 8181 + - name: healthchecks + port: 8000 + - name: hedgedoc + port: 3000 + - name: homarr + port: 7575 + - name: homebridge + port: 8581 + - name: homepage + port: 3000 + - name: homer + port: 8080 + - name: huginn + port: 3000 + - name: iplayarr + port: 4404 + - name: it-tools + port: 80 + - name: jellyseerr + port: 5055 + - name: jfa-go + port: 8056 + - name: joplin + port: 22300 + - name: kopia + port: 51515 + - name: lazylibrarian + port: 5299 + - name: leantime + port: 80 + - name: libreddit + port: 8080 + - name: librespeed + port: 80 + - name: linkace + port: 80 + - name: lldap + port: 17170 + - name: lubelogger + port: 8080 + - name: lychee + port: 80 + - name: mailu + port: 80 + - name: maintainerr + port: 6246 + - name: mastodon + port: 80 + - name: matomo + port: 80 + - name: mattermost + port: 8065 + - name: mealie + port: 9000 + - name: medusa + port: 8081 + - name: metube + port: 8081 + - name: miniflux + port: 8080 + - name: monitorr + port: 80 + - name: mstream + port: 3000 + - name: mylar + port: 8090 + - name: n8n + port: 5678 + - name: navidrome + port: 4533 + - name: netboot + port: 3000 + - name: netbox + port: 8000 + - name: netdata + port: 19999 + - name: nocodb + port: 8080 + - name: ntfy + port: 80 + - name: onetimesecret + port: 3000 + - name: oogway + port: 8080 + - name: openhab + port: 8080 + - name: open-webui + port: 8080 + - name: osticket + port: 80 + - name: papermerge + port: 8000 + - name: partdb + port: 80 + - name: petio + port: 7777 + - name: phoneinfoga + port: 5000 + - name: photoprism + port: 2342 + - name: phpmyadmin + port: 80 + - name: pinry + port: 80 + - name: piwigo + port: 80 + - name: pixelfed + port: 80 + - name: planka + port: 1337 + - name: podgrab + port: 8080 + - name: privatebin + port: 8080 + - name: pwndrop + port: 8080 + - name: pyload + port: 8000 + - name: qbit-manage + port: 8080 + - name: quassel-web + port: 64080 + - name: qui + port: 7476 + - name: rallly + port: 3000 + - name: raneto + port: 3000 + - name: requestrr + port: 4545 + - name: resilio-sync + port: 8888 + - name: romm + port: 8080 + - name: scrutiny + port: 8080 + - name: shlink + port: 8080 + - name: sickchill + port: 8081 + - name: sickrage + port: 8081 + - name: skyhook + port: 8080 + - name: smokeping + port: 80 + - name: speedtest-tracker + port: 80 + - name: spoolman + port: 8000 + - name: statping + port: 8080 + - name: stirling-pdf + port: 8080 + - name: storm + port: 8221 + - name: tasmobackup + port: 80 + - name: tdarr + port: 8265 + - name: thelounge + port: 9000 + - name: viewtube + port: 8066 + - name: wallabag + port: 80 + - name: wizarr + port: 5690 + - name: wordpress + port: 80 + - name: wrapperr + port: 8282 + - name: yacht + port: 8000 + - name: yourls + port: 80 + - name: your-spotify-api + port: 8080 + - name: your-spotify + port: 3000 + - name: youtube-dl-server + port: 8080 + - name: yt-dlp-web + port: 3000 + - name: zigbee2mqtt + port: 8080 + - name: znc + port: 6501 + - name: zwavejs2mqtt + port: 8091 + - name: zwave-js-ui + port: 8091 + - name: budge + port: 443 + https: true + - name: collabora + port: 9980 + https: true + - name: frigate + port: 8971 + https: true + - name: heimdall + port: 443 + https: true + - name: linkstack + port: 443 + https: true + - name: monica + port: 443 + https: true + - name: pydio + port: 443 + https: true + - name: unifi-controller + port: 8443 + https: true + buffering_off: true + - name: unifi-network-application + port: 8443 + https: true + buffering_off: true + - name: warpgate + port: 8888 + https: true + - name: babybuddy + port: 8000 + api: true + - name: bazarr + port: 6767 + api: true + - name: beszel + port: 8090 + api: true + - name: cadvisor + port: 8080 + api: true + - name: ddns-updater + port: 8000 + api: true + - name: grafana + port: 3000 + api: true + - name: grocy + port: 80 + api: true + - name: hoarder + port: 3000 + api: true + - name: homebox + port: 7745 + api: true + - name: immich + port: 2283 + api: true + - name: immich_server + port: 2283 + api: true + - name: influxdb + port: 8086 + api: true + - name: kavita + port: 5000 + api: true + - name: kimai + port: 80 + api: true + - name: komga + port: 25600 + api: true + - name: lidarr + port: 8686 + api: true + - name: linkwarden + port: 3000 + api: true + - name: overseerr + port: 5055 + api: true + - name: paperless + port: 8000 + api: true + - name: pingvin-share + port: 3000 + api: true + - name: radarr + port: 7878 + api: true + - name: readarr + port: 8787 + api: true + - name: sabnzbd + port: 8080 + api: true + - name: sonarr + port: 8989 + api: true + - name: watcharr + port: 3080 + api: true + - name: whisparr + port: 6969 + api: true + - name: boinc + port: 8080 + buffering_off: true + - name: cloudbeaver + port: 8978 + proxy_redirect_off: true + buffering_off: true + - name: crowdsec-dashboard + port: 3000 + iframe_friendly: true + - name: foundryvtt + port: 30000 + client_max_body_size: 300M + - name: gaps + port: 8484 + hide_xframe: true + - name: notifiarr + port: 5454 + - name: octoprint + port: 80 + set_x_scheme: true + - name: pgadmin + port: 80 + hide_x_forwarded_port: true + iframe_friendly: true + - name: pterodactyl + port: 80 + - name: saltrim + port: 3000 + client_max_body_size: 100M + - name: semaphore + port: 3000 + - name: themepark + port: 80 + - name: tinyauth + port: 3000 + +subfolders: + - name: airsonic + port: 4040 + - name: audiobookshelf + port: 80 + - name: booksonic + port: 4040 + - name: couchpotato + port: 5050 + - name: domoticz + port: 8080 + - name: flaresolverr + port: 8191 + - name: headphones + port: 8181 + - name: lazylibrarian + port: 5299 + - name: medusa + port: 8081 + - name: metube + port: 8081 + - name: mylar + port: 8090 + - name: pyload + port: 8000 + - name: quassel-web + port: 64080 + - name: sickchill + port: 8081 + - name: sickrage + port: 8081 + - name: slskd + port: 5000 + - name: smokeping + port: 80 + - name: webtop + port: 3000 + - name: znc + port: 6501 + - name: adminer + port: 8080 + redirect: true + - name: autobrr + port: 7474 + redirect: true + - name: crontabui + port: 8000 + redirect: true + rewrite: true + - name: dockge + port: 5001 + redirect: true + - name: gatus + port: 8080 + redirect: true + - name: miniflux + port: 8080 + redirect: true + - name: monitorr + port: 80 + redirect: true + - name: petio + port: 7777 + redirect: true + - name: planka + port: 1337 + redirect: true + - name: qui + port: 7476 + redirect: true + - name: shinobi + port: 8080 + redirect: true + - name: spoolman + port: 8000 + redirect: true + - name: ddns-updater + port: 8000 + api: true + - name: kavita + port: 5000 + redirect: true + api: true + - name: komga + port: 25600 + redirect: true + api: true + - name: lidarr + port: 8686 + api: true + - name: radarr + port: 7878 + api: true + - name: readarr + port: 8787 + api: true + - name: sabnzbd + port: 8080 + api: true + - name: sonarr + port: 8989 + api: true + - name: whisparr + port: 6969 + api: true + - name: dokuwiki + port: 80 + redirect: true + rewrite: true + - name: duplicati + port: 8200 + redirect: true + rewrite: true + - name: filebot + port: 5800 + redirect: true + rewrite: true + - name: flood + port: 3000 + redirect: true + rewrite: true + - name: forgejo + port: 3000 + redirect: true + rewrite: true + - name: gitea + port: 3000 + redirect: true + rewrite: true + - name: glances + port: 61208 + redirect: true + rewrite: true + - name: guacamole + port: 8080 + redirect: true + rewrite: true + buffering_off: true + - name: homepage + port: 3000 + rewrite: true + - name: lychee + port: 80 + redirect: true + rewrite: true + - name: netdata + port: 19999 + redirect: true + rewrite: true + - name: phpmyadmin + port: 80 + redirect: true + rewrite: true + - name: picard + port: 5800 + redirect: true + rewrite: true + - name: scope + port: 4040 + redirect: true + rewrite: true + - name: semaphore + port: 3000 + rewrite: true + - name: thelounge + port: 9000 + redirect: true + rewrite: true + +custom: + subdomains: + - adguard + - aria2-with-webui + - asciinema + - authelia + - authentik + - bitwarden + - calibre + - calibre-web + - code-server + - emby + - emulatorjs + - filebrowser + - gitea + - homeassistant + - jackett + - jdownloader + - jellyfin + - kasm + - mailcow + - metabase + - nextcloud + - nexusoss + - nzbget + - nzbhydra + - ombi + - openvpn-as + - openvscode-server + - organizr + - pihole + - plex + - plexwebtools + - portainer + - prometheus + - prowlarr + - pterodactylnode + - pydio-cells + - recipes + - rutorrent + - sonarrtorss + - synapse + - synclounge + - syncthing + - tautulli + - transmission + - ubooquity + - uptime-kuma + - vaultwarden + - watchstate + - wikijs + subfolders: + - bazarr + - beets + - beszel + - boinc + - calibre + - calibre-web + - deluge + - dozzle + - emby + - filebrowser + - flexget + - freshrss + - gaps + - grafana + - jackett + - jenkins + - jfa-go + - mailu + - monica + - mytinytodo + - nextcloud + - nzbget + - nzbhydra + - ombi + - organizr-auth + - organizr + - pihole + - plex + - plexwebtools + - portainer + - prowlarr + - rclone + - rutorrent + - sonarrtorss + - synclounge + - syncthing + - tautulli + - themepark + - transmission + - tvheadend + - ubooquity + - vaultwarden + - wordpress + - youtube-dl diff --git a/couchpotato.subdomain.conf.sample b/couchpotato.subdomain.conf.sample deleted file mode 100644 index a4d8711a5..000000000 --- a/couchpotato.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your couchpotato container is named couchpotato -# make sure that your dns has a cname set for couchpotato - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name couchpotato.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app couchpotato; - set $upstream_port 5050; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/couchpotato.subfolder.conf.sample b/couchpotato.subfolder.conf.sample deleted file mode 100644 index e416b1241..000000000 --- a/couchpotato.subfolder.conf.sample +++ /dev/null @@ -1,26 +0,0 @@ -## Version 2023/02/05 -# make sure that your couchpotato container is named couchpotato -# make sure that couchpotato is set to work with the base url /couchpotato/ - -location ^~ /couchpotato { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app couchpotato; - set $upstream_port 5050; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/crontabui.subfolder.conf.sample b/crontabui.subfolder.conf.sample deleted file mode 100644 index 0398d26b7..000000000 --- a/crontabui.subfolder.conf.sample +++ /dev/null @@ -1,31 +0,0 @@ -## Version 2023/02/05 -# make sure that your crontabui container is named crontabui -# crontabui does not require a base url setting - -location /crontabui { - return 301 $scheme://$host/crontabui/; -} - -location ^~ /crontabui/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app crontabui; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /crontabui(.*) $1 break; -} diff --git a/crowdsec-dashboard.subdomain.conf.sample b/crowdsec-dashboard.subdomain.conf.sample deleted file mode 100644 index 979e6b354..000000000 --- a/crowdsec-dashboard.subdomain.conf.sample +++ /dev/null @@ -1,58 +0,0 @@ -## Version 2025/07/18 -# make sure that your crowdsec-dashboard container is named crowdsec-dashboard -# make sure that your dns has a cname set for crowdsec-dashboard - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name crowdsec-dashboard.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app crowdsec-dashboard; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # Uncomment these if you want to lower security, and - # allow running in an iFrame (i.e. Organizr) - #proxy_hide_header Content-Security-Policy; - #proxy_hide_header X-Frame-Options; - } -} diff --git a/crowdsec.subdomain.conf.sample b/crowdsec.subdomain.conf.sample deleted file mode 100644 index e0aa7de86..000000000 --- a/crowdsec.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your crowdsec container is named crowdsec -# make sure that your dns has a cname set for crowdsec - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name crowdsec.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app crowdsec; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/cryptgeon.subdomain.conf.sample b/cryptgeon.subdomain.conf.sample deleted file mode 100644 index 8d591b007..000000000 --- a/cryptgeon.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your cryptgeon container is named cryptgeon -# make sure that your dns has a cname set for cryptgeon - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name cryptgeon.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app cryptgeon; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } - } diff --git a/adguard.subdomain.conf.sample b/custom_configs/adguard.subdomain.conf.sample similarity index 100% rename from adguard.subdomain.conf.sample rename to custom_configs/adguard.subdomain.conf.sample diff --git a/aria2-with-webui.subdomain.conf.sample b/custom_configs/aria2-with-webui.subdomain.conf.sample similarity index 100% rename from aria2-with-webui.subdomain.conf.sample rename to custom_configs/aria2-with-webui.subdomain.conf.sample diff --git a/asciinema.subdomain.conf.sample b/custom_configs/asciinema.subdomain.conf.sample similarity index 100% rename from asciinema.subdomain.conf.sample rename to custom_configs/asciinema.subdomain.conf.sample diff --git a/authelia.subdomain.conf.sample b/custom_configs/authelia.subdomain.conf.sample similarity index 100% rename from authelia.subdomain.conf.sample rename to custom_configs/authelia.subdomain.conf.sample diff --git a/authentik.subdomain.conf.sample b/custom_configs/authentik.subdomain.conf.sample similarity index 100% rename from authentik.subdomain.conf.sample rename to custom_configs/authentik.subdomain.conf.sample diff --git a/bazarr.subfolder.conf.sample b/custom_configs/bazarr.subfolder.conf.sample similarity index 100% rename from bazarr.subfolder.conf.sample rename to custom_configs/bazarr.subfolder.conf.sample diff --git a/beets.subfolder.conf.sample b/custom_configs/beets.subfolder.conf.sample similarity index 100% rename from beets.subfolder.conf.sample rename to custom_configs/beets.subfolder.conf.sample diff --git a/beszel.subfolder.conf.sample b/custom_configs/beszel.subfolder.conf.sample similarity index 100% rename from beszel.subfolder.conf.sample rename to custom_configs/beszel.subfolder.conf.sample diff --git a/bitwarden.subdomain.conf.sample b/custom_configs/bitwarden.subdomain.conf.sample similarity index 100% rename from bitwarden.subdomain.conf.sample rename to custom_configs/bitwarden.subdomain.conf.sample diff --git a/boinc.subfolder.conf.sample b/custom_configs/boinc.subfolder.conf.sample similarity index 100% rename from boinc.subfolder.conf.sample rename to custom_configs/boinc.subfolder.conf.sample diff --git a/calibre-web.subdomain.conf.sample b/custom_configs/calibre-web.subdomain.conf.sample similarity index 100% rename from calibre-web.subdomain.conf.sample rename to custom_configs/calibre-web.subdomain.conf.sample diff --git a/calibre-web.subfolder.conf.sample b/custom_configs/calibre-web.subfolder.conf.sample similarity index 100% rename from calibre-web.subfolder.conf.sample rename to custom_configs/calibre-web.subfolder.conf.sample diff --git a/calibre.subdomain.conf.sample b/custom_configs/calibre.subdomain.conf.sample similarity index 100% rename from calibre.subdomain.conf.sample rename to custom_configs/calibre.subdomain.conf.sample diff --git a/calibre.subfolder.conf.sample b/custom_configs/calibre.subfolder.conf.sample similarity index 100% rename from calibre.subfolder.conf.sample rename to custom_configs/calibre.subfolder.conf.sample diff --git a/code-server.subdomain.conf.sample b/custom_configs/code-server.subdomain.conf.sample similarity index 100% rename from code-server.subdomain.conf.sample rename to custom_configs/code-server.subdomain.conf.sample diff --git a/deluge.subfolder.conf.sample b/custom_configs/deluge.subfolder.conf.sample similarity index 100% rename from deluge.subfolder.conf.sample rename to custom_configs/deluge.subfolder.conf.sample diff --git a/dozzle.subfolder.conf.sample b/custom_configs/dozzle.subfolder.conf.sample similarity index 100% rename from dozzle.subfolder.conf.sample rename to custom_configs/dozzle.subfolder.conf.sample diff --git a/emby.subdomain.conf.sample b/custom_configs/emby.subdomain.conf.sample similarity index 100% rename from emby.subdomain.conf.sample rename to custom_configs/emby.subdomain.conf.sample diff --git a/emby.subfolder.conf.sample b/custom_configs/emby.subfolder.conf.sample similarity index 100% rename from emby.subfolder.conf.sample rename to custom_configs/emby.subfolder.conf.sample diff --git a/emulatorjs.subdomain.conf.sample b/custom_configs/emulatorjs.subdomain.conf.sample similarity index 100% rename from emulatorjs.subdomain.conf.sample rename to custom_configs/emulatorjs.subdomain.conf.sample diff --git a/filebrowser.subdomain.conf.sample b/custom_configs/filebrowser.subdomain.conf.sample similarity index 100% rename from filebrowser.subdomain.conf.sample rename to custom_configs/filebrowser.subdomain.conf.sample diff --git a/filebrowser.subfolder.conf.sample b/custom_configs/filebrowser.subfolder.conf.sample similarity index 100% rename from filebrowser.subfolder.conf.sample rename to custom_configs/filebrowser.subfolder.conf.sample diff --git a/flexget.subfolder.conf.sample b/custom_configs/flexget.subfolder.conf.sample similarity index 100% rename from flexget.subfolder.conf.sample rename to custom_configs/flexget.subfolder.conf.sample diff --git a/freshrss.subfolder.conf.sample b/custom_configs/freshrss.subfolder.conf.sample similarity index 100% rename from freshrss.subfolder.conf.sample rename to custom_configs/freshrss.subfolder.conf.sample diff --git a/gaps.subfolder.conf.sample b/custom_configs/gaps.subfolder.conf.sample similarity index 100% rename from gaps.subfolder.conf.sample rename to custom_configs/gaps.subfolder.conf.sample diff --git a/gitea.subdomain.conf.sample b/custom_configs/gitea.subdomain.conf.sample similarity index 100% rename from gitea.subdomain.conf.sample rename to custom_configs/gitea.subdomain.conf.sample diff --git a/grafana.subfolder.conf.sample b/custom_configs/grafana.subfolder.conf.sample similarity index 100% rename from grafana.subfolder.conf.sample rename to custom_configs/grafana.subfolder.conf.sample diff --git a/homeassistant.subdomain.conf.sample b/custom_configs/homeassistant.subdomain.conf.sample similarity index 100% rename from homeassistant.subdomain.conf.sample rename to custom_configs/homeassistant.subdomain.conf.sample diff --git a/jackett.subdomain.conf.sample b/custom_configs/jackett.subdomain.conf.sample similarity index 100% rename from jackett.subdomain.conf.sample rename to custom_configs/jackett.subdomain.conf.sample diff --git a/jackett.subfolder.conf.sample b/custom_configs/jackett.subfolder.conf.sample similarity index 100% rename from jackett.subfolder.conf.sample rename to custom_configs/jackett.subfolder.conf.sample diff --git a/jdownloader.subdomain.conf.sample b/custom_configs/jdownloader.subdomain.conf.sample similarity index 100% rename from jdownloader.subdomain.conf.sample rename to custom_configs/jdownloader.subdomain.conf.sample diff --git a/jellyfin.subdomain.conf.sample b/custom_configs/jellyfin.subdomain.conf.sample similarity index 100% rename from jellyfin.subdomain.conf.sample rename to custom_configs/jellyfin.subdomain.conf.sample diff --git a/jenkins.subfolder.conf.sample b/custom_configs/jenkins.subfolder.conf.sample similarity index 100% rename from jenkins.subfolder.conf.sample rename to custom_configs/jenkins.subfolder.conf.sample diff --git a/jfa-go.subfolder.conf.sample b/custom_configs/jfa-go.subfolder.conf.sample similarity index 100% rename from jfa-go.subfolder.conf.sample rename to custom_configs/jfa-go.subfolder.conf.sample diff --git a/kasm.subdomain.conf.sample b/custom_configs/kasm.subdomain.conf.sample similarity index 100% rename from kasm.subdomain.conf.sample rename to custom_configs/kasm.subdomain.conf.sample diff --git a/mailcow.subdomain.conf.sample b/custom_configs/mailcow.subdomain.conf.sample similarity index 100% rename from mailcow.subdomain.conf.sample rename to custom_configs/mailcow.subdomain.conf.sample diff --git a/mailu.subfolder.conf.sample b/custom_configs/mailu.subfolder.conf.sample similarity index 100% rename from mailu.subfolder.conf.sample rename to custom_configs/mailu.subfolder.conf.sample diff --git a/metabase.subdomain.conf.sample b/custom_configs/metabase.subdomain.conf.sample similarity index 100% rename from metabase.subdomain.conf.sample rename to custom_configs/metabase.subdomain.conf.sample diff --git a/monica.subfolder.conf.sample b/custom_configs/monica.subfolder.conf.sample similarity index 100% rename from monica.subfolder.conf.sample rename to custom_configs/monica.subfolder.conf.sample diff --git a/mytinytodo.subfolder.conf.sample b/custom_configs/mytinytodo.subfolder.conf.sample similarity index 100% rename from mytinytodo.subfolder.conf.sample rename to custom_configs/mytinytodo.subfolder.conf.sample diff --git a/nextcloud.subdomain.conf.sample b/custom_configs/nextcloud.subdomain.conf.sample similarity index 100% rename from nextcloud.subdomain.conf.sample rename to custom_configs/nextcloud.subdomain.conf.sample diff --git a/nextcloud.subfolder.conf.sample b/custom_configs/nextcloud.subfolder.conf.sample similarity index 100% rename from nextcloud.subfolder.conf.sample rename to custom_configs/nextcloud.subfolder.conf.sample diff --git a/nexusoss.subdomain.conf.sample b/custom_configs/nexusoss.subdomain.conf.sample similarity index 100% rename from nexusoss.subdomain.conf.sample rename to custom_configs/nexusoss.subdomain.conf.sample diff --git a/nzbget.subdomain.conf.sample b/custom_configs/nzbget.subdomain.conf.sample similarity index 100% rename from nzbget.subdomain.conf.sample rename to custom_configs/nzbget.subdomain.conf.sample diff --git a/nzbget.subfolder.conf.sample b/custom_configs/nzbget.subfolder.conf.sample similarity index 100% rename from nzbget.subfolder.conf.sample rename to custom_configs/nzbget.subfolder.conf.sample diff --git a/nzbhydra.subdomain.conf.sample b/custom_configs/nzbhydra.subdomain.conf.sample similarity index 100% rename from nzbhydra.subdomain.conf.sample rename to custom_configs/nzbhydra.subdomain.conf.sample diff --git a/nzbhydra.subfolder.conf.sample b/custom_configs/nzbhydra.subfolder.conf.sample similarity index 100% rename from nzbhydra.subfolder.conf.sample rename to custom_configs/nzbhydra.subfolder.conf.sample diff --git a/ombi.subdomain.conf.sample b/custom_configs/ombi.subdomain.conf.sample similarity index 100% rename from ombi.subdomain.conf.sample rename to custom_configs/ombi.subdomain.conf.sample diff --git a/ombi.subfolder.conf.sample b/custom_configs/ombi.subfolder.conf.sample similarity index 100% rename from ombi.subfolder.conf.sample rename to custom_configs/ombi.subfolder.conf.sample diff --git a/openvpn-as.subdomain.conf.sample b/custom_configs/openvpn-as.subdomain.conf.sample similarity index 100% rename from openvpn-as.subdomain.conf.sample rename to custom_configs/openvpn-as.subdomain.conf.sample diff --git a/openvscode-server.subdomain.conf.sample b/custom_configs/openvscode-server.subdomain.conf.sample similarity index 100% rename from openvscode-server.subdomain.conf.sample rename to custom_configs/openvscode-server.subdomain.conf.sample diff --git a/organizr-auth.subfolder.conf.sample b/custom_configs/organizr-auth.subfolder.conf.sample similarity index 100% rename from organizr-auth.subfolder.conf.sample rename to custom_configs/organizr-auth.subfolder.conf.sample diff --git a/organizr.subdomain.conf.sample b/custom_configs/organizr.subdomain.conf.sample similarity index 100% rename from organizr.subdomain.conf.sample rename to custom_configs/organizr.subdomain.conf.sample diff --git a/organizr.subfolder.conf.sample b/custom_configs/organizr.subfolder.conf.sample similarity index 100% rename from organizr.subfolder.conf.sample rename to custom_configs/organizr.subfolder.conf.sample diff --git a/pihole.subdomain.conf.sample b/custom_configs/pihole.subdomain.conf.sample similarity index 100% rename from pihole.subdomain.conf.sample rename to custom_configs/pihole.subdomain.conf.sample diff --git a/pihole.subfolder.conf.sample b/custom_configs/pihole.subfolder.conf.sample similarity index 100% rename from pihole.subfolder.conf.sample rename to custom_configs/pihole.subfolder.conf.sample diff --git a/plex.subdomain.conf.sample b/custom_configs/plex.subdomain.conf.sample similarity index 100% rename from plex.subdomain.conf.sample rename to custom_configs/plex.subdomain.conf.sample diff --git a/plex.subfolder.conf.sample b/custom_configs/plex.subfolder.conf.sample similarity index 100% rename from plex.subfolder.conf.sample rename to custom_configs/plex.subfolder.conf.sample diff --git a/plexwebtools.subdomain.conf.sample b/custom_configs/plexwebtools.subdomain.conf.sample similarity index 100% rename from plexwebtools.subdomain.conf.sample rename to custom_configs/plexwebtools.subdomain.conf.sample diff --git a/plexwebtools.subfolder.conf.sample b/custom_configs/plexwebtools.subfolder.conf.sample similarity index 100% rename from plexwebtools.subfolder.conf.sample rename to custom_configs/plexwebtools.subfolder.conf.sample diff --git a/portainer.subdomain.conf.sample b/custom_configs/portainer.subdomain.conf.sample similarity index 100% rename from portainer.subdomain.conf.sample rename to custom_configs/portainer.subdomain.conf.sample diff --git a/portainer.subfolder.conf.sample b/custom_configs/portainer.subfolder.conf.sample similarity index 100% rename from portainer.subfolder.conf.sample rename to custom_configs/portainer.subfolder.conf.sample diff --git a/prometheus.subdomain.conf.sample b/custom_configs/prometheus.subdomain.conf.sample similarity index 100% rename from prometheus.subdomain.conf.sample rename to custom_configs/prometheus.subdomain.conf.sample diff --git a/prowlarr.subdomain.conf.sample b/custom_configs/prowlarr.subdomain.conf.sample similarity index 100% rename from prowlarr.subdomain.conf.sample rename to custom_configs/prowlarr.subdomain.conf.sample diff --git a/prowlarr.subfolder.conf.sample b/custom_configs/prowlarr.subfolder.conf.sample similarity index 100% rename from prowlarr.subfolder.conf.sample rename to custom_configs/prowlarr.subfolder.conf.sample diff --git a/pterodactylnode.subdomain.conf.sample b/custom_configs/pterodactylnode.subdomain.conf.sample similarity index 100% rename from pterodactylnode.subdomain.conf.sample rename to custom_configs/pterodactylnode.subdomain.conf.sample diff --git a/pydio-cells.subdomain.conf.sample b/custom_configs/pydio-cells.subdomain.conf.sample similarity index 100% rename from pydio-cells.subdomain.conf.sample rename to custom_configs/pydio-cells.subdomain.conf.sample diff --git a/rclone.subfolder.conf.sample b/custom_configs/rclone.subfolder.conf.sample similarity index 100% rename from rclone.subfolder.conf.sample rename to custom_configs/rclone.subfolder.conf.sample diff --git a/recipes.subdomain.conf.sample b/custom_configs/recipes.subdomain.conf.sample similarity index 100% rename from recipes.subdomain.conf.sample rename to custom_configs/recipes.subdomain.conf.sample diff --git a/rutorrent.subdomain.conf.sample b/custom_configs/rutorrent.subdomain.conf.sample similarity index 100% rename from rutorrent.subdomain.conf.sample rename to custom_configs/rutorrent.subdomain.conf.sample diff --git a/rutorrent.subfolder.conf.sample b/custom_configs/rutorrent.subfolder.conf.sample similarity index 100% rename from rutorrent.subfolder.conf.sample rename to custom_configs/rutorrent.subfolder.conf.sample diff --git a/sonarrtorss.subdomain.conf.sample b/custom_configs/sonarrtorss.subdomain.conf.sample similarity index 100% rename from sonarrtorss.subdomain.conf.sample rename to custom_configs/sonarrtorss.subdomain.conf.sample diff --git a/sonarrtorss.subfolder.conf.sample b/custom_configs/sonarrtorss.subfolder.conf.sample similarity index 100% rename from sonarrtorss.subfolder.conf.sample rename to custom_configs/sonarrtorss.subfolder.conf.sample diff --git a/synapse.subdomain.conf.sample b/custom_configs/synapse.subdomain.conf.sample similarity index 100% rename from synapse.subdomain.conf.sample rename to custom_configs/synapse.subdomain.conf.sample diff --git a/synclounge.subdomain.conf.sample b/custom_configs/synclounge.subdomain.conf.sample similarity index 100% rename from synclounge.subdomain.conf.sample rename to custom_configs/synclounge.subdomain.conf.sample diff --git a/synclounge.subfolder.conf.sample b/custom_configs/synclounge.subfolder.conf.sample similarity index 100% rename from synclounge.subfolder.conf.sample rename to custom_configs/synclounge.subfolder.conf.sample diff --git a/syncthing.subdomain.conf.sample b/custom_configs/syncthing.subdomain.conf.sample similarity index 100% rename from syncthing.subdomain.conf.sample rename to custom_configs/syncthing.subdomain.conf.sample diff --git a/syncthing.subfolder.conf.sample b/custom_configs/syncthing.subfolder.conf.sample similarity index 100% rename from syncthing.subfolder.conf.sample rename to custom_configs/syncthing.subfolder.conf.sample diff --git a/tautulli.subdomain.conf.sample b/custom_configs/tautulli.subdomain.conf.sample similarity index 100% rename from tautulli.subdomain.conf.sample rename to custom_configs/tautulli.subdomain.conf.sample diff --git a/tautulli.subfolder.conf.sample b/custom_configs/tautulli.subfolder.conf.sample similarity index 100% rename from tautulli.subfolder.conf.sample rename to custom_configs/tautulli.subfolder.conf.sample diff --git a/themepark.subfolder.conf.sample b/custom_configs/themepark.subfolder.conf.sample similarity index 100% rename from themepark.subfolder.conf.sample rename to custom_configs/themepark.subfolder.conf.sample diff --git a/transmission.subdomain.conf.sample b/custom_configs/transmission.subdomain.conf.sample similarity index 100% rename from transmission.subdomain.conf.sample rename to custom_configs/transmission.subdomain.conf.sample diff --git a/transmission.subfolder.conf.sample b/custom_configs/transmission.subfolder.conf.sample similarity index 100% rename from transmission.subfolder.conf.sample rename to custom_configs/transmission.subfolder.conf.sample diff --git a/tvheadend.subfolder.conf.sample b/custom_configs/tvheadend.subfolder.conf.sample similarity index 100% rename from tvheadend.subfolder.conf.sample rename to custom_configs/tvheadend.subfolder.conf.sample diff --git a/ubooquity.subdomain.conf.sample b/custom_configs/ubooquity.subdomain.conf.sample similarity index 100% rename from ubooquity.subdomain.conf.sample rename to custom_configs/ubooquity.subdomain.conf.sample diff --git a/ubooquity.subfolder.conf.sample b/custom_configs/ubooquity.subfolder.conf.sample similarity index 100% rename from ubooquity.subfolder.conf.sample rename to custom_configs/ubooquity.subfolder.conf.sample diff --git a/uptime-kuma.subdomain.conf.sample b/custom_configs/uptime-kuma.subdomain.conf.sample similarity index 100% rename from uptime-kuma.subdomain.conf.sample rename to custom_configs/uptime-kuma.subdomain.conf.sample diff --git a/vaultwarden.subdomain.conf.sample b/custom_configs/vaultwarden.subdomain.conf.sample similarity index 100% rename from vaultwarden.subdomain.conf.sample rename to custom_configs/vaultwarden.subdomain.conf.sample diff --git a/vaultwarden.subfolder.conf.sample b/custom_configs/vaultwarden.subfolder.conf.sample similarity index 100% rename from vaultwarden.subfolder.conf.sample rename to custom_configs/vaultwarden.subfolder.conf.sample diff --git a/watchstate.subdomain.conf.sample b/custom_configs/watchstate.subdomain.conf.sample similarity index 100% rename from watchstate.subdomain.conf.sample rename to custom_configs/watchstate.subdomain.conf.sample diff --git a/wikijs.subdomain.conf.sample b/custom_configs/wikijs.subdomain.conf.sample similarity index 100% rename from wikijs.subdomain.conf.sample rename to custom_configs/wikijs.subdomain.conf.sample diff --git a/wordpress.subfolder.conf.sample b/custom_configs/wordpress.subfolder.conf.sample similarity index 100% rename from wordpress.subfolder.conf.sample rename to custom_configs/wordpress.subfolder.conf.sample diff --git a/youtube-dl.subfolder.conf.sample b/custom_configs/youtube-dl.subfolder.conf.sample similarity index 100% rename from youtube-dl.subfolder.conf.sample rename to custom_configs/youtube-dl.subfolder.conf.sample diff --git a/dashy.subdomain.conf.sample b/dashy.subdomain.conf.sample deleted file mode 100644 index 0370e09c2..000000000 --- a/dashy.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your dashy container is named dashy -# make sure that your dns has a cname set for dashy - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name dashy.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app dashy; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/ddns-updater.subdomain.conf.sample b/ddns-updater.subdomain.conf.sample deleted file mode 100644 index 557d3204d..000000000 --- a/ddns-updater.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your ddns-updater container is named ddns-updater -# make sure that your dns has a cname set for ddns-updater - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name ddns-updater.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ddns-updater; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/ddns-updater)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ddns-updater; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/ddns-updater.subfolder.conf.sample b/ddns-updater.subfolder.conf.sample deleted file mode 100644 index f4ad7e9e5..000000000 --- a/ddns-updater.subfolder.conf.sample +++ /dev/null @@ -1,36 +0,0 @@ -## Version 2024/08/04 -# make sure that your ddns-updater container is named ddns-updater -# make sure that ddns-updater is set to work with the base url /ddns-updater/ - -location ^~ /ddns-updater { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ddns-updater; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /ddns-updater/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ddns-updater; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/deluge.subdomain.conf.sample b/deluge.subdomain.conf.sample deleted file mode 100644 index 422a8aa62..000000000 --- a/deluge.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your deluge container is named deluge -# make sure that your dns has a cname set for deluge - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name deluge.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app deluge; - set $upstream_port 8112; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/dillinger.subdomain.conf.sample b/dillinger.subdomain.conf.sample deleted file mode 100644 index 1ca4e2b7a..000000000 --- a/dillinger.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your dillinger container is named dillinger -# make sure that your dns has a cname set for dillinger - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name dillinger.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app dillinger; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/discount-bandit.subdomain.conf.sample b/discount-bandit.subdomain.conf.sample deleted file mode 100644 index 20f58977f..000000000 --- a/discount-bandit.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your discount-bandit container is named discount-bandit -# make sure that your dns has a cname set for discount-bandit - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name discount-bandit.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app discount-bandit; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/dnsdist.subdomain.conf.sample b/dnsdist.subdomain.conf.sample deleted file mode 100644 index 9ecc4f1c4..000000000 --- a/dnsdist.subdomain.conf.sample +++ /dev/null @@ -1,24 +0,0 @@ -## Version 2025/07/18 -# make sure that your container is named dnsdist -# make sure that your dns has a cname set for dnsdist - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name dnsdist.*; - - location /dns-query { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app dnsdist; - set $upstream_port 443; - set $upstream_proto grpc; - grpc_pass grpcs://$upstream_app:$upstream_port; - - proxy_set_header Range $http_range; - proxy_set_header If-Range $http_if_range; - } -} diff --git a/dockge.subdomain.conf.sample b/dockge.subdomain.conf.sample deleted file mode 100644 index 5c4913648..000000000 --- a/dockge.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your dockge container is named dockge -# make sure that your dns has a cname set for dockge - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name dockge.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app dockge; - set $upstream_port 5001; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/dockge.subfolder.conf.sample b/dockge.subfolder.conf.sample deleted file mode 100644 index 5dbb6172f..000000000 --- a/dockge.subfolder.conf.sample +++ /dev/null @@ -1,31 +0,0 @@ -## Version 2023/02/05 -# make sure that your dockge container is named dockge -# make sure that dockge is set to work with the base url /dockge/ - - -location /dockge { - return 301 $scheme://$host/dockge/; -} - -location ^~ /dockge/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app dockge; - set $upstream_port 5001; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/documentserver.subdomain.conf.sample b/documentserver.subdomain.conf.sample deleted file mode 100644 index 81885ca26..000000000 --- a/documentserver.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your onlyoffice documentserver container is named documentserver -# make sure that your dns has a cname set for documentserver - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name documentserver.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app documentserver; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/dokuwiki.subdomain.conf.sample b/dokuwiki.subdomain.conf.sample deleted file mode 100644 index 1764d082b..000000000 --- a/dokuwiki.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your dokuwiki container is named dokuwiki -# make sure that your dns has a cname set for dokuwiki -# complete the setup by appending install.php to URL - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name dokuwiki.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app dokuwiki; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/dokuwiki.subfolder.conf.sample b/dokuwiki.subfolder.conf.sample deleted file mode 100644 index 401968fd4..000000000 --- a/dokuwiki.subfolder.conf.sample +++ /dev/null @@ -1,32 +0,0 @@ -## Version 2023/02/05 -# make sure that your dokuwiki container is named dokuwiki -# make sure that dokuwiki is set to work with the base url /dokuwiki/ -# first go into dokuwiki settings (Admin on the top left when Logged in), under "Configuration Settings" set the "basedir" to /dokuwiki/ and restart the dokuwiki container - -location /dokuwiki { - return 301 $scheme://$host/dokuwiki/; -} - -location ^~ /dokuwiki/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app dokuwiki; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /dokuwiki(.*) $1 break; -} diff --git a/domoticz.subdomain.conf.sample b/domoticz.subdomain.conf.sample deleted file mode 100644 index 9a64e9750..000000000 --- a/domoticz.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your domoticz container is named domoticz -# make sure that your dns has a cname set for domoticz - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name domoticz.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app domoticz; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/domoticz.subfolder.conf.sample b/domoticz.subfolder.conf.sample deleted file mode 100644 index 9bca758be..000000000 --- a/domoticz.subfolder.conf.sample +++ /dev/null @@ -1,27 +0,0 @@ -## Version 2023/02/05 -# make sure that your domoticz container is named domoticz -# make sure that domoticz is set to work with the base url /domoticz/ -# set the WEBROOT variable to domoticz for the domoticz container. - -location ^~ /domoticz/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app domoticz; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/dozzle.subdomain.conf.sample b/dozzle.subdomain.conf.sample deleted file mode 100644 index a64638fb2..000000000 --- a/dozzle.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your dozzle container is named dozzle -# make sure that your dns has a cname set for dozzle - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name dozzle.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app dozzle; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/drone.subdomain.conf.sample b/drone.subdomain.conf.sample deleted file mode 100644 index b1c081907..000000000 --- a/drone.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your drone container is named drone -# make sure that your dns has a cname set for drone - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name drone.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app drone; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/dsmrreader.subdomain.conf.sample b/dsmrreader.subdomain.conf.sample deleted file mode 100644 index 87447382e..000000000 --- a/dsmrreader.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your dsmr container is named dsmr -# make sure that your dns has a cname set for dsmr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name dsmr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app dsmr; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/duplicacy.subdomain.conf.sample b/duplicacy.subdomain.conf.sample deleted file mode 100644 index 2d040b778..000000000 --- a/duplicacy.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your duplicacy container is named duplicacy -# make sure that your dns has a cname set for duplicacy - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name duplicacy.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app duplicacy; - set $upstream_port 3875; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/duplicati.subdomain.conf.sample b/duplicati.subdomain.conf.sample deleted file mode 100644 index 94a7dedfa..000000000 --- a/duplicati.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your duplicati container is named duplicati -# make sure that your dns has a cname set for duplicati - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name duplicati.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app duplicati; - set $upstream_port 8200; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/duplicati.subfolder.conf.sample b/duplicati.subfolder.conf.sample deleted file mode 100644 index 264000604..000000000 --- a/duplicati.subfolder.conf.sample +++ /dev/null @@ -1,32 +0,0 @@ -## Version 2023/02/05 -# make sure that your duplicati container is named duplicati -# duplicati does not require a base url setting -# DUPLICATI AUTH WILL NOT WORK WITH THIS CONFIG, use the auth options below - -location /duplicati { - return 301 $scheme://$host/duplicati/; -} - -location ^~ /duplicati/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app duplicati; - set $upstream_port 8200; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /duplicati(.*) $1 break; -} diff --git a/embystat.subdomain.conf.sample b/embystat.subdomain.conf.sample deleted file mode 100644 index 26e58d77c..000000000 --- a/embystat.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your embystat container is named embystat -# make sure that your dns has a cname set for embystat - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name embystat.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app embystat; - set $upstream_port 6555; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/esphome.subdomain.conf.sample b/esphome.subdomain.conf.sample deleted file mode 100644 index 66169a252..000000000 --- a/esphome.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your esphome container is named esphome -# make sure that your dns has a cname set for esphome - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name esphome.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app esphome; - set $upstream_port 6052; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/fenrus.subdomain.conf.sample b/fenrus.subdomain.conf.sample deleted file mode 100644 index 53c4b7518..000000000 --- a/fenrus.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your fenrus container is named fenrus -# make sure that your dns has a cname set for fenrus - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name fenrus.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app fenrus; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/filebot.subdomain.conf.sample b/filebot.subdomain.conf.sample deleted file mode 100644 index 59963ee1d..000000000 --- a/filebot.subdomain.conf.sample +++ /dev/null @@ -1,62 +0,0 @@ -## Version 2025/07/18 -# make sure that your filebot container is named filebot -# make sure that your dns has a cname set for filebot - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name filebot.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app filebot; - set $upstream_port 5800; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } - - location ~ (/filebot)?/websockify { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app filebot; - set $upstream_port 5800; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port/websockify/; - } -} diff --git a/filebot.subfolder.conf.sample b/filebot.subfolder.conf.sample deleted file mode 100644 index 20a743087..000000000 --- a/filebot.subfolder.conf.sample +++ /dev/null @@ -1,31 +0,0 @@ -## Version 2023/02/05 -# make sure that your filebot container is named filebot -# filebot does not require a base url setting - -location /filebot { - return 301 $scheme://$host/filebot/; -} - -location ^~ /filebot/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app filebot; - set $upstream_port 5800; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /filebot(.*) $1 break; -} diff --git a/firefly.subdomain.conf.sample b/firefly.subdomain.conf.sample deleted file mode 100644 index 70dc16210..000000000 --- a/firefly.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your firefly container is named firefly -# make sure that your dns has a cname set for firefly - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name firefly.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app firefly; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/firefox.subdomain.conf.sample b/firefox.subdomain.conf.sample deleted file mode 100644 index a7347b46a..000000000 --- a/firefox.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your firefox container is named firefox -# make sure that your dns has a cname set for firefox - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name firefox.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app firefox; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/flaresolverr.subdomain.conf.sample b/flaresolverr.subdomain.conf.sample deleted file mode 100644 index ee9c825ef..000000000 --- a/flaresolverr.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your flaresolverr container is named flaresolverr -# make sure that your dns has a cname set for flaresolverr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name flaresolverr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app flaresolverr; - set $upstream_port 8191; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/flaresolverr.subfolder.conf.sample b/flaresolverr.subfolder.conf.sample deleted file mode 100644 index 8b6afa056..000000000 --- a/flaresolverr.subfolder.conf.sample +++ /dev/null @@ -1,26 +0,0 @@ -## Version 2024/01/19 -# make sure that your flaresolverr container is named flaresolverr -# make sure that sonarr is set to work with the base url /flaresolverr/ - -location ^~ /flaresolverr { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app flaresolverr; - set $upstream_port 8191; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/flexget.subdomain.conf.sample b/flexget.subdomain.conf.sample deleted file mode 100644 index 45dacc077..000000000 --- a/flexget.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your flexget container is named flexget -# make sure that your dns has a cname set for flexget - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name flexget.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app flexget; - set $upstream_port 5050; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/flood.subdomain.conf.sample b/flood.subdomain.conf.sample deleted file mode 100644 index 633bdd2f5..000000000 --- a/flood.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your flood container is named flood -# make sure that your dns has a cname set for flood - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name flood.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app flood; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/flood.subfolder.conf.sample b/flood.subfolder.conf.sample deleted file mode 100644 index 6b16d65b0..000000000 --- a/flood.subfolder.conf.sample +++ /dev/null @@ -1,31 +0,0 @@ -## Version 2023/02/05 -# make sure that your flood container is named flood -# flood does not require a base url setting - -location /flood { - return 301 $scheme://$host/flood/; -} - -location ^~ /flood/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app flood; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /flood(.*) $1 break; -} diff --git a/foldingathome.subdomain.conf.sample b/foldingathome.subdomain.conf.sample deleted file mode 100644 index 39eb643f5..000000000 --- a/foldingathome.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your foldingathome container is named foldingathome -# make sure that your dns has a cname set for foldingathome - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name foldingathome.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - proxy_buffering off; - include /config/nginx/resolver.conf; - set $upstream_app foldingathome; - set $upstream_port 7396; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/forgejo.subdomain.conf.sample b/forgejo.subdomain.conf.sample deleted file mode 100644 index e4012110d..000000000 --- a/forgejo.subdomain.conf.sample +++ /dev/null @@ -1,69 +0,0 @@ -## Version 2025/07/18 -# make sure that your forgejo container is named forgejo -# make sure that your dns has a cname set for forgejo -# edit the following parameters in /data/forgejo/conf/app.ini or set as ENV vars in your container -# [server] -# SSH_DOMAIN = forgejo.example.com -# ROOT_URL = https://forgejo.example.com/ -# DOMAIN = forgejo.example.com - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name forgejo.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app forgejo; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/forgejo)?/info/lfs { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app forgejo; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/forgejo.subfolder.conf.sample b/forgejo.subfolder.conf.sample deleted file mode 100644 index d23b33770..000000000 --- a/forgejo.subfolder.conf.sample +++ /dev/null @@ -1,24 +0,0 @@ -## Version 2024/04/20 -# make sure that your forgejo container is named forgejo -# make sure that forgejo is set to work with the base url /forgejo/ -# The following parameters in /data/forgejo/conf/app.ini should be edited to match your setup -# or set as ENV vars in your container -# [server] -# SSH_DOMAIN = example.com:2222 -# ROOT_URL = https://example.com/forgejo/ -# DOMAIN = example.com - -location /forgejo { - return 301 $scheme://$host/forgejo/; -} - -location ^~ /forgejo/ { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app forgejo; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /forgejo(.*) $1 break; -} diff --git a/foundryvtt.subdomain.conf.sample b/foundryvtt.subdomain.conf.sample deleted file mode 100644 index 4df44a76d..000000000 --- a/foundryvtt.subdomain.conf.sample +++ /dev/null @@ -1,63 +0,0 @@ -## Version 2025/07/18 -# make sure that your foundryvtt container is named foundryvtt -# make sure that your dns has a cname set for foundryvtt -# Ensure that your Foundry VTT's {userData}/Config/options.json file is configured as follows: -# "hostname": "your.hostname.com", -# "routePrefix": null, -# "sslCert": null, -# "sslKey": null, -# "port": 30000, -# "proxyPort": 443, -# "proxySSL": true -# Refer to https://foundryvtt.com/article/nginx/ for the latest Foundry configuration information - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name foundryvtt.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 300M; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app foundryvtt; - set $upstream_port 30000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/freshrss.subdomain.conf.sample b/freshrss.subdomain.conf.sample deleted file mode 100644 index 11a70907d..000000000 --- a/freshrss.subdomain.conf.sample +++ /dev/null @@ -1,59 +0,0 @@ -## Version 2025/07/18 -# make sure that your freshrss container is named freshrss -# make sure that your dns has a cname set for freshrss - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name freshrss.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app freshrss; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_buffering off; - proxy_set_header X-Forwarded-Port $server_port; - proxy_cookie_path / "/; HTTPOnly; Secure"; - proxy_set_header Authorization $http_authorization; - proxy_pass_header Authorization; - } -} diff --git a/frigate.subdomain.conf.sample b/frigate.subdomain.conf.sample deleted file mode 100644 index 955622d68..000000000 --- a/frigate.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your frigate container is named frigate -# make sure that your dns has a cname set for frigate -# if you are on a version older than 0.14.0 set upstream_port to 5000 and upstream_proto to http - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name frigate.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app frigate; - set $upstream_port 8971; - set $upstream_proto https; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/gaps.subdomain.conf.sample b/gaps.subdomain.conf.sample deleted file mode 100644 index 3e05ffacc..000000000 --- a/gaps.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your gaps container is named gaps -# make sure that your dns has a cname set for gaps - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name gaps.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app gaps; - set $upstream_port 8484; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_hide_header X-Frame-Options; - } -} diff --git a/gatus.subdomain.conf.sample b/gatus.subdomain.conf.sample deleted file mode 100644 index 457a04079..000000000 --- a/gatus.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your gatus container is named gatus -# make sure that your dns has a cname set for gatus - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name gatus.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app gatus; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} diff --git a/gatus.subfolder.conf.sample b/gatus.subfolder.conf.sample deleted file mode 100644 index cdfb04a11..000000000 --- a/gatus.subfolder.conf.sample +++ /dev/null @@ -1,32 +0,0 @@ -## Version 2024/02/27 -# make sure that your container is named -# make sure that is set to work with the base url // - - -location /gatus { - return 301 $scheme://$host/gatus/; -} - -location ^~ /gatus/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app gatus; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - diff --git a/generate_configs.py b/generate_configs.py new file mode 100644 index 000000000..0c0f02727 --- /dev/null +++ b/generate_configs.py @@ -0,0 +1,103 @@ +# generate_configs.py + +import os +import shutil +import yaml +from jinja2 import Environment, FileSystemLoader + +# --- Configuration --- +YAML_FILE = 'config_data.yml' +TEMPLATE_DIR = 'templates' +CUSTOM_DIR = 'custom_configs' +OUTPUT_DIR = 'output' +# --------------------- + +def generate_configs(): + """ + Generates Nginx config files from a YAML data source and Jinja2 templates. + """ + print("--- Starting Nginx Config Generation ---") + + # Create output directory if it doesn't exist + os.makedirs(OUTPUT_DIR, exist_ok=True) + print(f"Output directory '{OUTPUT_DIR}' is ready.") + + # Load data from YAML file + try: + with open(YAML_FILE, 'r') as f: + data = yaml.safe_load(f) + print(f"Successfully loaded data from '{YAML_FILE}'.") + except FileNotFoundError: + print(f"ERROR: Data file not found at '{YAML_FILE}'. Exiting.") + return + except yaml.YAMLError as e: + print(f"ERROR: Could not parse YAML file '{YAML_FILE}': {e}. Exiting.") + return + + # Set up Jinja2 environment + try: + env = Environment( + loader=FileSystemLoader(TEMPLATE_DIR), + trim_blocks=True, + lstrip_blocks=True + ) + subdomain_template = env.get_template('subdomain.conf.j2') + subfolder_template = env.get_template('subfolder.conf.j2') + print("Jinja2 templates loaded successfully.") + except Exception as e: + print(f"ERROR: Failed to load Jinja2 templates from '{TEMPLATE_DIR}': {e}. Exiting.") + return + + # Generate templated subdomain configs + print("\n--- Generating Templated Subdomain Configs ---") + subdomain_items = data.get('subdomains', []) + for item in subdomain_items: + filename = f"{item['name']}.subdomain.conf.sample" + output_path = os.path.join(OUTPUT_DIR, filename) + rendered_content = subdomain_template.render(item=item) + with open(output_path, 'w') as f: + f.write(rendered_content) + print(f" [OK] Generated {filename}") + + # Generate templated subfolder configs + print("\n--- Generating Templated Subfolder Configs ---") + subfolder_items = data.get('subfolders', []) + for item in subfolder_items: + filename = f"{item['name']}.subfolder.conf.sample" + output_path = os.path.join(OUTPUT_DIR, filename) + rendered_content = subfolder_template.render(item=item) + with open(output_path, 'w') as f: + f.write(rendered_content) + print(f" [OK] Generated {filename}") + + # Copy custom configs + print("\n--- Copying Custom Configs ---") + if not os.path.isdir(CUSTOM_DIR): + print(f"WARNING: Custom configs directory '{CUSTOM_DIR}' not found. Skipping copy.") + else: + # Process custom subdomains + for app_name in data.get('custom', {}).get('subdomains', []): + filename = f"{app_name}.subdomain.conf.sample" + source_path = os.path.join(CUSTOM_DIR, filename) + dest_path = os.path.join(OUTPUT_DIR, filename) + if os.path.exists(source_path): + shutil.copy(source_path, dest_path) + print(f" [OK] Copied {filename}") + else: + print(f" [!!] WARNING: Custom config file not found: {source_path}") + + # Process custom subfolders + for app_name in data.get('custom', {}).get('subfolders', []): + filename = f"{app_name}.subfolder.conf.sample" + source_path = os.path.join(CUSTOM_DIR, filename) + dest_path = os.path.join(OUTPUT_DIR, filename) + if os.path.exists(source_path): + shutil.copy(source_path, dest_path) + print(f" [OK] Copied {filename}") + else: + print(f" [!!] WARNING: Custom config file not found: {source_path}") + + print("\n--- Generation Complete ---") + +if __name__ == "__main__": + generate_configs() diff --git a/get_iplayer.subdomain.conf.sample b/get_iplayer.subdomain.conf.sample deleted file mode 100644 index ff6d1ef6f..000000000 --- a/get_iplayer.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your get_iplayer container is named get_iplayer -# make sure that your dns has a cname set for get_iplayer - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name get_iplayer.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app get_iplayer; - set $upstream_port 1935; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/ghost.subdomain.conf.sample b/ghost.subdomain.conf.sample deleted file mode 100644 index 20d718b16..000000000 --- a/ghost.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your ghost container is named ghost -# make sure that your dns has a cname set for ghost - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name ghost.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ghost; - set $upstream_port 2368; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/ghost.subfolder.conf.sample b/ghost.subfolder.conf.sample deleted file mode 100644 index 5673ccc82..000000000 --- a/ghost.subfolder.conf.sample +++ /dev/null @@ -1,28 +0,0 @@ -## Version 2023/02/05 -# make sure that your ghost container is named ghost -# make sure that ghost is set to work with the base url /ghost/ -# Make sure you are using a subfolder in your ghost config file. https://ghost.org/docs/concepts/config/#url -# Note: /ghost/ is by default used for the admin page. See https://ghost.org/docs/concepts/config/#admin-url - -location /blog { - # enable the next two lines for http auth - #uth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ghost; - set $upstream_port 2368; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/gitea.subfolder.conf.sample b/gitea.subfolder.conf.sample deleted file mode 100644 index 14f84a7fb..000000000 --- a/gitea.subfolder.conf.sample +++ /dev/null @@ -1,23 +0,0 @@ -## Version 2023/02/05 -# make sure that your gitea container is named gitea -# make sure that gitea is set to work with the base url /gitea/ -# The following parameters in /data/gitea/conf/app.ini should be edited to match your setup -# [server] -# SSH_DOMAIN = example.com:2222 -# ROOT_URL = https://example.com/gitea/ -# DOMAIN = example.com - -location /gitea { - return 301 $scheme://$host/gitea/; -} - -location ^~ /gitea/ { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app gitea; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /gitea(.*) $1 break; -} diff --git a/glances.subdomain.conf.sample b/glances.subdomain.conf.sample deleted file mode 100644 index a32221fad..000000000 --- a/glances.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your glances container is named glances -# make sure that your dns has a cname set for glances - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name glances.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app glances; - set $upstream_port 61208; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/glances.subfolder.conf.sample b/glances.subfolder.conf.sample deleted file mode 100644 index b4da5f4cf..000000000 --- a/glances.subfolder.conf.sample +++ /dev/null @@ -1,31 +0,0 @@ -## Version 2023/02/05 -# make sure that your glances container is named glances -# glances does not require a base url setting - -location /glances { - return 301 $scheme://$host/glances/; -} - -location ^~ /glances/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app glances; - set $upstream_port 61208; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /glances(.*) $1 break; -} diff --git a/gotify.subdomain.conf.sample b/gotify.subdomain.conf.sample deleted file mode 100644 index 209f65f65..000000000 --- a/gotify.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your gotify container is named gotify -# make sure that your dns has a cname set for gotify - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name gotify.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app gotify; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/gotify.subfolder.conf.sample b/gotify.subfolder.conf.sample deleted file mode 100644 index aae75b850..000000000 --- a/gotify.subfolder.conf.sample +++ /dev/null @@ -1,30 +0,0 @@ -## Version 2023/02/05 -# make sure that your gotify container is named gotify -# gotify does not require a base url setting - -location /gotify { - return 301 $scheme://$host/gotify/; -} - -location /gotify/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app gotify; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - rewrite ^/gotify(/.*) $1 break; -} diff --git a/grafana.subdomain.conf.sample b/grafana.subdomain.conf.sample deleted file mode 100644 index 894497df5..000000000 --- a/grafana.subdomain.conf.sample +++ /dev/null @@ -1,70 +0,0 @@ -## Version 2025/07/18 -# make sure that your grafana container is named grafana -# make sure that your dns has a cname set for grafana - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name grafana.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app grafana; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # Clear Authorization Header if you are using http auth and normal Grafana auth - #proxy_set_header Authorization ""; - - } - - location ~ (/grafana)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app grafana; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # Clear Authorization Header if you are using http auth and normal Grafana auth - #proxy_set_header Authorization ""; - - } -} diff --git a/grampsweb.subdomain.conf.sample b/grampsweb.subdomain.conf.sample deleted file mode 100644 index b125e1a3d..000000000 --- a/grampsweb.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your grampsweb container is named grampsweb -# make sure that your dns has a cname set for grampsweb - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name grampsweb.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 500m; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app grampsweb; - set $upstream_port 5000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/grampsweb)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app grampsweb; - set $upstream_port 5000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/grav.subdomain.conf.sample b/grav.subdomain.conf.sample deleted file mode 100644 index c59b76019..000000000 --- a/grav.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your grav container is named grav -# make sure that your dns has a cname set for grav - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name grav.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app grav; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} diff --git a/graylog.subdomain.conf.sample b/graylog.subdomain.conf.sample deleted file mode 100644 index 5f77013a7..000000000 --- a/graylog.subdomain.conf.sample +++ /dev/null @@ -1,57 +0,0 @@ -## Version 2025/07/18 -# make sure that your graylog container is named graylog -# make sure that your dns has a cname set for graylog -# Ensure the upstream_port matches your GRAYLOG_HTTP_BIND_ADDRESS port -# This conf assumes GRAYLOG_HTTP_BIND_ADDRESS=0.0.0.0:9000 - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name graylog.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app graylog; - set $upstream_port 9000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} diff --git a/grocy.subdomain.conf.sample b/grocy.subdomain.conf.sample deleted file mode 100644 index 8bb6001ce..000000000 --- a/grocy.subdomain.conf.sample +++ /dev/null @@ -1,63 +0,0 @@ -## Version 2025/07/18 -# make sure that your grocy container is named grocy -# make sure that your dns has a cname set for grocy - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name grocy.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app grocy; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/grocy)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app grocy; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/guacamole.subdomain.conf.sample b/guacamole.subdomain.conf.sample deleted file mode 100644 index d237b281a..000000000 --- a/guacamole.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your guacamole container is named guacamole -# make sure that your dns has a cname set for guacamole - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name guacamole.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app guacamole; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_buffering off; - } -} diff --git a/guacamole.subfolder.conf.sample b/guacamole.subfolder.conf.sample deleted file mode 100644 index b1355f286..000000000 --- a/guacamole.subfolder.conf.sample +++ /dev/null @@ -1,32 +0,0 @@ -## Version 2023/02/05 -# make sure that your guacamole container is named guacamole -# guacamole does not require a base url setting - -location /guacamole { - return 301 $scheme://$host/guacamole/; -} - -location ^~ /guacamole/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app guacamole; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_buffering off; - rewrite /guacamole(.*) $1 break; -} diff --git a/hass-configurator.subdomain.conf.sample b/hass-configurator.subdomain.conf.sample deleted file mode 100644 index a3fe8ace8..000000000 --- a/hass-configurator.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your hass container is named hass -# make sure that your dns has a cname set for hass -# this proxy configuration file is for the hass-configurator-docker container that is used -# in the hassos addon store (https://github.com/CausticLab/hass-configurator-docker) - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name hass-configurator.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app hass-configurator; - set $upstream_port 3218; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/headphones.subdomain.conf.sample b/headphones.subdomain.conf.sample deleted file mode 100644 index 15d64ca44..000000000 --- a/headphones.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your headphones container is named headphones -# make sure that your dns has a cname set for headphones - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name headphones.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app headphones; - set $upstream_port 8181; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/headphones.subfolder.conf.sample b/headphones.subfolder.conf.sample deleted file mode 100644 index d1dd19880..000000000 --- a/headphones.subfolder.conf.sample +++ /dev/null @@ -1,27 +0,0 @@ -## Version 2023/02/05 -# make sure that your headphones container is named headphones -# make sure that headphones is set to work with the base url /headphones/ -# first stop the headphones container and edit the config.ini for headphones and set http_root to /headphones and then start the headphones container - -location ^~ /headphones { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app headphones; - set $upstream_port 8181; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/healthchecks.subdomain.conf.sample b/healthchecks.subdomain.conf.sample deleted file mode 100644 index c8aa6baf9..000000000 --- a/healthchecks.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your healthchecks container is named healthchecks -# make sure that your dns has a cname set for healthchecks -# make sure your Healthchecks ALLOWED_HOSTS and SITE_ROOT align with the server_name used in this conf. - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name healthchecks.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app healthchecks; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/hedgedoc.subdomain.conf.sample b/hedgedoc.subdomain.conf.sample deleted file mode 100644 index 4e8968017..000000000 --- a/hedgedoc.subdomain.conf.sample +++ /dev/null @@ -1,56 +0,0 @@ -## Version 2025/07/18 -# make sure you set the following environment variables in your docker arguments -# CMD_DOMAIN=hedgedoc.server.com -# CMD_URL_ADDPORT=false -# CMD_PROTOCOL_USESSL=true - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name hedgedoc.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app hedgedoc; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/heimdall.subdomain.conf.sample b/heimdall.subdomain.conf.sample deleted file mode 100644 index 3543e79a6..000000000 --- a/heimdall.subdomain.conf.sample +++ /dev/null @@ -1,57 +0,0 @@ -## Version 2025/07/18 -# make sure that your heimdall container is named heimdall -# make sure that your dns has a cname set for heimdall - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name heimdall.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app heimdall; - set $upstream_port 443; - set $upstream_proto https; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # Enable to secure cookies. Further reading here -> https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies - #proxy_cookie_path / "/; Secure; SameSite=strict; HttpOnly"; - - } -} diff --git a/heimdall.subfolder.conf.sample b/heimdall.subfolder.conf.sample deleted file mode 100644 index 56e69260c..000000000 --- a/heimdall.subfolder.conf.sample +++ /dev/null @@ -1,26 +0,0 @@ -## Version 2023/02/05 -# make sure that your heimdall container is named heimdall -# In order to use this location block you need to edit the default file one folder up and comment out the / location - -location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app heimdall; - set $upstream_port 443; - set $upstream_proto https; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/hoarder.subdomain.conf.sample b/hoarder.subdomain.conf.sample deleted file mode 100644 index 160a6a6b0..000000000 --- a/hoarder.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your hoarder container is named hoarder -# make sure that your dns has a cname set for hoarder - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name hoarder.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app hoarder; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/hoarder)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app hoarder; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/homarr.subdomain.conf.sample b/homarr.subdomain.conf.sample deleted file mode 100644 index 66b1cf0db..000000000 --- a/homarr.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your homarr container is named homarr -# make sure that your dns has a cname set for homarr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name homarr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app homarr; - set $upstream_port 7575; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/homebox.subdomain.conf.sample b/homebox.subdomain.conf.sample deleted file mode 100644 index 3ed9df2b6..000000000 --- a/homebox.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your homebox container is named homebox -# make sure that your dns has a cname set for homebox - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name homebox.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app homebox; - set $upstream_port 7745; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/homebox)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app homebox; - set $upstream_port 7745; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/homebridge.subdomain.conf.sample b/homebridge.subdomain.conf.sample deleted file mode 100644 index 07faba95b..000000000 --- a/homebridge.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your homebridge container is named homebridge -# make sure that your dns has a cname set for homebridge - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name homebridge.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app homebridge; # change to host IP if using host networking mode - set $upstream_port 8581; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/homepage.subdomain.conf.sample b/homepage.subdomain.conf.sample deleted file mode 100644 index a7ee602b7..000000000 --- a/homepage.subdomain.conf.sample +++ /dev/null @@ -1,58 +0,0 @@ -## Version 2025/07/18 -# make sure that your homepage container is named homepage -# make sure that your dns has a cname set for homepage - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name homepage.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app homepage; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # Clear Authorization Header if you are using http auth and normal homepage auth - #proxy_set_header Authorization ""; - - } - -} diff --git a/homepage.subfolder.conf.sample b/homepage.subfolder.conf.sample deleted file mode 100644 index 52d3e7f89..000000000 --- a/homepage.subfolder.conf.sample +++ /dev/null @@ -1,35 +0,0 @@ -## Version 2024/04/09 -# make sure that your homepage container is named homepage -# make sure that homepage is set to work with the base url /homepage/ -# homepage requires environment variables set thus: -# environment: -# - "GF_SERVER_ROOT_URL=https://my.domain.com/homepage" -# - "GF_SERVER_DOMAIN=https://my.domain.com/" - -location ^~ /homepage/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app homepage; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # Clear Authorization Header if you are using http auth and normal homepage auth - #proxy_set_header Authorization ""; - - rewrite ^/homepage/(.*)$ /$1 break; - -} diff --git a/homer.subdomain.conf.sample b/homer.subdomain.conf.sample deleted file mode 100644 index e8e7d6672..000000000 --- a/homer.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your homer container is named homer -# make sure that your dns has a cname set for homer - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name homer.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app homer; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/huginn.subdomain.conf.sample b/huginn.subdomain.conf.sample deleted file mode 100644 index 935bb97dd..000000000 --- a/huginn.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your huginn container is named huginn -# make sure that your dns has a cname set for huginn - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name huginn.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app huginn; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/immich.subdomain.conf.sample b/immich.subdomain.conf.sample deleted file mode 100644 index 293094025..000000000 --- a/immich.subdomain.conf.sample +++ /dev/null @@ -1,65 +0,0 @@ -## Version 2025/07/18 -# make sure that your immich container is named immich -# make sure that your dns has a cname set for immich -# immich v1.118+ only. For earlier versions, change $upstream_port to 3001 - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name immich.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app immich; - set $upstream_port 2283; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/immich)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app immich; - set $upstream_port 2283; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/immich_server.subdomain.conf.sample b/immich_server.subdomain.conf.sample deleted file mode 100644 index 34bc4a990..000000000 --- a/immich_server.subdomain.conf.sample +++ /dev/null @@ -1,65 +0,0 @@ -## Version 2025/07/18 -# make sure that your immich container is named immich_server -# make sure that your dns has a cname set for immich -# immich v1.118+ only. For earlier versions, change $upstream_port to 3001 - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name immich.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app immich_server; - set $upstream_port 2283; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/immich)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app immich_server; - set $upstream_port 2283; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/influxdb.subdomain.conf.sample b/influxdb.subdomain.conf.sample deleted file mode 100644 index f289e76fd..000000000 --- a/influxdb.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your influxdb container is named influxdb -# make sure that your dns has a cname set for influxdb - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name influxdb.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app influxdb; - set $upstream_port 8086; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/influxdb)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app influxdb; - set $upstream_port 8086; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/iplayarr.subdomain.conf.sample b/iplayarr.subdomain.conf.sample deleted file mode 100644 index 65dd217e4..000000000 --- a/iplayarr.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your iplayarr container is named iplayarr -# make sure that your dns has a cname set for iplayarr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name iplayarr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app iplayarr; - set $upstream_port 4404; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/it-tools.subdomain.conf.sample b/it-tools.subdomain.conf.sample deleted file mode 100644 index ffaa1bcab..000000000 --- a/it-tools.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your it-tools container is named it-tools -# make sure that your dns has a cname set for it-tools - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name it-tools.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app it-tools; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/jellyfin.subfolder.conf.sample b/jellyfin.subfolder.conf.sample deleted file mode 100644 index 0e5e01dda..000000000 --- a/jellyfin.subfolder.conf.sample +++ /dev/null @@ -1,25 +0,0 @@ -## Version 2025/05/18 -# make sure that your jellyfin container is named jellyfin -# if jellyfin is running in bridge mode and the container is named "jellyfin", the below config should work as is -# if not, replace the line "set $upstream_app jellyfin;" with "set $upstream_app ;" -# or "set $upstream_app ;" for host mode, HOSTIP being the IP address of jellyfin -# in jellyfin settings, under "Advanced/Networking" change the public https port to 443, leave the local ports as is, set the base url to "/jellyfin" - -location /jellyfin { - return 301 $scheme://$host/jellyfin/; -} - -location ^~ /jellyfin/ { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app jellyfin; - set $upstream_port 8096; - set $upstream_proto http; - if ($http_user_agent ~ Web0S) { - add_header Access-Control-Allow-Origin "luna://com.webos.service.config" always; - } - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_set_header Range $http_range; - proxy_set_header If-Range $http_if_range; -} diff --git a/jellyseerr.subdomain.conf.sample b/jellyseerr.subdomain.conf.sample deleted file mode 100644 index ad0e9fab7..000000000 --- a/jellyseerr.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your jellyseerr container is named jellyseerr -# make sure that your dns has a cname set for jellyseerr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name jellyseerr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app jellyseerr; - set $upstream_port 5055; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/jfa-go.subdomain.conf.sample b/jfa-go.subdomain.conf.sample deleted file mode 100644 index f02cb060f..000000000 --- a/jfa-go.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your jfa-go container is named jfa-go -# make sure that your dns has a cname set for jfa-go - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name jfa-go.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app jfa-go; - set $upstream_port 8056; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/joplin.subdomain.conf.sample b/joplin.subdomain.conf.sample deleted file mode 100644 index 7269cb024..000000000 --- a/joplin.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your joplin container is named joplin -# make sure that your dns has a cname set for joplin - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name joplin.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app joplin; - set $upstream_port 22300; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/kanzi.subdomain.conf.sample b/kanzi.subdomain.conf.sample deleted file mode 100644 index 41a3a9bf2..000000000 --- a/kanzi.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your kanzi container is named kanzi -# make sure that your dns has a cname set for kanzi - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name kanzi.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app kanzi; - set $upstream_port 8000; - set $upstream_proto https; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/kanzi.subfolder.conf.sample b/kanzi.subfolder.conf.sample deleted file mode 100644 index 5ec965ddc..000000000 --- a/kanzi.subfolder.conf.sample +++ /dev/null @@ -1,31 +0,0 @@ -## Version 2023/02/05 -# make sure that your kanzi container is named kanzi -# kanzi does not require a base url setting - -location /kanzi { - return 301 $scheme://$host/kanzi/; -} - -location ^~ /kanzi/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app kanzi; - set $upstream_port 8000; - set $upstream_proto https; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /kanzi(.*) $1 break; -} diff --git a/kavita.subdomain.conf.sample b/kavita.subdomain.conf.sample deleted file mode 100644 index c401eb6c5..000000000 --- a/kavita.subdomain.conf.sample +++ /dev/null @@ -1,65 +0,0 @@ -## Version 2025/07/18 -# make sure that your kavita container is named kavita -# make sure that your dns has a cname set for kavita - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name kavita.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app kavita; - set $upstream_port 5000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - # Needed for OPDS access while using Authelia/ldap - location ~ (/kavita)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app kavita; - set $upstream_port 5000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/kavita.subfolder.conf.sample b/kavita.subfolder.conf.sample deleted file mode 100644 index 3d365d447..000000000 --- a/kavita.subfolder.conf.sample +++ /dev/null @@ -1,40 +0,0 @@ -## Version 2023/04/13 -# make sure that your kavita container is named kavita -# make sure that kavita is set to work with the base url /kavita/ - -location /kavita { - return 301 $scheme://$host/kavita/; -} - -location ^~ /kavita/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app kavita; - set $upstream_port 5000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /kavita/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app kavita; - set $upstream_port 5000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/kimai.subdomain.conf.sample b/kimai.subdomain.conf.sample deleted file mode 100644 index 9d40050fa..000000000 --- a/kimai.subdomain.conf.sample +++ /dev/null @@ -1,65 +0,0 @@ -## Version 2025/07/18 -# make sure that your kimai container is named kimai -# make sure that your dns has a cname set for kimai - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name kimai.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app kimai; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/kimai)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app kimai; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} diff --git a/komga.subdomain.conf.sample b/komga.subdomain.conf.sample deleted file mode 100644 index 0fee67265..000000000 --- a/komga.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your komga container is named komga -# make sure that your dns has a cname set for komga - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name komga.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app komga; - set $upstream_port 25600; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/komga)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app komga; - set $upstream_port 25600; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/komga.subfolder.conf.sample b/komga.subfolder.conf.sample deleted file mode 100644 index f9e60d64c..000000000 --- a/komga.subfolder.conf.sample +++ /dev/null @@ -1,40 +0,0 @@ -## Version 2023/09/05 -# make sure that your komga container is named komga -# make sure that komga is set to work with the base url /komga/ -# First make sure your Container has set an Baseurl set via docker-compose File "envirnoment: SERVER_SERVLET_CONTEXT_PATH=/komga" and recreate the container. - -location /komga { - return 301 $scheme://$host/komga/; -} - -location ^~ /komga/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app komga; - set $upstream_port 25600 ; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /komga/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app komga; - set $upstream_port 25600; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; -} diff --git a/kopia.subdomain.conf.sample b/kopia.subdomain.conf.sample deleted file mode 100644 index e400af759..000000000 --- a/kopia.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your kopia container is named kopia -# make sure that your dns has a cname set for kopia - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name kopia.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app kopia; - set $upstream_port 51515; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/lazylibrarian.subdomain.conf.sample b/lazylibrarian.subdomain.conf.sample deleted file mode 100644 index 762da0391..000000000 --- a/lazylibrarian.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your lazylibrarian container is named lazylibrarian -# make sure that your dns has a cname set for lazylibrarian - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name lazylibrarian.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app lazylibrarian; - set $upstream_port 5299; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/lazylibrarian.subfolder.conf.sample b/lazylibrarian.subfolder.conf.sample deleted file mode 100644 index 2ba4c2143..000000000 --- a/lazylibrarian.subfolder.conf.sample +++ /dev/null @@ -1,26 +0,0 @@ -## Version 2023/02/05 -# make sure that your lazylibrarian container is named lazylibrarian -# make sure that lazylibrarian is set to work with the base url /lazylibrarian/ - -location ^~ /lazylibrarian { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app lazylibrarian; - set $upstream_port 5299; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/leantime.subdomain.conf.sample b/leantime.subdomain.conf.sample deleted file mode 100644 index aa29afd3b..000000000 --- a/leantime.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your leantime container is named leantime -# make sure that your dns has a cname set for leantime - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name leantime.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app leantime; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} diff --git a/libreddit.subdomain.conf.sample b/libreddit.subdomain.conf.sample deleted file mode 100644 index 73b52c3d4..000000000 --- a/libreddit.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your libreddit container is named libreddit -# make sure that your dns has a cname set for libreddit - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name libreddit.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app libreddit; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/librespeed.subdomain.conf.sample b/librespeed.subdomain.conf.sample deleted file mode 100644 index 3b2732efb..000000000 --- a/librespeed.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your librespeed container is named librespeed -# make sure that your dns has a cname set for librespeed - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name librespeed.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app librespeed; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/lidarr.subdomain.conf.sample b/lidarr.subdomain.conf.sample deleted file mode 100644 index 2b3f98f3b..000000000 --- a/lidarr.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your lidarr container is named lidarr -# make sure that your dns has a cname set for lidarr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name lidarr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app lidarr; - set $upstream_port 8686; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/lidarr)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app lidarr; - set $upstream_port 8686; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/lidarr.subfolder.conf.sample b/lidarr.subfolder.conf.sample deleted file mode 100644 index dac4f2898..000000000 --- a/lidarr.subfolder.conf.sample +++ /dev/null @@ -1,36 +0,0 @@ -## Version 2023/02/05 -# make sure that your lidarr container is named lidarr -# make sure that lidarr is set to work with the base url /lidarr/ - -location ^~ /lidarr { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app lidarr; - set $upstream_port 8686; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /lidarr/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app lidarr; - set $upstream_port 8686; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/linkace.subdomain.conf.sample b/linkace.subdomain.conf.sample deleted file mode 100644 index 7471854fd..000000000 --- a/linkace.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your linkace container is named linkace -# make sure that your dns has a cname set for linkace -# use linkace:simple package with included proxy - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name linkace.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app linkace; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/linkstack.subdomain.conf.sample b/linkstack.subdomain.conf.sample deleted file mode 100644 index 8f26100c1..000000000 --- a/linkstack.subdomain.conf.sample +++ /dev/null @@ -1,52 +0,0 @@ -## Version 2025/07/18 -# make sure that your dns has a cname set for linkstack and that your linkstack container is not using a base url - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name linkstack.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app linkstack; - set $upstream_port 443; - set $upstream_proto https; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/linkwarden.subdomain.conf.sample b/linkwarden.subdomain.conf.sample deleted file mode 100644 index da1f34a11..000000000 --- a/linkwarden.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your linkwarden container is named linkwarden -# make sure that your dns has a cname set for linkwarden - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name linkwarden.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app linkwarden; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/linkwarden)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app linkwarden; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/linkwarden.subfolder.conf.sample b/linkwarden.subfolder.conf.sample deleted file mode 100644 index 166b80aac..000000000 --- a/linkwarden.subfolder.conf.sample +++ /dev/null @@ -1,41 +0,0 @@ -## Version 2023/02/05 -# make sure that your linkwarden container is named linkwarden -# make sure that linkwarden is set to work with the base url /linkwarden/ - - -location /linkwarden { - return 301 $scheme://$host/linkwarden/; -} - -location ^~ /linkwarden/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app linkwarden; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ~ (/linkwarden)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app linkwarden; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/lldap.subdomain.conf.sample b/lldap.subdomain.conf.sample deleted file mode 100644 index 384254b93..000000000 --- a/lldap.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your lldap container is named lldap -# make sure that your dns has a cname set for lldap - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name lldap.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app lldap; - set $upstream_port 17170; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/lubelogger.subdomain.conf.sample b/lubelogger.subdomain.conf.sample deleted file mode 100644 index 29f8c3d51..000000000 --- a/lubelogger.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your lubelogger container is named lubelogger -# make sure that your dns has a cname set for lubelogger - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name lubelogger.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app lubelogger; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/lychee.subdomain.conf.sample b/lychee.subdomain.conf.sample deleted file mode 100644 index 34c6fdfc0..000000000 --- a/lychee.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your lychee container is named lychee -# make sure that your dns has a cname set for lychee - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name lychee.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app lychee; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/lychee.subfolder.conf.sample b/lychee.subfolder.conf.sample deleted file mode 100644 index 4b8f6adbe..000000000 --- a/lychee.subfolder.conf.sample +++ /dev/null @@ -1,31 +0,0 @@ -## Version 2023/02/05 -# make sure that your lychee container is named lychee -# lychee does not require a base url setting - -location /lychee { - return 301 $scheme://$host/lychee/; -} - -location /lychee/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app lychee; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /lychee(.*) $1 break; -} diff --git a/mailu.subdomain.conf.sample b/mailu.subdomain.conf.sample deleted file mode 100644 index 4743bbebc..000000000 --- a/mailu.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your mailu container is named front -# make sure that your dns has a cname set for mailu - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name mailu.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app front; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/maintainerr.subdomain.conf.sample b/maintainerr.subdomain.conf.sample deleted file mode 100644 index c39de39d1..000000000 --- a/maintainerr.subdomain.conf.sample +++ /dev/null @@ -1,56 +0,0 @@ -## Version 2025/07/18 -# make sure that your maintainerr container is named maintainerr -# make sure that your dns has a cname set for maintainerr -# maintainerr v2.0.0+ only. for prior versions, set upstream_port to 80 - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name maintainerr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app maintainerr; - set $upstream_port 6246; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} diff --git a/mastodon.subdomain.conf.sample b/mastodon.subdomain.conf.sample deleted file mode 100644 index 9a4113f01..000000000 --- a/mastodon.subdomain.conf.sample +++ /dev/null @@ -1,58 +0,0 @@ -## Version 2025/07/18 -# make sure that your mastodon container is named mastodon -# make sure that your dns has a cname set for mastodon -# make sure you set `WEB_DOMAIN=mastodon.example.com` env var for the mastodon container -# if you set `LOCAL_DOMAIN=example.com` (without the mastodon subdomain), then don't forget to add -# the location block for redirecting `/.well-known/webfinger` into your main server block for the WEB_DOMAIN -# See the upstream docs for more info: https://docs.joinmastodon.org/admin/config/#basic - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name mastodon.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app mastodon; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/matomo.subdomain.conf.sample b/matomo.subdomain.conf.sample deleted file mode 100644 index a46e9b977..000000000 --- a/matomo.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your matomo container is named matomo -# make sure that your dns has a cname set for matomo - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name matomo.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app matomo; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/mattermost.subdomain.conf.sample b/mattermost.subdomain.conf.sample deleted file mode 100644 index b73a4cc94..000000000 --- a/mattermost.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# Make sure that your DNS has a CNAME record for "mattermost" and your Mattermost container is using the same subdomain -# To learn how to deploy Mattermost via Docker, visit https://docs.mattermost.com/install/install-docker.html - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name mattermost.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app mattermost; - set $upstream_port 8065; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/mealie.subdomain.conf.sample b/mealie.subdomain.conf.sample deleted file mode 100644 index 2a4a04e8e..000000000 --- a/mealie.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# Ensure your DNS has a CNAME set for mealie and that mealie container is named. - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name mealie.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app mealie; - set $upstream_port 9000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/medusa.subdomain.conf.sample b/medusa.subdomain.conf.sample deleted file mode 100644 index 5106a4c59..000000000 --- a/medusa.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your medusa container is named medusa -# make sure that your dns has a cname set for medusa - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name medusa.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app medusa; - set $upstream_port 8081; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/medusa.subfolder.conf.sample b/medusa.subfolder.conf.sample deleted file mode 100644 index 2e8ed8319..000000000 --- a/medusa.subfolder.conf.sample +++ /dev/null @@ -1,26 +0,0 @@ -## Version 2023/02/05 -# make sure that your medusa container is named medusa -# make sure that medusa is set to work with the base url /medusa/ - -location ^~ /medusa { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app medusa; - set $upstream_port 8081; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/metube.subdomain.conf.sample b/metube.subdomain.conf.sample deleted file mode 100644 index c07e26324..000000000 --- a/metube.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your metube container is named metube -# make sure that your dns has a cname set for metube - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name metube.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app metube; - set $upstream_port 8081; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/metube.subfolder.conf.sample b/metube.subfolder.conf.sample deleted file mode 100644 index bb10a0183..000000000 --- a/metube.subfolder.conf.sample +++ /dev/null @@ -1,27 +0,0 @@ -## Version 2023/02/05 -# make sure that your metube container is named metube -# make sure that metube is set to work with the base url /metube/ -# set the URL_PREFIX environment variable for the metube container to "/metube" - -location /metube { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app metube; - set $upstream_port 8081; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/miniflux.subdomain.conf.sample b/miniflux.subdomain.conf.sample deleted file mode 100644 index e83ab5b1b..000000000 --- a/miniflux.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your miniflux container is named miniflux -# make sure that your dns has a cname set for miniflux - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name miniflux.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app miniflux; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/miniflux.subfolder.conf.sample b/miniflux.subfolder.conf.sample deleted file mode 100644 index 9fce1d907..000000000 --- a/miniflux.subfolder.conf.sample +++ /dev/null @@ -1,31 +0,0 @@ -## Version 2023/02/05 -# make sure that your miniflux container is named miniflux -# make sure that miniflux is set to work with the base url /miniflux/ -# set the environment variable "BASE_URL" to "https://yourdomain.url/miniflux/", or follow this guide to create a config file for Miniflux: https://miniflux.app/docs/configuration.html - -location /miniflux { - return 301 $scheme://$host/miniflux/; -} - -location /miniflux/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app miniflux; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/monica.subdomain.conf.sample b/monica.subdomain.conf.sample deleted file mode 100644 index 6744a49ef..000000000 --- a/monica.subdomain.conf.sample +++ /dev/null @@ -1,56 +0,0 @@ -## Version 2025/07/18 -# make sure that your monica container is named monica. -# make sure that your dns has a cname set for monica. -# monica container should have the env var APP_ENV=production set. -# monica container should have the env var TRUSTED_PROXIES set to a value -# that includes SWAG as seen by the monica container - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name monica.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app monica; - set $upstream_port 443; - set $upstream_proto https; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/monitorr.subdomain.conf.sample b/monitorr.subdomain.conf.sample deleted file mode 100644 index d7658c305..000000000 --- a/monitorr.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your monitorr container is named monitorr -# make sure that your dns has a cname set for monitorr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name monitorr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app monitorr; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/monitorr.subfolder.conf.sample b/monitorr.subfolder.conf.sample deleted file mode 100644 index a084431d9..000000000 --- a/monitorr.subfolder.conf.sample +++ /dev/null @@ -1,30 +0,0 @@ -## Version 2023/02/05 -# make sure that your monitorr container is named monitorr -# monitorr does not require a base url setting - -location /monitorr { - return 301 $scheme://$host/monitorr/; -} - -location ^~ /monitorr/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app monitorr; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/mstream.subdomain.conf.sample b/mstream.subdomain.conf.sample deleted file mode 100644 index 01a42d2c0..000000000 --- a/mstream.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your mstream container is named mstream -# make sure that your dns has a cname set for mstream - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name mstream.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app mstream; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/mylar.subdomain.conf.sample b/mylar.subdomain.conf.sample deleted file mode 100644 index 2fbf545d1..000000000 --- a/mylar.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your mylar container is named mylar -# make sure that your dns has a cname set for mylar - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name mylar.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app mylar; - set $upstream_port 8090; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/mylar.subfolder.conf.sample b/mylar.subfolder.conf.sample deleted file mode 100644 index fe869d665..000000000 --- a/mylar.subfolder.conf.sample +++ /dev/null @@ -1,27 +0,0 @@ -## Version 2023/02/05 -# make sure that your mylar container is named mylar -# make sure that mylar is set to work with the base url /mylar/ -# first stop the mylar container and edit the config.ini for mylar and set http_root to /mylar and then start the mylar container - -location ^~ /mylar { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app mylar; - set $upstream_port 8090; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/n8n.subdomain.conf.sample b/n8n.subdomain.conf.sample deleted file mode 100644 index 093a181a3..000000000 --- a/n8n.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your n8n container is named n8n -# make sure that your dns has a cname set for n8n -# add `server.use-forward-headers=true` to `/config/application.properties` to ensure logs contain real source IP - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name n8n.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app n8n; - set $upstream_port 5678; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/navidrome.subdomain.conf.sample b/navidrome.subdomain.conf.sample deleted file mode 100644 index 9542268fb..000000000 --- a/navidrome.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your navidrome container is named navidrome -# make sure that your dns has a cname set for navidrome - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name navidrome.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app navidrome; - set $upstream_port 4533; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/netboot.subdomain.conf.sample b/netboot.subdomain.conf.sample deleted file mode 100644 index f0aae38c9..000000000 --- a/netboot.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your netboot container is named netboot -# make sure that your dns has a cname set for netboot - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name netboot.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app netboot; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/netbox.subdomain.conf.sample b/netbox.subdomain.conf.sample deleted file mode 100644 index 2065832c0..000000000 --- a/netbox.subdomain.conf.sample +++ /dev/null @@ -1,57 +0,0 @@ -## Version 2025/07/18 -# make sure that your container is named netbox -# make sure that your dns has a cname set for netbox -# make sure your netbox instance is using ALLOWED_HOST=netbox.domain.com (replace with your own domain) -# or edit both the environment variable and this conf file if using a different subdomain - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name netbox.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app netbox; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} diff --git a/netdata.subdomain.conf.sample b/netdata.subdomain.conf.sample deleted file mode 100644 index 3def48426..000000000 --- a/netdata.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your netdata container is named netdata -# make sure that your dns has a cname set for netdata - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name netdata.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app netdata; - set $upstream_port 19999; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/netdata.subfolder.conf.sample b/netdata.subfolder.conf.sample deleted file mode 100644 index 5cb786126..000000000 --- a/netdata.subfolder.conf.sample +++ /dev/null @@ -1,31 +0,0 @@ -## Version 2023/02/05 -# make sure that your netdata container is named netdata -# netdata does not require a base url setting - -location /netdata { - return 301 $scheme://$host/netdata/; -} - -location ^~ /netdata/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app netdata; - set $upstream_port 19999; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /netdata(.*) $1 break; -} diff --git a/nocodb.subdomain.conf.sample b/nocodb.subdomain.conf.sample deleted file mode 100644 index 314e6fdc5..000000000 --- a/nocodb.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your nocodb container is named nocodb -# make sure that your dns has a cname set for nocodb - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name nocodb.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nocodb; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/notifiarr.subdomain.conf.sample b/notifiarr.subdomain.conf.sample deleted file mode 100644 index 7f90da266..000000000 --- a/notifiarr.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your notifiarr container is named notifiarr -# make sure that your dns has a cname set for notifiarr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name notifiarr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - # Enable if you use webauth for Notifiarr client website authentication - #proxy_set_header X-WebAuth-User $user; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app notifiarr; - set $upstream_port 5454; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/ntfy.subdomain.conf.sample b/ntfy.subdomain.conf.sample deleted file mode 100644 index 7454b6f75..000000000 --- a/ntfy.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your ntfy container is named ntfy -# make sure that your dns has a cname set for ntfy - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name ntfy.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ntfy; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} diff --git a/octoprint.subdomain.conf.sample b/octoprint.subdomain.conf.sample deleted file mode 100644 index 2d683c153..000000000 --- a/octoprint.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your octoprint container is named octoprint -# make sure that your dns has a cname set for octoprint - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name octoprint.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app octoprint; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - proxy_set_header X-Scheme https; - - } -} diff --git a/onetimesecret.subdomain.conf.sample b/onetimesecret.subdomain.conf.sample deleted file mode 100644 index 155e1a3c9..000000000 --- a/onetimesecret.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your onetimesecret container is named onetimesecret -# make sure that your dns has a cname set for onetimesecret - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name onetimesecret.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app onetimesecret; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/oogway.subdomain.conf.sample b/oogway.subdomain.conf.sample deleted file mode 100644 index e7eb1419b..000000000 --- a/oogway.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your oogway container is named oogway -# make sure that your dns has a cname set for oogway - - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name oogway.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app oogway; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/open-webui.subdomain.conf.sample b/open-webui.subdomain.conf.sample deleted file mode 100644 index 4897f249d..000000000 --- a/open-webui.subdomain.conf.sample +++ /dev/null @@ -1,56 +0,0 @@ -## Version 2025/07/18 -# make sure that your open-webui container is named open-webui -# make sure that your dns has a cname set for open-webui - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name open-webui.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app open-webui; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} - diff --git a/openhab.subdomain.conf.sample b/openhab.subdomain.conf.sample deleted file mode 100644 index bb8b11e19..000000000 --- a/openhab.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your openhab container is named openhab -# make sure that your dns has a cname set for openhab - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name openhab.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app openhab; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/osticket.subdomain.conf.sample b/osticket.subdomain.conf.sample deleted file mode 100644 index a34db3109..000000000 --- a/osticket.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your osticket container is named osticket -# make sure that your dns has a cname set for osticket - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name osticket.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app osticket; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/overseerr.subdomain.conf.sample b/overseerr.subdomain.conf.sample deleted file mode 100644 index 13fb83481..000000000 --- a/overseerr.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your overseerr container is named overseerr -# make sure that your dns has a cname set for overseerr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name overseerr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app overseerr; - set $upstream_port 5055; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/overseerr)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app overseerr; - set $upstream_port 5055; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/paperless.subdomain.conf.sample b/paperless.subdomain.conf.sample deleted file mode 100644 index 5d9907eb3..000000000 --- a/paperless.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your paperless container is named paperless -# make sure that your dns has a cname set for paperless - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name paperless.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app paperless; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/paperless)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app paperless; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/paperless.subfolder.conf.sample b/paperless.subfolder.conf.sample deleted file mode 100644 index f51996d7c..000000000 --- a/paperless.subfolder.conf.sample +++ /dev/null @@ -1,40 +0,0 @@ -## Version 2023/02/05 -# make sure that your paperless container is named paperless -# make sure that paperless is set to work with the base url /paperless/ - -location /paperless { - return 301 $scheme://$host/paperless/; -} - -location ^~ /paperless/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app paperless; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ~ (/paperless)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app paperless; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/papermerge.subdomain.conf.sample b/papermerge.subdomain.conf.sample deleted file mode 100644 index 9f2aed33e..000000000 --- a/papermerge.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your papermerge container is named papermerge -# make sure that your dns has a cname set for papermerge - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name papermerge.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app papermerge; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/partdb.subdomain.conf.sample b/partdb.subdomain.conf.sample deleted file mode 100644 index 975a59acf..000000000 --- a/partdb.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your partdb container is named partdb -# make sure that your dns has a cname set for partdb - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name partdb.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app partdb; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} diff --git a/petio.subdomain.conf.sample b/petio.subdomain.conf.sample deleted file mode 100644 index 5c732b644..000000000 --- a/petio.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your petio container is named petio -# make sure that your dns has a cname set for petio - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name petio.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app petio; - set $upstream_port 7777; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/petio.subfolder.conf.sample b/petio.subfolder.conf.sample deleted file mode 100644 index ec382dc3b..000000000 --- a/petio.subfolder.conf.sample +++ /dev/null @@ -1,30 +0,0 @@ -## Version 2023/02/05 -# make sure that your petio container is named petio -# make sure that petio is set to work with the base url /petio/ - -location /petio { - return 301 $scheme://$host/petio/; -} - -location ^~ /petio/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app petio; - set $upstream_port 7777; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/phoneinfoga.subdomain.conf.sample b/phoneinfoga.subdomain.conf.sample deleted file mode 100644 index 31f9bc85f..000000000 --- a/phoneinfoga.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your phoneinfoga container is named phoneinfoga -# make sure that your dns has a cname set for phoneinfoga -# add command: 'serve' to your docker compose, so the PhoneInfoga web server starts - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name phoneinfoga.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app phoneinfoga; - set $upstream_port 5000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/photoprism.subdomain.conf.sample b/photoprism.subdomain.conf.sample deleted file mode 100644 index 657db9461..000000000 --- a/photoprism.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# Ensure your DNS has a CNAME set for Photoprism and that Photoprism container is named. - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name photoprism.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app photoprism; - set $upstream_port 2342; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/phpmyadmin.subdomain.conf.sample b/phpmyadmin.subdomain.conf.sample deleted file mode 100644 index e92af1edb..000000000 --- a/phpmyadmin.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your phpmyadmin container is named phpmyadmin -# make sure that your dns has a cname set for phpmyadmin - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name phpmyadmin.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app phpmyadmin; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/phpmyadmin.subfolder.conf.sample b/phpmyadmin.subfolder.conf.sample deleted file mode 100644 index 046528f61..000000000 --- a/phpmyadmin.subfolder.conf.sample +++ /dev/null @@ -1,31 +0,0 @@ -## Version 2023/02/05 -# make sure that your phpmyadmin container is named phpmyadmin -# phpmyadmin does not require a base url setting - -location /phpmyadmin { - return 301 $scheme://$host/phpmyadmin/; -} - -location ^~ /phpmyadmin/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app phpmyadmin; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /phpmyadmin(.*) $1 break; -} diff --git a/picard.subfolder.conf.sample b/picard.subfolder.conf.sample deleted file mode 100644 index ca819717b..000000000 --- a/picard.subfolder.conf.sample +++ /dev/null @@ -1,31 +0,0 @@ -## Version 2023/02/05 -# make sure that your picard container is named picard -# picard does not require a base url setting - -location /picard { - return 301 $scheme://$host/picard/; -} - -location ^~ /picard/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app picard; - set $upstream_port 5800; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /picard(.*) $1 break; -} diff --git a/pingvin-share.subdomain.conf.sample b/pingvin-share.subdomain.conf.sample deleted file mode 100644 index 98562fa14..000000000 --- a/pingvin-share.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your pingvin-share container is named pingvin-share -# make sure that your dns has a cname set for pingvin-share - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name pingvin-share.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app pingvin-share; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/pingvin-share)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app pingvin-share; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/pinry.subdomain.conf.sample b/pinry.subdomain.conf.sample deleted file mode 100644 index 6e1aa9531..000000000 --- a/pinry.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your pinry container is named pinry -# make sure that your dns has a cname set for pinry - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name pinry.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app pinry; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/piwigo.subdomain.conf.sample b/piwigo.subdomain.conf.sample deleted file mode 100644 index f1e82051b..000000000 --- a/piwigo.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your piwigo container is named piwigo -# make sure that your dns has a cname set for piwigo - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name piwigo.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app piwigo; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/pixelfed.subdomain.conf.sample b/pixelfed.subdomain.conf.sample deleted file mode 100644 index 8676381bd..000000000 --- a/pixelfed.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your pixelfed container is named pixelfed -# make sure that your dns has a cname set for pixelfed - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name pixelfed.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app pixelfed; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/planka.subdomain.conf.sample b/planka.subdomain.conf.sample deleted file mode 100644 index 0d1e4ed8b..000000000 --- a/planka.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your planka container is named planka -# make sure that your dns has a cname set for planka -# make sure that the BASE_URL env variable in planka container is set to: BASE_URL="https://planka.example.com" - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name planka.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app planka; - set $upstream_port 1337; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/planka.subfolder.conf.sample b/planka.subfolder.conf.sample deleted file mode 100644 index b0d3d51fe..000000000 --- a/planka.subfolder.conf.sample +++ /dev/null @@ -1,30 +0,0 @@ -## Version 2023/02/05 -# make sure that your planka container is named planka -# make sure that the BASE_URL env variable in planka container is set to: BASE_URL="https://example.com/planka/" - - -location /planka { - return 301 $scheme://$host/planka/; -} - -location ^~ /planka/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app planka; - set $upstream_port 1337; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; -} diff --git a/podgrab.subdomain.conf.sample b/podgrab.subdomain.conf.sample deleted file mode 100644 index 9614984ed..000000000 --- a/podgrab.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your podgrab container is named podgrab -# make sure that your dns has a cname set for podgrab - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name podgrab.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app podgrab; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/privatebin.subdomain.conf.sample b/privatebin.subdomain.conf.sample deleted file mode 100644 index c6c578e5e..000000000 --- a/privatebin.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your privatebin container is named privatebin -# make sure that your dns has a cname set for privatebin - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name privatebin.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app privatebin; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/pterodactyl.subdomain.conf.sample b/pterodactyl.subdomain.conf.sample deleted file mode 100644 index 4d33bf5fa..000000000 --- a/pterodactyl.subdomain.conf.sample +++ /dev/null @@ -1,56 +0,0 @@ -## Version 2025/07/18 -# this is for your actual panel, not nodes -# make sure you set your pterodactyl servers "remote" and "api" addresses to the domains you specify here -# ensure you have enabled "ssl encryption" and (if necessary) "behind proxy" in your pterodactyl server -# make sure that your pterodactyl container is named pterodactyl -# make sure that your dns has a cname set for pterodactyl - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name pterodactyl.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app pterodactyl; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/pwndrop.subdomain.conf.sample b/pwndrop.subdomain.conf.sample deleted file mode 100644 index 10704b0f6..000000000 --- a/pwndrop.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your pwndrop container is named pwndrop -# make sure that your dns has a cname set for pwndrop - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name pwndrop.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app pwndrop; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/pydio.subdomain.conf.sample b/pydio.subdomain.conf.sample deleted file mode 100644 index 517e0d028..000000000 --- a/pydio.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your pydio container is named pydio -# make sure that your dns has a cname set for pydio - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name pydio.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app pydio; - set $upstream_port 443; - set $upstream_proto https; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/pyload.subdomain.conf.sample b/pyload.subdomain.conf.sample deleted file mode 100644 index 2f653cdd1..000000000 --- a/pyload.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your pyload container is named pyload -# make sure that your dns has a cname set for pyload - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name pyload.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app pyload; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/pyload.subfolder.conf.sample b/pyload.subfolder.conf.sample deleted file mode 100644 index ba0bec7fa..000000000 --- a/pyload.subfolder.conf.sample +++ /dev/null @@ -1,28 +0,0 @@ -## Version 2023/02/05 -# make sure that your pyload container is named pyload -# make sure that pyload is set to work with the base url /pyload/ -# First go into pyload settings, under "Web Interface" set the "Path Prefix" to /pyload and restart the pyload container -# Only works with pyload-ng - -location ^~ /pyload { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app pyload; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/qbit-manage.subdomain.conf.sample b/qbit-manage.subdomain.conf.sample deleted file mode 100644 index ed59bcc9c..000000000 --- a/qbit-manage.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your qbit-manage container is named qbit-manage -# make sure that your dns has a cname set for qbit-manage -# qbit-manage v4.5.0+ only - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name qbit-manage.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app qbit-manage; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } - -} diff --git a/qbittorrent.subdomain.conf.sample b/qbittorrent.subdomain.conf.sample deleted file mode 100644 index c67a1be68..000000000 --- a/qbittorrent.subdomain.conf.sample +++ /dev/null @@ -1,170 +0,0 @@ -## Version 2025/07/18 -# make sure that your qbittorrent container is named qbittorrent -# make sure that your dns has a cname set for qbittorrent -# Api and related location bypasses are now commented out by default -# due to users easily misconfiguring qbittorrent to allow -# public access through the api endpoint by including SWAG in -# "Bypass authentication for clients in whitelisted IP subnets", -# which results in all connections through SWAG to be considered -# local and bypassing auth, which also applies to qbittorrent's -# api endpoint (webui api) -# enable at your own risk - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name qbittorrent.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app qbittorrent; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_set_header Referer ''; - proxy_set_header Host $upstream_app:$upstream_port; - proxy_set_header X-Forwarded-Host $host; - } - - # location ~ (/qbittorrent)?/api { - # include /config/nginx/proxy.conf; - # include /config/nginx/resolver.conf; - # set $upstream_app qbittorrent; - # set $upstream_port 8080; - # set $upstream_proto http; - # proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # rewrite /qbittorrent(.*) $1 break; - - # proxy_set_header Referer ''; - # proxy_set_header Host $upstream_app:$upstream_port; - # proxy_set_header X-Forwarded-Host $host; - # } - - # location ~ (/qbittorrent)?/command { - # include /config/nginx/proxy.conf; - # include /config/nginx/resolver.conf; - # set $upstream_app qbittorrent; - # set $upstream_port 8080; - # set $upstream_proto http; - # proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # rewrite /qbittorrent(.*) $1 break; - - # proxy_set_header Referer ''; - # proxy_set_header Host $upstream_app:$upstream_port; - # proxy_set_header X-Forwarded-Host $host; - # } - - # location ~ (/qbittorrent)?/css { - # include /config/nginx/proxy.conf; - # include /config/nginx/resolver.conf; - # set $upstream_app qbittorrent; - # set $upstream_port 8080; - # set $upstream_proto http; - # proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # rewrite /qbittorrent(.*) $1 break; - - # proxy_set_header Referer ''; - # proxy_set_header Host $upstream_app:$upstream_port; - # proxy_set_header X-Forwarded-Host $host; - # } - - # location ~ (/qbittorrent)?/query { - # include /config/nginx/proxy.conf; - # include /config/nginx/resolver.conf; - # set $upstream_app qbittorrent; - # set $upstream_port 8080; - # set $upstream_proto http; - # proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # rewrite /qbittorrent(.*) $1 break; - - # proxy_set_header Referer ''; - # proxy_set_header Host $upstream_app:$upstream_port; - # proxy_set_header X-Forwarded-Host $host; - # } - - # location ~ (/qbittorrent)?/login { - # include /config/nginx/proxy.conf; - # include /config/nginx/resolver.conf; - # set $upstream_app qbittorrent; - # set $upstream_port 8080; - # set $upstream_proto http; - # proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # rewrite /qbittorrent(.*) $1 break; - - # proxy_set_header Referer ''; - # proxy_set_header Host $upstream_app:$upstream_port; - # proxy_set_header X-Forwarded-Host $host; - # } - - # location ~ (/qbittorrent)?/sync { - # include /config/nginx/proxy.conf; - # include /config/nginx/resolver.conf; - # set $upstream_app qbittorrent; - # set $upstream_port 8080; - # set $upstream_proto http; - # proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # rewrite /qbittorrent(.*) $1 break; - - # proxy_set_header Referer ''; - # proxy_set_header Host $upstream_app:$upstream_port; - # proxy_set_header X-Forwarded-Host $host; - # } - - # location ~ (/qbittorrent)?/scripts { - # include /config/nginx/proxy.conf; - # include /config/nginx/resolver.conf; - # set $upstream_app qbittorrent; - # set $upstream_port 8080; - # set $upstream_proto http; - # proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # rewrite /qbittorrent(.*) $1 break; - - # proxy_set_header Referer ''; - # proxy_set_header Host $upstream_app:$upstream_port; - # proxy_set_header X-Forwarded-Host $host; - # } -} diff --git a/qbittorrent.subfolder.conf.sample b/qbittorrent.subfolder.conf.sample deleted file mode 100644 index d0bd429bc..000000000 --- a/qbittorrent.subfolder.conf.sample +++ /dev/null @@ -1,148 +0,0 @@ -## Version 2023/10/10 -# make sure that your qbittorrent container is named qbittorrent -# qbittorrent does not require a base url setting -# Api and related location bypasses are now commented out by default -# due to users easily misconfiguring qbittorrent to allow -# public access through the api endpoint by including SWAG in -# "Bypass authentication for clients in whitelisted IP subnets", -# which results in all connections through SWAG to be considered -# local and bypassing auth, which also applies to qbittorrent's -# api endpoint (webui api) -# enable at your own risk - -location /qbittorrent { - return 301 $scheme://$host/qbittorrent/; -} - -location ^~ /qbittorrent/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app qbittorrent; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /qbittorrent(.*) $1 break; - - proxy_set_header Referer ''; - proxy_set_header Host $upstream_app:$upstream_port; - proxy_set_header X-Forwarded-Host $host; -} - -# location ^~ /qbittorrent/api { -# include /config/nginx/proxy.conf; -# include /config/nginx/resolver.conf; -# set $upstream_app qbittorrent; -# set $upstream_port 8080; -# set $upstream_proto http; -# proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -# rewrite /qbittorrent(.*) $1 break; - -# proxy_set_header Referer ''; -# proxy_set_header Host $upstream_app:$upstream_port; -# proxy_set_header X-Forwarded-Host $host; -# } - -# location ^~ /qbittorrent/command { -# include /config/nginx/proxy.conf; -# include /config/nginx/resolver.conf; -# set $upstream_app qbittorrent; -# set $upstream_port 8080; -# set $upstream_proto http; -# proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -# rewrite /qbittorrent(.*) $1 break; - -# proxy_set_header Referer ''; -# proxy_set_header Host $upstream_app:$upstream_port; -# proxy_set_header X-Forwarded-Host $host; -# } - -# location ^~ /qbittorrent/css { -# include /config/nginx/proxy.conf; -# include /config/nginx/resolver.conf; -# set $upstream_app qbittorrent; -# set $upstream_port 8080; -# set $upstream_proto http; -# proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -# rewrite /qbittorrent(.*) $1 break; - -# proxy_set_header Referer ''; -# proxy_set_header Host $upstream_app:$upstream_port; -# proxy_set_header X-Forwarded-Host $host; -# } - -# location ^~ /qbittorrent/query { -# include /config/nginx/proxy.conf; -# include /config/nginx/resolver.conf; -# set $upstream_app qbittorrent; -# set $upstream_port 8080; -# set $upstream_proto http; -# proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -# rewrite /qbittorrent(.*) $1 break; - -# proxy_set_header Referer ''; -# proxy_set_header Host $upstream_app:$upstream_port; -# proxy_set_header X-Forwarded-Host $host; -# } - -# location ^~ /qbittorrent/login { -# include /config/nginx/proxy.conf; -# include /config/nginx/resolver.conf; -# set $upstream_app qbittorrent; -# set $upstream_port 8080; -# set $upstream_proto http; -# proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -# rewrite /qbittorrent(.*) $1 break; - -# proxy_set_header Referer ''; -# proxy_set_header Host $upstream_app:$upstream_port; -# proxy_set_header X-Forwarded-Host $host; -# } - -# location ^~ /qbittorrent/sync { -# include /config/nginx/proxy.conf; -# include /config/nginx/resolver.conf; -# set $upstream_app qbittorrent; -# set $upstream_port 8080; -# set $upstream_proto http; -# proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -# rewrite /qbittorrent(.*) $1 break; - -# proxy_set_header Referer ''; -# proxy_set_header Host $upstream_app:$upstream_port; -# proxy_set_header X-Forwarded-Host $host; -# } - -# location ^~ /qbittorrent/scripts { -# include /config/nginx/proxy.conf; -# include /config/nginx/resolver.conf; -# set $upstream_app qbittorrent; -# set $upstream_port 8080; -# set $upstream_proto http; -# proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -# rewrite /qbittorrent(.*) $1 break; - -# proxy_set_header Referer ''; -# proxy_set_header Host $upstream_app:$upstream_port; -# proxy_set_header X-Forwarded-Host $host; -# } diff --git a/quassel-web.subdomain.conf.sample b/quassel-web.subdomain.conf.sample deleted file mode 100644 index d61f587fe..000000000 --- a/quassel-web.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your quassel container is named quassel-web -# make sure that your dns has a cname set for quassel -# make sure Quassel-Web is running on http with -e 'HTTPS'='false' or if you're using -e 'ADVANCED'='true' by editing config.json appropriately - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name quassel.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app quassel-web; - set $upstream_port 64080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/quassel-web.subfolder.conf.sample b/quassel-web.subfolder.conf.sample deleted file mode 100644 index 59de63ec9..000000000 --- a/quassel-web.subfolder.conf.sample +++ /dev/null @@ -1,28 +0,0 @@ -## Version 2023/02/05 -# make sure that your quassel-web container is named quassel-web -# make sure that quassel-web is set to work with the base url /quassel/ -# Set base-url with docker run command env variable -e 'URL_BASE'='/quassel' and make sure Quassel-Web is running on http -# with -e 'HTTPS'='false' or if you're using -e 'ADVANCED'='true' by editing config.json appropriately - -location ^~ /quassel { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app quassel-web; - set $upstream_port 64080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/qui.subdomain.conf.sample b/qui.subdomain.conf.sample deleted file mode 100644 index c0bf97881..000000000 --- a/qui.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/08/28 -# make sure that your qui container is named qui -# make sure that your dns has a cname set for qui - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name qui.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app qui; - set $upstream_port 7476; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/qui.subfolder.conf.sample b/qui.subfolder.conf.sample deleted file mode 100644 index 7f4c66dc6..000000000 --- a/qui.subfolder.conf.sample +++ /dev/null @@ -1,31 +0,0 @@ -## Version 2025/08/28 -# make sure that your qui container is named qui -# make sure that qui is set to work with the base url /qui/ - - -location /qui { - return 301 $scheme://$host/qui/; -} - -location ^~ /qui/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app qui; - set $upstream_port 7476; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/radarr.subdomain.conf.sample b/radarr.subdomain.conf.sample deleted file mode 100644 index 3b5add0a6..000000000 --- a/radarr.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your radarr container is named radarr -# make sure that your dns has a cname set for radarr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name radarr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app radarr; - set $upstream_port 7878; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/radarr)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app radarr; - set $upstream_port 7878; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/radarr.subfolder.conf.sample b/radarr.subfolder.conf.sample deleted file mode 100644 index eab06dece..000000000 --- a/radarr.subfolder.conf.sample +++ /dev/null @@ -1,36 +0,0 @@ -## Version 2023/02/05 -# make sure that your radarr container is named radarr -# make sure that radarr is set to work with the base url /radarr/ - -location ^~ /radarr { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app radarr; - set $upstream_port 7878; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /radarr/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app radarr; - set $upstream_port 7878; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/rallly.subdomain.conf.sample b/rallly.subdomain.conf.sample deleted file mode 100644 index 40b712fe1..000000000 --- a/rallly.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your rallly container is named rallly -# make sure that your dns has a cname set for rallly - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name rallly.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app rallly; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/raneto.subdomain.conf.sample b/raneto.subdomain.conf.sample deleted file mode 100644 index 4630a2050..000000000 --- a/raneto.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your raneto container is named raneto -# make sure that your dns has a cname set for raneto - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name raneto.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app raneto; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/readarr.subdomain.conf.sample b/readarr.subdomain.conf.sample deleted file mode 100644 index a1cb1c65d..000000000 --- a/readarr.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your readarr container is named readarr -# make sure that your dns has a cname set for readarr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name readarr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app readarr; - set $upstream_port 8787; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/readarr)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app readarr; - set $upstream_port 8787; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/readarr.subfolder.conf.sample b/readarr.subfolder.conf.sample deleted file mode 100644 index 1c251520a..000000000 --- a/readarr.subfolder.conf.sample +++ /dev/null @@ -1,36 +0,0 @@ -## Version 2023/02/05 -# make sure that your readarr container is named readarr -# make sure that readarr is set to work with the base url /readarr/ - -location ^~ /readarr { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app readarr; - set $upstream_port 8787; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /readarr/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app readarr; - set $upstream_port 8787; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/requestrr.subdomain.conf.sample b/requestrr.subdomain.conf.sample deleted file mode 100644 index 700fb0488..000000000 --- a/requestrr.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your requestrr container is named requestrr -# make sure that your dns has a cname set for requestrr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name requestrr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app requestrr; - set $upstream_port 4545; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/resilio-sync.subdomain.conf.sample b/resilio-sync.subdomain.conf.sample deleted file mode 100644 index 287a9f990..000000000 --- a/resilio-sync.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your resilio-sync container is named resilio-sync -# make sure that your dns has a cname set for resilio-sync - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name resilio-sync.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app resilio-sync; - set $upstream_port 8888; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/romm.subdomain.conf.sample b/romm.subdomain.conf.sample deleted file mode 100644 index b9bc2170a..000000000 --- a/romm.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your romM container is named romm -# make sure that your dns has a cname set for romm - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name romm.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app romm; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/sabnzbd.subdomain.conf.sample b/sabnzbd.subdomain.conf.sample deleted file mode 100644 index 6e372d61c..000000000 --- a/sabnzbd.subdomain.conf.sample +++ /dev/null @@ -1,66 +0,0 @@ -## Version 2025/07/18 -# make sure that your sabnzbd container is named sabnzbd -# make sure that your dns has a cname set for sabnzbd -# edit the sabnzbd.ini host_whitelist to avoid hostname verification issues. This format: -# host_whitelist = sabnzbd.domain.com, www.sabnzbd.domain.com - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name sabnzbd.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app sabnzbd; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/sabnzbd)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app sabnzbd; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/sabnzbd.subfolder.conf.sample b/sabnzbd.subfolder.conf.sample deleted file mode 100644 index f1f79cee7..000000000 --- a/sabnzbd.subfolder.conf.sample +++ /dev/null @@ -1,37 +0,0 @@ -## Version 2023/02/05 -# make sure that your sabnzbd container is named sabnzbd -# make sure that sabnzbd is set to work with the base url /sabnzbd/ -# sabnzbd already uses the base url /sabnzbd by default so you don't need to do anything extra - -location ^~ /sabnzbd { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app sabnzbd; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /sabnzbd/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app sabnzbd; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/saltrim.subdomain.conf.sample b/saltrim.subdomain.conf.sample deleted file mode 100644 index 30b6150dd..000000000 --- a/saltrim.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your saltrim webserver container is named bar_assistant-webserver-1 or manually change to match the upstream_app below -# make sure that your dns has a cname set for saltrim - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name saltrim.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 100M; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app bar_assistant-webserver-1; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/scope.subfolder.conf.sample b/scope.subfolder.conf.sample deleted file mode 100644 index 0a86c3c69..000000000 --- a/scope.subfolder.conf.sample +++ /dev/null @@ -1,31 +0,0 @@ -## Version 2023/02/05 -# make sure that your scope container is named scope -# scope does not require a base url setting - -location /scope { - return 301 $scheme://$host/scope/; -} - -location ^~ /scope/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app scope; - set $upstream_port 4040; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /scope(.*) $1 break; -} diff --git a/scrutiny.subdomain.conf.sample b/scrutiny.subdomain.conf.sample deleted file mode 100644 index 25cf36be3..000000000 --- a/scrutiny.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your scrutiny container is named scrutiny -# make sure that your dns has a cname set for scrutiny - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name scrutiny.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app scrutiny; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/semaphore.subdomain.conf.sample b/semaphore.subdomain.conf.sample deleted file mode 100644 index 87ec40d18..000000000 --- a/semaphore.subdomain.conf.sample +++ /dev/null @@ -1,58 +0,0 @@ -## Version 2025/07/18 -# make sure that your semaphore container is named semaphore -# make sure that your dns has a cname set for semaphore - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name semaphore.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app semaphore; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # Clear Authorization Header if you are using http auth and normal semaphore auth - #proxy_set_header Authorization ""; - - } - -} diff --git a/semaphore.subfolder.conf.sample b/semaphore.subfolder.conf.sample deleted file mode 100644 index 871142bae..000000000 --- a/semaphore.subfolder.conf.sample +++ /dev/null @@ -1,46 +0,0 @@ -## Version 2023/09/01 -# make sure that your grafana container is named grafana -# make sure that grafana is set to work with the base url /grafana/ - -location ^~ /semaphore/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app semaphore; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # Clear Authorization Header if you are using http auth and normal semaphore auth - #proxy_set_header Authorization ""; - - rewrite ^/semaphore/(.*)$ /$1 break; - -} - -location ^~ /semaphore/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app semaphore; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # Clear Authorization Header if you are using http auth and normal semaphore auth - #proxy_set_header Authorization ""; - - rewrite ^/semaphore/(.*)$ /$1 break; - -} diff --git a/shinobi.subdomain.conf.sample b/shinobi.subdomain.conf.sample deleted file mode 100644 index e8f51951f..000000000 --- a/shinobi.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your shinobi container is named shinobi -# make sure that your dns has a cname set for shinobi - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name shinobi.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app shinobi; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/shinobi.subfolder.conf.sample b/shinobi.subfolder.conf.sample deleted file mode 100644 index 9bf1618f3..000000000 --- a/shinobi.subfolder.conf.sample +++ /dev/null @@ -1,32 +0,0 @@ -## Version 2023/02/05 -# make sure that your shinobi container is named shinobi -# make sure that shinobi is set to work with the base url /shinobi/ -# ensure your config.json file has an entry for the base url set to /shinobi, i.e. -# "baseurl":"/shinobi" - -location /shinobi { - return 301 $scheme://$host/shinobi/; -} - -location ^~ /shinobi/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app shinobi; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/shlink.subdomain.conf.sample b/shlink.subdomain.conf.sample deleted file mode 100644 index 668edb5aa..000000000 --- a/shlink.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your shlink container is named shlink -# make sure that your dns has a cname set for shlink - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name shlink.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app shlink; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/sickchill.subdomain.conf.sample b/sickchill.subdomain.conf.sample deleted file mode 100644 index a4fe84cd6..000000000 --- a/sickchill.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your sickchill container is named sickchill -# make sure that your dns has a cname set for sickchill - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name sickchill.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app sickchill; - set $upstream_port 8081; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/sickchill.subfolder.conf.sample b/sickchill.subfolder.conf.sample deleted file mode 100644 index f862273d0..000000000 --- a/sickchill.subfolder.conf.sample +++ /dev/null @@ -1,27 +0,0 @@ -## Version 2023/02/05 -# make sure that your sickchill container is named sickchill -# make sure that sickchill is set to work with the base url /sickchill/ -# first stop the sickchill container and edit the config.ini for sickchill and set web_root to /sickchill and then start the sickchill container - -location ^~ /sickchill { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app sickchill; - set $upstream_port 8081; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/sickrage.subdomain.conf.sample b/sickrage.subdomain.conf.sample deleted file mode 100644 index 4356de8cf..000000000 --- a/sickrage.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your sickrage container is named sickrage -# make sure that your dns has a cname set for sickrage - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name sickrage.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app sickrage; - set $upstream_port 8081; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/sickrage.subfolder.conf.sample b/sickrage.subfolder.conf.sample deleted file mode 100644 index 72afa683c..000000000 --- a/sickrage.subfolder.conf.sample +++ /dev/null @@ -1,27 +0,0 @@ -## Version 2023/02/05 -# make sure that your sickrage container is named sickrage -# make sure that sickrage is set to work with the base url /sickrage/ -# first stop the sickrage container and edit the config.ini for sickrage and set web_root to /sickrage and then start the sickrage container - -location ^~ /sickrage { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app sickrage; - set $upstream_port 8081; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/skyhook.subdomain.conf.sample b/skyhook.subdomain.conf.sample deleted file mode 100644 index 8c89b83e0..000000000 --- a/skyhook.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your skyhook container is named skyhook -# make sure that your dns has a cname set for skyhook - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name skyhook.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app skyhook; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/slskd.subfolder.conf.sample b/slskd.subfolder.conf.sample deleted file mode 100644 index 04159c7e5..000000000 --- a/slskd.subfolder.conf.sample +++ /dev/null @@ -1,27 +0,0 @@ -## Version 2023/02/05 -# make sure that your slskd container is named slskd -# make sure that slskd is set to work with the base url /slskd/ -# first edit the slskd.yml and set 'url_base: /slskd' and restart the slskd container - -location ^~ /slskd { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app slskd; - set $upstream_port 5000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/smokeping.subdomain.conf.sample b/smokeping.subdomain.conf.sample deleted file mode 100644 index fa0340b5f..000000000 --- a/smokeping.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your smokeping container is named smokeping -# make sure that your dns has a cname set for smokeping - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name smokeping.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app smokeping; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/smokeping.subfolder.conf.sample b/smokeping.subfolder.conf.sample deleted file mode 100644 index bfdba8023..000000000 --- a/smokeping.subfolder.conf.sample +++ /dev/null @@ -1,27 +0,0 @@ -## Version 2023/02/05 -# make sure that your smokeping container is named smokeping -# make sure that smokeping is set to work with the base url /smokeping/ -# smokeping already uses the base url /smokeping by default so you don't need to do anything extra - -location ^~ /smokeping { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app smokeping; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/sonarr.subdomain.conf.sample b/sonarr.subdomain.conf.sample deleted file mode 100644 index 7b7f640f6..000000000 --- a/sonarr.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your sonarr container is named sonarr -# make sure that your dns has a cname set for sonarr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name sonarr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app sonarr; - set $upstream_port 8989; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/sonarr)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app sonarr; - set $upstream_port 8989; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/sonarr.subfolder.conf.sample b/sonarr.subfolder.conf.sample deleted file mode 100644 index 54fa3ea22..000000000 --- a/sonarr.subfolder.conf.sample +++ /dev/null @@ -1,36 +0,0 @@ -## Version 2023/02/05 -# make sure that your sonarr container is named sonarr -# make sure that sonarr is set to work with the base url /sonarr/ - -location ^~ /sonarr { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app sonarr; - set $upstream_port 8989; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /sonarr/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app sonarr; - set $upstream_port 8989; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/speedtest-tracker.subdomain.conf.sample b/speedtest-tracker.subdomain.conf.sample deleted file mode 100644 index 822621b53..000000000 --- a/speedtest-tracker.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your speedtest-tracker container is named speedtest-tracker -# make sure that your dns has a cname set for speedtest-tracker - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name speedtest-tracker.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app speedtest-tracker; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} diff --git a/spoolman.subdomain.conf.sample b/spoolman.subdomain.conf.sample deleted file mode 100644 index 523c498c1..000000000 --- a/spoolman.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your spoolman container is named spoolman -# make sure that your dns has a cname set for spoolman - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name spoolman.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app spoolman; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/spoolman.subfolder.conf.sample b/spoolman.subfolder.conf.sample deleted file mode 100644 index 4fa88e782..000000000 --- a/spoolman.subfolder.conf.sample +++ /dev/null @@ -1,30 +0,0 @@ -## Version 2025/03/27 -# make sure that your spoolman container is named spoolman -# make sure that spoolman is set to work with the base url /spoolman/ - - -location /spoolman { - return 301 $scheme://$host/spoolman/; -} - -location ^~ /spoolman/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app spoolman; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; -} \ No newline at end of file diff --git a/statping.subdomain.conf.sample b/statping.subdomain.conf.sample deleted file mode 100644 index d822b1621..000000000 --- a/statping.subdomain.conf.sample +++ /dev/null @@ -1,56 +0,0 @@ -## Version 2025/07/18 -# make sure that your statping container is named statup -# make sure that your dns has a cname set for statping -# If you are using the SSL docker-compose.yml on the statping repo, then the container name will be set to statup. -# On other compose examples, it might be named statping. In that case, change $upstream_app statup to $upstream_app statping - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name statping.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app statup; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/stirling-pdf.subdomain.conf.sample b/stirling-pdf.subdomain.conf.sample deleted file mode 100644 index 90385dd93..000000000 --- a/stirling-pdf.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your stirling-pdf container is named stirling-pdf -# make sure that your dns has a cname set for stirling-pdf - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name stirling-pdf.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app stirling-pdf; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} diff --git a/storm.subdomain.conf.sample b/storm.subdomain.conf.sample deleted file mode 100644 index f6e422ee1..000000000 --- a/storm.subdomain.conf.sample +++ /dev/null @@ -1,59 +0,0 @@ -## Version 2025/07/18 -# reverse proxy config for a modern deluge interface named storm -# https://github.com/relvacode/storm -# make sure that your storm container is named storm -# make sure that your dns has a cname set for storm - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name storm.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app storm; - set $upstream_port 8221; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - - } - - -} diff --git a/taisun.subdomain.conf.sample b/taisun.subdomain.conf.sample deleted file mode 100644 index 1e20ef081..000000000 --- a/taisun.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your taisun container is named taisun -# make sure that your dns has a cname set for taisun - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name taisun.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app taisun; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_buffering off; - } -} diff --git a/tasmobackup.subdomain.conf.sample b/tasmobackup.subdomain.conf.sample deleted file mode 100644 index c76147ec8..000000000 --- a/tasmobackup.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your tasmobackup container is named tasmobackup -# make sure that your dns has a cname set for tasmobackup - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name tasmobackup.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app tasmobackup; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/tdarr.subdomain.conf.sample b/tdarr.subdomain.conf.sample deleted file mode 100644 index 03f6ca633..000000000 --- a/tdarr.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your tdarr container is named tdarr -# make sure that your dns has a cname set for tdarr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name tdarr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app tdarr; - set $upstream_port 8265; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/pgadmin.subdomain.conf.sample b/templates/subdomain.conf.j2 similarity index 58% rename from pgadmin.subdomain.conf.sample rename to templates/subdomain.conf.j2 index 46b4b989e..2b5df860b 100644 --- a/pgadmin.subdomain.conf.sample +++ b/templates/subdomain.conf.j2 @@ -1,6 +1,6 @@ -## Version 2025/07/18 -# make sure that your pgadmin container is named pgadmin -# make sure that your dns has a cname set for pgadmin +## Version 2025/08/28 +# make sure that your {{ item.name }} container is named {{ item.name }} +# make sure that your dns has a cname set for {{ item.name }} server { listen 443 ssl; @@ -8,11 +8,17 @@ server { listen [::]:443 ssl; # listen [::]:443 quic; - server_name pgadmin.*; + server_name {{ item.name }}.*; include /config/nginx/ssl.conf; - client_max_body_size 0; + client_max_body_size {{ item.client_max_body_size | default('0') }}; +{% if item.proxy_redirect_off %} + proxy_redirect off; +{% endif %} +{% if item.buffering_off %} + proxy_buffering off; +{% endif %} # enable for ldap auth (requires ldap-location.conf in the location block) #include /config/nginx/ldap-server.conf; @@ -45,15 +51,33 @@ server { include /config/nginx/proxy.conf; include /config/nginx/resolver.conf; - set $upstream_app pgadmin; - set $upstream_port 80; - set $upstream_proto http; + set $upstream_app {{ item.name }}; + set $upstream_port {{ item.port }}; + set $upstream_proto {% if item.https %}https{% else %}http{% endif %}; proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # Hide proxy port to prevent CSRF errors - proxy_hide_header X-Forwarded-Port; - +{% if item.hide_xframe %} + proxy_hide_header X-Frame-Options; +{% endif %} +{% if item.iframe_friendly %} # Uncomment to allow loading in an iframe (i.e. Organizr) #proxy_hide_header X-Frame-Options; +{% endif %} +{% if item.hide_x_forwarded_port %} + # Hide proxy port to prevent CSRF errors + proxy_hide_header X-Forwarded-Port; +{% endif %} +{% if item.set_x_scheme %} + proxy_set_header X-Scheme https; +{% endif %} + } +{% if item.api %} + location ~ (?:/{{ item.name }})?/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app {{ item.name }}; + set $upstream_port {{ item.port }}; + set $upstream_proto {% if item.https %}https{% else %}http{% endif %}; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; } +{% endif %} } diff --git a/templates/subfolder.conf.j2 b/templates/subfolder.conf.j2 new file mode 100644 index 000000000..3e70ab0b1 --- /dev/null +++ b/templates/subfolder.conf.j2 @@ -0,0 +1,49 @@ +## Version 2025/08/28 +# make sure that your {{ item.name }} container is named {{ item.name }} +# make sure that {{ item.name }} is set to work with the base url /{{ item.name }}/ + +{% if item.redirect %} +location /{{ item.name }} { + return 301 $scheme://$host/{{ item.name }}/; +} + +location ^~ /{{ item.name }}/ { +{% else %} +location ^~ /{{ item.name }} { +{% endif %} + # enable the next two lines for http auth + #auth_basic "Restricted"; + #auth_basic_user_file /config/nginx/.htpasswd; + + # enable for ldap auth (requires ldap-server.conf in the server block) + #include /config/nginx/ldap-location.conf; + + # enable for Authelia (requires authelia-server.conf in the server block) + #include /config/nginx/authelia-location.conf; + + # enable for Authentik (requires authentik-server.conf in the server block) + #include /config/nginx/authentik-location.conf; + + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app {{ item.name }}; + set $upstream_port {{ item.port }}; + set $upstream_proto {% if item.https %}https{% else %}http{% endif %}; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; +{% if item.rewrite %} + rewrite /{{ item.name }}(.*) $1 break; +{% endif %} +{% if item.buffering_off %} + proxy_buffering off; +{% endif %} +} +{% if item.api %} +location ^~ /{{ item.name }}/api { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app {{ item.name }}; + set $upstream_port {{ item.port }}; + set $upstream_proto {% if item.https %}https{% else %}http{% endif %}; + proxy_pass $upstream_proto://$upstream_app:$upstream_port; +} +{% endif %} diff --git a/thelounge.subdomain.conf.sample b/thelounge.subdomain.conf.sample deleted file mode 100644 index d5c0f1396..000000000 --- a/thelounge.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your thelounge container is named thelounge -# make sure that your dns has a cname set for thelounge - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name thelounge.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app thelounge; - set $upstream_port 9000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/thelounge.subfolder.conf.sample b/thelounge.subfolder.conf.sample deleted file mode 100644 index dfd59240c..000000000 --- a/thelounge.subfolder.conf.sample +++ /dev/null @@ -1,31 +0,0 @@ -## Version 2023/02/05 -# make sure that your thelounge container is named thelounge -# thelounge does not require a base url setting - -location /thelounge { - return 301 $scheme://$host/thelounge/; -} - -location ^~ /thelounge/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app thelounge; - set $upstream_port 9000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /thelounge(.*) $1 break; -} diff --git a/themepark.subdomain.conf.sample b/themepark.subdomain.conf.sample deleted file mode 100644 index 7c2f23230..000000000 --- a/themepark.subdomain.conf.sample +++ /dev/null @@ -1,60 +0,0 @@ -## Version 2025/07/18 -# make sure that your theme-park. container is named theme-park. -# make sure that your dns has a cname set for themepark. - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name themepark.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - # If you don't want to cache the CSS files you can uncomment the lines below. - # add_header Last-Modified $date_gmt; - # add_header Cache-Control 'no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0'; - # if_modified_since off; - # expires -1; - # etag off; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app theme-park; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/tinyauth.subdomain.conf.sample b/tinyauth.subdomain.conf.sample deleted file mode 100644 index 24eb3eeeb..000000000 --- a/tinyauth.subdomain.conf.sample +++ /dev/null @@ -1,27 +0,0 @@ -## Version 2025/07/18 -# make sure that your tinyauth container is named tinyauth -# make sure that your dns has a cname set for tinyauth - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name tinyauth.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - location / { - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app tinyauth; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/unifi-controller.subdomain.conf.sample b/unifi-controller.subdomain.conf.sample deleted file mode 100644 index 35f332ae8..000000000 --- a/unifi-controller.subdomain.conf.sample +++ /dev/null @@ -1,57 +0,0 @@ -## Version 2025/07/18 -# make sure that your unifi-controller container is named unifi-controller -# make sure that your dns has a cname set for unifi -# NOTE: If you use the proxy_cookie_path setting in proxy.conf you need to remove HTTPOnly; -# ex: proxy_cookie_path / "/; Secure"; - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name unifi.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app unifi-controller; - set $upstream_port 8443; - set $upstream_proto https; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_buffering off; - } -} diff --git a/unifi-network-application.subdomain.conf.sample b/unifi-network-application.subdomain.conf.sample deleted file mode 100644 index aa8032571..000000000 --- a/unifi-network-application.subdomain.conf.sample +++ /dev/null @@ -1,58 +0,0 @@ -## Version 2025/07/18 -# make sure that your unifi-network-application container is named unifi-network-application -# make sure that your dns has a cname set for unifi -# NOTE: If you use the proxy_cookie_path setting in proxy.conf you need to remove HTTPOnly; -# ex: proxy_cookie_path / "/; Secure"; -# change $upstream_port to 443 if connecting to a Unifi Cloud Key - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name unifi.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app unifi-network-application; - set $upstream_port 8443; - set $upstream_proto https; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_buffering off; - } -} diff --git a/viewtube.subdomain.conf.sample b/viewtube.subdomain.conf.sample deleted file mode 100644 index 8e1a2914a..000000000 --- a/viewtube.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your viewtube container is named viewtube -# make sure that your dns has a cname set for viewtube - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name viewtube.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app viewtube; - set $upstream_port 8066; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} diff --git a/wallabag.subdomain.conf.sample b/wallabag.subdomain.conf.sample deleted file mode 100644 index 73de4a6d5..000000000 --- a/wallabag.subdomain.conf.sample +++ /dev/null @@ -1,56 +0,0 @@ -## Version 2025/07/18 -# make sure that your wallabag container is named wallabag -# make sure that your dns has a cname set for wallabag -# also, make sure your env var in your docker run or compose match the full domain, incl. https:// -# i.e. - SYMFONY__ENV__DOMAIN_NAME=https://wallabag.yourdomain.com - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name wallabag.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app wallabag; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/warpgate.subdomain.conf.sample b/warpgate.subdomain.conf.sample deleted file mode 100644 index 872898a65..000000000 --- a/warpgate.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your warpgate container is named warpgate -# make sure that your dns has a cname set for warpgate - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name warpgate.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app warpgate; - set $upstream_port 8888; - set $upstream_proto https; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} diff --git a/watcharr.subdomain.conf.sample b/watcharr.subdomain.conf.sample deleted file mode 100644 index 8f9beb800..000000000 --- a/watcharr.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your watcharr container is named watcharr -# make sure that your dns has a cname set for watcharr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name watcharr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app watcharr; - set $upstream_port 3080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/watcharr)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app watcharr; - set $upstream_port 3080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/webtop.subdomain.conf.sample b/webtop.subdomain.conf.sample deleted file mode 100644 index 362e29a0d..000000000 --- a/webtop.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that you have a cname set for the webtop -# set up authentication here, for better security - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name webtop.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app webtop; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_buffering off; - } -} diff --git a/webtop.subfolder.conf.sample b/webtop.subfolder.conf.sample deleted file mode 100644 index 526525c3f..000000000 --- a/webtop.subfolder.conf.sample +++ /dev/null @@ -1,29 +0,0 @@ -## Version 2024/02/14 -# make sure that your webtop container is named webtop -# make sure that webtop is set to work with the base url /webtop/ -# works with any KasmVNC based image - -location ^~ /webtop { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app webtop; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_buffering off; - -} diff --git a/whisparr.subdomain.conf.sample b/whisparr.subdomain.conf.sample deleted file mode 100644 index bc443f559..000000000 --- a/whisparr.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your whisparr container is named whisparr -# make sure that your dns has a cname set for whisparr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name whisparr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app whisparr; - set $upstream_port 6969; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/whisparr)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app whisparr; - set $upstream_port 6969; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/whisparr.subfolder.conf.sample b/whisparr.subfolder.conf.sample deleted file mode 100644 index 13d36933c..000000000 --- a/whisparr.subfolder.conf.sample +++ /dev/null @@ -1,36 +0,0 @@ -## Version 2024/08/04 -# make sure that your whisparr container is named whisparr -# make sure that whisparr is set to work with the base url /whisparr/ - -location ^~ /whisparr { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app whisparr; - set $upstream_port 6969; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /whisparr/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app whisparr; - set $upstream_port 6969; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/wizarr.subdomain.conf.sample b/wizarr.subdomain.conf.sample deleted file mode 100644 index 84e00dfaa..000000000 --- a/wizarr.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your wizarr container is named wizarr -# make sure that your dns has a cname set for wizarr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name wizarr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app wizarr; - set $upstream_port 5690; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/wordpress.subdomain.conf.sample b/wordpress.subdomain.conf.sample deleted file mode 100644 index 79489cd8f..000000000 --- a/wordpress.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your wordpress container is named wordpress -# make sure that your dns has a cname set for wordpress - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name wordpress.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app wordpress; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/wrapperr.subdomain.conf.sample b/wrapperr.subdomain.conf.sample deleted file mode 100644 index ff4958824..000000000 --- a/wrapperr.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your wrapperr container is named wrapperr -# make sure that your dns has a cname set for wrapperr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name wrapperr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app wrapperr; - set $upstream_port 8282; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/yacht.subdomain.conf.sample b/yacht.subdomain.conf.sample deleted file mode 100644 index 7d4693341..000000000 --- a/yacht.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your yacht container is named yacht -# make sure that your dns has a cname set for yacht - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name yacht.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app yacht; - set $upstream_port 8000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/your-spotify-api.subdomain.conf.sample b/your-spotify-api.subdomain.conf.sample deleted file mode 100644 index ae613e0b3..000000000 --- a/your-spotify-api.subdomain.conf.sample +++ /dev/null @@ -1,59 +0,0 @@ -## Version 2025/07/18 -# https://github.com/Yooooomi/your_spotify -# this is not a standalone config, it requires configured your-spotify web container for full functionality. -# it uses server URLs for api callbacks, thus a server is required -# make sure that your YourSpotify api container is named your-spotify-server -# make sure that your dns has a cname set for your-spotify-server -# do not forget to finish configuration following instructions in apps repository. API_ENDPOINT=https://your-spotify-server.[your domain]. - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name your-spotify-server.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app your-spotify-server; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} diff --git a/your-spotify.subdomain.conf.sample b/your-spotify.subdomain.conf.sample deleted file mode 100644 index bc0bd15fb..000000000 --- a/your-spotify.subdomain.conf.sample +++ /dev/null @@ -1,61 +0,0 @@ -## Version 2025/07/18 -# https://github.com/Yooooomi/your_spotify -# this is not a standalone config, it requires configured your-spotify api container for full functionality. -# it uses server URLs for api callbacks, thus a server is required -# make sure that your YourSpotify web container is named your-spotify-web -# make sure that your dns has a cname set for your-spotify -# do not forget to finish configuration following instructions in apps repository. CLIENT_ENDPOINT=https://your-spotify.[your domain] - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name your-spotify.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app your-spotify-web; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} - - diff --git a/yourls.subdomain.conf.sample b/yourls.subdomain.conf.sample deleted file mode 100644 index ee8edd7ce..000000000 --- a/yourls.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your yourls container is named yourls -# make sure that your dns has a cname set for yourls if necessary - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name yourls.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app yourls; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/youtube-dl-server.subdomain.conf.sample b/youtube-dl-server.subdomain.conf.sample deleted file mode 100644 index f4a9ce746..000000000 --- a/youtube-dl-server.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your youtube-dl-server container is named youtube-dl-server -# make sure that your dns has a cname set for youtube-dl-server - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name youtube-dl-server.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app youtube-dl-server; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/yt-dlp-web.subdomain.conf.sample b/yt-dlp-web.subdomain.conf.sample deleted file mode 100644 index 88f8dc423..000000000 --- a/yt-dlp-web.subdomain.conf.sample +++ /dev/null @@ -1,53 +0,0 @@ -## Version 2025/07/18 -# make sure that your yt-dlp-web container is named yt-dlp-web -# make sure that your dns has a cname set for yt-dlp-web - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name yt-dlp-web.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app yt-dlp-web; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/zigbee2mqtt.subdomain.conf.sample b/zigbee2mqtt.subdomain.conf.sample deleted file mode 100644 index 88e065da3..000000000 --- a/zigbee2mqtt.subdomain.conf.sample +++ /dev/null @@ -1,55 +0,0 @@ -## Version 2025/07/18 -# make sure that your zigbee2mqtt container is named zigbee2mqtt -# make sure that your dns has a cname set for zigbee2mqtt - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name zigbee2mqtt.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app zigbee2mqtt; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - -} diff --git a/znc.subdomain.conf.sample b/znc.subdomain.conf.sample deleted file mode 100644 index bb944f176..000000000 --- a/znc.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your znc container is named znc -# make sure that your dns has a cname set for znc - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name znc.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app znc; - set $upstream_port 6501; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/znc.subfolder.conf.sample b/znc.subfolder.conf.sample deleted file mode 100644 index 70d261055..000000000 --- a/znc.subfolder.conf.sample +++ /dev/null @@ -1,27 +0,0 @@ -## Version 2023/02/05 -# make sure that your znc container is named znc -# make sure that znc is set to work with the base url /znc/ -# edit /config/configs/znc.conf and add URIPrefix = /znc/ in the line above and restart the znc container - -location /znc { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app znc; - set $upstream_port 6501; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/zwave-js-ui.subdomain.conf.sample b/zwave-js-ui.subdomain.conf.sample deleted file mode 100644 index 1c56a28de..000000000 --- a/zwave-js-ui.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your zwave-js-ui container is named zwave-js-ui -# make sure that your dns has a cname set for zwave-js-ui - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name zwave-js-ui.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app zwave-js-ui; - set $upstream_port 8091; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/zwavejs2mqtt.subdomain.conf.sample b/zwavejs2mqtt.subdomain.conf.sample deleted file mode 100644 index f845e3973..000000000 --- a/zwavejs2mqtt.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your zwavejs2mqtt container is named zwavejs2mqtt -# make sure that your dns has a cname set for zwavejs2mqtt - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name zwavejs2mqtt.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app zwavejs2mqtt; - set $upstream_port 8091; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} From 84fc26f86aaa185450746df10c58995101123dcf Mon Sep 17 00:00:00 2001 From: thelamer Date: Mon, 1 Sep 2025 17:28:36 -0400 Subject: [PATCH 2/2] show POC for SWAG --- config_data.yml | 472 +++++++++--------- custom_configs/adguard.subdomain.conf.sample | 76 --- .../aria2-with-webui.subdomain.conf.sample | 78 --- .../asciinema.subdomain.conf.sample | 78 --- custom_configs/authelia.subdomain.conf.sample | 37 -- .../authentik.subdomain.conf.sample | 37 -- custom_configs/bazarr.subfolder.conf.sample | 40 -- custom_configs/beets.subfolder.conf.sample | 29 -- custom_configs/beszel.subfolder.conf.sample | 41 -- .../bitwarden.subdomain.conf.sample | 104 ---- custom_configs/boinc.subfolder.conf.sample | 60 --- .../calibre-web.subdomain.conf.sample | 86 ---- .../calibre-web.subfolder.conf.sample | 64 --- custom_configs/calibre.subdomain.conf.sample | 87 ---- custom_configs/calibre.subfolder.conf.sample | 89 ---- custom_configs/deluge.subfolder.conf.sample | 32 -- custom_configs/dozzle.subfolder.conf.sample | 34 -- custom_configs/emby.subdomain.conf.sample | 33 -- custom_configs/emby.subfolder.conf.sample | 34 -- .../emulatorjs.subdomain.conf.sample | 85 ---- .../filebrowser.subdomain.conf.sample | 80 --- .../filebrowser.subfolder.conf.sample | 61 --- custom_configs/flexget.subfolder.conf.sample | 39 -- custom_configs/freshrss.subfolder.conf.sample | 36 -- custom_configs/gaps.subfolder.conf.sample | 33 -- custom_configs/gitea.subdomain.conf.sample | 69 --- custom_configs/grafana.subfolder.conf.sample | 50 -- .../homeassistant.subdomain.conf.sample | 72 --- custom_configs/jackett.subdomain.conf.sample | 74 --- custom_configs/jackett.subfolder.conf.sample | 46 -- .../jdownloader.subdomain.conf.sample | 62 --- custom_configs/jenkins.subfolder.conf.sample | 39 -- custom_configs/jfa-go.subfolder.conf.sample | 33 -- custom_configs/mailu.subfolder.conf.sample | 60 --- custom_configs/metabase.subdomain.conf.sample | 62 --- custom_configs/monica.subfolder.conf.sample | 31 -- .../mytinytodo.subfolder.conf.sample | 31 -- .../nextcloud.subfolder.conf.sample | 51 -- custom_configs/nzbget.subdomain.conf.sample | 84 ---- custom_configs/nzbget.subfolder.conf.sample | 57 --- custom_configs/nzbhydra.subdomain.conf.sample | 104 ---- custom_configs/nzbhydra.subfolder.conf.sample | 77 --- custom_configs/ombi.subdomain.conf.sample | 80 --- custom_configs/ombi.subfolder.conf.sample | 61 --- .../organizr-auth.subfolder.conf.sample | 41 -- custom_configs/organizr.subdomain.conf.sample | 58 --- custom_configs/organizr.subfolder.conf.sample | 29 -- custom_configs/pihole.subdomain.conf.sample | 82 --- custom_configs/pihole.subfolder.conf.sample | 61 --- custom_configs/plex.subdomain.conf.sample | 80 --- custom_configs/plex.subfolder.conf.sample | 54 -- .../plexwebtools.subdomain.conf.sample | 54 -- .../plexwebtools.subfolder.conf.sample | 30 -- .../portainer.subdomain.conf.sample | 66 --- .../portainer.subfolder.conf.sample | 44 -- .../prometheus.subdomain.conf.sample | 78 --- custom_configs/prowlarr.subdomain.conf.sample | 72 --- custom_configs/prowlarr.subfolder.conf.sample | 46 -- .../pterodactylnode.subdomain.conf.sample | 67 --- custom_configs/rclone.subfolder.conf.sample | 42 -- .../rutorrent.subfolder.conf.sample | 59 --- .../sonarrtorss.subdomain.conf.sample | 62 --- .../sonarrtorss.subfolder.conf.sample | 38 -- .../synclounge.subdomain.conf.sample | 66 --- .../synclounge.subfolder.conf.sample | 59 --- .../syncthing.subdomain.conf.sample | 66 --- .../syncthing.subfolder.conf.sample | 44 -- custom_configs/tautulli.subdomain.conf.sample | 84 ---- custom_configs/tautulli.subfolder.conf.sample | 57 --- .../themepark.subfolder.conf.sample | 40 -- .../transmission.subdomain.conf.sample | 73 --- .../transmission.subfolder.conf.sample | 47 -- .../tvheadend.subfolder.conf.sample | 44 -- .../ubooquity.subdomain.conf.sample | 84 ---- .../ubooquity.subfolder.conf.sample | 37 -- .../uptime-kuma.subdomain.conf.sample | 64 --- .../vaultwarden.subdomain.conf.sample | 111 ---- .../vaultwarden.subfolder.conf.sample | 87 ---- .../watchstate.subdomain.conf.sample | 66 --- custom_configs/wikijs.subdomain.conf.sample | 64 --- .../wordpress.subfolder.conf.sample | 28 -- .../youtube-dl.subfolder.conf.sample | 35 -- generate_configs.py | 23 - templates/subdomain.conf.j2 | 60 +++ templates/subfolder.conf.j2 | 49 -- 85 files changed, 286 insertions(+), 5053 deletions(-) delete mode 100644 custom_configs/adguard.subdomain.conf.sample delete mode 100644 custom_configs/aria2-with-webui.subdomain.conf.sample delete mode 100644 custom_configs/asciinema.subdomain.conf.sample delete mode 100644 custom_configs/authelia.subdomain.conf.sample delete mode 100644 custom_configs/authentik.subdomain.conf.sample delete mode 100644 custom_configs/bazarr.subfolder.conf.sample delete mode 100644 custom_configs/beets.subfolder.conf.sample delete mode 100644 custom_configs/beszel.subfolder.conf.sample delete mode 100644 custom_configs/bitwarden.subdomain.conf.sample delete mode 100644 custom_configs/boinc.subfolder.conf.sample delete mode 100644 custom_configs/calibre-web.subdomain.conf.sample delete mode 100644 custom_configs/calibre-web.subfolder.conf.sample delete mode 100644 custom_configs/calibre.subdomain.conf.sample delete mode 100644 custom_configs/calibre.subfolder.conf.sample delete mode 100644 custom_configs/deluge.subfolder.conf.sample delete mode 100644 custom_configs/dozzle.subfolder.conf.sample delete mode 100644 custom_configs/emby.subdomain.conf.sample delete mode 100644 custom_configs/emby.subfolder.conf.sample delete mode 100644 custom_configs/emulatorjs.subdomain.conf.sample delete mode 100644 custom_configs/filebrowser.subdomain.conf.sample delete mode 100644 custom_configs/filebrowser.subfolder.conf.sample delete mode 100644 custom_configs/flexget.subfolder.conf.sample delete mode 100644 custom_configs/freshrss.subfolder.conf.sample delete mode 100644 custom_configs/gaps.subfolder.conf.sample delete mode 100644 custom_configs/gitea.subdomain.conf.sample delete mode 100644 custom_configs/grafana.subfolder.conf.sample delete mode 100644 custom_configs/homeassistant.subdomain.conf.sample delete mode 100644 custom_configs/jackett.subdomain.conf.sample delete mode 100644 custom_configs/jackett.subfolder.conf.sample delete mode 100644 custom_configs/jdownloader.subdomain.conf.sample delete mode 100644 custom_configs/jenkins.subfolder.conf.sample delete mode 100644 custom_configs/jfa-go.subfolder.conf.sample delete mode 100644 custom_configs/mailu.subfolder.conf.sample delete mode 100644 custom_configs/metabase.subdomain.conf.sample delete mode 100644 custom_configs/monica.subfolder.conf.sample delete mode 100644 custom_configs/mytinytodo.subfolder.conf.sample delete mode 100644 custom_configs/nextcloud.subfolder.conf.sample delete mode 100644 custom_configs/nzbget.subdomain.conf.sample delete mode 100644 custom_configs/nzbget.subfolder.conf.sample delete mode 100644 custom_configs/nzbhydra.subdomain.conf.sample delete mode 100644 custom_configs/nzbhydra.subfolder.conf.sample delete mode 100644 custom_configs/ombi.subdomain.conf.sample delete mode 100644 custom_configs/ombi.subfolder.conf.sample delete mode 100644 custom_configs/organizr-auth.subfolder.conf.sample delete mode 100644 custom_configs/organizr.subdomain.conf.sample delete mode 100644 custom_configs/organizr.subfolder.conf.sample delete mode 100644 custom_configs/pihole.subdomain.conf.sample delete mode 100644 custom_configs/pihole.subfolder.conf.sample delete mode 100644 custom_configs/plex.subdomain.conf.sample delete mode 100644 custom_configs/plex.subfolder.conf.sample delete mode 100644 custom_configs/plexwebtools.subdomain.conf.sample delete mode 100644 custom_configs/plexwebtools.subfolder.conf.sample delete mode 100644 custom_configs/portainer.subdomain.conf.sample delete mode 100644 custom_configs/portainer.subfolder.conf.sample delete mode 100644 custom_configs/prometheus.subdomain.conf.sample delete mode 100644 custom_configs/prowlarr.subdomain.conf.sample delete mode 100644 custom_configs/prowlarr.subfolder.conf.sample delete mode 100644 custom_configs/pterodactylnode.subdomain.conf.sample delete mode 100644 custom_configs/rclone.subfolder.conf.sample delete mode 100644 custom_configs/rutorrent.subfolder.conf.sample delete mode 100644 custom_configs/sonarrtorss.subdomain.conf.sample delete mode 100644 custom_configs/sonarrtorss.subfolder.conf.sample delete mode 100644 custom_configs/synclounge.subdomain.conf.sample delete mode 100644 custom_configs/synclounge.subfolder.conf.sample delete mode 100644 custom_configs/syncthing.subdomain.conf.sample delete mode 100644 custom_configs/syncthing.subfolder.conf.sample delete mode 100644 custom_configs/tautulli.subdomain.conf.sample delete mode 100644 custom_configs/tautulli.subfolder.conf.sample delete mode 100644 custom_configs/themepark.subfolder.conf.sample delete mode 100644 custom_configs/transmission.subdomain.conf.sample delete mode 100644 custom_configs/transmission.subfolder.conf.sample delete mode 100644 custom_configs/tvheadend.subfolder.conf.sample delete mode 100644 custom_configs/ubooquity.subdomain.conf.sample delete mode 100644 custom_configs/ubooquity.subfolder.conf.sample delete mode 100644 custom_configs/uptime-kuma.subdomain.conf.sample delete mode 100644 custom_configs/vaultwarden.subdomain.conf.sample delete mode 100644 custom_configs/vaultwarden.subfolder.conf.sample delete mode 100644 custom_configs/watchstate.subdomain.conf.sample delete mode 100644 custom_configs/wikijs.subdomain.conf.sample delete mode 100644 custom_configs/wordpress.subfolder.conf.sample delete mode 100644 custom_configs/youtube-dl.subfolder.conf.sample delete mode 100644 templates/subfolder.conf.j2 diff --git a/config_data.yml b/config_data.yml index 3fe302a34..d47e7f341 100644 --- a/config_data.yml +++ b/config_data.yml @@ -437,269 +437,249 @@ subdomains: port: 80 - name: tinyauth port: 3000 - -subfolders: - - name: airsonic - port: 4040 - - name: audiobookshelf - port: 80 - - name: booksonic - port: 4040 - - name: couchpotato - port: 5050 - - name: domoticz - port: 8080 - - name: flaresolverr - port: 8191 - - name: headphones - port: 8181 - - name: lazylibrarian - port: 5299 - - name: medusa - port: 8081 - - name: metube - port: 8081 - - name: mylar - port: 8090 - - name: pyload - port: 8000 - - name: quassel-web - port: 64080 - - name: sickchill - port: 8081 - - name: sickrage - port: 8081 - - name: slskd - port: 5000 - - name: smokeping - port: 80 - - name: webtop - port: 3000 - - name: znc - port: 6501 - - name: adminer - port: 8080 - redirect: true - - name: autobrr - port: 7474 - redirect: true - - name: crontabui - port: 8000 - redirect: true - rewrite: true - - name: dockge - port: 5001 - redirect: true - - name: gatus - port: 8080 - redirect: true - - name: miniflux - port: 8080 - redirect: true - - name: monitorr - port: 80 - redirect: true - - name: petio - port: 7777 - redirect: true - - name: planka - port: 1337 - redirect: true - - name: qui - port: 7476 - redirect: true - - name: shinobi - port: 8080 - redirect: true - - name: spoolman - port: 8000 - redirect: true - - name: ddns-updater - port: 8000 - api: true - - name: kavita - port: 5000 - redirect: true - api: true - - name: komga - port: 25600 - redirect: true - api: true - - name: lidarr - port: 8686 - api: true - - name: radarr - port: 7878 - api: true - - name: readarr - port: 8787 - api: true - - name: sabnzbd + # --- MIGRATED FROM CUSTOM --- + - name: adguard + port: 80 + extra_locations: + - path: /control + - path: /dns-query + - name: aria2-with-webui + port: 80 + extra_locations: + - path: /jsonrpc + port: 6800 + proxy_pass_path: /jsonrpc + - path: /rpc + port: 6800 + proxy_pass_path: /rpc + - name: asciinema + port: 4000 + extra_locations: + - path: /dashboard + port: 4002 + - name: authelia + port: 9091 + extra_locations: + - path: /api + - name: authentik + port: 9000 + extra_locations: + - path: /api + - name: bitwarden port: 8080 - api: true - - name: sonarr - port: 8989 - api: true - - name: whisparr - port: 6969 - api: true - - name: dokuwiki - port: 80 - redirect: true - rewrite: true - - name: duplicati - port: 8200 - redirect: true - rewrite: true - - name: filebot - port: 5800 - redirect: true - rewrite: true - - name: flood - port: 3000 - redirect: true - rewrite: true - - name: forgejo - port: 3000 - redirect: true - rewrite: true - - name: gitea - port: 3000 - redirect: true - rewrite: true - - name: glances - port: 61208 - redirect: true - rewrite: true - - name: guacamole + client_max_body_size: 128M + extra_locations: + - path: /admin + - path: /api + - path: /notifications/hub + - name: calibre port: 8080 - redirect: true - rewrite: true buffering_off: true - - name: homepage + extra_locations: + - path: /content-server/ + port: 8081 + - name: calibre-web + port: 8083 + proxy_set_headers: + - key: X-Scheme + value: $scheme + extra_locations: + - path: /opds/ + proxy_set_headers: + - key: X-Scheme + value: $scheme + - path: /kobo/ + proxy_set_headers: + - key: X-Forwarded-Host + value: $http_host + - key: X-Scheme + value: $scheme + custom_directives: + - proxy_buffer_size 128k + - proxy_buffers 4 256k + - proxy_busy_buffers_size 256k + - name: emby + port: 8096 + proxy_set_headers: + - key: Range + value: $http_range + - key: If-Range + value: $http_if_range + - name: emulatorjs + port: 80 + extra_locations: + - path: /backend/ + port: 3000 + - name: filebrowser + port: 8080 + extra_locations: + - path: /api/public + - path: /share + - path: /static + - name: gitea port: 3000 - rewrite: true - - name: lychee - port: 80 - redirect: true - rewrite: true - - name: netdata - port: 19999 - redirect: true - rewrite: true - - name: phpmyadmin - port: 80 - redirect: true - rewrite: true - - name: picard + extra_locations: + - path: /(api|info/lfs) + - name: homeassistant + port: 8123 + extra_locations: + - path: ^/(api|local|media)/ + - name: jackett + port: 9117 + extra_locations: + - path: /api + - path: /dl + - name: jdownloader port: 5800 - redirect: true - rewrite: true - - name: scope - port: 4040 - redirect: true - rewrite: true - - name: semaphore + extra_locations: + - path: /websockify + proxy_pass_path: /websockify + - name: metabase port: 3000 - rewrite: true - - name: thelounge + extra_locations: + - path: ^/api + - name: nzbget + port: 6789 + extra_locations: + - path: /(/[^\/:]*:[^\/:]*)?/jsonrpc + - path: /(/[^\/:]*:[^\/]*)?/jsonprpc + - path: /(/[^\/:]*:[^\/]*)?/xmlrpc + - name: nzbhydra + port: 5076 + extra_locations: + - path: /api + - path: /getnzb + - path: /gettorrent + - path: /rss + - path: /torznab/api + - name: ombi + port: 3579 + extra_locations: + - path: /api + - path: /swagger + custom_directives: + - if ($http_referer ~* /ombi) { rewrite ^/swagger/(.*) /ombi/swagger/$1? redirect; } + - name: organizr + port: 80 + - name: pihole + port: 80 + proxy_hide_headers: + - X-Frame-Options + extra_locations: + - path: /admin + proxy_hide_headers: + - X-Frame-Options + - name: plex + port: 32400 + proxy_redirect_off: true + buffering_off: true + proxy_set_headers: + - { key: X-Plex-Client-Identifier, value: $http_x_plex_client_identifier } + - { key: X-Plex-Device, value: $http_x_plex_device } + - { key: X-Plex-Device-Name, value: $http_x_plex_device_name } + - { key: X-Plex-Platform, value: $http_x_plex_platform } + - { key: X-Plex-Platform-Version, value: $http_x_plex_platform_version } + - { key: X-Plex-Product, value: $http_x_plex_product } + - { key: X-Plex-Token, value: $http_x_plex_token } + - { key: X-Plex-Version, value: $http_x_plex_version } + - { key: X-Plex-Nocache, value: $http_x_plex_nocache } + - { key: X-Plex-Provides, value: $http_x_plex_provides } + - { key: X-Plex-Device-Vendor, value: $http_x_plex_device_vendor } + - { key: X-Plex-Model, value: $http_x_plex_model } + extra_locations: + - path: /library/streams/ + custom_directives: + - proxy_pass_request_headers off + - name: plexwebtools + port: 33400 + app: plex + - name: portainer port: 9000 - redirect: true - rewrite: true + proxy_hide_headers: + - X-Frame-Options + extra_locations: + - path: /api + proxy_hide_headers: + - X-Frame-Options + - name: prometheus + port: 9090 + extra_locations: + - path: /api + - path: /-/(healthy|ready|reload|quit) + - name: prowlarr + port: 9696 + extra_locations: + - path: /(/[0-9]+)?/api + - path: /(/[0-9]+)?/download + - name: pterodactylnode + port: 443 + extra_locations: + - path: /api + - name: sonarrtorss + port: 18989 + extra_locations: + - path: ^/(api/|sonarr$|rss$|atom$|json$) + - name: synclounge + port: 8088 + websockets: true + - name: syncthing + port: 8384 + proxy_hide_headers: + - Authorization + extra_locations: + - path: /rest + proxy_hide_headers: + - Authorization + - name: tautulli + port: 8181 + extra_locations: + - path: /api + - path: /newsletter + - path: /image + - name: transmission + port: 9091 + proxy_pass_headers: + - X-Transmission-Session-Id + extra_locations: + - path: /rpc + - name: ubooquity + port: 2202 + extra_locations: + - path: /admin + port: 2203 + - path: /admin-res + port: 2203 + - path: /admin-api + port: 2203 + - name: uptime-kuma + port: 3001 + extra_locations: + - path: /(status|assets|icon.svg) + - name: vaultwarden + port: 80 + client_max_body_size: 128M + extra_locations: + - path: ^/admin + - path: /api + - path: /notifications/hub + - name: watchstate + port: 8080 + extra_locations: + - path: /v1/api + - name: wikijs + port: 3000 + extra_locations: + - path: /graphql custom: subdomains: - - adguard - - aria2-with-webui - - asciinema - - authelia - - authentik - - bitwarden - - calibre - - calibre-web - code-server - - emby - - emulatorjs - - filebrowser - - gitea - - homeassistant - - jackett - - jdownloader - jellyfin - kasm - mailcow - - metabase - - nextcloud - nexusoss - - nzbget - - nzbhydra - - ombi - openvpn-as - openvscode-server - - organizr - - pihole - - plex - - plexwebtools - - portainer - - prometheus - - prowlarr - - pterodactylnode - pydio-cells - recipes - - rutorrent - - sonarrtorss - synapse - - synclounge - - syncthing - - tautulli - - transmission - - ubooquity - - uptime-kuma - - vaultwarden - - watchstate - - wikijs - subfolders: - - bazarr - - beets - - beszel - - boinc - - calibre - - calibre-web - - deluge - - dozzle - - emby - - filebrowser - - flexget - - freshrss - - gaps - - grafana - - jackett - - jenkins - - jfa-go - - mailu - - monica - - mytinytodo - - nextcloud - - nzbget - - nzbhydra - - ombi - - organizr-auth - - organizr - - pihole - - plex - - plexwebtools - - portainer - - prowlarr - - rclone - - rutorrent - - sonarrtorss - - synclounge - - syncthing - - tautulli - - themepark - - transmission - - tvheadend - - ubooquity - - vaultwarden - - wordpress - - youtube-dl diff --git a/custom_configs/adguard.subdomain.conf.sample b/custom_configs/adguard.subdomain.conf.sample deleted file mode 100644 index ab618d851..000000000 --- a/custom_configs/adguard.subdomain.conf.sample +++ /dev/null @@ -1,76 +0,0 @@ -## Version 2025/07/18 -# make sure that your adguard container is named adguard -# make sure that your dns has a cname set for adguard - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name adguard.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app adguard; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location /control { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app adguard; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location /dns-query { - # to properly use this please set `allow_unencrypted_doh: true` and `force_https: false` in adguard - # see https://github.com/AdguardTeam/AdGuardHome/wiki/Configuration#configuration-file - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app adguard; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/aria2-with-webui.subdomain.conf.sample b/custom_configs/aria2-with-webui.subdomain.conf.sample deleted file mode 100644 index 6e75fcc0a..000000000 --- a/custom_configs/aria2-with-webui.subdomain.conf.sample +++ /dev/null @@ -1,78 +0,0 @@ -## Version 2025/07/18 -# make sure that your aria2 container is named aria2-with-webui -# make sure that your dns has a cname set for aria2 -# -# The RPC port will need to be changed to 443 in the AriaNg/WebUI-Aria2 settings or by using the AriaNg command api -# e.g. https://aria2.example.com/#!/settings/rpc/set/https/aria2.example.com/443/jsonrpc -# https://aria2.example.com/#!/settings/rpc/set?protocol=https&host=aria2.example.com&port=443&interface=aria2-with-webui/jsonrpc - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name aria2.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app aria2-with-webui; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/aria2-with-webui)?/jsonrpc { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app aria2-with-webui; - set $upstream_port 6800; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port/jsonrpc; - - } - - location ~ (/aria2-with-webui)?/rpc { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app aria2-with-webui; - set $upstream_port 6800; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port/rpc; - - } -} diff --git a/custom_configs/asciinema.subdomain.conf.sample b/custom_configs/asciinema.subdomain.conf.sample deleted file mode 100644 index 8a1e68783..000000000 --- a/custom_configs/asciinema.subdomain.conf.sample +++ /dev/null @@ -1,78 +0,0 @@ -## Version 2025/07/18 -# make sure that your asciinema container is named asciinema -# make sure that your dns has a cname set for asciinema - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name asciinema.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app asciinema; - set $upstream_port 4000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } - - location ~ (/asciinema)?/dashboard { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app asciinema; - set $upstream_port 4002; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/custom_configs/authelia.subdomain.conf.sample b/custom_configs/authelia.subdomain.conf.sample deleted file mode 100644 index 0c8276a6d..000000000 --- a/custom_configs/authelia.subdomain.conf.sample +++ /dev/null @@ -1,37 +0,0 @@ -## Version 2025/07/18 -# make sure that your authelia container is named authelia -# make sure that your dns has a cname set for authelia - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name authelia.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - location / { - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app authelia; - set $upstream_port 9091; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/authelia)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app authelia; - set $upstream_port 9091; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/authentik.subdomain.conf.sample b/custom_configs/authentik.subdomain.conf.sample deleted file mode 100644 index 5b6c9ccc3..000000000 --- a/custom_configs/authentik.subdomain.conf.sample +++ /dev/null @@ -1,37 +0,0 @@ -## Version 2025/07/18 -# make sure that your authentik container is named authentik-server -# make sure that your dns has a cname set for authentik - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name authentik.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - location / { - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app authentik-server; - set $upstream_port 9000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/authentik)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app authentik-server; - set $upstream_port 9000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/bazarr.subfolder.conf.sample b/custom_configs/bazarr.subfolder.conf.sample deleted file mode 100644 index eede1dd1f..000000000 --- a/custom_configs/bazarr.subfolder.conf.sample +++ /dev/null @@ -1,40 +0,0 @@ -## Version 2023/02/05 -# make sure that your bazarr container is named bazarr -# make sure that bazarr is set to work with the base url /bazarr/ - -location /bazarr { - return 301 $scheme://$host/bazarr/; -} - -location ^~ /bazarr/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app bazarr; - set $upstream_port 6767; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /bazarr/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app bazarr; - set $upstream_port 6767; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/custom_configs/beets.subfolder.conf.sample b/custom_configs/beets.subfolder.conf.sample deleted file mode 100644 index 7a19a0b9c..000000000 --- a/custom_configs/beets.subfolder.conf.sample +++ /dev/null @@ -1,29 +0,0 @@ -## Version 2023/02/05 -# make sure that your beets container is named beets -# make sure that beets is set to work with the base url /beets/ -# first edit beets.yml and enable the reverse proxy settings, under "web" add "reverse_proxy: true" and restart the beets container - -location /beets { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app beets; - set $upstream_port 8337; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_set_header X-Scheme $scheme; - proxy_set_header X-Script-Name /beets; -} diff --git a/custom_configs/beszel.subfolder.conf.sample b/custom_configs/beszel.subfolder.conf.sample deleted file mode 100644 index 050d3e9b2..000000000 --- a/custom_configs/beszel.subfolder.conf.sample +++ /dev/null @@ -1,41 +0,0 @@ -## Version 2023/02/05 -# make sure that your beszel container is named beszel -# make sure that beszel is set to work with the base url /beszel/ - - -location /beszel { - return 301 $scheme://$host/beszel/; -} - -location ^~ /beszel/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app beszel; - set $upstream_port 8090; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /beszel/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app beszel; - set $upstream_port 8090; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/custom_configs/bitwarden.subdomain.conf.sample b/custom_configs/bitwarden.subdomain.conf.sample deleted file mode 100644 index a5dd48ad0..000000000 --- a/custom_configs/bitwarden.subdomain.conf.sample +++ /dev/null @@ -1,104 +0,0 @@ -## Version 2025/07/18 -# make sure that your bitwarden container is named bitwarden -# make sure that your dns has a cname set for bitwarden -# if you are using bitwarden (the official image), use the bitwarden conf -# if you are using vaultwarden (an unofficial implementation), use the vaultwarden conf -# -# bitwarden defaults to port 8080 and can be changed using the environment variable BW_PORT_HTTP on the bitwarden container - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name bitwarden.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 128M; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app bitwarden; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/bitwarden)?/admin { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app bitwarden; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/bitwarden)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app bitwarden; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/bitwarden)?/notifications/hub { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app bitwarden; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/boinc.subfolder.conf.sample b/custom_configs/boinc.subfolder.conf.sample deleted file mode 100644 index 21dab87c3..000000000 --- a/custom_configs/boinc.subfolder.conf.sample +++ /dev/null @@ -1,60 +0,0 @@ -## Version 2023/02/05 -# make sure that your bionc container is named bionc -# make sure that bionc is set to work with the base url /bionc/ -# In boinc docker arguments, set an env variable for SUBFOLDER=/boinc/ - -location /boinc { - return 301 $scheme://$host/boinc/; -} - -location ^~ /boinc/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app boinc; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_buffering off; -} - -# If using subfolders for multiple Linux Desktop containers (full gui apps being rendered over web). -# You will need to modify this path and modify the the client settings in the application. -# Settings > Advanced > Websocket > Path -# IE websockify-boinc -location ^~ /websockify { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app boinc; - set $upstream_port 6901; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_buffering off; -} diff --git a/custom_configs/calibre-web.subdomain.conf.sample b/custom_configs/calibre-web.subdomain.conf.sample deleted file mode 100644 index b5109bd7d..000000000 --- a/custom_configs/calibre-web.subdomain.conf.sample +++ /dev/null @@ -1,86 +0,0 @@ -## Version 2025/07/18 -# make sure that your calibre-web container is named calibre-web -# make sure that your dns has a cname set for calibre-web - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name calibre-web.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - # To use Authelia to log in to Calibre-Web, make sure "Reverse Proxy Login" is - # enabled, "Reverse Proxy Header Name" is set to Remote-User, and each Authelia - # user also has a corresponding user manually created in Calibre-Web. - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app calibre-web; - set $upstream_port 8083; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_set_header X-Scheme $scheme; - } - - # OPDS feed for eBook reader apps - # Even if you use Authelia, the OPDS feed requires a password to be set for - # the user directly in Calibre-Web, as eBook reader apps don't support - # form-based logins, only HTTP Basic auth. - location /opds/ { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app calibre-web; - set $upstream_port 8083; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - proxy_set_header X-Scheme $scheme; - } - - # Feed for Kobo - location /kobo/ { - include /config/nginx/resolver.conf; - set $upstream_app calibre-web; - set $upstream_port 8083; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - proxy_set_header X-Forwarded-Host $http_host; - proxy_set_header X-Scheme $scheme; - proxy_buffer_size 128k; - proxy_buffers 4 256k; - proxy_busy_buffers_size 256k; - } -} diff --git a/custom_configs/calibre-web.subfolder.conf.sample b/custom_configs/calibre-web.subfolder.conf.sample deleted file mode 100644 index 011c6fcaa..000000000 --- a/custom_configs/calibre-web.subfolder.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2023/02/05 -# make sure that your calibre-web container is named calibre-web -# calibre-web does not require a base url setting - -location /calibre-web { - return 301 $scheme://$host/calibre-web/; -} - -location ^~ /calibre-web/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - # To use Authelia to log in to Calibre-Web, make sure "Reverse Proxy Login" is - # enabled, "Reverse Proxy Header Name" is set to Remote-User, and each Authelia - # user also has a corresponding user manually created in Calibre-Web. - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app calibre-web; - set $upstream_port 8083; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_set_header X-Scheme $scheme; - proxy_set_header X-Script-Name /calibre-web; -} - -# OPDS feed for eBook reader apps -# Even if you use Authelia, the OPDS feed requires a password to be set for -# the user directly in Calibre-Web, as eBook reader apps don't support -# form-based logins, only HTTP Basic auth. -location ^~ /calibre-web/opds/ { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app calibre-web; - set $upstream_port 8083; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - proxy_set_header X-Scheme $scheme; - proxy_set_header X-Script-Name /calibre-web; -} - -# Feed for Kobo -location ^~ /calibre-web/kobo/ { - include /config/nginx/resolver.conf; - set $upstream_app calibre-web; - set $upstream_port 8083; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - proxy_set_header X-Scheme $scheme; - proxy_set_header X-Script-Name /calibre-web; - proxy_buffer_size 128k; - proxy_buffers 4 256k; - proxy_busy_buffers_size 256k; -} diff --git a/custom_configs/calibre.subdomain.conf.sample b/custom_configs/calibre.subdomain.conf.sample deleted file mode 100644 index 08a54df44..000000000 --- a/custom_configs/calibre.subdomain.conf.sample +++ /dev/null @@ -1,87 +0,0 @@ -## Version 2025/07/18 -# make sure that your calibre container is named calibre -# make sure that your dns has a cname set for calibre -# for the content server, go into calibre preferences / sharing over the net / advanced and -# set the first option for prefix url to '/content-server', save and restart the container -# the content server will be accessible at 'https://calibre.domain.com/content-server/' - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name calibre.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app calibre; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_buffering off; - } - - location /content-server { - return 301 $scheme://$host/content-server/; - } - - location ^~ /content-server/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app calibre; - set $upstream_port 8081; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/custom_configs/calibre.subfolder.conf.sample b/custom_configs/calibre.subfolder.conf.sample deleted file mode 100644 index f9192b77b..000000000 --- a/custom_configs/calibre.subfolder.conf.sample +++ /dev/null @@ -1,89 +0,0 @@ -## Version 2023/02/05 -# make sure that your calibre container is named calibre -# make sure that calibre is set to work with the base url /calibre/ -# In calibre docker arguments, set an env variable for SUBFOLDER=/calibre/ -# for the content server, go into calibre preferences / sharing over the net / advanced and -# set the first option for prefix url to '/content-server', save and restart the container -# the content server will be accessible at 'https://domain.com/content-server/' - -location /calibre { - return 301 $scheme://$host/calibre/; -} - -location ^~ /calibre/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app calibre; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location /content-server { - return 301 $scheme://$host/content-server/; -} - -location ^~ /content-server/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app calibre; - set $upstream_port 8081; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -# If using subfolders for multiple Linux Desktop containers (full gui apps being rendered over web). -# You will need to modify this path and modify the the client settings in the application. -# Settings > Advanced > Websocket > Path -# IE websockify-calibre -location ^~ /websockify { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app calibre; - set $upstream_port 6901; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_buffering off; -} diff --git a/custom_configs/deluge.subfolder.conf.sample b/custom_configs/deluge.subfolder.conf.sample deleted file mode 100644 index 74aab629d..000000000 --- a/custom_configs/deluge.subfolder.conf.sample +++ /dev/null @@ -1,32 +0,0 @@ -## Version 2023/02/05 -# make sure that your deluge container is named deluge -# deluge does not require a base url setting - -location /deluge { - return 301 $scheme://$host/deluge/; -} - -location ^~ /deluge/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app deluge; - set $upstream_port 8112; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /deluge(.*) $1 break; - proxy_set_header X-Deluge-Base "/deluge/"; -} diff --git a/custom_configs/dozzle.subfolder.conf.sample b/custom_configs/dozzle.subfolder.conf.sample deleted file mode 100644 index b0cd5bd43..000000000 --- a/custom_configs/dozzle.subfolder.conf.sample +++ /dev/null @@ -1,34 +0,0 @@ -## Version 2023/02/05 -# make sure that your dozzle container is named dozzle -# make sure that dozzle is set to work with the base url /dozzle/ -# First either add "--base /dozzle" or "-e DOZZLE_BASE=/dozzle" to your docker run command, and restart the Dozzle container - -location /dozzle { - return 301 $scheme://$host/dozzle/; -} - -location ^~ /dozzle/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app dozzle; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - chunked_transfer_encoding off; - proxy_buffering off; - proxy_cache off; -} diff --git a/custom_configs/emby.subdomain.conf.sample b/custom_configs/emby.subdomain.conf.sample deleted file mode 100644 index 04aab92ea..000000000 --- a/custom_configs/emby.subdomain.conf.sample +++ /dev/null @@ -1,33 +0,0 @@ -## Version 2025/07/18 -# make sure that your emby container is named emby -# make sure that your dns has a cname set for emby -# if emby is running in bridge mode and the container is named "emby", the below config should work as is -# if not, replace the line "set $upstream_app emby;" with "set $upstream_app ;" -# or "set $upstream_app ;" for host mode, HOSTIP being the IP address of emby -# in emby settings, under "Advanced" change the public https port to 443, leave the local ports as is, set the "external domain" to your url, -# and set the "Secure connection mode" to "Handled by reverse proxy" - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name emby.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - location / { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app emby; - set $upstream_port 8096; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_set_header Range $http_range; - proxy_set_header If-Range $http_if_range; - } -} diff --git a/custom_configs/emby.subfolder.conf.sample b/custom_configs/emby.subfolder.conf.sample deleted file mode 100644 index b2295c74a..000000000 --- a/custom_configs/emby.subfolder.conf.sample +++ /dev/null @@ -1,34 +0,0 @@ -## Version 2023/02/05 -# make sure that your emby container is named emby -# emby does not require a base url setting -# if emby is running in bridge mode and the container is named "emby", the below config should work as is -# if not, replace the line "set $upstream_app emby;" with "set $upstream_app ;" -# or "set $upstream_app ;" for host mode, HOSTIP being the IP address of emby -# in emby settings, under "Advanced" change the public https port to 443, leave the local ports as is, set the "external domain" to your url and subdomain, -# and set the "Secure connection mode" to "Handled by reverse proxy" - -location /emby { - return 301 $scheme://$host/emby/; -} - -location ^~ /emby/ { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app emby; - set $upstream_port 8096; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_set_header Range $http_range; - proxy_set_header If-Range $http_if_range; -} - -location ^~ /embywebsocket { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app emby; - set $upstream_port 8096; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/custom_configs/emulatorjs.subdomain.conf.sample b/custom_configs/emulatorjs.subdomain.conf.sample deleted file mode 100644 index 4a1da2415..000000000 --- a/custom_configs/emulatorjs.subdomain.conf.sample +++ /dev/null @@ -1,85 +0,0 @@ -## Version 2025/07/18 -# make sure that your emulatorjs container is named emulatorjs -# make sure that your dns has a cname set for emulatorjs -# In emulatorjs docker arguments, set an env variable for SUBFOLDER=/backend/ -# The backend interface will be accessible at https://emulatorjs.yourdomain.com/backend/ -# Don't forget to enable auth at least for the /backend/ location - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name emulatorjs.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app emulatorjs; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } - - location /backend { - return 301 $scheme://$host/backend/; - } - - location ^~ /backend/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app emulatorjs; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/custom_configs/filebrowser.subdomain.conf.sample b/custom_configs/filebrowser.subdomain.conf.sample deleted file mode 100644 index dcbc4ffb9..000000000 --- a/custom_configs/filebrowser.subdomain.conf.sample +++ /dev/null @@ -1,80 +0,0 @@ -## Version 2025/07/18 -# make sure that your filebrowser container is named filebrowser -# make sure that your dns has a cname set for filebrowser - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name filebrowser.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app filebrowser; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } - - location ~ (/filebrowser)?/api/public { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app filebrowser; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } - - location ~ (/filebrowser)?/share { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app filebrowser; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } - - location ~ (/filebrowser)?/static { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app filebrowser; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/custom_configs/filebrowser.subfolder.conf.sample b/custom_configs/filebrowser.subfolder.conf.sample deleted file mode 100644 index 8c7ceaf5d..000000000 --- a/custom_configs/filebrowser.subfolder.conf.sample +++ /dev/null @@ -1,61 +0,0 @@ -## Version 2023/02/05 -# make sure that your filebrowser container is named filebrowser -# make sure that filebrowser is set to work with the base url /filebrowser/ -# set this environment variable on your filebrowser container FB_BASEURL=/filebrowser - -location /filebrowser { - return 301 $scheme://$host/filebrowser/; -} - -location ^~ /filebrowser/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app filebrowser; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /filebrowser/api/public { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app filebrowser; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /filebrowser/share { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app filebrowser; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /filebrowser/static { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app filebrowser; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/custom_configs/flexget.subfolder.conf.sample b/custom_configs/flexget.subfolder.conf.sample deleted file mode 100644 index 12f156613..000000000 --- a/custom_configs/flexget.subfolder.conf.sample +++ /dev/null @@ -1,39 +0,0 @@ -## Version 2023/02/12 -# make sure that your flexget container is named flexget -# make sure that flexget is set to work with the base url /flexget/ -# make sure to set 'base_url: /flexget' under your flexget's config.yml web_server block - -location /flexget { - return 301 $scheme://$host/flexget/; -} - -location ^~ /flexget/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app flexget; - set $upstream_port 5050; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; -} - -location ^~ /flexget/api/ { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app flexget; - set $upstream_port 5050; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; -} diff --git a/custom_configs/freshrss.subfolder.conf.sample b/custom_configs/freshrss.subfolder.conf.sample deleted file mode 100644 index 208d400a2..000000000 --- a/custom_configs/freshrss.subfolder.conf.sample +++ /dev/null @@ -1,36 +0,0 @@ -## Version 2023/02/05 -# make sure that your freshrss container is named freshrss -# freshrss does not require a base url setting - -location /freshrss { - return 301 $scheme://$host/freshrss/; -} - -location ^~ /freshrss/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app freshrss; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /freshrss(.*) $1 break; - proxy_buffering off; - proxy_set_header X-Forwarded-Port $server_port; - proxy_cookie_path / "/; HTTPOnly; Secure"; - proxy_set_header Authorization $http_authorization; - proxy_pass_header Authorization; -} diff --git a/custom_configs/gaps.subfolder.conf.sample b/custom_configs/gaps.subfolder.conf.sample deleted file mode 100644 index 9f99ff760..000000000 --- a/custom_configs/gaps.subfolder.conf.sample +++ /dev/null @@ -1,33 +0,0 @@ -## Version 2023/02/05 -# make sure that your gaps container is named gaps -# make sure that gaps is set to work with the base url /gaps/ -# In your Docker compose (or docker run) add: BASE_URL: /gaps - -location /gaps { - return 301 $scheme://$host/gaps/; -} - -location ^~ /gaps/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app gaps; - set $upstream_port 8484; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # Uncomment to allow loading in an iframe (i.e. Organizr) - # proxy_hide_header X-Frame-Options; -} diff --git a/custom_configs/gitea.subdomain.conf.sample b/custom_configs/gitea.subdomain.conf.sample deleted file mode 100644 index 7c1024f34..000000000 --- a/custom_configs/gitea.subdomain.conf.sample +++ /dev/null @@ -1,69 +0,0 @@ -## Version 2025/07/18 -# make sure that your gitea container is named gitea -# make sure that your dns has a cname set for gitea -# edit the following parameters in /data/gitea/conf/app.ini -# [server] -# SSH_DOMAIN = gitea.server.com -# ROOT_URL = https://gitea.server.com/ -# DOMAIN = gitea.server.com - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name gitea.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app gitea; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/gitea)?/(api|info/lfs) { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app gitea; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/grafana.subfolder.conf.sample b/custom_configs/grafana.subfolder.conf.sample deleted file mode 100644 index f460c48ba..000000000 --- a/custom_configs/grafana.subfolder.conf.sample +++ /dev/null @@ -1,50 +0,0 @@ -## Version 2023/04/20 -# make sure that your grafana container is named grafana -# make sure that grafana is set to work with the base url /grafana/ -# grafana requires environment variables set thus: -# environment: -# - "GF_SERVER_ROOT_URL=https://my.domain.com/grafana" -# - "GF_SERVER_DOMAIN=https://my.domain.com/" - -location ^~ /grafana/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app grafana; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # Clear Authorization Header if you are using http auth and normal Grafana auth - #proxy_set_header Authorization ""; - - rewrite ^/grafana/(.*)$ /$1 break; - -} - -location ^~ /grafana/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app grafana; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # Clear Authorization Header if you are using http auth and normal Grafana auth - #proxy_set_header Authorization ""; - - rewrite ^/grafana/(.*)$ /$1 break; - -} diff --git a/custom_configs/homeassistant.subdomain.conf.sample b/custom_configs/homeassistant.subdomain.conf.sample deleted file mode 100644 index b7e5a2b14..000000000 --- a/custom_configs/homeassistant.subdomain.conf.sample +++ /dev/null @@ -1,72 +0,0 @@ -## Version 2025/07/18 -# make sure that your homeassistant container is named homeassistant -# make sure that your dns has a cname set for homeassistant - -# As of homeassistant 2021.7.0, it is now required to define the network range your proxy resides in, this is done in Homeassitants configuration.yaml -# https://www.home-assistant.io/integrations/http/#trusted_proxies -# Example below uses the default dockernetwork ranges, you may need to update this if you dont use defaults. -# -# http: -# use_x_forwarded_for: true -# trusted_proxies: -# - 172.16.0.0/12 - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name homeassistant.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app homeassistant; - set $upstream_port 8123; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ ^/(api|local|media)/ { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app homeassistant; - set $upstream_port 8123; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/custom_configs/jackett.subdomain.conf.sample b/custom_configs/jackett.subdomain.conf.sample deleted file mode 100644 index c7612225a..000000000 --- a/custom_configs/jackett.subdomain.conf.sample +++ /dev/null @@ -1,74 +0,0 @@ -## Version 2025/07/18 -# make sure that your jackett container is named jackett -# make sure that your dns has a cname set for jackett - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name jackett.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app jackett; - set $upstream_port 9117; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/jackett)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app jackett; - set $upstream_port 9117; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/jackett)?/dl { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app jackett; - set $upstream_port 9117; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/jackett.subfolder.conf.sample b/custom_configs/jackett.subfolder.conf.sample deleted file mode 100644 index 030b96cd7..000000000 --- a/custom_configs/jackett.subfolder.conf.sample +++ /dev/null @@ -1,46 +0,0 @@ -## Version 2023/02/05 -# make sure that your jackett container is named jackett -# make sure that jackett is set to work with the base url /jackett/ - -location ^~ /jackett { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app jackett; - set $upstream_port 9117; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /jackett/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app jackett; - set $upstream_port 9117; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /jackett/dl { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app jackett; - set $upstream_port 9117; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/custom_configs/jdownloader.subdomain.conf.sample b/custom_configs/jdownloader.subdomain.conf.sample deleted file mode 100644 index 72cd4e010..000000000 --- a/custom_configs/jdownloader.subdomain.conf.sample +++ /dev/null @@ -1,62 +0,0 @@ -## Version 2025/08/07 -# make sure that your jdownloader container is named jdownloader -# make sure that your dns has a cname set for jdownloader - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name jdownloader.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app jdownloader; - set $upstream_port 5800; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } - - location ~ (/jdownloader)?/websockify { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app jdownloader; - set $upstream_port 5800; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port/websockify; - } -} diff --git a/custom_configs/jenkins.subfolder.conf.sample b/custom_configs/jenkins.subfolder.conf.sample deleted file mode 100644 index ac6e7e24d..000000000 --- a/custom_configs/jenkins.subfolder.conf.sample +++ /dev/null @@ -1,39 +0,0 @@ -## Version 2023/02/05 -# make sure that your jenkins container is named jenkins -# make sure that jenkins is set to work with the base url /jenkins/ -# First either add '--prefix=/jenkins' or '-e JENKINS_OPTS="--prefix=/jenkins"' to your docker run command, and restart the Jenkins container. -# Also be sure to add '/jenkins/' to your URL under: Jenkins > Configuration > Manage Jenkins > Jenkins URL - -location /jenkins { - return 301 $scheme://$host/jenkins/; -} - -location ^~ /jenkins/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app jenkins; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # This is the maximum upload size - client_max_body_size 10m; - sendfile off; - proxy_max_temp_file_size 0; - proxy_temp_file_write_size 64k; - proxy_request_buffering off; - proxy_buffering off; -} diff --git a/custom_configs/jfa-go.subfolder.conf.sample b/custom_configs/jfa-go.subfolder.conf.sample deleted file mode 100644 index 0709ebc61..000000000 --- a/custom_configs/jfa-go.subfolder.conf.sample +++ /dev/null @@ -1,33 +0,0 @@ -## Version 2023/02/05 -# make sure that your jfa-go container is named jfa-go -# make sure to set the URL base (“Reverse Proxy subfolder”) in jfa-go > Settings > General (ui > url_base in jfa-go config.ini) to "/jfa-go/" - -location /jfa-go { - return 301 $scheme://$host/jfa-go/; -} - -location ^~ /jfa-go/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app jfa-go; - set $upstream_port 8056; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - # Remove the CSP header set for Jellyfin - proxy_hide_header Content-Security-Policy; - add_header Content-Security-Policy ""; -} diff --git a/custom_configs/mailu.subfolder.conf.sample b/custom_configs/mailu.subfolder.conf.sample deleted file mode 100644 index 5a4cfef38..000000000 --- a/custom_configs/mailu.subfolder.conf.sample +++ /dev/null @@ -1,60 +0,0 @@ -## Version 2023/02/05 -# make sure that your mailu container is named mailu -# mailu does not require a base url setting - -# This config have been tested with "TLS_FLAVOR=mail" -# To avoid errors you must change in docker-compose ports: 80 and 443, more info: https://mailu.io/1.7/reverse.html - -location /admin { - return 301 $scheme://$host/admin/; -} - -location ^~ /admin/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app front; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location /webmail { - return 301 $scheme://$host/webmail/; -} - -location ^~ /webmail/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app front; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/custom_configs/metabase.subdomain.conf.sample b/custom_configs/metabase.subdomain.conf.sample deleted file mode 100644 index 445bc70ea..000000000 --- a/custom_configs/metabase.subdomain.conf.sample +++ /dev/null @@ -1,62 +0,0 @@ -## Version 2025/07/18 -# make sure that your metabase container is named metabase -# make sure that your dns has a cname set for metabase - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name metabase.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app metabase; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } - - location ~ ^/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app metabase; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/custom_configs/monica.subfolder.conf.sample b/custom_configs/monica.subfolder.conf.sample deleted file mode 100644 index 2e7c84dc2..000000000 --- a/custom_configs/monica.subfolder.conf.sample +++ /dev/null @@ -1,31 +0,0 @@ -## Version 2023/02/05 -# make sure that your monica container is named monica -# make sure that monica is set to work with the base url /monica/ -# Set the monica Docker container's APP_URL to a fully-qualified domain that ends with /monica/ and restart the container. -# Example: https://yourhost.cc/monica/ - -location /monica { - return 301 $scheme://$host/monica/; -} - -location ^~ /monica/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app monica; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; -} diff --git a/custom_configs/mytinytodo.subfolder.conf.sample b/custom_configs/mytinytodo.subfolder.conf.sample deleted file mode 100644 index 6a09929ed..000000000 --- a/custom_configs/mytinytodo.subfolder.conf.sample +++ /dev/null @@ -1,31 +0,0 @@ -## Version 2023/02/05 -# make sure that your mytinytodo container is named mytinytodo -# make sure that mytinytodo is set to work with the base url /todo/ -# works with https://github.com/breakall/mytinytodo-docker -# set the mtt_url to 'https://your.domain.com/todo/' in db/config.php - -location /todo { - return 301 $scheme://$host/todo/; -} - -location ^~ /todo/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app mytinytodo; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port/; -} diff --git a/custom_configs/nextcloud.subfolder.conf.sample b/custom_configs/nextcloud.subfolder.conf.sample deleted file mode 100644 index f206d06fa..000000000 --- a/custom_configs/nextcloud.subfolder.conf.sample +++ /dev/null @@ -1,51 +0,0 @@ -## Version 2024/04/25 -# make sure that your nextcloud container is named nextcloud -# make sure that nextcloud is set to work with the base url /nextcloud/ -# Assuming this container is called "swag", edit your nextcloud container's config -# located at /config/www/nextcloud/config/config.php and add the following lines before the ");": -# 'trusted_proxies' => [gethostbyname('swag')], -# 'overwritewebroot' => '/nextcloud', -# 'overwrite.cli.url' => 'https://example.com/nextcloud', -# -# Also don't forget to add your domain name to the trusted domains array. It should look somewhat like this: -# array ( -# 0 => '192.168.0.1:444', # This line may look different on your setup, don't modify it. -# 1 => 'example.com', -# ), - -location ^~ /.well-known { - # The rules in this block are an adaptation of the rules - # in the Nextcloud `.htaccess` that concern `/.well-known`. - - location = /.well-known/carddav { return 301 /nextcloud/remote.php/dav/; } - location = /.well-known/caldav { return 301 /nextcloud/remote.php/dav/; } - - # Let Nextcloud's API for `/.well-known` URIs handle all other - # requests by passing them to the front-end controller. - return 301 /nextcloud/index.php$request_uri; -} - -location ^~ /nextcloud/ { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nextcloud; - set $upstream_port 443; - set $upstream_proto https; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /nextcloud(.*) $1 break; - - proxy_set_header Range $http_range; - proxy_set_header If-Range $http_if_range; - proxy_ssl_session_reuse off; - - # Hide proxy response headers from Nextcloud that conflict with ssl.conf - # Uncomment the Optional additional headers in SWAG's ssl.conf to pass Nextcloud's security scan - proxy_hide_header Referrer-Policy; - proxy_hide_header X-Content-Type-Options; - proxy_hide_header X-Frame-Options; - proxy_hide_header X-XSS-Protection; - - # Disable proxy buffering - proxy_buffering off; -} diff --git a/custom_configs/nzbget.subdomain.conf.sample b/custom_configs/nzbget.subdomain.conf.sample deleted file mode 100644 index 02fcc4f83..000000000 --- a/custom_configs/nzbget.subdomain.conf.sample +++ /dev/null @@ -1,84 +0,0 @@ -## Version 2025/07/18 -# make sure that your nzbget container is named nzbget -# make sure that your dns has a cname set for nzbget - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name nzbget.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbget; - set $upstream_port 6789; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/nzbget)?(/[^\/:]*:[^\/:]*)?/jsonrpc { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbget; - set $upstream_port 6789; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/nzbget)?(/[^\/:]*:[^\/]*)?/jsonprpc { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbget; - set $upstream_port 6789; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/nzbget)?(/[^\/:]*:[^\/]*)?/xmlrpc { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbget; - set $upstream_port 6789; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/nzbget.subfolder.conf.sample b/custom_configs/nzbget.subfolder.conf.sample deleted file mode 100644 index 2daf48887..000000000 --- a/custom_configs/nzbget.subfolder.conf.sample +++ /dev/null @@ -1,57 +0,0 @@ -## Version 2023/02/05 -# make sure that your nzbget container is named nzbget -# make sure that nzbget is set to work with the base url /nzbget/ -# nzbget does not require a base url setting - -location /nzbget { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbget; - set $upstream_port 6789; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ~ /nzbget(/[^\/:]*:[^\/]*)?/jsonrpc { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbget; - set $upstream_port 6789; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ~ /nzbget(/[^\/:]*:[^\/]*)?/jsonprpc { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbget; - set $upstream_port 6789; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ~ /nzbget(/[^\/:]*:[^\/]*)?/xmlrpc { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbget; - set $upstream_port 6789; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/custom_configs/nzbhydra.subdomain.conf.sample b/custom_configs/nzbhydra.subdomain.conf.sample deleted file mode 100644 index 753f92c7b..000000000 --- a/custom_configs/nzbhydra.subdomain.conf.sample +++ /dev/null @@ -1,104 +0,0 @@ -## Version 2025/07/18 -# make sure that your nzbhydra container is named nzbhydra2 -# make sure that your dns has a cname set for nzbhydra - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name nzbhydra.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbhydra2; - set $upstream_port 5076; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/nzbhydra)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbhydra2; - set $upstream_port 5076; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/nzbhydra)?/getnzb { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbhydra2; - set $upstream_port 5076; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/nzbhydra)?/gettorrent { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbhydra2; - set $upstream_port 5076; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/nzbhydra)?/rss { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbhydra2; - set $upstream_port 5076; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/nzbhydra)?/torznab/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbhydra2; - set $upstream_port 5076; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/nzbhydra.subfolder.conf.sample b/custom_configs/nzbhydra.subfolder.conf.sample deleted file mode 100644 index 22a721dde..000000000 --- a/custom_configs/nzbhydra.subfolder.conf.sample +++ /dev/null @@ -1,77 +0,0 @@ -## Version 2023/02/05 -# make sure that your nzbhydra container is named nzbhydra2 -# make sure that nzbhydra is set to work with the base url /nzbhydra/ -# first go into nzbhydra settings, set the URL Base to /nzbhydra, then disable CSRF protection on the same page and restart the nzbhydra container - -location ^~ /nzbhydra { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbhydra2; - set $upstream_port 5076; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /nzbhydra/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbhydra2; - set $upstream_port 5076; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /nzbhydra/getnzb { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbhydra2; - set $upstream_port 5076; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /nzbhydra/gettorrent { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbhydra2; - set $upstream_port 5076; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /nzbhydra/rss { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbhydra2; - set $upstream_port 5076; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /nzbhydra/torznab/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app nzbhydra2; - set $upstream_port 5076; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/custom_configs/ombi.subdomain.conf.sample b/custom_configs/ombi.subdomain.conf.sample deleted file mode 100644 index e1663649f..000000000 --- a/custom_configs/ombi.subdomain.conf.sample +++ /dev/null @@ -1,80 +0,0 @@ -## Version 2025/07/18 -# make sure that your ombi container is named ombi -# make sure that your dns has a cname set for ombi - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name ombi.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ombi; - set $upstream_port 3579; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - # This allows access to the actual api - location ~ (/ombi)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ombi; - set $upstream_port 3579; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - # This allows access to the documentation for the api - location ~ (/ombi)?/swagger { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ombi; - set $upstream_port 3579; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - if ($http_referer ~* /ombi) { - rewrite ^/swagger/(.*) /ombi/swagger/$1? redirect; - } -} diff --git a/custom_configs/ombi.subfolder.conf.sample b/custom_configs/ombi.subfolder.conf.sample deleted file mode 100644 index a72188a87..000000000 --- a/custom_configs/ombi.subfolder.conf.sample +++ /dev/null @@ -1,61 +0,0 @@ -## Version 2023/02/05 -# make sure that your ombi container is named ombi -# make sure that ombi is set to work with the base url /ombi/ -# first go into ombi settings, under the menu "Ombi" set the base url to /ombi and restart the ombi container - -location /ombi { - return 301 $scheme://$host/ombi/; -} - -location ^~ /ombi/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ombi; - set $upstream_port 3579; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -# This allows access to the actual api -location ^~ /ombi/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ombi; - set $upstream_port 3579; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -if ($http_referer ~* /ombi) { - rewrite ^/api/(.*) /ombi/api/$1? redirect; -} - -# This allows access to the documentation for the api -location ^~ /ombi/swagger { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ombi; - set $upstream_port 3579; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -if ($http_referer ~* /ombi) { - rewrite ^/swagger/(.*) /ombi/swagger/$1? redirect; -} diff --git a/custom_configs/organizr-auth.subfolder.conf.sample b/custom_configs/organizr-auth.subfolder.conf.sample deleted file mode 100644 index cb55d384f..000000000 --- a/custom_configs/organizr-auth.subfolder.conf.sample +++ /dev/null @@ -1,41 +0,0 @@ -## Version 2023/02/05 -# make sure that your organizr container is named organizr -# To use config this with subfolder proxies: -# Rename this file to organizr-auth.subfolder.conf -# Add one of the auth_request lines from the comments below -# ex: -# auth_request /auth-0; -# -# To use config this with subdomain proxies: -# Rename this file to organizr-auth.subfolder.conf (the subfolder file name is still used) -# Add the following line in your other subdomain proxy configs -# include /config/nginx/proxy-confs/organizr-auth.subfolder.conf; -# Add one of the auth_request lines from the comments below -# ex: -# include /config/nginx/proxy-confs/organizr-auth.subfolder.conf; -# auth_request /auth-0; - -location ~ /auth-([0-9]+) { - internal; - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_auth_app organizr; - set $upstream_auth_port 80; - set $upstream_auth_proto http; - proxy_pass $upstream_auth_proto://$upstream_auth_app:$upstream_auth_port/api/v2/auth?group=$1; - - proxy_set_header Content-Length ""; - - # Do not uncomment the lines below, these are examples for use in other proxy configs - #auth_request /auth-0; #=Admin - #auth_request /auth-1; #=Co-Admin - #auth_request /auth-2; #=Super User - #auth_request /auth-3; #=Power User - #auth_request /auth-4; #=User - #auth_request /auth-998; #=Logged In - #auth_request /auth-999; #=Guest -} - -# Optional redirect server authentication errors to organizr authentication page -# NOTE: $host must be modified to your public URL when using subdomain proxies -#error_page 401 $scheme://$host/?error=$status&return=$scheme://$http_host$request_uri; diff --git a/custom_configs/organizr.subdomain.conf.sample b/custom_configs/organizr.subdomain.conf.sample deleted file mode 100644 index 08509dd0b..000000000 --- a/custom_configs/organizr.subdomain.conf.sample +++ /dev/null @@ -1,58 +0,0 @@ -## Version 2025/07/18 -# make sure that your organizr container is named organizr -# make sure that your dns has a cname set for organizr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name organizr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app organizr; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - # Optional redirect server errors to organizr error pages - #error_page 400 402 403 404 405 408 500 502 503 504 $scheme://$host/?error=$status; - -} diff --git a/custom_configs/organizr.subfolder.conf.sample b/custom_configs/organizr.subfolder.conf.sample deleted file mode 100644 index aed65c33d..000000000 --- a/custom_configs/organizr.subfolder.conf.sample +++ /dev/null @@ -1,29 +0,0 @@ -## Version 2023/02/05 -# make sure that your organizr container is named organizr -# In order to use this location block you need to edit the default file one folder up and comment out the / and ~ \.php$ locations - -location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app organizr; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -# Optional redirect server errors to organizr error pages -#error_page 400 402 403 404 405 408 500 502 503 504 $scheme://$host/?error=$status; diff --git a/custom_configs/pihole.subdomain.conf.sample b/custom_configs/pihole.subdomain.conf.sample deleted file mode 100644 index 342f3c73b..000000000 --- a/custom_configs/pihole.subdomain.conf.sample +++ /dev/null @@ -1,82 +0,0 @@ -## Version 2025/07/18 -# make sure that your pihole container is named pihole -# make sure that your dns has a cname set for pihole - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name pihole.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app pihole; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_hide_header X-Frame-Options; - } - - location /admin { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app pihole; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_hide_header X-Frame-Options; - } -} diff --git a/custom_configs/pihole.subfolder.conf.sample b/custom_configs/pihole.subfolder.conf.sample deleted file mode 100644 index dbc330e0b..000000000 --- a/custom_configs/pihole.subfolder.conf.sample +++ /dev/null @@ -1,61 +0,0 @@ -## Version 2023/02/05 -# make sure that your pihole container is named pihole -# pihole does not require a base url setting - -location /pihole { - return 301 $scheme://$host/pihole/; -} - -location ^~ /pihole/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app pihole; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /pihole(.*) $1 break; - proxy_hide_header X-Frame-Options; -} - -location /pihole/admin { - return 301 $scheme://$host/pihole/admin/; -} - -location ^~ /pihole/admin/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app pihole; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /pihole(.*) $1 break; - proxy_hide_header X-Frame-Options; -} diff --git a/custom_configs/plex.subdomain.conf.sample b/custom_configs/plex.subdomain.conf.sample deleted file mode 100644 index 78a94af07..000000000 --- a/custom_configs/plex.subdomain.conf.sample +++ /dev/null @@ -1,80 +0,0 @@ -## Version 2025/07/18 -# make sure that your plex container is named plex -# make sure that your dns has a cname set for plex -# if plex is running in bridge mode and the container is named "plex", the below config should work as is -# if not, replace the line "set $upstream_app plex;" with "set $upstream_app ;" -# or "set $upstream_app ;" for host mode, HOSTIP being the IP address of plex -# in plex server settings, under network, fill in "Custom server access URLs" with your domain (ie. "https://plex.yourdomain.url:443") - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name plex.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - proxy_redirect off; - proxy_buffering off; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app plex; - set $upstream_port 32400; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_set_header X-Plex-Client-Identifier $http_x_plex_client_identifier; - proxy_set_header X-Plex-Device $http_x_plex_device; - proxy_set_header X-Plex-Device-Name $http_x_plex_device_name; - proxy_set_header X-Plex-Platform $http_x_plex_platform; - proxy_set_header X-Plex-Platform-Version $http_x_plex_platform_version; - proxy_set_header X-Plex-Product $http_x_plex_product; - proxy_set_header X-Plex-Token $http_x_plex_token; - proxy_set_header X-Plex-Version $http_x_plex_version; - proxy_set_header X-Plex-Nocache $http_x_plex_nocache; - proxy_set_header X-Plex-Provides $http_x_plex_provides; - proxy_set_header X-Plex-Device-Vendor $http_x_plex_device_vendor; - proxy_set_header X-Plex-Model $http_x_plex_model; - } - - location /library/streams/ { - set $upstream_app plex; - set $upstream_port 32400; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - proxy_pass_request_headers off; - } -} diff --git a/custom_configs/plex.subfolder.conf.sample b/custom_configs/plex.subfolder.conf.sample deleted file mode 100644 index d1e2ef182..000000000 --- a/custom_configs/plex.subfolder.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2023/02/05 -#******** This config no longer works as intended. The web app loads, but no direct connection to server is made. ********* -#******** PRs welcome for anyone who figures out how to fix it. Use the subdomain config in the meantime. ******* - -# make sure that your plex container is named plex -# if plex is running in bridge mode and the container is named "plex", the below config should work as is -# if not, replace the line "set $upstream_app plex;" with "set $upstream_app ;" -# or "set $upstream_app ;" for host mode, HOSTIP being the IP address of plex -# in plex server settings, under network, fill in "Custom server access URLs" with your domain (ie. "https://yourdomain.url:443/plex") - -location /plex { - return 301 $scheme://$host/plex/; -} - -location ^~ /plex/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app plex; - set $upstream_port 32400; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /plex(.*) $1 break; - - proxy_set_header X-Plex-Client-Identifier $http_x_plex_client_identifier; - proxy_set_header X-Plex-Device $http_x_plex_device; - proxy_set_header X-Plex-Device-Name $http_x_plex_device_name; - proxy_set_header X-Plex-Platform $http_x_plex_platform; - proxy_set_header X-Plex-Platform-Version $http_x_plex_platform_version; - proxy_set_header X-Plex-Product $http_x_plex_product; - proxy_set_header X-Plex-Token $http_x_plex_token; - proxy_set_header X-Plex-Version $http_x_plex_version; - proxy_set_header X-Plex-Nocache $http_x_plex_nocache; - proxy_set_header X-Plex-Provides $http_x_plex_provides; - proxy_set_header X-Plex-Device-Vendor $http_x_plex_device_vendor; - proxy_set_header X-Plex-Model $http_x_plex_model; -} - -if ($http_referer ~* /plex) { - rewrite ^/web/(.*) /plex/web/$1? redirect; -} diff --git a/custom_configs/plexwebtools.subdomain.conf.sample b/custom_configs/plexwebtools.subdomain.conf.sample deleted file mode 100644 index 92904b0fb..000000000 --- a/custom_configs/plexwebtools.subdomain.conf.sample +++ /dev/null @@ -1,54 +0,0 @@ -## Version 2025/07/18 -# make sure that your plex container is named plex -# make sure that your dns has a cname set for plexwebtools - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name plexwebtools.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app plex; - set $upstream_port 33400; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/plexwebtools.subfolder.conf.sample b/custom_configs/plexwebtools.subfolder.conf.sample deleted file mode 100644 index 617520909..000000000 --- a/custom_configs/plexwebtools.subfolder.conf.sample +++ /dev/null @@ -1,30 +0,0 @@ -## Version 2023/02/05 -# make sure that your plex container is named plex -# make sure that plexwebtools is set to work with the base url /plexwebtools/ - -location /plexwebtools { - return 301 $scheme://$host/plexwebtools/; -} - -location ^~ /plexwebtools/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app plex; - set $upstream_port 33400; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/custom_configs/portainer.subdomain.conf.sample b/custom_configs/portainer.subdomain.conf.sample deleted file mode 100644 index 41191445c..000000000 --- a/custom_configs/portainer.subdomain.conf.sample +++ /dev/null @@ -1,66 +0,0 @@ -## Version 2025/07/18 -# make sure that your portainer container is named portainer -# make sure that your dns has a cname set for portainer - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name portainer.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app portainer; - set $upstream_port 9000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_hide_header X-Frame-Options; # Possibly not needed after Portainer 1.20.0 - } - - location ~ (/portainer)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app portainer; - set $upstream_port 9000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_hide_header X-Frame-Options; # Possibly not needed after Portainer 1.20.0 - } -} diff --git a/custom_configs/portainer.subfolder.conf.sample b/custom_configs/portainer.subfolder.conf.sample deleted file mode 100644 index bf0f2e6f7..000000000 --- a/custom_configs/portainer.subfolder.conf.sample +++ /dev/null @@ -1,44 +0,0 @@ -## Version 2023/02/12 -# make sure that your portainer container is named portainer -# portainer does not require a base url setting - -location /portainer { - return 301 $scheme://$host/portainer/; -} - -location ^~ /portainer/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app portainer; - set $upstream_port 9000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /portainer(.*) $1 break; - proxy_hide_header X-Frame-Options; # Possibly not needed after Portainer 1.20.0 -} - -location ^~ /portainer/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app portainer; - set $upstream_port 9000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /portainer(.*) $1 break; - proxy_hide_header X-Frame-Options; # Possibly not needed after Portainer 1.20.0 -} diff --git a/custom_configs/prometheus.subdomain.conf.sample b/custom_configs/prometheus.subdomain.conf.sample deleted file mode 100644 index 1b2ab86e7..000000000 --- a/custom_configs/prometheus.subdomain.conf.sample +++ /dev/null @@ -1,78 +0,0 @@ -## Version 2025/07/18 -# make sure that your prometheus container is named prometheus -# make sure that your dns has a cname set for prometheus - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name prometheus.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app prometheus; - set $upstream_port 9090; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/prometheus)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app prometheus; - set $upstream_port 9090; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/prometheus)?/-/(healthy|ready|reload|quit) { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app prometheus; - set $upstream_port 9090; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/prowlarr.subdomain.conf.sample b/custom_configs/prowlarr.subdomain.conf.sample deleted file mode 100644 index 681d76f20..000000000 --- a/custom_configs/prowlarr.subdomain.conf.sample +++ /dev/null @@ -1,72 +0,0 @@ -## Version 2025/07/18 -# make sure that your prowlarr container is named prowlarr -# make sure that your dns has a cname set for prowlarr - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name prowlarr.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app prowlarr; - set $upstream_port 9696; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } - - location ~ (/prowlarr)?(/[0-9]+)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app prowlarr; - set $upstream_port 9696; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } - - location ~ (/prowlarr)?(/[0-9]+)?/download { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app prowlarr; - set $upstream_port 9696; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/prowlarr.subfolder.conf.sample b/custom_configs/prowlarr.subfolder.conf.sample deleted file mode 100644 index cb373490b..000000000 --- a/custom_configs/prowlarr.subfolder.conf.sample +++ /dev/null @@ -1,46 +0,0 @@ -## Version 2023/09/13 -# make sure that your prowlarr container is named prowlarr -# make sure that prowlarr is set to work with the base url /prowlarr/ - -location /prowlarr { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app prowlarr; - set $upstream_port 9696; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ~ /prowlarr(/[0-9]+)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app prowlarr; - set $upstream_port 9696; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ~ /prowlarr(/[0-9]+)?/download { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app prowlarr; - set $upstream_port 9696; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/custom_configs/pterodactylnode.subdomain.conf.sample b/custom_configs/pterodactylnode.subdomain.conf.sample deleted file mode 100644 index 85bf09bf2..000000000 --- a/custom_configs/pterodactylnode.subdomain.conf.sample +++ /dev/null @@ -1,67 +0,0 @@ -## Version 2025/07/18 -# this is for nodes, not your actual panel -# make sure you set your node to use 443 as its API port -# make sure that your pterodactylnode container is named pterodactylnode -# make sure that your dns has a cname set for pterodactylnode - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name pterodactylnode.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app pterodactylnode; - set $upstream_port 443; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/pterodactylnode)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app pterodactylnode; - set $upstream_port 443; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/rclone.subfolder.conf.sample b/custom_configs/rclone.subfolder.conf.sample deleted file mode 100644 index ce1bacc9f..000000000 --- a/custom_configs/rclone.subfolder.conf.sample +++ /dev/null @@ -1,42 +0,0 @@ -## Version 2023/02/05 -# make sure that your rclone container is named rclone -# rclone does not require a base url setting - -location /rclone { - return 301 $scheme://$host/rclone/; -} - -location ^~ /rclone/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app rclone; - set $upstream_port 5800; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /rclone(.*) $1 break; -} - -location ^~ /rclone/websockify { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app rclone; - set $upstream_port 5800; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port/websockify/; - - rewrite /rclone(.*) $1 break; -} diff --git a/custom_configs/rutorrent.subfolder.conf.sample b/custom_configs/rutorrent.subfolder.conf.sample deleted file mode 100644 index bd45a7ae8..000000000 --- a/custom_configs/rutorrent.subfolder.conf.sample +++ /dev/null @@ -1,59 +0,0 @@ -## Version 2023/02/05 -# make sure that your rutorrent container is named rutorrent -# rutorrent does not require a base url setting - -location /rutorrent { - return 301 $scheme://$host/rutorrent/; -} - -location ^~ /rutorrent/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app rutorrent; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /rutorrent(.*) $1 break; -} - -location ^~ /rutorrent/RPC2 { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # block rpc access by default because it is unprotected - # you can comment out the next line to enable remote rpc calls - deny all; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app rutorrent; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /rutorrent(.*) $1 break; -} diff --git a/custom_configs/sonarrtorss.subdomain.conf.sample b/custom_configs/sonarrtorss.subdomain.conf.sample deleted file mode 100644 index 42a58d353..000000000 --- a/custom_configs/sonarrtorss.subdomain.conf.sample +++ /dev/null @@ -1,62 +0,0 @@ -## Version 2025/07/18 -# make sure that your sonarrtorss container is named sonarrtorss -# make sure that your dns has a cname set for sonarrtorss - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name sonarrtorss.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app sonarrtorss; - set $upstream_port 18989; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } - - location ~ ^/(api/|sonarr$|rss$|atom$|json$) { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app sonarrtorss; - set $upstream_port 18989; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - } -} diff --git a/custom_configs/sonarrtorss.subfolder.conf.sample b/custom_configs/sonarrtorss.subfolder.conf.sample deleted file mode 100644 index 8b5c37a8e..000000000 --- a/custom_configs/sonarrtorss.subfolder.conf.sample +++ /dev/null @@ -1,38 +0,0 @@ -## Version 2024/06/21 -# make sure that your sonarrtorss container is named sonarrtorss -# sonarrtorss does not require a base url setting - -location ^~ /sonarrtorss { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app sonarrtorss; - set $upstream_port 18989; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /sonarrtorss(.*) $1 break; -} - -location ~ ^/sonarrtorss/(api/|sonarr$|rss$|atom$|json$) { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app sonarrtorss; - set $upstream_port 18989; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /sonarrtorss(.*) $1 break; -} diff --git a/custom_configs/synclounge.subdomain.conf.sample b/custom_configs/synclounge.subdomain.conf.sample deleted file mode 100644 index b652279fc..000000000 --- a/custom_configs/synclounge.subdomain.conf.sample +++ /dev/null @@ -1,66 +0,0 @@ -## Version 2025/07/18 -# make sure that your synclounge container is named synclounge -# make sure that your dns has a cname set for synclounge -# Use this with SyncLounge v3 and up. -# Make sure that you do not have HSTS enabled, otherwise http access won't work - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - listen 80; - listen [::]:80; - - server_name synclounge.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app synclounge; - set $upstream_port 8088; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_buffering off; - proxy_socket_keepalive on; - proxy_set_header X-Forwarded-Proto $scheme; - proxy_set_header Sec-WebSocket-Extensions $http_sec_websocket_extensions; - proxy_set_header Sec-WebSocket-Key $http_sec_websocket_key; - proxy_set_header Sec-WebSocket-Version $http_sec_websocket_version; - - } -} diff --git a/custom_configs/synclounge.subfolder.conf.sample b/custom_configs/synclounge.subfolder.conf.sample deleted file mode 100644 index dc98fb61e..000000000 --- a/custom_configs/synclounge.subfolder.conf.sample +++ /dev/null @@ -1,59 +0,0 @@ -## Version 2023/02/05 -# make sure that your synclounge container is named synclounge -# make sure that synclounge is set to work with the base url /synclounge/ -# Use this with SyncLounge v3 or up -# -# To allow non-secure connections (http), which is required by some Plex clients, modify the first block in site-confs/default to look something like this: -#server { -# listen 80 default_server; -# listen [::]:80 default_server; -# server_name _; -# -# # Don't force redirect SyncLounge to https -# include /config/nginx/proxy-confs/synclounge.subfolder.conf; -# -# location / { -# return 301 https://$host$request_uri; -# } -#} - -# Uncomment to force SyncLounge to always load over http. Only use this if you've allowed http per the above instructions. -#if ($scheme = https) { -# return 301 http://$host$request_uri; -#} - -location /synclounge { - return 301 $scheme://$host/synclounge/; -} - -location /synclounge/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app synclounge; - set $upstream_port 8088; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /synclounge(.*) $1 break; - - proxy_buffering off; - proxy_socket_keepalive on; - proxy_set_header X-Forwarded-Proto $scheme; - proxy_set_header Sec-WebSocket-Extensions $http_sec_websocket_extensions; - proxy_set_header Sec-WebSocket-Key $http_sec_websocket_key; - proxy_set_header Sec-WebSocket-Version $http_sec_websocket_version; - -} diff --git a/custom_configs/syncthing.subdomain.conf.sample b/custom_configs/syncthing.subdomain.conf.sample deleted file mode 100644 index cdc3d454b..000000000 --- a/custom_configs/syncthing.subdomain.conf.sample +++ /dev/null @@ -1,66 +0,0 @@ -## Version 2025/07/18 -# make sure that your syncthing container is named syncthing -# make sure that your dns has a cname set for syncthing - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name syncthing.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app syncthing; - set $upstream_port 8384; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_hide_header Authorization; - } - - location ~ (/syncthing)?/rest { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app syncthing; - set $upstream_port 8384; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_hide_header Authorization; - } -} diff --git a/custom_configs/syncthing.subfolder.conf.sample b/custom_configs/syncthing.subfolder.conf.sample deleted file mode 100644 index 17f719ec9..000000000 --- a/custom_configs/syncthing.subfolder.conf.sample +++ /dev/null @@ -1,44 +0,0 @@ -## Version 2023/02/12 -# make sure that your syncthing container is named syncthing -# syncthing does not require a base url setting - -location /syncthing { - return 301 $scheme://$host/syncthing/; -} - -location ^~ /syncthing/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app syncthing; - set $upstream_port 8384; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /syncthing(.*) $1 break; - proxy_hide_header Authorization; -} - -location ^~ /syncthing/rest { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app syncthing; - set $upstream_port 8384; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - rewrite /syncthing(.*) $1 break; - proxy_hide_header Authorization; -} diff --git a/custom_configs/tautulli.subdomain.conf.sample b/custom_configs/tautulli.subdomain.conf.sample deleted file mode 100644 index fa487078e..000000000 --- a/custom_configs/tautulli.subdomain.conf.sample +++ /dev/null @@ -1,84 +0,0 @@ -## Version 2025/07/18 -# make sure that your tautulli container is named tautulli -# make sure that your dns has a cname set for tautulli - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name tautulli.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app tautulli; - set $upstream_port 8181; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/tautulli)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app tautulli; - set $upstream_port 8181; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/tautulli)?/newsletter { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app tautulli; - set $upstream_port 8181; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/tautulli)?/image { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app tautulli; - set $upstream_port 8181; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/tautulli.subfolder.conf.sample b/custom_configs/tautulli.subfolder.conf.sample deleted file mode 100644 index 55e9eedca..000000000 --- a/custom_configs/tautulli.subfolder.conf.sample +++ /dev/null @@ -1,57 +0,0 @@ -## Version 2023/02/05 -# make sure that your tautulli container is named tautulli -# make sure that tautulli is set to work with the base url /tautulli/ -# first go into tautulli settings, under "Web Interface", click on show advanced, set the HTTP root to /tautulli and restart the tautulli container - -location ^~ /tautulli { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app tautulli; - set $upstream_port 8181; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /tautulli/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app tautulli; - set $upstream_port 8181; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /tautulli/newsletter { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app tautulli; - set $upstream_port 8181; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /tautulli/image { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app tautulli; - set $upstream_port 8181; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/custom_configs/themepark.subfolder.conf.sample b/custom_configs/themepark.subfolder.conf.sample deleted file mode 100644 index 6fff1b3bc..000000000 --- a/custom_configs/themepark.subfolder.conf.sample +++ /dev/null @@ -1,40 +0,0 @@ -## Version 2023/02/05 -# make sure that your theme-park container is named theme-park -# make sure that theme-park is set to work with the base url /theme-park/ -# If you want to change the urlbase update the TP_URLBASE env on the theme-park container. - -location /themepark { - return 301 $scheme://$host/themepark/; -} - -location ^~ /themepark/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # If you don't want to cache the CSS files you can uncomment the lines below. - # add_header Last-Modified $date_gmt; - # add_header Cache-Control 'no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0'; - # if_modified_since off; - # expires -1; - # etag off; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - sub_filter_types *; - sub_filter 'url("/css/' 'url("/themepark/css/'; - sub_filter_once off; - set $upstream_app theme-park; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; -} diff --git a/custom_configs/transmission.subdomain.conf.sample b/custom_configs/transmission.subdomain.conf.sample deleted file mode 100644 index 272d0dc81..000000000 --- a/custom_configs/transmission.subdomain.conf.sample +++ /dev/null @@ -1,73 +0,0 @@ -## Version 2025/07/18 -# Make sure that DNS has a cname set for transmission -# -# Some Transmission Chrome extensions cannot handle HTTP/2 proxies as they -# rely on the HTTP Status Text to determine if they should add the -# X-Transmission-Session-Id header or not. HTTP/2 does not return this text -# so jQuery responses are empty. This causes RPCs to fail. -# -# If your extension is affected, you can remove http2 from -# /config/nginx/nginx.conf or submit a bug report with the -# extension developer to fix their extensions to support HTTP/2. - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name transmission.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app transmission; - set $upstream_port 9091; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_pass_header X-Transmission-Session-Id; - } - - location ~ (/transmission)?/rpc { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app transmission; - set $upstream_port 9091; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/transmission.subfolder.conf.sample b/custom_configs/transmission.subfolder.conf.sample deleted file mode 100644 index 059eb3263..000000000 --- a/custom_configs/transmission.subfolder.conf.sample +++ /dev/null @@ -1,47 +0,0 @@ -## Version 2023/02/05 -# make sure that your transmission container is named transmission -# transmission does not require a base url setting -# -# Some Transmission Chrome extensions cannot handle HTTP/2 proxies as they -# rely on the HTTP Status Text to determine if they should add the -# X-Transmission-Session-Id header or not. HTTP/2 does not return this text -# so jQuery responses are empty. This causes RPCs to fail. -# -# If your extension is affected, you can remove http2 from the default server -# in /config/nginx/site-confs/default or listen on a different port that has -# no http2 servers defined. Better yet, submit a bug report with the -# extension developer to fix their extensions to support HTTP/2. - -location ^~ /transmission { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app transmission; - set $upstream_port 9091; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_pass_header X-Transmission-Session-Id; -} - -location ^~ /transmission/rpc { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app transmission; - set $upstream_port 9091; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/custom_configs/tvheadend.subfolder.conf.sample b/custom_configs/tvheadend.subfolder.conf.sample deleted file mode 100644 index 3b769460d..000000000 --- a/custom_configs/tvheadend.subfolder.conf.sample +++ /dev/null @@ -1,44 +0,0 @@ -## Version 2023/02/05 -# make sure that your tvheadend container is named tvheadend -# make sure that tvheadend is set to work with the base url /tvheadend/ -# Before activating this config you need to do two things: -# - enable a setting in the tvheadend web interface -# - change your RUN_OPTS for tvheadend. -# -# You need to enable the setting "PROXY protocol & X-Forwarded For" -# in the tvheadend web interface. This setting can be found in -# "Configuration" -> "General" -> "Base" in the "HTTP Server Settings" Group. -# You need to set the View level to Expert to see it. Once activated, you may need to -# restart your tvheadend container. When testing this config, please be reminded -# that the tvheadend docker can take a very long time to start (>10mins). -# -# For the subfolder to work you also need to edit your tvheadend docker compose / cli config -# and set http_root in RUN_OPTS to tvheadend, e.g. in docker compose: -# - RUN_OPTS= --http_root /tvheadend - -location /tvheadend { - return 301 $scheme://$host/tvheadend/; -} - -location /tvheadend/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - - set $upstream_app tvheadend; - set $upstream_port 9981; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; -} diff --git a/custom_configs/ubooquity.subdomain.conf.sample b/custom_configs/ubooquity.subdomain.conf.sample deleted file mode 100644 index 4438caefe..000000000 --- a/custom_configs/ubooquity.subdomain.conf.sample +++ /dev/null @@ -1,84 +0,0 @@ -## Version 2025/07/18 -# make sure that your ubooquity container is named ubooquity -# make sure that your dns has a cname set for ubooquity - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name ubooquity.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ubooquity; - set $upstream_port 2202; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location /admin { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ubooquity; - set $upstream_port 2203; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location /admin-res { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ubooquity; - set $upstream_port 2203; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location /admin-api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ubooquity; - set $upstream_port 2203; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/ubooquity.subfolder.conf.sample b/custom_configs/ubooquity.subfolder.conf.sample deleted file mode 100644 index b1a6a5bf6..000000000 --- a/custom_configs/ubooquity.subfolder.conf.sample +++ /dev/null @@ -1,37 +0,0 @@ -## Version 2023/02/05 -# make sure that your ubooquity container is named ubooquity -# make sure that ubooquity is set to work with the base url /ubooquity/ -# set the reverse proxy prefix in the admin gui to ubooquity. - -location ^~ /ubooquity { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ubooquity; - set $upstream_port 2202; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ^~ /ubooquity/admin { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app ubooquity; - set $upstream_port 2203; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/custom_configs/uptime-kuma.subdomain.conf.sample b/custom_configs/uptime-kuma.subdomain.conf.sample deleted file mode 100644 index a0a17d51b..000000000 --- a/custom_configs/uptime-kuma.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your uptime-kuma container is named uptime-kuma -# make sure that your dns has a cname set for uptime-kuma - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name uptime-kuma.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app uptime-kuma; - set $upstream_port 3001; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ /(status|assets|icon.svg) { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app uptime-kuma; - set $upstream_port 3001; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/vaultwarden.subdomain.conf.sample b/custom_configs/vaultwarden.subdomain.conf.sample deleted file mode 100644 index 761607b83..000000000 --- a/custom_configs/vaultwarden.subdomain.conf.sample +++ /dev/null @@ -1,111 +0,0 @@ -## Version 2025/07/18 -# make sure that your vaultwarden container is named vaultwarden -# make sure that your dns has a cname set for vaultwarden -# if you are using bitwarden (the official image), use the bitwarden conf -# if you are using vaultwarden (an unofficial implementation), use the vaultwarden conf -# -# vaultwarden defaults to port 80 and can be changed using the environment variable ROCKET_PORT on the vaultwarden container - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name vaultwarden.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 128M; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app vaultwarden; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ ^(/vaultwarden)?/admin { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - # if you enable admin page via ADMIN_TOKEN env variable - # consider restricting access to LAN only via uncommenting the following lines - #allow 10.0.0.0/8; - #allow 172.16.0.0/12; - #allow 192.168.0.0/16; - #deny all; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app vaultwarden; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/vaultwarden)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app vaultwarden; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/vaultwarden)?/notifications/hub { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app vaultwarden; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/vaultwarden.subfolder.conf.sample b/custom_configs/vaultwarden.subfolder.conf.sample deleted file mode 100644 index f97dc8936..000000000 --- a/custom_configs/vaultwarden.subfolder.conf.sample +++ /dev/null @@ -1,87 +0,0 @@ -## Version 2023/11/12 -# make sure that your vaultwarden container is named vaultwarden -# make sure that vaultwarden is set to work with the base url /vaultwarden/ -# if you are using bitwarden (the official image), use the bitwarden conf -# if you are using vaultwarden (an unofficial implementation), use the vaultwarden conf -# -# vaultwarden defaults to port 80 and can be changed using the environment variable ROCKET_PORT on the vaultwarden container -# -# Environmental Variable DOMAIN=https:///vaultwarden must be set in vaultwarden container including subfolder. - -location /vaultwarden { - return 301 $scheme://$host/vaultwarden/; -} - -location ^~ /vaultwarden/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app vaultwarden; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ~ ^(/vaultwarden)?/admin { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # if you enable admin page via ADMIN_TOKEN env variable - # consider restricting access to LAN only via uncommenting the following lines - #allow 10.0.0.0/8; - #allow 172.16.0.0/12; - #allow 192.168.0.0/16; - #deny all; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app vaultwarden; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ~ (/vaultwarden)?/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app vaultwarden; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - -location ~ (/vaultwarden)?/notifications/hub { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app vaultwarden; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} - diff --git a/custom_configs/watchstate.subdomain.conf.sample b/custom_configs/watchstate.subdomain.conf.sample deleted file mode 100644 index 5f1684313..000000000 --- a/custom_configs/watchstate.subdomain.conf.sample +++ /dev/null @@ -1,66 +0,0 @@ -## Version 2025/07/18 -# make sure that your radarr container is named watchstate -# make sure that your dns has a cname set for watchstate -# the api endpoint is not behind auth, so please make sure to enable -# "Webhook match backend id" in backend settings - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name watchstate.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app watchstate; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ /v1/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app watchstate; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/wikijs.subdomain.conf.sample b/custom_configs/wikijs.subdomain.conf.sample deleted file mode 100644 index 1071ace35..000000000 --- a/custom_configs/wikijs.subdomain.conf.sample +++ /dev/null @@ -1,64 +0,0 @@ -## Version 2025/07/18 -# make sure that your wikijs container is named wikijs -# make sure that your dns has a cname set for wikijs - -server { - listen 443 ssl; -# listen 443 quic; - listen [::]:443 ssl; -# listen [::]:443 quic; - - server_name wikijs.*; - - include /config/nginx/ssl.conf; - - client_max_body_size 0; - - # enable for ldap auth (requires ldap-location.conf in the location block) - #include /config/nginx/ldap-server.conf; - - # enable for Authelia (requires authelia-location.conf in the location block) - #include /config/nginx/authelia-server.conf; - - # enable for Authentik (requires authentik-location.conf in the location block) - #include /config/nginx/authentik-server.conf; - - # enable for Tinyauth (requires tinyauth-location.conf in the location block) - #include /config/nginx/tinyauth-server.conf; - - location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - # enable for Tinyauth (requires tinyauth-server.conf in the server block) - #include /config/nginx/tinyauth-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app wikijs; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } - - location ~ (/wikijs)?/graphql { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app wikijs; - set $upstream_port 3000; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - } -} diff --git a/custom_configs/wordpress.subfolder.conf.sample b/custom_configs/wordpress.subfolder.conf.sample deleted file mode 100644 index 6b47885e5..000000000 --- a/custom_configs/wordpress.subfolder.conf.sample +++ /dev/null @@ -1,28 +0,0 @@ -## Version 2023/02/05 -# make sure that your wordpress container is named wordpress -# make sure that wordpress is set to work with the base url /wordpress/ -# In order to use this location block you need to edit the default file one folder up and comment out the / location as well as the "~ \.php$" location -# tested with the official wordpress docker image - -location / { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app wordpress; - set $upstream_port 80; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - -} diff --git a/custom_configs/youtube-dl.subfolder.conf.sample b/custom_configs/youtube-dl.subfolder.conf.sample deleted file mode 100644 index b07a58f06..000000000 --- a/custom_configs/youtube-dl.subfolder.conf.sample +++ /dev/null @@ -1,35 +0,0 @@ -## Version 2023/02/05 -# make sure that your youtube-dl-server container is named youtube-dl-server -# youtube-dl-server does not require a base url setting -# Works with this youtube-dl Fork: https://github.com/nbr23/youtube-dl-server - -location /youtube-dl { - return 301 $scheme://$host/youtube-dl/; -} - -location ^~ /youtube-dl/ { - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app youtube-dl-server; - set $upstream_port 8080; - set $upstream_proto http; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; - - proxy_set_header Referer ''; - # next line doesn't work with the latest version of: https://github.com/nbr23/youtube-dl-server - # proxy_set_header Host $upstream_app:8080; - rewrite /youtube-dl(.*) $1 break; -} diff --git a/generate_configs.py b/generate_configs.py index 0c0f02727..8f81c652c 100644 --- a/generate_configs.py +++ b/generate_configs.py @@ -42,7 +42,6 @@ def generate_configs(): lstrip_blocks=True ) subdomain_template = env.get_template('subdomain.conf.j2') - subfolder_template = env.get_template('subfolder.conf.j2') print("Jinja2 templates loaded successfully.") except Exception as e: print(f"ERROR: Failed to load Jinja2 templates from '{TEMPLATE_DIR}': {e}. Exiting.") @@ -59,17 +58,6 @@ def generate_configs(): f.write(rendered_content) print(f" [OK] Generated {filename}") - # Generate templated subfolder configs - print("\n--- Generating Templated Subfolder Configs ---") - subfolder_items = data.get('subfolders', []) - for item in subfolder_items: - filename = f"{item['name']}.subfolder.conf.sample" - output_path = os.path.join(OUTPUT_DIR, filename) - rendered_content = subfolder_template.render(item=item) - with open(output_path, 'w') as f: - f.write(rendered_content) - print(f" [OK] Generated {filename}") - # Copy custom configs print("\n--- Copying Custom Configs ---") if not os.path.isdir(CUSTOM_DIR): @@ -86,17 +74,6 @@ def generate_configs(): else: print(f" [!!] WARNING: Custom config file not found: {source_path}") - # Process custom subfolders - for app_name in data.get('custom', {}).get('subfolders', []): - filename = f"{app_name}.subfolder.conf.sample" - source_path = os.path.join(CUSTOM_DIR, filename) - dest_path = os.path.join(OUTPUT_DIR, filename) - if os.path.exists(source_path): - shutil.copy(source_path, dest_path) - print(f" [OK] Copied {filename}") - else: - print(f" [!!] WARNING: Custom config file not found: {source_path}") - print("\n--- Generation Complete ---") if __name__ == "__main__": diff --git a/templates/subdomain.conf.j2 b/templates/subdomain.conf.j2 index 2b5df860b..af958cbbe 100644 --- a/templates/subdomain.conf.j2 +++ b/templates/subdomain.conf.j2 @@ -68,6 +68,39 @@ server { {% endif %} {% if item.set_x_scheme %} proxy_set_header X-Scheme https; +{% endif %} +{% if item.websockets %} + proxy_buffering off; + proxy_socket_keepalive on; + proxy_set_header X-Forwarded-Proto $scheme; + proxy_set_header Sec-WebSocket-Extensions $http_sec_websocket_extensions; + proxy_set_header Sec-WebSocket-Key $http_sec_websocket_key; + proxy_set_header Sec-WebSocket-Version $http_sec_websocket_version; +{% endif %} +{% if item.proxy_pass_headers %} +{% for header in item.proxy_pass_headers %} + proxy_pass_header {{ header }}; +{% endfor %} +{% endif %} +{% if item.proxy_set_headers %} +{% for header in item.proxy_set_headers %} + proxy_set_header {{ header.key }} {{ header.value }}; +{% endfor %} +{% endif %} +{% if item.proxy_hide_headers %} +{% for header in item.proxy_hide_headers %} + proxy_hide_header {{ header }}; +{% endfor %} +{% endif %} +{% if item.add_headers %} +{% for header in item.add_headers %} + add_header {{ header.key }} "{{ header.value }}"; +{% endfor %} +{% endif %} +{% if item.custom_directives %} +{% for directive in item.custom_directives %} + {{ directive }}; +{% endfor %} {% endif %} } {% if item.api %} @@ -80,4 +113,31 @@ server { proxy_pass $upstream_proto://$upstream_app:$upstream_port; } {% endif %} +{% if item.extra_locations %} +{% for loc in item.extra_locations %} + location ~ (?:/{{ item.name }})?{{ loc.path }} { + include /config/nginx/proxy.conf; + include /config/nginx/resolver.conf; + set $upstream_app {{ loc.app | default(item.name) }}; + set $upstream_port {{ loc.port | default(item.port) }}; + set $upstream_proto {% if loc.https %}https{% elif item.https and loc.https is not defined %}https{% else %}http{% endif %}; + proxy_pass $upstream_proto://$upstream_app:$upstream_port{% if loc.proxy_pass_path %}{{ loc.proxy_pass_path }}{% endif %}; +{% if loc.proxy_set_headers %} +{% for header in loc.proxy_set_headers %} + proxy_set_header {{ header.key }} {{ header.value }}; +{% endfor %} +{% endif %} +{% if loc.proxy_hide_headers %} +{% for header in loc.proxy_hide_headers %} + proxy_hide_header {{ header }}; +{% endfor %} +{% endif %} +{% if loc.custom_directives %} +{% for directive in loc.custom_directives %} + {{ directive }}; +{% endfor %} +{% endif %} + } +{% endfor %} +{% endif %} } diff --git a/templates/subfolder.conf.j2 b/templates/subfolder.conf.j2 deleted file mode 100644 index 3e70ab0b1..000000000 --- a/templates/subfolder.conf.j2 +++ /dev/null @@ -1,49 +0,0 @@ -## Version 2025/08/28 -# make sure that your {{ item.name }} container is named {{ item.name }} -# make sure that {{ item.name }} is set to work with the base url /{{ item.name }}/ - -{% if item.redirect %} -location /{{ item.name }} { - return 301 $scheme://$host/{{ item.name }}/; -} - -location ^~ /{{ item.name }}/ { -{% else %} -location ^~ /{{ item.name }} { -{% endif %} - # enable the next two lines for http auth - #auth_basic "Restricted"; - #auth_basic_user_file /config/nginx/.htpasswd; - - # enable for ldap auth (requires ldap-server.conf in the server block) - #include /config/nginx/ldap-location.conf; - - # enable for Authelia (requires authelia-server.conf in the server block) - #include /config/nginx/authelia-location.conf; - - # enable for Authentik (requires authentik-server.conf in the server block) - #include /config/nginx/authentik-location.conf; - - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app {{ item.name }}; - set $upstream_port {{ item.port }}; - set $upstream_proto {% if item.https %}https{% else %}http{% endif %}; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; -{% if item.rewrite %} - rewrite /{{ item.name }}(.*) $1 break; -{% endif %} -{% if item.buffering_off %} - proxy_buffering off; -{% endif %} -} -{% if item.api %} -location ^~ /{{ item.name }}/api { - include /config/nginx/proxy.conf; - include /config/nginx/resolver.conf; - set $upstream_app {{ item.name }}; - set $upstream_port {{ item.port }}; - set $upstream_proto {% if item.https %}https{% else %}http{% endif %}; - proxy_pass $upstream_proto://$upstream_app:$upstream_port; -} -{% endif %}