Skip to content

Commit

Permalink
add authelia subdomain conf and add auth support
Browse files Browse the repository at this point in the history
  • Loading branch information
aptalca committed May 24, 2020
1 parent 14eb015 commit eb55108
Show file tree
Hide file tree
Showing 140 changed files with 713 additions and 0 deletions.
6 changes: 6 additions & 0 deletions adguard.subdomain.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,9 @@ server {
# enable for ldap auth, fill in ldap details in ldap.conf
#include /config/nginx/ldap.conf;

# enable for Authelia
#include /config/nginx/authelia-server.conf;

location / {
# enable the next two lines for http auth
#auth_basic "Restricted";
Expand All @@ -22,6 +25,9 @@ server {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app adguard;
Expand Down
3 changes: 3 additions & 0 deletions adminer.subfolder.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,9 @@ location ^~ /adminer/ {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app adminer;
Expand Down
6 changes: 6 additions & 0 deletions airsonic.subdomain.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,9 @@ server {
# enable for ldap auth, fill in ldap details in ldap.conf
#include /config/nginx/ldap.conf;

# enable for Authelia
#include /config/nginx/authelia-server.conf;

location / {
# enable the next two lines for http auth
#auth_basic "Restricted";
Expand All @@ -23,6 +26,9 @@ server {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app airsonic;
Expand Down
3 changes: 3 additions & 0 deletions airsonic.subfolder.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,9 @@ location ^~ /airsonic {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app airsonic;
Expand Down
23 changes: 23 additions & 0 deletions authelia.subdomain.conf.sample
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
# make sure that your dns has a cname set for authelia

server {
listen 443 ssl;
listen [::]:443 ssl;

server_name authelia.*;

include /config/nginx/ssl.conf;

client_max_body_size 0;

location / {

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app authelia;
set $upstream_port 9091;
set $upstream_proto http;
proxy_pass $upstream_proto://$upstream_app:$upstream_port;

}
}
6 changes: 6 additions & 0 deletions bazarr.subdomain.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,9 @@ server {
# enable for ldap auth, fill in ldap details in ldap.conf
#include /config/nginx/ldap.conf;

# enable for Authelia
#include /config/nginx/authelia-server.conf;

location / {
# enable the next two lines for http auth
#auth_basic "Restricted";
Expand All @@ -22,6 +25,9 @@ server {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app bazarr;
Expand Down
3 changes: 3 additions & 0 deletions bazarr.subfolder.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,9 @@ location ^~ /bazarr/ {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app bazarr;
Expand Down
6 changes: 6 additions & 0 deletions beets.subdomain.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,9 @@ server {
#enable for ldap auth, fill in ldap details in ldap.conf
#include /config/nginx/ldap.conf;

# enable for Authelia
#include /config/nginx/authelia-server.conf;

location / {
#enable the next two lines for http auth
#auth_basic "Restricted";
Expand All @@ -23,6 +26,9 @@ server {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app beets;
Expand Down
3 changes: 3 additions & 0 deletions beets.subfolder.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,9 @@ location /beets {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app beets;
Expand Down
6 changes: 6 additions & 0 deletions bitwarden.subdomain.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,9 @@ server {
# enable for ldap auth, fill in ldap details in ldap.conf
#include /config/nginx/ldap.conf;

# enable for Authelia
#include /config/nginx/authelia-server.conf;

location / {
# enable the next two lines for http auth
#auth_basic "Restricted";
Expand All @@ -23,6 +26,9 @@ server {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app bitwarden;
Expand Down
6 changes: 6 additions & 0 deletions boinc.subdomain.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,9 @@ server {
# enable for ldap auth, fill in ldap details in ldap.conf
#include /config/nginx/ldap.conf;

# enable for Authelia
#include /config/nginx/authelia-server.conf;

location / {
# enable the next two lines for http auth
#auth_basic "Restricted";
Expand All @@ -22,6 +25,9 @@ server {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
proxy_buffering off;
resolver 127.0.0.11 valid=30s;
Expand Down
6 changes: 6 additions & 0 deletions booksonic.subdomain.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,9 @@ server {
# enable for ldap auth, fill in ldap details in ldap.conf
#include /config/nginx/ldap.conf;

# enable for Authelia
#include /config/nginx/authelia-server.conf;

location / {
# enable the next two lines for http auth
#auth_basic "Restricted";
Expand All @@ -22,6 +25,9 @@ server {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app booksonic;
Expand Down
3 changes: 3 additions & 0 deletions booksonic.subfolder.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,9 @@ location ^~ /booksonic {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app booksonic;
Expand Down
3 changes: 3 additions & 0 deletions bookstack.subdomain.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,9 @@ server {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app bookstack;
Expand Down
6 changes: 6 additions & 0 deletions calibre-web.subdomain.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,9 @@ server {
# enable for ldap auth, fill in ldap details in ldap.conf
#include /config/nginx/ldap.conf;

# enable for Authelia
#include /config/nginx/authelia-server.conf;

location / {
# enable the next two lines for http auth
#auth_basic "Restricted";
Expand All @@ -22,6 +25,9 @@ server {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app calibre-web;
Expand Down
3 changes: 3 additions & 0 deletions calibre-web.subfolder.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,9 @@ location ^~ /calibre-web/ {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

resolver 127.0.0.11 valid=30s;
set $upstream_app calibre-web;
set $upstream_port 8083;
Expand Down
6 changes: 6 additions & 0 deletions calibre.subdomain.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,9 @@ server {
# enable for ldap auth, fill in ldap details in ldap.conf
#include /config/nginx/ldap.conf;

# enable for Authelia
#include /config/nginx/authelia-server.conf;

location / {
# enable the next two lines for http auth
#auth_basic "Restricted";
Expand All @@ -22,6 +25,9 @@ server {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

resolver 127.0.0.11 valid=30s;
set $upstream_app calibre;
set $upstream_port 8080;
Expand Down
3 changes: 3 additions & 0 deletions calibre.subfolder.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,9 @@ location ^~ /calibre/ {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

resolver 127.0.0.11 valid=30s;
set $upstream_app calibre;
set $upstream_port 8080;
Expand Down
6 changes: 6 additions & 0 deletions code-server.subdomain.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,9 @@ server {
# enable for ldap auth, fill in ldap details in ldap.conf
#include /config/nginx/ldap.conf;

# enable for Authelia
#include /config/nginx/authelia-server.conf;

location / {
# enable the next two lines for http auth
#auth_basic "Restricted";
Expand All @@ -22,6 +25,9 @@ server {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app code-server;
Expand Down
6 changes: 6 additions & 0 deletions codimd.subdomain.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,9 @@ server {
# enable for ldap auth, fill in ldap details in ldap.conf
#include /config/nginx/ldap.conf;

# enable for Authelia
#include /config/nginx/authelia-server.conf;

location / {
# enable the next two lines for http auth
#auth_basic "Restricted";
Expand All @@ -24,6 +27,9 @@ server {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app codimd;
Expand Down
6 changes: 6 additions & 0 deletions couchpotato.subdomain.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,9 @@ server {
# enable for ldap auth, fill in ldap details in ldap.conf
#include /config/nginx/ldap.conf;

# enable for Authelia
#include /config/nginx/authelia-server.conf;

location / {
# enable the next two lines for http auth
#auth_basic "Restricted";
Expand All @@ -22,6 +25,9 @@ server {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app couchpotato;
Expand Down
3 changes: 3 additions & 0 deletions couchpotato.subfolder.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,9 @@ location ^~ /couchpotato {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app couchpotato;
Expand Down
6 changes: 6 additions & 0 deletions deluge.subdomain.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,9 @@ server {
# enable for ldap auth, fill in ldap details in ldap.conf
#include /config/nginx/ldap.conf;

# enable for Authelia
#include /config/nginx/authelia-server.conf;

location / {
# enable the next two lines for http auth
#auth_basic "Restricted";
Expand All @@ -22,6 +25,9 @@ server {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app deluge;
Expand Down
3 changes: 3 additions & 0 deletions deluge.subfolder.conf.sample
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,9 @@ location ^~ /deluge/ {
#auth_request /auth;
#error_page 401 =200 /login;

# enable for Authelia
#include /config/nginx/authelia-location.conf;

include /config/nginx/proxy.conf;
resolver 127.0.0.11 valid=30s;
set $upstream_app deluge;
Expand Down
Loading

0 comments on commit eb55108

Please sign in to comment.