c552001fa9
Merge 4cb39fe332
into d499e2bfef
2024-10-17 01:55:35 +00:00
554d1ff2b6
Add set directives for proxies to keep from crashing if upstream is down
2024-09-04 00:07:43 -04:00
280bac8b43
advanced config move to top of default confg
2024-04-28 18:18:38 +08:00
10ece3548d
Fixing "the map directive is not allowed here" at the validation stage (see https://github.com/NginxProxyManager/nginx-proxy-manager/pull/3478 )
2024-02-27 00:42:58 +01:00
09d5e2c94f
Merge pull request #3360 from DarioViva42/hsts-only-with-https
...
only add hsts header with https.
2024-01-09 08:16:01 +10:00
ccf9cce825
Fixed issue where the HTTP2 support was always enabled in nginx config, no matter what the user configured.
2023-12-09 11:16:37 -05:00
289e438c59
only add hsts header with https.
...
fixes https://github.com/NginxProxyManager/nginx-proxy-manager/issues/1005
for more information look at: https://websistent.com/add-the-hsts-header-only-for-https-requests-nginx/
2023-12-02 03:26:34 +01:00
1a983651a5
proxy_set_header Host is not useful in proxy_host.conf,it should be modify in conf.d/include/proxy.conf
2023-08-11 11:12:06 +08:00
75c2f73796
Merge branch 'NginxProxyManager:develop' into issue_for_external_port
2023-07-31 23:08:35 +08:00
fb1e4bd46c
Update proxy_host.conf by replace $host:$server with $http_host
2023-07-31 22:55:14 +08:00
2dd4434ceb
Add support for nginx 444 default response
...
The default nginx 444 response drops the inbound connection without
sending any response to the client.
2023-05-22 11:59:50 +10:00
fec36834f7
- Updated objection, knex, liquidjs, signale and sqlite3 packages
...
- Changes for objection migration
- Moved common access template code to an include
- Fixed access rules configuration generation
2023-03-17 14:18:51 +10:00
f00fe275ca
allow domain like 'com.example.com:8080',use external port and nginx programmer manager listen thses ports
2023-02-13 14:33:09 +08:00
adc5a2020a
Merge pull request #1666 from TobiasKneidl/patch-1
...
Update default.conf to follow the default site setting also for ipv6
2021-12-27 11:03:14 +10:00
bb422d4454
Update default.conf
2021-12-22 00:24:05 +01:00
1f879f67a9
Reverts back to proxy_pass without variables
2021-11-09 13:57:39 +01:00
c203d1a0d8
Requires ~() in location to remove $request_uri and removes $request_uri if it is just a slash
2021-11-06 13:38:02 +01:00
3d80759a21
Renames the $upstream variables and does not append $request_ui if capture group exists in location
2021-11-04 10:08:15 +01:00
bbde7a108a
Use variable with full uri in proxy pass
2021-10-25 14:48:22 +02:00
87731a8b5c
Revert "Utilise variable for custom locations proxy_pass"
...
This reverts commit 6c1ae77a2a
.
2021-10-25 14:27:37 +02:00
f022e84979
Add SSL and HTTP2 into IPv6 on listen.conf
...
I can only server contents with IPv6 because I'm sitting behind CGN on IPv4. When enabling HTTP2 it still not serve contents with HTTP2 as there are missing arguments in the `listen`. But it still does the SSL encryption.
Previous to this commit it generates:
```
listen 80;
listen [::]:80;
listen 443 ssl http2;
listen [::]:443;
```
Now it generates:
```
listen 80;
listen [::]:80;
listen 443 ssl http2;
listen [::]:443 ssl http2;
```
2021-09-07 22:50:49 +02:00
ab40e4e2cf
Merge pull request #1036 from BjoernAkAManf/master
...
Allows hostname instead of ip for streams
2021-08-16 13:40:40 +10:00
66f86cf497
Merge pull request #1258 from nightah/fix-location-proxy_pass
...
Utilise variable for custom locations proxy_pass
2021-08-07 13:03:33 +10:00
d34691152c
Fixes renewal unused http certificates
2021-08-04 14:07:53 +02:00
6c1ae77a2a
Utilise variable for custom locations proxy_pass
...
If a custom location is currently set to proxy to a DNS hostname this hostname is cached by nginx. When the underlying IP for the hostname changes this will be cached in nginx until it is restarted. This behaviour is somewhat undesirable if utilising containers.
This change sets the proxy_pass for custom locations into a variable and utilises said variable for routing to the upstream backend. This will ensure that nginx will utilise the resolver and resolve the hostname to the current IP instead of relying on the nginx cache.
2021-07-23 16:24:46 +10:00
56c317d223
All logs in single folder
...
nginx cannot create the folder structure for logs
2021-06-29 23:07:54 +02:00
fae848bd1b
Store host logs in subfolders
2021-06-29 20:40:36 +02:00
deca493912
Splits access and error logs for each host
2021-06-18 09:38:48 +02:00
f575400bc8
Merge pull request #1081 from vipergts450/vipergts450-custom_location-patch
...
Vipergts450 custom location patch
2021-06-07 12:46:23 +10:00
ba45705571
Partial revert of 421934e
...
Keeping the server block of websocket definitions but also bringing back the
location block after discussions on #1067
2021-05-08 12:17:10 +10:00
4c76803f13
Rearrange _location.conf template
...
Allow more of the main host parameters into the custom location configuration and reorder to make more sense.
2021-05-06 22:30:45 -04:00
a3b896fa70
Update _location.conf
2021-05-06 14:48:38 -04:00
60347a90e9
Update _location.conf
2021-05-06 11:40:40 -04:00
389fd158ad
allows hostname instead of ip for streams
2021-04-24 01:09:01 +02:00
421934efed
Move 'Allow Websockets' definitions to host root configuration
...
This fixes issues with these settings not applying to custom locations
defined under hosts.
2021-04-13 20:04:35 +01:00
f056b9dc7f
Move 'Force SSL' definitions to host root configuration
...
This fixes issues with these settings not applying to custom locations
defined under hosts.
2021-04-13 19:59:49 +01:00
74db0004bd
Merge pull request #883 from baruffaldi/master
...
Forward scheme and http code added for redirection hosts
2021-03-17 11:30:26 +10:00
1c64252015
Update _hsts.conf template
...
I propose the change to max-age value of HSTS from 1 year to 2 years.
2021-03-13 12:40:47 +00:00
6df7b72e08
Forward scheme and http code added for redirection hosts
...
You can now configure the forward_scheme and forward_http_code on user interface (section redirection hosts)
2021-02-09 11:23:15 +01:00
d1fac583ea
Use configured default page also for IPv6
...
Just a small check for the ipv6 variable, similar to _listen.conf,
so that the configured default page is also delivered on ipv6 requests.
2021-01-25 01:28:50 +01:00
21f36f535f
Don't spit out a ; if the preceeding value is empty
2020-10-16 13:41:08 +10:00
0df0545777
Allows auth information from AccessList not to be passed to proxied hosts. Resolves issue #153 .
...
Signed-off-by: James Morgan <jmorgan.au+github@gmail.com >
2020-10-15 10:23:09 +11:00
84d8fb0899
Merge pull request #403 from Indemnity83/empty-auth
...
Don't ask for username/password if none are defined
2020-05-28 09:18:50 +10:00
2ebfdcf0c9
Fix LE certs for IPv6 only domains Fixes 394
2020-05-20 22:21:26 +10:00
df73c2a458
skip auth check if no users defined
2020-05-09 15:51:11 -07:00
f5ee91aeb3
write access list to proxy host config
2020-04-13 23:32:00 -07:00
bdb591af9e
- Add ability to disable ipv6, fixes #312
...
- Added ipv6 listening to hosts when configured, fixes #236 and #149
- Added documentation about disabling ipv6
- Updated npm packages
2020-04-07 10:43:19 +10:00
3e7d2b216b
Update proxy_host.conf
...
FIX as explained on #340
2020-03-27 19:01:21 +01:00
bb0f4bfa62
v2.1.0 ( #293 )
...
* Fix wrapping when too many hosts are shown (#207 )
* Update npm packages, fixes CVE-2019-10757
* Revert some breaking packages
* Major overhaul
- Docker buildx support in CI
- Cypress API Testing in CI
- Restructured folder layout (insert clean face meme)
- Added Swagger documentation and validate API against that (to be completed)
- Use common base image for all supported archs, which includes updated nginx with ipv6 support
- Updated certbot and changes required for it
- Large amount of Hosts names will wrap in UI
- Updated packages for frontend
- Version bump 2.1.0
* Updated documentation
* Fix JWT expire time going crazy. Now set to 1day
* Backend JS formatting rules
* Remove v1 importer, I doubt anyone is using v1 anymore
* Added backend formatting rules and enforce them
in Jenkins builds
* Fix CI, doesn't need a tty
* Thanks bcrypt. Why can't you just be normal.
* Cleanup after syntax check
Co-authored-by: Marcelo Castagna <margaale@users.noreply.github.com >
2020-02-19 15:55:06 +11:00