Compare commits

...

21 Commits

Author SHA1 Message Date
Xialijun
84030525c4
Merge 4cb39fe332bbca97d6a51ac775184c9f456006af into 79d28f03d035114b80dcd04845306ecb98175074 2025-02-24 06:13:37 -06:00
jc21
79d28f03d0
Merge pull request #4346 from Sander0542/feature/security-schemes-component
All checks were successful
Close stale issues and PRs / stale (push) Successful in 4s
API Schema Improvements
2025-02-07 12:39:49 +10:00
Sander Jochems
df48b835c4
Update order to match others 2025-02-05 22:20:21 +01:00
Sander Jochems
8a1557154a
Add certificate fields to boolFields 2025-02-05 22:15:12 +01:00
Sander Jochems
a6af5ec2c7
Remove certificate as required from proxy host 2025-02-05 18:18:50 +01:00
Sander Jochems
14d7c35fd7
Fix whitespaces 2025-02-05 17:31:09 +01:00
Sander Jochems
cfcf78aaee
Set bearer auth security component 2025-02-05 17:29:40 +01:00
xialj
4cb39fe332 is more suitable for ,if listen port is no 80 or 443 2023-08-11 11:13:39 +08:00
xialj
1a983651a5 proxy_set_header Host is not useful in proxy_host.conf,it should be modify in conf.d/include/proxy.conf 2023-08-11 11:12:06 +08:00
xialj
145fe2d24f Strings must use singlequote quotes 2023-08-01 00:17:40 +08:00
xialj
5dbb0b921e Strings must use singlequote quotes 2023-08-01 00:05:33 +08:00
xialj
700d908abd varible listen_ports should be in case which nice_host_type is proxy_host 2023-08-01 00:04:11 +08:00
xialj
7f2552d77f formatting nginx.js 2023-08-01 00:01:22 +08:00
xialj
bbeb4f5a60 formatting nginx.js 2023-07-31 23:56:59 +08:00
xialj
c166f6b41f formatting nginx.js 2023-07-31 23:56:25 +08:00
xialj
05831fcd44 formatting nginx.js 2023-07-31 23:55:03 +08:00
xialj
dec0ff31eb bugfix when create a proxy-host.conf can with more ports 2023-07-31 23:52:27 +08:00
xialj
4ebfb4247c bugfix when create a proxy-host.conf can with more ports 2023-07-31 23:39:25 +08:00
Xialijun
75c2f73796
Merge branch 'NginxProxyManager:develop' into issue_for_external_port 2023-07-31 23:08:35 +08:00
Xialijun
fb1e4bd46c
Update proxy_host.conf by replace $host:$server with $http_host 2023-07-31 22:55:14 +08:00
xialj
f00fe275ca allow domain like 'com.example.com:8080',use external port and nginx programmer manager listen thses ports 2023-02-13 14:33:09 +08:00
7 changed files with 32 additions and 4 deletions

View File

@ -234,6 +234,19 @@ const internalNginx = {
// Set the IPv6 setting for the host
host.ipv6 = internalNginx.ipv6Enabled();
if ( nice_host_type === 'proxy_host' ) {
let listen_ports = [];
host.domain_names.map( function (domain_name) {
if ( domain_name.indexOf(':') > 0 ){
listen_ports.push(parseInt(domain_name.substring(domain_name.indexOf(':')+1)));
}
});
if ( listen_ports.length > 0 ){
host.listen_ports = listen_ports;
}
}
locationsPromise.then(() => {
renderEngine

View File

@ -12,7 +12,11 @@ Model.knex(db);
const boolFields = [
'is_deleted',
'ssl_forced',
'http2_support',
'enabled',
'hsts_enabled',
'hsts_subdomains',
];
class DeadHost extends Model {

View File

@ -8,8 +8,8 @@ const now = require('./now_helper');
Model.knex(db);
const boolFields = [
'enabled',
'is_deleted',
'enabled',
'tcp_forwarding',
'udp_forwarding',
];

View File

@ -22,8 +22,7 @@
"enabled",
"locations",
"hsts_enabled",
"hsts_subdomains",
"certificate"
"hsts_subdomains"
],
"additionalProperties": false,
"properties": {

View File

@ -9,6 +9,15 @@
"url": "http://127.0.0.1:81/api"
}
],
"components": {
"securitySchemes": {
"bearerAuth": {
"type": "http",
"scheme": "bearer",
"bearerFormat": "JWT"
}
}
},
"paths": {
"/": {
"get": {

View File

@ -12,6 +12,9 @@
#listen [::]:443;
{% endif %}
{% endif %}
{% for listen_port in listen_ports %}
listen listen_port;
{% endfor %}
server_name {{ domain_names | join: " " }};
{% if http2_support == 1 or http2_support == true %}
http2 on;

View File

@ -1,5 +1,5 @@
add_header X-Served-By $host;
proxy_set_header Host $host;
proxy_set_header Host $http_host;
proxy_set_header X-Forwarded-Scheme $scheme;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;