I’m having the same issues with Grocy. Seems that grocy has something strange. Tried it with a subdomain, but doesn’t work. Also not with a folder /grocy and the by @kirpat suggested rewrite /grocy/(.*) /$1 break;
Does anyone has another suggestion to get this to work?
edit: I got it to work with a subdomain. Localhost insn’t the way to go
But to get a subfolder working (as in domain.org/folder) isn’t working for me. Also not for pihole. And to get everything in a subdomain is a bit much to ask.
Does anyone have a working reverse proxy for a subfolder?
Kodi has a web server built in (which is enabled in the settings) which allows you to control that instance as well as watch content on the browser etc.
I requested a new SSL cert for the above domain and it worked first try. From there, it was straightforward to add an iframe panel and make it accessible from within Home Assistant.
I also made NPM available in a similar manner (nginx.mydomain.duckdns.org) though it’s not working in the HA iframe for some reason. NPM has its own authentication, so I’m mostly ok with make it remotely available, though ideally I could keep it behind the HA authentication since I have multi-factor enabled there. Has anyone else done this? Or am I really just setting myself up for trouble by making NPM available outside my home network at all?
For anyone else looking for this solution, I edited the NPM proxy host by adding the following code in the advanced configuration section: proxy_hide_header X-Frame-Options;
By default, x-frame-options are set to deny all connections. Once I removed that header, the NPM iframe works correctly.
NPM automatically renews the certificate? I had an automation for let’s encrypt addon but I assume if I renew the cert woth LE addon, it will not work here, right?
I just made an account to thank you. I could not figure this out. the part that helped me was to comment out the http: in configuration.yaml. All other guides say to add alot of stuff here.
I’m a bit of a noob with reverse proxies, can anyone tell me what “block common exploits” option does and if there is any undesired effects of having this option enabled?