mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-25 17:35:52 +03:00
[PR #3331] [CLOSED] Ssl passthrough hosts - updated #3683
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#3683
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/NginxProxyManager/nginx-proxy-manager/pull/3331
Author: @acul009
Created: 11/17/2023
Status: ❌ Closed
Base:
develop← Head:ssl-passthrough-hosts📝 Commits (10+)
66cbd12WIP: started adding new host type ssl passthroughb44dcd4WIP: complete control of new passthrough host typeb9ab4a2Finalizes SSL Passthrough hostsc6a50e0Fixes eslint errors040f4a7Adds comments to docker compose dev48aac78Fixes migrationc5b9752compose file fixc91084bfixed broken syntax and padding676db1cfixed padding and syntax467f4abfixed remove functions📊 Changes
40 files changed (+1932 additions, -119 deletions)
View changed files
📝
backend/internal/host.js(+35 -7)📝
backend/internal/nginx.js(+153 -63)➕
backend/internal/ssl-passthrough-host.js(+357 -0)📝
backend/internal/user.js(+9 -8)➕
backend/lib/access/ssl_passthrough_hosts-create.json(+23 -0)➕
backend/lib/access/ssl_passthrough_hosts-delete.json(+23 -0)➕
backend/lib/access/ssl_passthrough_hosts-get.json(+23 -0)➕
backend/lib/access/ssl_passthrough_hosts-list.json(+23 -0)➕
backend/lib/access/ssl_passthrough_hosts-update.json(+23 -0)➕
backend/migrations/20211010141200_ssl_passthrough_host.js(+85 -0)➕
backend/models/ssl_passthrough_host.js(+55 -0)📝
backend/routes/api/main.js(+12 -3)➕
backend/routes/api/nginx/ssl_passthrough_hosts.js(+196 -0)➕
backend/schema/endpoints/ssl-passthrough-hosts.json(+208 -0)📝
backend/schema/index.json(+3 -0)📝
backend/setup.js(+31 -18)➕
backend/templates/ssl_passthrough_host.conf(+41 -0)📝
docker/docker-compose.dev.yml(+3 -1)📝
docker/rootfs/etc/nginx/nginx.conf(+1 -0)📝
docker/rootfs/etc/s6-overlay/s6-rc.d/prepare/20-paths.sh(+1 -0)...and 20 more files
📄 Description
Hi,
This PR updates the original Request: SSL passthrough hosts #1479
My use case is passing data to hosts which can handle certificate request for themselves.
In those cases I'd use the http proxy to only forward the requests to /.well-known/acme-challenge.
Additional traffic then has to arrive over TLS to work.
This makes reusing Port 443 for multiple services a breeze.
@chaptergy If you have some time, I'd really appreciate if you could check that I didn't botch any of your work :)
This would resolve Ticket #853 and allow for more secure data handling inside local networks.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.