refactor(services): Remove Tinyauth middleware from all services
Remove Tinyauth SSO middleware references from: - FreshRSS, Backrest, Booklore, Code Server - Homarr, Homepage, Karakeep, Komodo - MicroBin, RSS Bridge, RSSHub, Static Sites Services with local-only middleware now only use local-only restriction (Backrest, Code Server) without Tinyauth.
This commit is contained in:
parent
ffff392aa0
commit
2c60e54c80
12 changed files with 2 additions and 12 deletions
|
|
@ -29,7 +29,6 @@ services:
|
||||||
traefik.http.services.freshrss.loadbalancer.passhostheader: true
|
traefik.http.services.freshrss.loadbalancer.passhostheader: true
|
||||||
|
|
||||||
# SSO Protection removed - using FreshRSS built-in auth
|
# SSO Protection removed - using FreshRSS built-in auth
|
||||||
# traefik.http.routers.freshrss.middlewares: tinyauth
|
|
||||||
|
|
||||||
# Homarr Discovery
|
# Homarr Discovery
|
||||||
homarr.name: FreshRSS
|
homarr.name: FreshRSS
|
||||||
|
|
|
||||||
|
|
@ -27,7 +27,7 @@ services:
|
||||||
traefik.http.services.backrest.loadbalancer.server.port: 9898
|
traefik.http.services.backrest.loadbalancer.server.port: 9898
|
||||||
|
|
||||||
# Require authentication and restrict to local network
|
# Require authentication and restrict to local network
|
||||||
traefik.http.routers.backrest.middlewares: tinyauth,local-only
|
traefik.http.routers.backrest.middlewares: local-only
|
||||||
|
|
||||||
# Homarr Discovery
|
# Homarr Discovery
|
||||||
homarr.name: Backrest Backup
|
homarr.name: Backrest Backup
|
||||||
|
|
|
||||||
|
|
@ -28,7 +28,6 @@ services:
|
||||||
traefik.http.services.booklore.loadbalancer.server.port: 3000
|
traefik.http.services.booklore.loadbalancer.server.port: 3000
|
||||||
|
|
||||||
# SSO Protection
|
# SSO Protection
|
||||||
traefik.http.routers.booklore.middlewares: tinyauth
|
|
||||||
|
|
||||||
# Homarr Discovery
|
# Homarr Discovery
|
||||||
homarr.name: Booklore
|
homarr.name: Booklore
|
||||||
|
|
|
||||||
|
|
@ -30,7 +30,7 @@ services:
|
||||||
traefik.http.services.code-server.loadbalancer.server.port: 8443
|
traefik.http.services.code-server.loadbalancer.server.port: 8443
|
||||||
|
|
||||||
# SSO Protection and restrict to local network
|
# SSO Protection and restrict to local network
|
||||||
traefik.http.routers.code-server.middlewares: tinyauth,local-only
|
traefik.http.routers.code-server.middlewares: local-only
|
||||||
|
|
||||||
# Homarr Discovery
|
# Homarr Discovery
|
||||||
homarr.name: Code Server (IDE)
|
homarr.name: Code Server (IDE)
|
||||||
|
|
|
||||||
|
|
@ -32,7 +32,6 @@ services:
|
||||||
traefik.http.services.homarr.loadbalancer.server.port: 7575
|
traefik.http.services.homarr.loadbalancer.server.port: 7575
|
||||||
|
|
||||||
# Optional: SSO Protection (disabled for dashboard access)
|
# Optional: SSO Protection (disabled for dashboard access)
|
||||||
# traefik.http.routers.homarr.middlewares: tinyauth
|
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
homelab:
|
homelab:
|
||||||
|
|
|
||||||
|
|
@ -30,7 +30,6 @@ services:
|
||||||
traefik.http.services.homepage.loadbalancer.server.port: 3000
|
traefik.http.services.homepage.loadbalancer.server.port: 3000
|
||||||
|
|
||||||
# Optional: SSO Protection (disabled for easy dashboard access)
|
# Optional: SSO Protection (disabled for easy dashboard access)
|
||||||
# traefik.http.routers.homepage.middlewares: tinyauth
|
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
homelab:
|
homelab:
|
||||||
|
|
|
||||||
|
|
@ -34,7 +34,6 @@ services:
|
||||||
traefik.http.services.karakeep.loadbalancer.server.port: 3000
|
traefik.http.services.karakeep.loadbalancer.server.port: 3000
|
||||||
|
|
||||||
# SSO Protection
|
# SSO Protection
|
||||||
traefik.http.routers.karakeep.middlewares: tinyauth
|
|
||||||
|
|
||||||
# Homarr Discovery
|
# Homarr Discovery
|
||||||
homarr.name: Karakeep (Bookmarks)
|
homarr.name: Karakeep (Bookmarks)
|
||||||
|
|
|
||||||
|
|
@ -82,7 +82,6 @@ services:
|
||||||
traefik.http.services.komodo.loadbalancer.server.port: 9120
|
traefik.http.services.komodo.loadbalancer.server.port: 9120
|
||||||
|
|
||||||
# Optional: SSO Protection
|
# Optional: SSO Protection
|
||||||
# traefik.http.routers.komodo.middlewares: tinyauth
|
|
||||||
|
|
||||||
komodo-periphery:
|
komodo-periphery:
|
||||||
container_name: komodo-periphery
|
container_name: komodo-periphery
|
||||||
|
|
|
||||||
|
|
@ -28,7 +28,6 @@ services:
|
||||||
traefik.http.services.microbin.loadbalancer.server.port: 8080
|
traefik.http.services.microbin.loadbalancer.server.port: 8080
|
||||||
|
|
||||||
# Note: MicroBin has its own auth, SSO disabled by default
|
# Note: MicroBin has its own auth, SSO disabled by default
|
||||||
# traefik.http.routers.microbin.middlewares: tinyauth
|
|
||||||
|
|
||||||
# Homarr Discovery
|
# Homarr Discovery
|
||||||
homarr.name: MicroBin
|
homarr.name: MicroBin
|
||||||
|
|
|
||||||
|
|
@ -22,7 +22,6 @@ services:
|
||||||
traefik.http.services.rss-bridge.loadbalancer.server.port: 80
|
traefik.http.services.rss-bridge.loadbalancer.server.port: 80
|
||||||
|
|
||||||
# SSO Protection (disabled so feeds can be accessed by RSS readers)
|
# SSO Protection (disabled so feeds can be accessed by RSS readers)
|
||||||
# traefik.http.routers.rss-bridge.middlewares: tinyauth
|
|
||||||
|
|
||||||
# Homarr Discovery
|
# Homarr Discovery
|
||||||
homarr.name: RSS Bridge
|
homarr.name: RSS Bridge
|
||||||
|
|
|
||||||
|
|
@ -29,7 +29,6 @@ services:
|
||||||
traefik.http.services.rsshub.loadbalancer.server.port: 1200
|
traefik.http.services.rsshub.loadbalancer.server.port: 1200
|
||||||
|
|
||||||
# Note: RSSHub is public by design, SSO disabled
|
# Note: RSSHub is public by design, SSO disabled
|
||||||
# traefik.http.routers.rsshub.middlewares: tinyauth
|
|
||||||
|
|
||||||
# Homarr Discovery
|
# Homarr Discovery
|
||||||
homarr.name: RSSHub
|
homarr.name: RSSHub
|
||||||
|
|
|
||||||
|
|
@ -43,7 +43,6 @@ services:
|
||||||
traefik.http.routers.figgy-main.entrypoints: websecure
|
traefik.http.routers.figgy-main.entrypoints: websecure
|
||||||
traefik.http.routers.figgy-main.tls.certresolver: letsencrypt
|
traefik.http.routers.figgy-main.tls.certresolver: letsencrypt
|
||||||
traefik.http.routers.figgy-main.service: caddy-static
|
traefik.http.routers.figgy-main.service: caddy-static
|
||||||
traefik.http.routers.figgy-main.middlewares: tinyauth
|
|
||||||
# SSO protected - experimental/private content
|
# SSO protected - experimental/private content
|
||||||
|
|
||||||
# Service definition (single backend for all routes)
|
# Service definition (single backend for all routes)
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue