From 5df9eb85880daec0caef16b1591a7f6b22e38522 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Sat, 18 Apr 2026 12:53:47 +0000 Subject: [PATCH 2/8] Add Ingress support to Bazarr NAS addon - Add ingress: true, ingress_entry, panel_icon, panel_admin to config.yaml - Add connection_mode option (ingress_noauth/noingress_auth/ingress_auth) - Add nginx package and 90-disable_ingress.sh module to Dockerfile - Add nginx reverse proxy configuration (matching Sonarr/Radarr pattern) - Add 32-nginx_ingress.sh init script for Bazarr YAML config handling - Add nginx S6 service (run/finish) with base_url validation Agent-Logs-Url: https://github.com/alexbelgium/hassio-addons/sessions/621436fb-7e38-4572-8231-55b067f62d83 Co-authored-by: alexbelgium <44178713+alexbelgium@users.noreply.github.com> --- bazarr/Dockerfile | 4 +- bazarr/config.yaml | 6 ++ .../etc/cont-init.d/32-nginx_ingress.sh | 57 +++++++++++ bazarr/rootfs/etc/nginx/includes/mime.types | 96 +++++++++++++++++++ .../etc/nginx/includes/proxy_params.conf | 16 ++++ .../rootfs/etc/nginx/includes/resolver.conf | 1 + .../etc/nginx/includes/server_params.conf | 5 + .../rootfs/etc/nginx/includes/ssl_params.conf | 9 ++ .../rootfs/etc/nginx/includes/upstream.conf | 3 + bazarr/rootfs/etc/nginx/nginx.conf | 57 +++++++++++ bazarr/rootfs/etc/nginx/servers/ingress.conf | 29 ++++++ bazarr/rootfs/etc/services.d/nginx/finish | 8 ++ bazarr/rootfs/etc/services.d/nginx/run | 24 +++++ 13 files changed, 313 insertions(+), 2 deletions(-) create mode 100644 bazarr/rootfs/etc/cont-init.d/32-nginx_ingress.sh create mode 100644 bazarr/rootfs/etc/nginx/includes/mime.types create mode 100644 bazarr/rootfs/etc/nginx/includes/proxy_params.conf create mode 100644 bazarr/rootfs/etc/nginx/includes/resolver.conf create mode 100644 bazarr/rootfs/etc/nginx/includes/server_params.conf create mode 100644 bazarr/rootfs/etc/nginx/includes/ssl_params.conf create mode 100644 bazarr/rootfs/etc/nginx/includes/upstream.conf create mode 100644 bazarr/rootfs/etc/nginx/nginx.conf create mode 100644 bazarr/rootfs/etc/nginx/servers/ingress.conf create mode 100644 bazarr/rootfs/etc/services.d/nginx/finish create mode 100644 bazarr/rootfs/etc/services.d/nginx/run diff --git a/bazarr/Dockerfile b/bazarr/Dockerfile index a3d8a8e8b..6df0936c3 100644 --- a/bazarr/Dockerfile +++ b/bazarr/Dockerfile @@ -47,14 +47,14 @@ RUN if [ ! -f /bin/sh ] && [ -f /usr/bin/sh ]; then ln -s /usr/bin/sh /bin/sh; f if [ ! -f /bin/bash ] && [ -f /usr/bin/bash ]; then ln -s /usr/bin/bash /bin/bash; fi # Modules -ARG MODULES="00-banner.sh 01-custom_script.sh 00-local_mounts.sh 00-smb_mounts.sh" +ARG MODULES="00-banner.sh 01-custom_script.sh 90-disable_ingress.sh 00-local_mounts.sh 00-smb_mounts.sh" # Automatic modules download COPY ha_automodules.sh /ha_automodules.sh RUN chmod 744 /ha_automodules.sh && /ha_automodules.sh "$MODULES" && rm /ha_automodules.sh # Manual apps -ENV PACKAGES="" +ENV PACKAGES="nginx" # Automatic apps & bashio COPY ha_autoapps.sh /ha_autoapps.sh diff --git a/bazarr/config.yaml b/bazarr/config.yaml index d29100051..bdfefab73 100644 --- a/bazarr/config.yaml +++ b/bazarr/config.yaml @@ -72,6 +72,8 @@ environment: PGID: "0" PUID: "0" image: ghcr.io/alexbelgium/bazarr-{arch} +ingress: true +ingress_entry: bazarr init: false map: - addon_config:rw @@ -84,6 +86,9 @@ options: env_vars: [] PGID: 0 PUID: 0 + connection_mode: ingress_noauth +panel_admin: false +panel_icon: mdi:subtitles-outline ports: 6767/tcp: 6767 ports_description: @@ -101,6 +106,7 @@ schema: cifsdomain: str? cifspassword: str? cifsusername: str? + connection_mode: list(ingress_noauth|noingress_auth|ingress_auth) localdisks: str? networkdisks: str? slug: bazarr_nas diff --git a/bazarr/rootfs/etc/cont-init.d/32-nginx_ingress.sh b/bazarr/rootfs/etc/cont-init.d/32-nginx_ingress.sh new file mode 100644 index 000000000..153a57576 --- /dev/null +++ b/bazarr/rootfs/etc/cont-init.d/32-nginx_ingress.sh @@ -0,0 +1,57 @@ +#!/usr/bin/with-contenv bashio +# shellcheck shell=bash +set -e + +################# +# NGINX SETTING # +################# +declare ingress_interface +declare ingress_port + +ingress_port=$(bashio::addon.ingress_port) +ingress_interface=$(bashio::addon.ip_address) +ingress_entry=$(bashio::addon.ingress_entry) +sed -i "s/%%port%%/${ingress_port}/g" /etc/nginx/servers/ingress.conf +sed -i "s/%%interface%%/${ingress_interface}/g" /etc/nginx/servers/ingress.conf +sed -i "s|%%ingress_entry%%|${ingress_entry}|g" /etc/nginx/servers/ingress.conf + +################## +# CONFIG SETTING # +################## + +# Values +slug=bazarr +CONFIG_LOCATION=/config/config/config.yaml + +if [ -f "$CONFIG_LOCATION" ]; then + + # Define addon mode + connection_mode="$(bashio::config "connection_mode")" + bashio::log.green "---------------------------" + bashio::log.green "Connection_mode is $connection_mode" + bashio::log.green "---------------------------" + case "$connection_mode" in + # Ingress mode, authentication is disabled + ingress_noauth) + bashio::log.green "Ingress is enabled, authentication is disabled" + bashio::log.yellow "WARNING : Make sure that the port is not exposed externally by your router to avoid a security risk !" + # Set base_url + sed -i "s/ base_url:.*/ base_url: $slug/" "$CONFIG_LOCATION" + # Disable auth + sed -i '/^auth:/,/^[^ ]/{ s/ type:.*/ type: null/ }' "$CONFIG_LOCATION" + ;; + # Ingress mode, with authentication + ingress_auth) + bashio::log.green "Ingress is enabled, and external authentication is enabled" + # Set base_url + sed -i "s/ base_url:.*/ base_url: $slug/" "$CONFIG_LOCATION" + ;; + # No ingress mode, with authentication + noingress_auth) + bashio::log.green "Disabling ingress and enabling authentication" + bashio::log.yellow "WARNING : Ingress is disabled so the app won't be available from HA itself !" + sed -i "s/ base_url:.*/ base_url: ''/" "$CONFIG_LOCATION" + ;; + esac + +fi diff --git a/bazarr/rootfs/etc/nginx/includes/mime.types b/bazarr/rootfs/etc/nginx/includes/mime.types new file mode 100644 index 000000000..7c7cdef2d --- /dev/null +++ b/bazarr/rootfs/etc/nginx/includes/mime.types @@ -0,0 +1,96 @@ +types { + text/html html htm shtml; + text/css css; + text/xml xml; + image/gif gif; + image/jpeg jpeg jpg; + application/javascript js; + application/atom+xml atom; + application/rss+xml rss; + + text/mathml mml; + text/plain txt; + text/vnd.sun.j2me.app-descriptor jad; + text/vnd.wap.wml wml; + text/x-component htc; + + image/png png; + image/svg+xml svg svgz; + image/tiff tif tiff; + image/vnd.wap.wbmp wbmp; + image/webp webp; + image/x-icon ico; + image/x-jng jng; + image/x-ms-bmp bmp; + + font/woff woff; + font/woff2 woff2; + + application/java-archive jar war ear; + application/json json; + application/mac-binhex40 hqx; + application/msword doc; + application/pdf pdf; + application/postscript ps eps ai; + application/rtf rtf; + application/vnd.apple.mpegurl m3u8; + application/vnd.google-earth.kml+xml kml; + application/vnd.google-earth.kmz kmz; + application/vnd.ms-excel xls; + application/vnd.ms-fontobject eot; + application/vnd.ms-powerpoint ppt; + application/vnd.oasis.opendocument.graphics odg; + application/vnd.oasis.opendocument.presentation odp; + application/vnd.oasis.opendocument.spreadsheet ods; + application/vnd.oasis.opendocument.text odt; + application/vnd.openxmlformats-officedocument.presentationml.presentation + pptx; + application/vnd.openxmlformats-officedocument.spreadsheetml.sheet + xlsx; + application/vnd.openxmlformats-officedocument.wordprocessingml.document + docx; + application/vnd.wap.wmlc wmlc; + application/x-7z-compressed 7z; + application/x-cocoa cco; + application/x-java-archive-diff jardiff; + application/x-java-jnlp-file jnlp; + application/x-makeself run; + application/x-perl pl pm; + application/x-pilot prc pdb; + application/x-rar-compressed rar; + application/x-redhat-package-manager rpm; + application/x-sea sea; + application/x-shockwave-flash swf; + application/x-stuffit sit; + application/x-tcl tcl tk; + application/x-x509-ca-cert der pem crt; + application/x-xpinstall xpi; + application/xhtml+xml xhtml; + application/xspf+xml xspf; + application/zip zip; + + application/octet-stream bin exe dll; + application/octet-stream deb; + application/octet-stream dmg; + application/octet-stream iso img; + application/octet-stream msi msp msm; + + audio/midi mid midi kar; + audio/mpeg mp3; + audio/ogg ogg; + audio/x-m4a m4a; + audio/x-realaudio ra; + + video/3gpp 3gpp 3gp; + video/mp2t ts; + video/mp4 mp4; + video/mpeg mpeg mpg; + video/quicktime mov; + video/webm webm; + video/x-flv flv; + video/x-m4v m4v; + video/x-mng mng; + video/x-ms-asf asx asf; + video/x-ms-wmv wmv; + video/x-msvideo avi; +} diff --git a/bazarr/rootfs/etc/nginx/includes/proxy_params.conf b/bazarr/rootfs/etc/nginx/includes/proxy_params.conf new file mode 100644 index 000000000..924ba949e --- /dev/null +++ b/bazarr/rootfs/etc/nginx/includes/proxy_params.conf @@ -0,0 +1,16 @@ +proxy_http_version 1.1; +proxy_ignore_client_abort off; +proxy_read_timeout 86400s; +proxy_redirect off; +proxy_send_timeout 86400s; +proxy_max_temp_file_size 0; + +proxy_hide_header X-Frame-Options; +proxy_set_header Accept-Encoding ""; +proxy_set_header Connection $connection_upgrade; +proxy_set_header Upgrade $http_upgrade; +proxy_set_header Host $http_host; +proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; +proxy_set_header X-Forwarded-Proto $scheme; +proxy_set_header X-NginX-Proxy true; +proxy_set_header X-Real-IP $remote_addr; diff --git a/bazarr/rootfs/etc/nginx/includes/resolver.conf b/bazarr/rootfs/etc/nginx/includes/resolver.conf new file mode 100644 index 000000000..70f4982b9 --- /dev/null +++ b/bazarr/rootfs/etc/nginx/includes/resolver.conf @@ -0,0 +1 @@ +resolver 127.0.0.11 ipv6=off; diff --git a/bazarr/rootfs/etc/nginx/includes/server_params.conf b/bazarr/rootfs/etc/nginx/includes/server_params.conf new file mode 100644 index 000000000..a0ff6baa0 --- /dev/null +++ b/bazarr/rootfs/etc/nginx/includes/server_params.conf @@ -0,0 +1,5 @@ +server_name $hostname; + +add_header X-Content-Type-Options nosniff; +add_header X-XSS-Protection "1; mode=block"; +add_header X-Robots-Tag none; diff --git a/bazarr/rootfs/etc/nginx/includes/ssl_params.conf b/bazarr/rootfs/etc/nginx/includes/ssl_params.conf new file mode 100644 index 000000000..6f1500599 --- /dev/null +++ b/bazarr/rootfs/etc/nginx/includes/ssl_params.conf @@ -0,0 +1,9 @@ +ssl_protocols TLSv1.2; +ssl_prefer_server_ciphers on; +ssl_ciphers ECDHE-RSA-AES256-GCM-SHA512:DHE-RSA-AES256-GCM-SHA512:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA; +ssl_ecdh_curve secp384r1; +ssl_session_timeout 10m; +ssl_session_cache shared:SSL:10m; +ssl_session_tickets off; +ssl_stapling on; +ssl_stapling_verify on; diff --git a/bazarr/rootfs/etc/nginx/includes/upstream.conf b/bazarr/rootfs/etc/nginx/includes/upstream.conf new file mode 100644 index 000000000..61ecbf251 --- /dev/null +++ b/bazarr/rootfs/etc/nginx/includes/upstream.conf @@ -0,0 +1,3 @@ +upstream backend { + server 127.0.0.1:8080; +} diff --git a/bazarr/rootfs/etc/nginx/nginx.conf b/bazarr/rootfs/etc/nginx/nginx.conf new file mode 100644 index 000000000..833c2ad1d --- /dev/null +++ b/bazarr/rootfs/etc/nginx/nginx.conf @@ -0,0 +1,57 @@ + +# Run nginx in foreground. +daemon off; + +# This is run inside Docker. +user root; + +# Pid storage location. +pid /var/run/nginx.pid; + +# Set number of worker processes. +worker_processes 1; + +# Enables the use of JIT for regular expressions to speed-up their processing. +pcre_jit on; + +# Write error log to Hass.io add-on log. +error_log /proc/1/fd/1 error; + +# Load allowed environment vars +env HASSIO_TOKEN; + +# Load dynamic modules. +include /etc/nginx/modules/*.conf; + +# Max num of simultaneous connections by a worker process. +events { + worker_connections 512; +} + +http { + include /etc/nginx/includes/mime.types; + + log_format hassio '[$time_local] $status ' + '$http_x_forwarded_for($remote_addr) ' + '$request ($http_user_agent)'; + + access_log /proc/1/fd/1 hassio; + client_max_body_size 4G; + default_type application/octet-stream; + gzip on; + keepalive_timeout 65; + sendfile on; + server_tokens off; + tcp_nodelay on; + tcp_nopush on; + + map $http_upgrade $connection_upgrade { + default upgrade; + '' close; + } + + include /etc/nginx/includes/resolver.conf; + include /etc/nginx/includes/upstream.conf; + + include /etc/nginx/servers/*.conf; +} diff --git a/bazarr/rootfs/etc/nginx/servers/ingress.conf b/bazarr/rootfs/etc/nginx/servers/ingress.conf new file mode 100644 index 000000000..95f57fca4 --- /dev/null +++ b/bazarr/rootfs/etc/nginx/servers/ingress.conf @@ -0,0 +1,29 @@ +server { + listen %%interface%%:%%port%% default_server; + + #include /etc/nginx/includes/server_params.conf; + #include /etc/nginx/includes/proxy_params.conf; + + client_max_body_size 0; + + location / { + add_header Access-Control-Allow-Origin *; + proxy_connect_timeout 30m; + proxy_send_timeout 30m; + proxy_read_timeout 30m; + proxy_pass http://127.0.0.1:6767; + + # Allow websocket + proxy_http_version 1.1; + proxy_set_header Upgrade $http_upgrade; + proxy_set_header Connection $http_connection; + #auth_basic off; + + # Correct base_url + proxy_set_header Accept-Encoding ""; + sub_filter_once off; + sub_filter_types *; + sub_filter /bazarr %%ingress_entry%%/bazarr; + } + +} diff --git a/bazarr/rootfs/etc/services.d/nginx/finish b/bazarr/rootfs/etc/services.d/nginx/finish new file mode 100644 index 000000000..444240135 --- /dev/null +++ b/bazarr/rootfs/etc/services.d/nginx/finish @@ -0,0 +1,8 @@ +#!/usr/bin/execlineb -S0 +# ============================================================================== +# Take down the S6 supervision tree when Nginx fails +# ============================================================================== +if { s6-test ${1} -ne 0 } +if { s6-test ${1} -ne 256 } + +s6-svscanctl -t /var/run/s6/services diff --git a/bazarr/rootfs/etc/services.d/nginx/run b/bazarr/rootfs/etc/services.d/nginx/run new file mode 100644 index 000000000..d5bdc999a --- /dev/null +++ b/bazarr/rootfs/etc/services.d/nginx/run @@ -0,0 +1,24 @@ +#!/usr/bin/with-contenv bashio +# shellcheck shell=bash +set -e +# ============================================================================== + +# Set variables +slug=bazarr +port=6767 +CONFIG_LOCATION=/config/config/config.yaml + +# Wait for bazarr to become available +bashio::net.wait_for "$port" localhost 900 + +# Set base_url +if [ -f "$CONFIG_LOCATION" ]; then + if ! grep -q "base_url.*$slug" "$CONFIG_LOCATION" && ! bashio::config.true "ingress_disabled"; then + bashio::log.warning "BaseUrl not set properly, restarting" + sed -i "s/ base_url:.*/ base_url: $slug/" "$CONFIG_LOCATION" + bashio::addon.restart + fi +fi + +bashio::log.info "Starting NGinx..." +exec nginx From de34808c400c7f7b477f50c8444291fb8e135696 Mon Sep 17 00:00:00 2001 From: Alexandre <44178713+alexbelgium@users.noreply.github.com> Date: Mon, 20 Apr 2026 09:43:00 +0200 Subject: [PATCH 3/8] Potential fix for pull request finding Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com> --- bazarr/rootfs/etc/cont-init.d/32-nginx_ingress.sh | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/bazarr/rootfs/etc/cont-init.d/32-nginx_ingress.sh b/bazarr/rootfs/etc/cont-init.d/32-nginx_ingress.sh index 153a57576..5bebf042b 100644 --- a/bazarr/rootfs/etc/cont-init.d/32-nginx_ingress.sh +++ b/bazarr/rootfs/etc/cont-init.d/32-nginx_ingress.sh @@ -45,12 +45,16 @@ if [ -f "$CONFIG_LOCATION" ]; then bashio::log.green "Ingress is enabled, and external authentication is enabled" # Set base_url sed -i "s/ base_url:.*/ base_url: $slug/" "$CONFIG_LOCATION" + # Enable Bazarr auth when leaving ingress_noauth + sed -i '/^auth:/,/^[^ ]/{ s/ type:.*/ type: form/ }' "$CONFIG_LOCATION" ;; # No ingress mode, with authentication noingress_auth) bashio::log.green "Disabling ingress and enabling authentication" bashio::log.yellow "WARNING : Ingress is disabled so the app won't be available from HA itself !" sed -i "s/ base_url:.*/ base_url: ''/" "$CONFIG_LOCATION" + # Enable Bazarr auth when leaving ingress_noauth + sed -i '/^auth:/,/^[^ ]/{ s/ type:.*/ type: form/ }' "$CONFIG_LOCATION" ;; esac From e6d8c926c390e0621f6d0264370bc7b2394df26f Mon Sep 17 00:00:00 2001 From: Alexandre <44178713+alexbelgium@users.noreply.github.com> Date: Mon, 20 Apr 2026 09:43:11 +0200 Subject: [PATCH 4/8] Potential fix for pull request finding Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com> --- bazarr/rootfs/etc/services.d/nginx/run | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/bazarr/rootfs/etc/services.d/nginx/run b/bazarr/rootfs/etc/services.d/nginx/run index d5bdc999a..94c657e39 100644 --- a/bazarr/rootfs/etc/services.d/nginx/run +++ b/bazarr/rootfs/etc/services.d/nginx/run @@ -13,10 +13,14 @@ bashio::net.wait_for "$port" localhost 900 # Set base_url if [ -f "$CONFIG_LOCATION" ]; then - if ! grep -q "base_url.*$slug" "$CONFIG_LOCATION" && ! bashio::config.true "ingress_disabled"; then - bashio::log.warning "BaseUrl not set properly, restarting" - sed -i "s/ base_url:.*/ base_url: $slug/" "$CONFIG_LOCATION" - bashio::addon.restart + if ! bashio::config.true "ingress_disabled"; then + if ! bashio::config.has_value "connection_mode" || [ "$(bashio::config 'connection_mode')" != "noingress_auth" ]; then + if ! grep -q "base_url.*$slug" "$CONFIG_LOCATION"; then + bashio::log.warning "BaseUrl not set properly, restarting" + sed -i "s/ base_url:.*/ base_url: $slug/" "$CONFIG_LOCATION" + bashio::addon.restart + fi + fi fi fi From 90fb7400090e9325c9ef0f4ab5c2a886ee58709b Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Mon, 20 Apr 2026 07:51:23 +0000 Subject: [PATCH 5/8] Update CHANGELOG.md and README.md for Bazarr ingress support Agent-Logs-Url: https://github.com/alexbelgium/hassio-addons/sessions/78d7d6d1-48d6-4b72-b2ec-994ffd94eba3 Co-authored-by: alexbelgium <44178713+alexbelgium@users.noreply.github.com> --- bazarr/CHANGELOG.md | 4 ++++ bazarr/README.md | 8 ++++++++ 2 files changed, 12 insertions(+) diff --git a/bazarr/CHANGELOG.md b/bazarr/CHANGELOG.md index 88d9e3b15..ffdde6af8 100644 --- a/bazarr/CHANGELOG.md +++ b/bazarr/CHANGELOG.md @@ -1,4 +1,8 @@ +## 1.5.6-2 (2026-04-20) +- Add Ingress support with nginx reverse proxy for sidebar integration +- Add connection_mode option (ingress_noauth/noingress_auth/ingress_auth) + ## 1.5.6 (2026-02-28) - Update to latest version from linuxserver/docker-bazarr (changelog : https://github.com/linuxserver/docker-bazarr/releases) diff --git a/bazarr/README.md b/bazarr/README.md index 8f42d6002..c7b2a4df3 100644 --- a/bazarr/README.md +++ b/bazarr/README.md @@ -48,18 +48,26 @@ Configurations can be done through the app webUI, except for the following optio | `PGID` | int | `0` | Group ID for file permissions | | `PUID` | int | `0` | User ID for file permissions | | `TZ` | str | | Timezone (e.g., `Europe/London`) | +| `connection_mode` | list | `ingress_noauth` | Connection mode (ingress_noauth/noingress_auth/ingress_auth) | | `localdisks` | str | | Local drives to mount (e.g., `sda1,sdb1,MYNAS`) | | `networkdisks` | str | | SMB shares to mount (e.g., `//SERVER/SHARE`) | | `cifsusername` | str | | SMB username for network shares | | `cifspassword` | str | | SMB password for network shares | | `cifsdomain` | str | | SMB domain for network shares | +### Connection Modes + +- `ingress_noauth` - Default, disables authentication for seamless ingress integration +- `noingress_auth` - Disables ingress for external URL, enables authentication +- `ingress_auth` - Enables both ingress and authentication + ### Example Configuration ```yaml PGID: 0 PUID: 0 TZ: "Europe/London" +connection_mode: "ingress_noauth" localdisks: "sda1,sdb1" networkdisks: "//192.168.1.100/media,//nas.local/subtitles" cifsusername: "mediauser" From 1d2a1d5ed067ddac242b63d3b978f28205df5c9a Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Mon, 20 Apr 2026 08:02:32 +0000 Subject: [PATCH 6/8] Fix version mismatch: bump config.yaml version to 1.5.6-2 to match CHANGELOG Agent-Logs-Url: https://github.com/alexbelgium/hassio-addons/sessions/46ce0994-9638-4ec9-8ba3-e65a2fc6f89f Co-authored-by: alexbelgium <44178713+alexbelgium@users.noreply.github.com> --- bazarr/config.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/bazarr/config.yaml b/bazarr/config.yaml index bdfefab73..1299c6951 100644 --- a/bazarr/config.yaml +++ b/bazarr/config.yaml @@ -112,5 +112,5 @@ schema: slug: bazarr_nas udev: true url: https://github.com/alexbelgium/hassio-addons/tree/master/bazarr -version: "1.5.6" +version: "1.5.6-2" webui: "[PROTO:ssl]://[HOST]:[PORT:6767]" From 3ddc0e8cb32471e23a4f393da05b09a7c1989911 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Mon, 20 Apr 2026 08:03:22 +0000 Subject: [PATCH 7/8] Remove trailing whitespace in upstream.conf Agent-Logs-Url: https://github.com/alexbelgium/hassio-addons/sessions/46ce0994-9638-4ec9-8ba3-e65a2fc6f89f Co-authored-by: alexbelgium <44178713+alexbelgium@users.noreply.github.com> --- bazarr/rootfs/etc/nginx/includes/upstream.conf | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/bazarr/rootfs/etc/nginx/includes/upstream.conf b/bazarr/rootfs/etc/nginx/includes/upstream.conf index 61ecbf251..b292326bd 100644 --- a/bazarr/rootfs/etc/nginx/includes/upstream.conf +++ b/bazarr/rootfs/etc/nginx/includes/upstream.conf @@ -1,3 +1,3 @@ upstream backend { server 127.0.0.1:8080; -} +} From cb6b59a7069b3aeb2cc8d743a8fff600c12d1a63 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Mon, 20 Apr 2026 09:06:25 +0000 Subject: [PATCH 8/8] Increment bazarr version to 1.5.6-3 Agent-Logs-Url: https://github.com/alexbelgium/hassio-addons/sessions/a1ce3a2c-53aa-4027-bdd3-4cfceb087133 Co-authored-by: alexbelgium <44178713+alexbelgium@users.noreply.github.com> --- bazarr/CHANGELOG.md | 2 +- bazarr/config.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/bazarr/CHANGELOG.md b/bazarr/CHANGELOG.md index ffdde6af8..a245574eb 100644 --- a/bazarr/CHANGELOG.md +++ b/bazarr/CHANGELOG.md @@ -1,5 +1,5 @@ -## 1.5.6-2 (2026-04-20) +## 1.5.6-3 (2026-04-20) - Add Ingress support with nginx reverse proxy for sidebar integration - Add connection_mode option (ingress_noauth/noingress_auth/ingress_auth) diff --git a/bazarr/config.yaml b/bazarr/config.yaml index 1299c6951..f4c57f8b3 100644 --- a/bazarr/config.yaml +++ b/bazarr/config.yaml @@ -112,5 +112,5 @@ schema: slug: bazarr_nas udev: true url: https://github.com/alexbelgium/hassio-addons/tree/master/bazarr -version: "1.5.6-2" +version: "1.5.6-3" webui: "[PROTO:ssl]://[HOST]:[PORT:6767]"