From 420acaea0d9668ba825144eaf947124a1bc03adf Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Thu, 19 Feb 2026 11:29:36 +0000 Subject: [PATCH 2/5] Add Home Assistant ingress support for Seerr addon with nginx reverse proxy Co-authored-by: alexbelgium <44178713+alexbelgium@users.noreply.github.com> --- seerr/Dockerfile | 2 +- seerr/config.yaml | 3 + .../etc/cont-init.d/32-nginx_ingress.sh | 20 ++++ seerr/rootfs/etc/nginx/includes/mime.types | 96 +++++++++++++++++++ .../etc/nginx/includes/proxy_params.conf | 15 +++ seerr/rootfs/etc/nginx/includes/resolver.conf | 1 + .../etc/nginx/includes/server_params.conf | 5 + .../rootfs/etc/nginx/includes/ssl_params.conf | 9 ++ seerr/rootfs/etc/nginx/includes/upstream.conf | 3 + seerr/rootfs/etc/nginx/nginx.conf | 56 +++++++++++ seerr/rootfs/etc/nginx/servers/ingress.conf | 66 +++++++++++++ seerr/rootfs/etc/services.d/nginx/finish | 8 ++ seerr/rootfs/etc/services.d/nginx/run | 11 +++ 13 files changed, 294 insertions(+), 1 deletion(-) create mode 100644 seerr/rootfs/etc/cont-init.d/32-nginx_ingress.sh create mode 100644 seerr/rootfs/etc/nginx/includes/mime.types create mode 100644 seerr/rootfs/etc/nginx/includes/proxy_params.conf create mode 100644 seerr/rootfs/etc/nginx/includes/resolver.conf create mode 100644 seerr/rootfs/etc/nginx/includes/server_params.conf create mode 100644 seerr/rootfs/etc/nginx/includes/ssl_params.conf create mode 100644 seerr/rootfs/etc/nginx/includes/upstream.conf create mode 100644 seerr/rootfs/etc/nginx/nginx.conf create mode 100644 seerr/rootfs/etc/nginx/servers/ingress.conf create mode 100644 seerr/rootfs/etc/services.d/nginx/finish create mode 100644 seerr/rootfs/etc/services.d/nginx/run diff --git a/seerr/Dockerfile b/seerr/Dockerfile index a99f81a87..2ca7e98ba 100644 --- a/seerr/Dockerfile +++ b/seerr/Dockerfile @@ -56,7 +56,7 @@ ADD "https://raw.githubusercontent.com/alexbelgium/hassio-addons/master/.templat RUN chmod 744 /ha_automodules.sh && /ha_automodules.sh "$MODULES" && rm /ha_automodules.sh # Manual apps -ENV PACKAGES="" +ENV PACKAGES="nginx" # Automatic apps & bashio ADD "https://raw.githubusercontent.com/alexbelgium/hassio-addons/master/.templates/ha_autoapps.sh" "/ha_autoapps.sh" diff --git a/seerr/config.yaml b/seerr/config.yaml index 5b3e3924a..04901b09b 100644 --- a/seerr/config.yaml +++ b/seerr/config.yaml @@ -67,6 +67,9 @@ devices: - /dev/nvme2 environment: {} image: ghcr.io/alexbelgium/seerr-{arch} +ingress: true +ingress_port: 0 +ingress_stream: true webui: "[PROTO:ssl]://[HOST]:[PORT:5055]" init: false map: diff --git a/seerr/rootfs/etc/cont-init.d/32-nginx_ingress.sh b/seerr/rootfs/etc/cont-init.d/32-nginx_ingress.sh new file mode 100644 index 000000000..3eda69587 --- /dev/null +++ b/seerr/rootfs/etc/cont-init.d/32-nginx_ingress.sh @@ -0,0 +1,20 @@ +#!/usr/bin/with-contenv bashio +# shellcheck shell=bash +set -e + +#################### +# Seerr Ingress # +#################### + +bashio::log.info "Configuring Nginx for ingress..." + +ingress_port=$(bashio::addon.ingress_port) +ingress_interface=$(bashio::addon.ip_address) +ingress_entry=$(bashio::addon.ingress_entry) + +# Update ingress.conf with actual values +sed -i "s|%%port%%|${ingress_port}|g" /etc/nginx/servers/ingress.conf +sed -i "s|%%interface%%|${ingress_interface}|g" /etc/nginx/servers/ingress.conf +sed -i "s|%%ingress_entry%%|${ingress_entry}|g" /etc/nginx/servers/ingress.conf + +bashio::log.info "Nginx ingress configured on ${ingress_interface}:${ingress_port}" diff --git a/seerr/rootfs/etc/nginx/includes/mime.types b/seerr/rootfs/etc/nginx/includes/mime.types new file mode 100644 index 000000000..7c7cdef2d --- /dev/null +++ b/seerr/rootfs/etc/nginx/includes/mime.types @@ -0,0 +1,96 @@ +types { + text/html html htm shtml; + text/css css; + text/xml xml; + image/gif gif; + image/jpeg jpeg jpg; + application/javascript js; + application/atom+xml atom; + application/rss+xml rss; + + text/mathml mml; + text/plain txt; + text/vnd.sun.j2me.app-descriptor jad; + text/vnd.wap.wml wml; + text/x-component htc; + + image/png png; + image/svg+xml svg svgz; + image/tiff tif tiff; + image/vnd.wap.wbmp wbmp; + image/webp webp; + image/x-icon ico; + image/x-jng jng; + image/x-ms-bmp bmp; + + font/woff woff; + font/woff2 woff2; + + application/java-archive jar war ear; + application/json json; + application/mac-binhex40 hqx; + application/msword doc; + application/pdf pdf; + application/postscript ps eps ai; + application/rtf rtf; + application/vnd.apple.mpegurl m3u8; + application/vnd.google-earth.kml+xml kml; + application/vnd.google-earth.kmz kmz; + application/vnd.ms-excel xls; + application/vnd.ms-fontobject eot; + application/vnd.ms-powerpoint ppt; + application/vnd.oasis.opendocument.graphics odg; + application/vnd.oasis.opendocument.presentation odp; + application/vnd.oasis.opendocument.spreadsheet ods; + application/vnd.oasis.opendocument.text odt; + application/vnd.openxmlformats-officedocument.presentationml.presentation + pptx; + application/vnd.openxmlformats-officedocument.spreadsheetml.sheet + xlsx; + application/vnd.openxmlformats-officedocument.wordprocessingml.document + docx; + application/vnd.wap.wmlc wmlc; + application/x-7z-compressed 7z; + application/x-cocoa cco; + application/x-java-archive-diff jardiff; + application/x-java-jnlp-file jnlp; + application/x-makeself run; + application/x-perl pl pm; + application/x-pilot prc pdb; + application/x-rar-compressed rar; + application/x-redhat-package-manager rpm; + application/x-sea sea; + application/x-shockwave-flash swf; + application/x-stuffit sit; + application/x-tcl tcl tk; + application/x-x509-ca-cert der pem crt; + application/x-xpinstall xpi; + application/xhtml+xml xhtml; + application/xspf+xml xspf; + application/zip zip; + + application/octet-stream bin exe dll; + application/octet-stream deb; + application/octet-stream dmg; + application/octet-stream iso img; + application/octet-stream msi msp msm; + + audio/midi mid midi kar; + audio/mpeg mp3; + audio/ogg ogg; + audio/x-m4a m4a; + audio/x-realaudio ra; + + video/3gpp 3gpp 3gp; + video/mp2t ts; + video/mp4 mp4; + video/mpeg mpeg mpg; + video/quicktime mov; + video/webm webm; + video/x-flv flv; + video/x-m4v m4v; + video/x-mng mng; + video/x-ms-asf asx asf; + video/x-ms-wmv wmv; + video/x-msvideo avi; +} diff --git a/seerr/rootfs/etc/nginx/includes/proxy_params.conf b/seerr/rootfs/etc/nginx/includes/proxy_params.conf new file mode 100644 index 000000000..1990d4959 --- /dev/null +++ b/seerr/rootfs/etc/nginx/includes/proxy_params.conf @@ -0,0 +1,15 @@ +proxy_http_version 1.1; +proxy_ignore_client_abort off; +proxy_read_timeout 86400s; +proxy_redirect off; +proxy_send_timeout 86400s; +proxy_max_temp_file_size 0; + +proxy_set_header Accept-Encoding ""; +proxy_set_header Connection $connection_upgrade; +proxy_set_header Host $http_host; +proxy_set_header Upgrade $http_upgrade; +proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; +proxy_set_header X-Forwarded-Proto $scheme; +proxy_set_header X-NginX-Proxy true; +proxy_set_header X-Real-IP $remote_addr; diff --git a/seerr/rootfs/etc/nginx/includes/resolver.conf b/seerr/rootfs/etc/nginx/includes/resolver.conf new file mode 100644 index 000000000..70f4982b9 --- /dev/null +++ b/seerr/rootfs/etc/nginx/includes/resolver.conf @@ -0,0 +1 @@ +resolver 127.0.0.11 ipv6=off; diff --git a/seerr/rootfs/etc/nginx/includes/server_params.conf b/seerr/rootfs/etc/nginx/includes/server_params.conf new file mode 100644 index 000000000..a0ff6baa0 --- /dev/null +++ b/seerr/rootfs/etc/nginx/includes/server_params.conf @@ -0,0 +1,5 @@ +server_name $hostname; + +add_header X-Content-Type-Options nosniff; +add_header X-XSS-Protection "1; mode=block"; +add_header X-Robots-Tag none; diff --git a/seerr/rootfs/etc/nginx/includes/ssl_params.conf b/seerr/rootfs/etc/nginx/includes/ssl_params.conf new file mode 100644 index 000000000..6f1500599 --- /dev/null +++ b/seerr/rootfs/etc/nginx/includes/ssl_params.conf @@ -0,0 +1,9 @@ +ssl_protocols TLSv1.2; +ssl_prefer_server_ciphers on; +ssl_ciphers ECDHE-RSA-AES256-GCM-SHA512:DHE-RSA-AES256-GCM-SHA512:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA; +ssl_ecdh_curve secp384r1; +ssl_session_timeout 10m; +ssl_session_cache shared:SSL:10m; +ssl_session_tickets off; +ssl_stapling on; +ssl_stapling_verify on; diff --git a/seerr/rootfs/etc/nginx/includes/upstream.conf b/seerr/rootfs/etc/nginx/includes/upstream.conf new file mode 100644 index 000000000..d1839a492 --- /dev/null +++ b/seerr/rootfs/etc/nginx/includes/upstream.conf @@ -0,0 +1,3 @@ +upstream backend { + server 127.0.0.1:5055; +} diff --git a/seerr/rootfs/etc/nginx/nginx.conf b/seerr/rootfs/etc/nginx/nginx.conf new file mode 100644 index 000000000..7e5bc6f7c --- /dev/null +++ b/seerr/rootfs/etc/nginx/nginx.conf @@ -0,0 +1,56 @@ +# Run nginx in foreground. +daemon off; + +# This is run inside Docker. +user root; + +# Pid storage location. +pid /var/run/nginx.pid; + +# Set number of worker processes. +worker_processes 1; + +# Enables the use of JIT for regular expressions to speed-up their processing. +pcre_jit on; + +# Write error log to Hass.io add-on log. +error_log /proc/1/fd/1 error; + +# Load allowed environment vars +env HASSIO_TOKEN; + +# Load dynamic modules. +include /etc/nginx/modules/*.conf; + +# Max num of simultaneous connections by a worker process. +events { + worker_connections 512; +} + +http { + include /etc/nginx/includes/mime.types; + + log_format hassio '[$time_local] $status ' + '$http_x_forwarded_for($remote_addr) ' + '$request ($http_user_agent)'; + + access_log /proc/1/fd/1 hassio; + client_max_body_size 4G; + default_type application/octet-stream; + gzip on; + keepalive_timeout 65; + sendfile on; + server_tokens off; + tcp_nodelay on; + tcp_nopush on; + + map $http_upgrade $connection_upgrade { + default upgrade; + '' close; + } + + include /etc/nginx/includes/resolver.conf; + include /etc/nginx/includes/upstream.conf; + + include /etc/nginx/servers/*.conf; +} diff --git a/seerr/rootfs/etc/nginx/servers/ingress.conf b/seerr/rootfs/etc/nginx/servers/ingress.conf new file mode 100644 index 000000000..b9fcc2f9c --- /dev/null +++ b/seerr/rootfs/etc/nginx/servers/ingress.conf @@ -0,0 +1,66 @@ +server { + listen %%interface%%:%%port%% default_server; + include /etc/nginx/includes/server_params.conf; + include /etc/nginx/includes/proxy_params.conf; + + proxy_buffering off; + gzip_static off; + client_max_body_size 0; + + location / { + proxy_pass http://127.0.0.1:5055; + + proxy_http_version 1.1; + proxy_set_header Upgrade $http_upgrade; + proxy_set_header Connection "upgrade"; + + proxy_hide_header X-Powered-By; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $scheme; + proxy_set_header Accept-Encoding ""; + proxy_read_timeout 90; + add_header X-Frame-Options "SAMEORIGIN"; + add_header 'Referrer-Policy' 'no-referrer'; + + # Correct base_url for ingress + absolute_redirect off; + proxy_redirect / %%ingress_entry%%/; + sub_filter_once off; + sub_filter_types text/html text/css text/javascript application/javascript application/json; + + # Rewrite Next.js static assets + sub_filter '/_next/' '%%ingress_entry%%/_next/'; + + # Rewrite API paths + sub_filter '"/api/v1' '"%%ingress_entry%%/api/v1'; + sub_filter "'/api/v1" "'%%ingress_entry%%/api/v1"; + sub_filter '`/api/v1' '`%%ingress_entry%%/api/v1'; + + # Rewrite image proxy paths + sub_filter '"/imageproxy' '"%%ingress_entry%%/imageproxy'; + sub_filter '"/avatarproxy' '"%%ingress_entry%%/avatarproxy'; + sub_filter "'/imageproxy" "'%%ingress_entry%%/imageproxy"; + sub_filter "'/avatarproxy" "'%%ingress_entry%%/avatarproxy"; + + # Rewrite API docs path + sub_filter '"/api-docs' '"%%ingress_entry%%/api-docs'; + + # Rewrite root href/src references + sub_filter 'href="/' 'href="%%ingress_entry%%/'; + sub_filter 'src="/' 'src="%%ingress_entry%%/'; + sub_filter 'action="/' 'action="%%ingress_entry%%/'; + sub_filter 'content="/' 'content="%%ingress_entry%%/'; + + # Rewrite fetch/router paths in JavaScript + sub_filter 'fetch("/' 'fetch("%%ingress_entry%%/'; + sub_filter "fetch('/" "fetch('%%ingress_entry%%/"; + sub_filter 'fetch(`/' 'fetch(`%%ingress_entry%%/'; + sub_filter 'router.push("/' 'router.push("%%ingress_entry%%/'; + sub_filter "router.push('/" "router.push('%%ingress_entry%%/"; + sub_filter 'router.push(`/' 'router.push(`%%ingress_entry%%/'; + sub_filter 'router.replace("/' 'router.replace("%%ingress_entry%%/'; + sub_filter "router.replace('/" "router.replace('%%ingress_entry%%/"; + sub_filter 'window.location.href="/' 'window.location.href="%%ingress_entry%%/'; + } +} diff --git a/seerr/rootfs/etc/services.d/nginx/finish b/seerr/rootfs/etc/services.d/nginx/finish new file mode 100644 index 000000000..444240135 --- /dev/null +++ b/seerr/rootfs/etc/services.d/nginx/finish @@ -0,0 +1,8 @@ +#!/usr/bin/execlineb -S0 +# ============================================================================== +# Take down the S6 supervision tree when Nginx fails +# ============================================================================== +if { s6-test ${1} -ne 0 } +if { s6-test ${1} -ne 256 } + +s6-svscanctl -t /var/run/s6/services diff --git a/seerr/rootfs/etc/services.d/nginx/run b/seerr/rootfs/etc/services.d/nginx/run new file mode 100644 index 000000000..d94302870 --- /dev/null +++ b/seerr/rootfs/etc/services.d/nginx/run @@ -0,0 +1,11 @@ +#!/usr/bin/with-contenv bashio +# shellcheck shell=bash +set -e +# ============================================================================== + +# Wait for Seerr to become available +bashio::net.wait_for 5055 localhost 900 + +bashio::log.info "Starting NGinx..." + +exec nginx From 99fc601f5bef02311819b2d159fcbbf998ad672a Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Thu, 19 Feb 2026 11:30:40 +0000 Subject: [PATCH 3/5] Address code review: fix proxy_redirect conflict and add TLSv1.3 support Co-authored-by: alexbelgium <44178713+alexbelgium@users.noreply.github.com> --- seerr/rootfs/etc/nginx/includes/proxy_params.conf | 2 +- seerr/rootfs/etc/nginx/includes/ssl_params.conf | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/seerr/rootfs/etc/nginx/includes/proxy_params.conf b/seerr/rootfs/etc/nginx/includes/proxy_params.conf index 1990d4959..aa69123d7 100644 --- a/seerr/rootfs/etc/nginx/includes/proxy_params.conf +++ b/seerr/rootfs/etc/nginx/includes/proxy_params.conf @@ -1,7 +1,7 @@ proxy_http_version 1.1; proxy_ignore_client_abort off; proxy_read_timeout 86400s; -proxy_redirect off; +#proxy_redirect off; proxy_send_timeout 86400s; proxy_max_temp_file_size 0; diff --git a/seerr/rootfs/etc/nginx/includes/ssl_params.conf b/seerr/rootfs/etc/nginx/includes/ssl_params.conf index 6f1500599..6cf1b5a3e 100644 --- a/seerr/rootfs/etc/nginx/includes/ssl_params.conf +++ b/seerr/rootfs/etc/nginx/includes/ssl_params.conf @@ -1,4 +1,4 @@ -ssl_protocols TLSv1.2; +ssl_protocols TLSv1.2 TLSv1.3; ssl_prefer_server_ciphers on; ssl_ciphers ECDHE-RSA-AES256-GCM-SHA512:DHE-RSA-AES256-GCM-SHA512:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA; ssl_ecdh_curve secp384r1; From 2078d51cbb0bd66df7e21483b68d620597b158dc Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Thu, 19 Feb 2026 12:50:14 +0000 Subject: [PATCH 4/5] Align ingress sub_filter rules with official Seerr reverse proxy docs Co-authored-by: alexbelgium <44178713+alexbelgium@users.noreply.github.com> --- .../etc/cont-init.d/32-nginx_ingress.sh | 4 ++ seerr/rootfs/etc/nginx/servers/ingress.conf | 60 +++++++------------ 2 files changed, 27 insertions(+), 37 deletions(-) diff --git a/seerr/rootfs/etc/cont-init.d/32-nginx_ingress.sh b/seerr/rootfs/etc/cont-init.d/32-nginx_ingress.sh index 3eda69587..a3f00c6c0 100644 --- a/seerr/rootfs/etc/cont-init.d/32-nginx_ingress.sh +++ b/seerr/rootfs/etc/cont-init.d/32-nginx_ingress.sh @@ -12,9 +12,13 @@ ingress_port=$(bashio::addon.ingress_port) ingress_interface=$(bashio::addon.ip_address) ingress_entry=$(bashio::addon.ingress_entry) +# Build escaped version of ingress_entry for JavaScript contexts (e.g., \/_next) +ingress_entry_escaped="${ingress_entry//\//\\\\/}" + # Update ingress.conf with actual values sed -i "s|%%port%%|${ingress_port}|g" /etc/nginx/servers/ingress.conf sed -i "s|%%interface%%|${ingress_interface}|g" /etc/nginx/servers/ingress.conf +sed -i "s|%%ingress_entry_escaped%%|${ingress_entry_escaped}|g" /etc/nginx/servers/ingress.conf sed -i "s|%%ingress_entry%%|${ingress_entry}|g" /etc/nginx/servers/ingress.conf bashio::log.info "Nginx ingress configured on ${ingress_interface}:${ingress_port}" diff --git a/seerr/rootfs/etc/nginx/servers/ingress.conf b/seerr/rootfs/etc/nginx/servers/ingress.conf index b9fcc2f9c..41e47ecc9 100644 --- a/seerr/rootfs/etc/nginx/servers/ingress.conf +++ b/seerr/rootfs/etc/nginx/servers/ingress.conf @@ -23,44 +23,30 @@ server { add_header X-Frame-Options "SAMEORIGIN"; add_header 'Referrer-Policy' 'no-referrer'; - # Correct base_url for ingress + # Redirect location headers absolute_redirect off; - proxy_redirect / %%ingress_entry%%/; + proxy_redirect ^ %%ingress_entry%%; + proxy_redirect /setup %%ingress_entry%%/setup; + proxy_redirect /login %%ingress_entry%%/login; + + # Sub filters to replace hardcoded paths + # Based on https://github.com/seerr-team/seerr/blob/develop/docs/extending-seerr/reverse-proxy.mdx sub_filter_once off; - sub_filter_types text/html text/css text/javascript application/javascript application/json; - - # Rewrite Next.js static assets - sub_filter '/_next/' '%%ingress_entry%%/_next/'; - - # Rewrite API paths - sub_filter '"/api/v1' '"%%ingress_entry%%/api/v1'; - sub_filter "'/api/v1" "'%%ingress_entry%%/api/v1"; - sub_filter '`/api/v1' '`%%ingress_entry%%/api/v1'; - - # Rewrite image proxy paths - sub_filter '"/imageproxy' '"%%ingress_entry%%/imageproxy'; - sub_filter '"/avatarproxy' '"%%ingress_entry%%/avatarproxy'; - sub_filter "'/imageproxy" "'%%ingress_entry%%/imageproxy"; - sub_filter "'/avatarproxy" "'%%ingress_entry%%/avatarproxy"; - - # Rewrite API docs path - sub_filter '"/api-docs' '"%%ingress_entry%%/api-docs'; - - # Rewrite root href/src references - sub_filter 'href="/' 'href="%%ingress_entry%%/'; - sub_filter 'src="/' 'src="%%ingress_entry%%/'; - sub_filter 'action="/' 'action="%%ingress_entry%%/'; - sub_filter 'content="/' 'content="%%ingress_entry%%/'; - - # Rewrite fetch/router paths in JavaScript - sub_filter 'fetch("/' 'fetch("%%ingress_entry%%/'; - sub_filter "fetch('/" "fetch('%%ingress_entry%%/"; - sub_filter 'fetch(`/' 'fetch(`%%ingress_entry%%/'; - sub_filter 'router.push("/' 'router.push("%%ingress_entry%%/'; - sub_filter "router.push('/" "router.push('%%ingress_entry%%/"; - sub_filter 'router.push(`/' 'router.push(`%%ingress_entry%%/'; - sub_filter 'router.replace("/' 'router.replace("%%ingress_entry%%/'; - sub_filter "router.replace('/" "router.replace('%%ingress_entry%%/"; - sub_filter 'window.location.href="/' 'window.location.href="%%ingress_entry%%/'; + sub_filter_types *; + sub_filter 'href="/"' 'href="%%ingress_entry%%"'; + sub_filter 'href="/login"' 'href="%%ingress_entry%%/login"'; + sub_filter 'href:"/"' 'href:"%%ingress_entry%%"'; + sub_filter '\/_next' '%%ingress_entry_escaped%%\/_next'; + sub_filter '/_next' '%%ingress_entry%%/_next'; + sub_filter '/api/v1' '%%ingress_entry%%/api/v1'; + sub_filter '/login/plex/loading' '%%ingress_entry%%/login/plex/loading'; + sub_filter '/images/' '%%ingress_entry%%/images/'; + sub_filter '/imageproxy/' '%%ingress_entry%%/imageproxy/'; + sub_filter '/avatarproxy/' '%%ingress_entry%%/avatarproxy/'; + sub_filter '/android-' '%%ingress_entry%%/android-'; + sub_filter '/apple-' '%%ingress_entry%%/apple-'; + sub_filter '/favicon' '%%ingress_entry%%/favicon'; + sub_filter '/logo_' '%%ingress_entry%%/logo_'; + sub_filter '/site.webmanifest' '%%ingress_entry%%/site.webmanifest'; } } From 928ca108796e0f3cf4631ddc890c90b77545f634 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Thu, 19 Feb 2026 12:54:23 +0000 Subject: [PATCH 5/5] Use fixed /seerr ingress_entry path matching official Seerr reverse proxy docs Co-authored-by: alexbelgium <44178713+alexbelgium@users.noreply.github.com> --- seerr/config.yaml | 1 + .../etc/cont-init.d/32-nginx_ingress.sh | 6 --- seerr/rootfs/etc/nginx/servers/ingress.conf | 47 ++++++++++--------- 3 files changed, 26 insertions(+), 28 deletions(-) diff --git a/seerr/config.yaml b/seerr/config.yaml index 04901b09b..a4da17bf7 100644 --- a/seerr/config.yaml +++ b/seerr/config.yaml @@ -68,6 +68,7 @@ devices: environment: {} image: ghcr.io/alexbelgium/seerr-{arch} ingress: true +ingress_entry: /seerr ingress_port: 0 ingress_stream: true webui: "[PROTO:ssl]://[HOST]:[PORT:5055]" diff --git a/seerr/rootfs/etc/cont-init.d/32-nginx_ingress.sh b/seerr/rootfs/etc/cont-init.d/32-nginx_ingress.sh index a3f00c6c0..920c0cead 100644 --- a/seerr/rootfs/etc/cont-init.d/32-nginx_ingress.sh +++ b/seerr/rootfs/etc/cont-init.d/32-nginx_ingress.sh @@ -10,15 +10,9 @@ bashio::log.info "Configuring Nginx for ingress..." ingress_port=$(bashio::addon.ingress_port) ingress_interface=$(bashio::addon.ip_address) -ingress_entry=$(bashio::addon.ingress_entry) - -# Build escaped version of ingress_entry for JavaScript contexts (e.g., \/_next) -ingress_entry_escaped="${ingress_entry//\//\\\\/}" # Update ingress.conf with actual values sed -i "s|%%port%%|${ingress_port}|g" /etc/nginx/servers/ingress.conf sed -i "s|%%interface%%|${ingress_interface}|g" /etc/nginx/servers/ingress.conf -sed -i "s|%%ingress_entry_escaped%%|${ingress_entry_escaped}|g" /etc/nginx/servers/ingress.conf -sed -i "s|%%ingress_entry%%|${ingress_entry}|g" /etc/nginx/servers/ingress.conf bashio::log.info "Nginx ingress configured on ${ingress_interface}:${ingress_port}" diff --git a/seerr/rootfs/etc/nginx/servers/ingress.conf b/seerr/rootfs/etc/nginx/servers/ingress.conf index 41e47ecc9..5779a1b14 100644 --- a/seerr/rootfs/etc/nginx/servers/ingress.conf +++ b/seerr/rootfs/etc/nginx/servers/ingress.conf @@ -7,8 +7,13 @@ server { gzip_static off; client_max_body_size 0; - location / { - proxy_pass http://127.0.0.1:5055; + # Based on https://github.com/seerr-team/seerr/blob/develop/docs/extending-seerr/reverse-proxy.mdx + location ^~ /seerr { + set $app 'seerr'; + + # Remove /seerr path to pass to the app + rewrite ^/seerr/?(.*)$ /$1 break; + proxy_pass http://127.0.0.1:5055; # NO TRAILING SLASH proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; @@ -24,29 +29,27 @@ server { add_header 'Referrer-Policy' 'no-referrer'; # Redirect location headers - absolute_redirect off; - proxy_redirect ^ %%ingress_entry%%; - proxy_redirect /setup %%ingress_entry%%/setup; - proxy_redirect /login %%ingress_entry%%/login; + proxy_redirect ^ /$app; + proxy_redirect /setup /$app/setup; + proxy_redirect /login /$app/login; # Sub filters to replace hardcoded paths - # Based on https://github.com/seerr-team/seerr/blob/develop/docs/extending-seerr/reverse-proxy.mdx sub_filter_once off; sub_filter_types *; - sub_filter 'href="/"' 'href="%%ingress_entry%%"'; - sub_filter 'href="/login"' 'href="%%ingress_entry%%/login"'; - sub_filter 'href:"/"' 'href:"%%ingress_entry%%"'; - sub_filter '\/_next' '%%ingress_entry_escaped%%\/_next'; - sub_filter '/_next' '%%ingress_entry%%/_next'; - sub_filter '/api/v1' '%%ingress_entry%%/api/v1'; - sub_filter '/login/plex/loading' '%%ingress_entry%%/login/plex/loading'; - sub_filter '/images/' '%%ingress_entry%%/images/'; - sub_filter '/imageproxy/' '%%ingress_entry%%/imageproxy/'; - sub_filter '/avatarproxy/' '%%ingress_entry%%/avatarproxy/'; - sub_filter '/android-' '%%ingress_entry%%/android-'; - sub_filter '/apple-' '%%ingress_entry%%/apple-'; - sub_filter '/favicon' '%%ingress_entry%%/favicon'; - sub_filter '/logo_' '%%ingress_entry%%/logo_'; - sub_filter '/site.webmanifest' '%%ingress_entry%%/site.webmanifest'; + sub_filter 'href="/"' 'href="/$app"'; + sub_filter 'href="/login"' 'href="/$app/login"'; + sub_filter 'href:"/"' 'href:"/$app"'; + sub_filter '\/_next' '\/$app\/_next'; + sub_filter '/_next' '/$app/_next'; + sub_filter '/api/v1' '/$app/api/v1'; + sub_filter '/login/plex/loading' '/$app/login/plex/loading'; + sub_filter '/images/' '/$app/images/'; + sub_filter '/imageproxy/' '/$app/imageproxy/'; + sub_filter '/avatarproxy/' '/$app/avatarproxy/'; + sub_filter '/android-' '/$app/android-'; + sub_filter '/apple-' '/$app/apple-'; + sub_filter '/favicon' '/$app/favicon'; + sub_filter '/logo_' '/$app/logo_'; + sub_filter '/site.webmanifest' '/$app/site.webmanifest'; } }