From f54509c3f93386c93a3771e0da252bb7dc7fd329 Mon Sep 17 00:00:00 2001 From: Stefan Melmuk <509385+stefan0xC@users.noreply.github.com> Date: Wed, 9 Jul 2025 15:00:52 +0200 Subject: [PATCH] remove id again because it does not get rendered --- Proxy-examples.md | 30 +++++++++++++++--------------- 1 file changed, 15 insertions(+), 15 deletions(-) diff --git a/Proxy-examples.md b/Proxy-examples.md index 8113fd7..fe0cd04 100644 --- a/Proxy-examples.md +++ b/Proxy-examples.md @@ -13,7 +13,7 @@ Secure TLS protocol and cipher configurations for webservers can be generated us *** -
+
Caddy 2.x
Caddy 2 will automatically enable HTTPS in most circumstances, check the [docs](https://caddyserver.com/docs/automatic-https#activation). @@ -101,7 +101,7 @@ If you prefer, you can also directly specify a value instead of substituting an ```
-
+
lighttpd with sub-path (by FlakyPi)
In this example Vaultwarden will be available via https://shared.example.tld/vault/
@@ -144,7 +144,7 @@ You'll have to set `IP_HEADER` to `X-Forwarded-For` instead of `X-Real-IP` in th
-
+
Nginx (by @BlackDex)
```nginx @@ -231,7 +231,7 @@ If you run into 504 Gateway Timeout problems, tell nginx to wait longer for Vaul
-
+
Nginx with sub-path (by @BlackDex)
In this example Vaultwarden will be available via https://shared.example.tld/vault/
@@ -335,7 +335,7 @@ server { ```
-
+
Nginx (NixOS) (by tklitschi, samdoshi)
Example NixOS nginx config. For more Information about NixOS Deployment see [Deployment Wiki page](https://github.com/dani-garcia/vaultwarden/wiki/Deployment-examples). @@ -376,7 +376,7 @@ Example NixOS nginx config. For more Information about NixOS Deployment see [Dep ```
-
+
Nginx with proxy_protocol in front (by dionysius)
In this example there is a downstream proxy communicating in [proxy_protocol in front of this nginx](https://docs.nginx.com/nginx/admin-guide/load-balancer/using-proxy-protocol/) (E.g. a [LXD proxy device with proxy_protocol enabled](https://linuxcontainers.org/lxd/docs/master/reference/devices_proxy/)). Nginx needs to correctly consume the protocol and headers to forward need to be set from the those. Lines marked with `# <---` have different contents than BlackDex's example. @@ -465,7 +465,7 @@ server { ```
-
+
Apache (by fbartels)
Remember to enable `mod_proxy_wstunnel` and `mod_proxy_http`, for example with: `a2enmod proxy_wstunnel` and `a2enmod proxy_http`. @@ -493,7 +493,7 @@ Remember to enable `mod_proxy_wstunnel` and `mod_proxy_http`, for example with: ```
-
+
Apache in a sub-location (by @agentdr8)
Modify your docker start-up to include the sub-location. @@ -566,7 +566,7 @@ labels: ```
-
+
Traefik v2 (docker-compose example by hwwilliams, gzfrozen)
#### Traefik v1 labels migrated to Traefik v2 @@ -601,7 +601,7 @@ labels: ```
-
+
HAproxy (by @BlackDex)
Add these lines to your haproxy configuration. @@ -626,8 +626,8 @@ backend vaultwarden_http ```
-
-HAproxy Kubernetes Ingress(by @devinslick)
+
+HAproxy Kubernetes Ingress (by @devinslick)
Controller installation details can be found here: https://www.haproxy.com/documentation/kubernetes-ingress/community/installation/on-prem/ Note that the CF-Connecting-IP header is only required if you use cloudflare @@ -665,7 +665,7 @@ spec: ```
-
+
Istio k8s (by @asenyaev)
```gateway+vs @@ -718,7 +718,7 @@ spec: ```
-
+
CloudFlare Tunnel (by @calvin-li-developer)
`docker-compose.yml`: @@ -789,7 +789,7 @@ ingress:
-Pound
+Pound
``` Alive 15