-
-
Notifications
You must be signed in to change notification settings - Fork 43
Reverse Proxy and Subpath
github-actions[bot] edited this page Jan 28, 2026
·
1 revision
FileRise is proxy-aware and can run under a subpath like /files. Use these rules for reliable URLs and auth.
- Set
FR_PUBLISHED_URLto the public URL (e.g.https://example.com/files). - If your proxy strips the prefix, set
X-Forwarded-PrefixorFR_BASE_PATH. - If you are behind a proxy, set
FR_TRUSTED_PROXIESandFR_IP_HEADER. - Set
SECURE=truewhen behind HTTPS.
Example: proxy to Docker on 127.0.0.1:8080, mounted at /files.
location /files/ {
rewrite ^/files/(.*)$ /$1 break;
proxy_pass http://127.0.0.1:8080;
proxy_set_header Host $host;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Prefix /files;
}Recommended env:
FR_PUBLISHED_URL=https://example.com/files
Use StripPrefix and rely on X-Forwarded-Prefix:
apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: filerise-strip-files
spec:
stripPrefix:
prefixes:
- /files- Trailing slash in
proxy_passcan break paths. - Forgetting
FR_PUBLISHED_URLresults in bad share links. - If the prefix is stripped but
FR_BASE_PATHis not set, links may be wrong.
Docs · Support · FileRise.net · Changelog
- Admin panel
- Admin gotchas
- Common env vars
- Environment variables full reference
- ACL and permissions
- ACL recipes
- Nginx setup
- Reverse proxy and subpath
- WebDAV
- WebDAV via curl
- WebDAV security and clients
- ONLYOFFICE
- Encryption at rest
- OIDC and SSO
- CIFS share auto metadata
- Sharing and public links
- Upload limits and PHP tuning
- Logs and diagnostics
- Backup and restore
- Upgrade and migration
- Migration checklist
- Maintenance scripts
- Performance quickstart
- Performance tuning
- Security hardening