Skip to content

fuomag9/caddy-proxy-manager

Repository files navigation

Caddy Proxy Manager

Web interface for managing Caddy Server reverse proxies and certificates.

License Next.js Docker

Report BugRequest Feature

Dashboard screenshot

Overview

This project provides a web UI for Caddy Server, eliminating the need to manually edit JSON configurations or Caddyfiles. It handles reverse proxies, access lists, and certificate management through a Material UI interface.

Key features:

  • Reverse proxy configuration with upstream pools and custom headers
  • HTTP basic auth access lists
  • OAuth2/OIDC authentication support
  • Automatic HTTPS via Caddy's ACME (Let's Encrypt) with Cloudflare DNS-01 support
  • Custom certificate import (internal CA, wildcards, etc.)
  • Audit logging of all configuration changes
  • Built with Next.js 16, React 19, Drizzle ORM, and TypeScript

Installation

git clone https://github.com/fuomag9/caddy-proxy-manager.git
cd caddy-proxy-manager
cp .env.example .env
# Edit .env with your credentials
docker compose up -d

Access at http://localhost:3000/login

Data persists in Docker volumes (caddy-manager-data, caddy-data, caddy-config, caddy-logs).


Features

  • Proxy Hosts - Reverse proxies with custom headers and upstream pools
  • Access Lists - HTTP basic auth
  • Certificates - Custom SSL/TLS import (automatic Let's Encrypt via Caddy)
  • Settings - ACME email and Cloudflare DNS-01 configuration
  • Audit Log - Configuration change tracking

Configuration

Environment Variables

Variable Description Default Required
SESSION_SECRET Session encryption key (32+ chars) None Yes
ADMIN_USERNAME Admin login username admin Yes
ADMIN_PASSWORD Admin password (see requirements below) admin (dev only) Yes
BASE_URL Public URL where users access the dashboard.
Required for OAuth - must match redirect URI
http://localhost:3000 Yes (if using OAuth)
CADDY_API_URL Caddy Admin API endpoint http://caddy:2019 (prod)
http://localhost:2019 (dev)
No
DATABASE_URL SQLite database URL file:/app/data/caddy-proxy-manager.db No
CERTS_DIRECTORY Certificate storage directory ./data/certs No
LOGIN_MAX_ATTEMPTS Max login attempts before rate limit 5 No
LOGIN_WINDOW_MS Rate limit window in milliseconds 300000 (5 min) No
LOGIN_BLOCK_MS Rate limit block duration in milliseconds 900000 (15 min) No
OAUTH_ENABLED Enable OAuth2/OIDC authentication false No
OAUTH_PROVIDER_NAME Display name for OAuth provider OAuth2 No
OAUTH_CLIENT_ID OAuth2 client ID None No
OAUTH_CLIENT_SECRET OAuth2 client secret None No
OAUTH_ISSUER OAuth2 OIDC issuer URL None No

Production Requirements:

  • SESSION_SECRET: 32+ characters (openssl rand -base64 32)
  • ADMIN_PASSWORD: 12+ chars with uppercase, lowercase, numbers, and special characters

Development mode (NODE_ENV=development) allows default admin/admin credentials.


Security

  • Production enforces strong passwords (12+ chars, mixed case, numbers, special characters)
  • 32+ character session secrets required
  • Login rate limiting: 5 attempts per 5 minutes
  • Audit trail for all configuration changes
  • Supports OAuth2/OIDC for SSO

Production Setup:

export SESSION_SECRET=$(openssl rand -base64 32)
export ADMIN_USERNAME="admin"
export ADMIN_PASSWORD="YourStr0ng-P@ssw0rd123!"
docker compose up -d

Limitations:

  • Certificate private keys stored unencrypted in SQLite
  • In-memory rate limiting (not suitable for multi-instance deployments)

Certificate Management

Caddy automatically obtains Let's Encrypt certificates for all proxy hosts.

Cloudflare DNS-01 (optional): Configure in Settings with a Cloudflare API token (Zone.DNS:Edit permissions).

Custom Certificates (optional): Import your own certificates via the Certificates page. Private keys are stored unencrypted in SQLite.


OAuth Authentication

Supports any OIDC-compliant provider (Authentik, Keycloak, Auth0, etc.).

# Set your public URL (REQUIRED for OAuth to work)
BASE_URL=https://caddy-manager.example.com

OAUTH_ENABLED=true
OAUTH_PROVIDER_NAME="Authentik"  # Display name
OAUTH_CLIENT_ID=your-client-id
OAUTH_CLIENT_SECRET=your-client-secret
OAUTH_ISSUER=https://auth.example.com/application/o/app/

Redirect URI Configuration:

You must configure this redirect URI in your OAuth provider:

{BASE_URL}/api/auth/callback/oauth2

Examples:

  • http://localhost:3000/api/auth/callback/oauth2 (development)
  • https://caddy-manager.example.com/api/auth/callback/oauth2 (production)

The BASE_URL environment variable must match exactly where users access your dashboard.

OAuth login appears on the login page alongside credentials. Users can link OAuth to existing accounts from the Profile page.


Roadmap

  • Multi-user RBAC
  • Additional DNS providers (Route53, Namecheap, etc.)
  • Backup/restore
  • API for programmatic configuration

Open an issue for feature requests.


Contributing

Contributions welcome:

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/name)
  3. Commit changes (git commit -m 'Add feature')
  4. Push to branch (git push origin feature/name)
  5. Open a Pull Request
  • Follow the existing code style (TypeScript, Prettier formatting)
  • Add tests for new features when applicable
  • Update documentation for user-facing changes
  • Keep commits focused and write clear commit messages

Support


License

This project is licensed under the MIT License - see the LICENSE file for details.


Acknowledgments


About

Docker container for managing Caddy proxy hosts with a simple, powerful interface

Resources

License

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors 208