Connectivity
Expose your self-hosted HeySummon instance to the internet.
Cloudflare Tunnel (Recommended)
Best for production. Free, custom domains, DDoS protection.
Setup
- Go to Cloudflare Zero Trust → Networks → Tunnels
- Create a tunnel named
hitlaas - Add a public hostname (e.g.,
hitlaas.yourdomain.com) pointing tohttp://app:3000 - Copy the tunnel token
- Run
bash scripts/setup.shand choose option 1
How It Works
Internet → Cloudflare Edge → cloudflared container → app:3000No inbound ports needed. Outbound-only connection.
Security
- No open inbound ports
- All traffic encrypted
- DDoS protection included
- Access policies via Cloudflare Zero Trust
Tailscale Funnel
Best for internal/team use. Built on WireGuard.
Setup
- Enable Funnel in your ACL policy
- Generate a reusable auth key with tags
- Run
bash scripts/setup.shand choose option 2
How It Works
URL: https://hitlaas.<tailnet>.ts.net
Can restrict to Tailscale-only access using --serve instead of --funnel.
Ngrok
Best for quick testing. URL changes on restart (free tier).
Setup
- Create account at ngrok.com
- Copy auth token
- Run
bash scripts/setup.shand choose option 3
Notes
- Free URLs are random and change on restart
- Update
NEXTAUTH_URLwhen URL changes - Paid plans offer custom domains and IP restrictions
- Inspect traffic at
http://localhost:4040
Direct / Manual
If you have a VPS with a public IP or your own reverse proxy:
docker compose up -dConfigure your reverse proxy (Nginx, Caddy, etc.) to forward traffic to port 3000.