Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-09-14 | reverse_proxy: Ability to mutate headers; set upstream placeholders | Matthew Holt | |
2019-09-14 | headers: Ability to mutate request headers including http.Request.Host | Matthew Holt | |
Also a few bug fixes | |||
2019-09-13 | Use keybase fork of mitchellh/go-ps for bug fixes (#2750) | Mohammed Al Sahaf | |
2019-09-13 | Forgot to commit caddyfile.go changes in last commit | Matthew Holt | |
2019-09-13 | headers: Add ability to replace substrings in header fields | Matthew Holt | |
This will probably be useful so the proxy can rewrite header values. | |||
2019-09-13 | encode: Fix bug where default status code was being written | Matthew Holt | |
for small responses. See https://caddy.community/t/v2-permanent-redirect-prompt/6190?u=matt | |||
2019-09-13 | Update v2 readme in prep for beta1 | Matthew Holt | |
2019-09-13 | Hard-code 'main' module name until bug upstream in Go modules is fixed | Matthew Holt | |
See https://github.com/golang/go/issues/29228 | |||
2019-09-13 | http: Consider wildcards when evaluating automatic HTTPS | Matthew Holt | |
2019-09-13 | admin: Allow listening on unix socket (closes #2749) | Matthew Holt | |
2019-09-13 | httpcaddyfile: Fix tls certificate loader module names (#2748) | Matthew Holt | |
2019-09-12 | tls: Do away with SetDefaults which did nothing useful | Matthew Holt | |
CertMagic uses the same defaults for us | |||
2019-09-12 | go.mod: Use lego v3 and CertMagic 0.7.0 | Matthew Holt | |
2019-09-11 | tls: Remove support for TLS 1.0 and TLS 1.1 | Matthew Holt | |
2019-09-11 | reverseproxy: Fix host and port on requests; fix Caddyfile parser | Matthew Holt | |
2019-09-11 | tls: Use Let's Encrypt production endpoint | Matthew Holt | |
We're done testing this in staging | |||
2019-09-11 | http: Set Alt-Svc header if experimental HTTP3 server is enabled | Matthew Holt | |
2019-09-11 | headers: New 'request_header' directive; handle Host header specially | Matthew Holt | |
Before this change, only response headers could be manipulated with the Caddyfile's 'header' directive. Also handle the request Host header specially, since the Go standard library treats it separately from the other header fields... | |||
2019-09-11 | reverseproxy: Add 'tls' option to enable HTTPS with HTTP transport | Matthew Holt | |
2019-09-11 | httpcaddyfile: Add 'experimental_http3' option | Matthew Holt | |
2019-09-11 | httpcaddyfile: Switch order; reverse_proxy comes before php_fastcgi | Matthew Holt | |
2019-09-10 | caddyfile: Improve Dispenser.NextBlock() to support nesting | Matthew Holt | |
2019-09-10 | New 'php_fastcgi' directive for convenient PHP+FastCGI reverse proxy | Matthew Holt | |
2019-09-10 | rewrite: Caddyfile directive should always invoke a rehandle | Matthew Holt | |
This is unless each route's matcher is dynamically executed after previous handlers... | |||
2019-09-10 | fastcgi: Make EnvVars a map instead of a slice | Matthew Holt | |
2019-09-10 | Require Go 1.13; use Go 1.13's default support for TLS 1.3 | Matthew Holt | |
2019-09-10 | Experimental IETF-standard HTTP/3 support (known issue exists) (#2727) | Matt Holt | |
* Begin WIP integration of HTTP/3 support * http3: Set actual Handler, make fakeClosePacketConn type for UDP sockets Also use latest quic-go for ALPN fix * Manually keep track of and close HTTP/3 listeners * Update quic-go after working through some http3 bugs * Fix go mod * Make http3 optional for now | |||
2019-09-10 | Fix build (sigh) | Matthew Holt | |
2019-09-09 | Merge pull request #2737 from caddyserver/fastcgi (reverse proxy!) | Matt Holt | |
v2: Refactor reverse proxy and add FastCGI support | |||
2019-09-09 | Migrate some selection policy tests over to v2 | Matthew Holt | |
2019-09-09 | reverse_proxy: Caddyfile integration (and fix blocks in Dispenser) | Matthew Holt | |
2019-09-09 | Log when auto HTTPS or auto HTTP->HTTPS redirects are disabled | Matthew Holt | |
2019-09-09 | file_server: Enforce URL canonicalization (closes #2741) | Matthew Holt | |
2019-09-07 | Fix build (#2740) | Ingo Gottwald | |
Build was broken with commit 50961ec. | |||
2019-09-06 | Header matchers: allow matching presence of header with empty list | Matthew Holt | |
2019-09-06 | File matcher enforces trailing-slash convention to match dirs/files | Matthew Holt | |
2019-09-06 | Fix Schrodinger's file existence check in file matcher | Matthew Holt | |
See: https://stackoverflow.com/a/12518877/1048862 For example, trying to check the existence of "/www/index.php/index.php" fails but not with an os.IsNotExist()-type error. So we have to assume that a file that cannot be successfully stat'ed at all does not exist. | |||
2019-09-06 | Various fixes/tweaks to HTTP placeholder variables and file matching | Matthew Holt | |
- Rename http.var.* -> http.vars.* to be more consistent - Prefixing a path matcher with * now invokes simple suffix matching - Handlers and matchers that need a root path default to {http.vars.root} - Clean replacer output on the file matcher's file selection suffix | |||
2019-09-06 | fastcgi: Use request context as base, not a new one | Matthew Holt | |
2019-09-05 | cli: Fix run and start when no config file is available | Matthew Holt | |
2019-09-05 | fastcgi: Set default root path; add interface guards | Matthew Holt | |
2019-09-05 | Add original URI to request context; implement into fastcgi env | Matthew Holt | |
2019-09-05 | Reconcile upstream dial addresses and request host/URL information | Matthew Holt | |
My goodness that was complicated Blessed be request.Context Sort of | |||
2019-09-03 | reverse_proxy: Ignore context.Canceled errors | Matthew Holt | |
These happen when downstream clients cancel the request, but that's not our problem nor a failure in our end | |||
2019-09-03 | Integrate circuit breaker modules with reverse proxy | Matthew Holt | |
2019-09-03 | Some cleanup and godoc | Matthew Holt | |
2019-09-03 | reverse_proxy: Implement remaining TLS config for proxy to backend | Matthew Holt | |
2019-09-03 | reverse_proxy: Implement active health checks | Matthew Holt | |
2019-09-03 | Initial implementation of TLS client authentication (#2731) | Alexandre Stein | |
* Add support for client TLS authentication Signed-off-by: Alexandre Stein <alexandre_stein@interlab-net.com> * make and use client authentication struct * force StrictSNIHost if TLSConnPolicies is not empty * Implement leafs verification * Fixes issue when using multiple verification * applies the comments from maintainers * Apply comment * Refactor/cleanup initial TLS client auth implementation | |||
2019-09-02 | reverse_proxy: WIP refactor and support for FastCGI | Matthew Holt | |