summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2023-02-06caddyauth: Use singleflight for basic auth (#5344)Y.Horie
* caddyauth: Add singleflight for basic auth * Fixes #5338 * it occurred the thunder herd problem like this https://medium.com/@mhrlife/avoid-duplicate-requests-while-filling-cache-98c687879f59 * Update modules/caddyhttp/caddyauth/basicauth.go Fix comment Co-authored-by: Francis Lavoie <lavofr@gmail.com> --------- Co-authored-by: Francis Lavoie <lavofr@gmail.com> Co-authored-by: Matt Holt <mholt@users.noreply.github.com>
2023-02-06admin: Add `CADDY_ADMIN` env var to override the default (#5332)Francis Lavoie
2023-02-06chore: Build with Go 1.20, keep minimum at 1.18 for now (#5353)Francis Lavoie
2023-01-31cmd: Add `--envfile` flag to `validate` command (#5350)Amis Shokoohi
Fixes https://github.com/caddyserver/caddy/issues/5346
2023-01-31cmd: `fmt` exit successfully after overwriting config file (#5351)Amis Shokoohi
Fixes https://github.com/caddyserver/caddy/issues/5349
2023-01-31chore: Fix warning "range variable captured by func literal" (#5348)Francis Lavoie
2023-01-30caddytls: Debug log for ask endpointMatthew Holt
2023-01-27httpcaddyfile: Add persist_config global option (#5339)Y.Horie
Co-authored-by: Francis Lavoie <lavofr@gmail.com>
2023-01-27caddyfile: Allow overriding server names (#5323)Francis Lavoie
2023-01-25reverseproxy: Add flag to short command to disable redirects (#5330)Y.Horie
Co-authored-by: Francis Lavoie <lavofr@gmail.com> Fixes undefined
2023-01-25tracing: Support placeholders in span name (#5329)David Frickert
Fixes https://github.com/caddyserver/caddy/issues/5171
2023-01-24go.mod: bump tscert package to fix Tailscale 1.34+ on Windows (#5331)Brad Fitzpatrick
As of Tailscale 1.34.0 on Windows, Tailscale now uses a named pipe to connect to the local tailscale service. This pulls in tailscale/tscert#5 as reported in tailscale/tscert#4. (Sorry, we should've noticed this earlier!) Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com> Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2023-01-21cmd: `caddy fmt` return code is 1 if not formatted (#5297)Y.Horie
* cmd: Fix caddy fmt if input isn't formatted * Fixes #5294 * return exit 1 with an error message * cmd: Use formattingDifference for caddy fmt * #5294 * expose caddyfile.formattingDifference
2023-01-21httpcaddyfile: Warn on importing empty file; skip dotfiles (#5320)Y.Horie
* httpcaddyfile: Change the parse rules when empty file or dotfile with a glob. * Fixes #5295 * Empty file should just log a warning, and result in no tokens. * The last segment of the path is '*', it should skip any dotfiles. * The last segment of the path is '.*', it should read all dotfiles in a dir. * httpcaddyfile: Regard empty files as import files which include only white space.
2023-01-21chore: Fix typo, coral -> cobra (#5325)Y.Horie
2023-01-18httpcaddyfile: Fix `handle` grouping inside `route` (#5315)WeidiDeng
Co-authored-by: Francis Lavoie <lavofr@gmail.com>
2023-01-17go.mod: Update golang.org/x/net to v0.5.0 (#5314)Alexandre Vicenzi
2023-01-17chore: Fix caddyfile.replaceEnvVars return (#5311)Y.Horie
2023-01-10caddyhttp: Add server-level `trusted_proxies` config (#5103)Francis Lavoie
2023-01-09caddytls: Add test cases for Caddyfile `tls` options (#5293)Yannick Ihmels
2023-01-09reverseproxy: Fix hanging for Transfer-Encoding: chunked (#5289)Y.Horie
* Fixes #5236 * enable request body buffering in reverse proxy when the request header has Transfer-Encoding: chunked
2023-01-06reverseproxy: Don't enable auto-https when `--from` flag is http (#5269)Emily Lange
2023-01-06reverseproxy: Set origreq in active health check (#5284)Matt Holt
* reverseproxy: Set origreq in active health check Fix #5281 * Oops; dereference Request
2023-01-06caddytls: Add `dns_ttl` config, improve Caddyfile `tls` options (#5287)Yannick Ihmels
2023-01-04fileserver: Add a couple test casesMatthew Holt
With placeholders
2023-01-01Update README.mdMatt Holt
Attempt to fix logo that was appearing black in some browsers (perhaps due to CSP?). Thanks to @IndeedNotJames for investigating! Hopefully this works.
2022-12-31Update README.mdMatt Holt
Update logo and fix test result badge
2022-12-28ci: Fix goreleaser deprecation (#5270)Francis Lavoie
2022-12-28ci: Update GitHub Actions to avoid `set-output` deprecation (#5271)TAKAHASHI Shuuji
2022-12-22ci: exclude dependbot from running tests on s390x machine (#5266)Mohammed Al Sahaf
2022-12-20encode: Respect Cache-Control no-transform (#5257)darkweak
* encode: respect Cache-Control HTTP header no-transform * encode: switch to strings.Contains
2022-12-19build(deps): bump goreleaser/goreleaser-action from 2 to 4 (#5264)dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2022-12-19build(deps): bump actions/upload-artifact from 1 to 3 (#5262)dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2022-12-19build(deps): bump actions/cache from 2 to 3 (#5263)dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2022-12-19build(deps): bump peter-evans/repository-dispatch from 1 to 2 (#5261)dependabot[bot]
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2022-12-19ci: Check for github action updates monthly (#5258)John Losito
2022-12-19cmd: Avoid panic when printing version without build info (#5210)Lukas Vogel
* version: don't panic if read build info doesn't work If `debug.ReadBuildInfo()` doesn't return the build information we should not try to access it. Especially if users only want to build with the `CustomVersion` we should not assume access to `debug.ReadBuildInfo()`. The build environment where this isn't available for me is when building with bazel. * exit early
2022-12-19readme: white ZeroSSL text color in dark mode (#5259)Emily Lange
* readme: white ZeroSSL text color in dark mode * fix: keep `valign` for GitHub mobile app
2022-12-12readme: darker variants of logos in dark mode (#5248)IndeedNotJames
2022-12-08go.mod: Update quic-go to v0.31.0Matthew Holt
And fix a comment typo
2022-12-06acme_server: Configurable default lifetime for issued certificates (#5232)Kyle McCullough
* acme_server: add certificate lifetime configuration option Signed-off-by: Kyle McCullough <kylemcc@gmail.com> * pki: allow intermediate cert lifetime to be configured Signed-off-by: Kyle McCullough <kylemcc@gmail.com> Signed-off-by: Kyle McCullough <kylemcc@gmail.com>
2022-12-05caddytest: internalize init config into '.go' file (#5230)Mohammed Al Sahaf
2022-12-05reverseproxy: Improve hostByHashing distribution (#5229)Alban Lecocq
* If upstreams are all using same host but with different ports ie: foobar:4001 foobar:4002 foobar:4003 ... Because fnv-1a has not a good enough avalanche effect Then the hostByHashing result is not well balanced over all upstreams As last byte FNV input tend to affect few bits, the idea is to change the concatenation order between the key and the upstream strings So the upstream last byte have more impact on hash diffusion
2022-11-30Clarify some docsMatthew Holt
2022-11-23admin: set certmagic cache logger (#5173)bit
same way it is set in modules/caddytls/tls.go
2022-11-23caddypki: Use go.step.sm/crypto to generate the PKI (#5217)Mariano Cano
This commit replaces the use of github.com/smallstep/cli to generate the root and intermediate certificates and uses go.step.sm/crypto instead. It also upgrades the version of github.com/smallstep/certificates to the latest version.
2022-11-23admin: fix certificate renewal for admin (#5169)bit
certmagic.New takes a template and returns pointer to the new config. GetConfigForCert later must return a pointer to the new config not the template. fixes #5162
2022-11-14reverseproxy: Mask the WS close message when we're the client (#5199)Francis Lavoie
* reverseproxy: Mask the WS close message when we're the client * weakrand * Bump golangci-lint version so path ignores work on Windows * gofmt * ugh, gofmt everything, I guess
2022-11-08caddypki: Prefer user-configured root instead of generating new one (#5189)Jonathan Garcia
instead of generating a new root certificate at the default location load the certificate from the configuration. fixes: #5181
2022-11-06ci: set least privilged token for github actions for lint workflow (#5179)Ashish Kurmi
* ci: set least privilged token for github actions Signed-off-by: Ashish Kurmi <akurmi@stepsecurity.io> * ci:reverting github actions permissions for all but lint workflow Signed-off-by: Ashish Kurmi <akurmi@stepsecurity.io>