1. 24 Jan, 2017 3 commits
  2. 23 Jan, 2017 2 commits
    • Matt Holt's avatar
      Merge pull request #1356 from mholt/fix_hijack · 696b46f0
      Matt Holt authored
      proxy: Fixed #1352: invalid use of the HTTP hijacker
      696b46f0
    • Peer Beckmann's avatar
      Generate meta elements from prelude items description and keywords (#1335) · e5ef285e
      Peer Beckmann authored
      * Generate meta elements from useful front matters.
      Limited to the default template and specific elements.
      
      * Rerun gofmt
      
      * Add "keywords" and remove "language" to/from the list of meta tags.
      
      * Add a simple positive list test for the meta tag generation.
      
      * Move the meta tag list to a var at the begin of the file.
      Seperate the Meta tags from the other front matters:
      	- Don't override user settings with name `meta`
      	- Cleaner Code.
      
      * Remove the uneccessary `[:]` in the []Bytes to String casting.
      @mholt was right ;)
      
      * One minor refinement. Combining two statements.
      e5ef285e
  3. 21 Jan, 2017 3 commits
    • Matthew Holt's avatar
    • Matt Holt's avatar
      Merge pull request #1366 from mholt/tls-sni-renew-fix · 9369b814
      Matt Holt authored
      tls: Fix background certificate renewals that use TLS-SNI challenge
      9369b814
    • Matthew Holt's avatar
      tls: Fix background certificate renewals that use TLS-SNI challenge · 0e34c7c9
      Matthew Holt authored
      The loop which performs renewals in the background obtains a read lock
      on the certificate cache map, so that it can be safely iterated. Before
      this fix, it would obtain the renewals in the read lock. This has been
      fine, except that the TLS-SNI challenge, when invoked after Caddy has
      already started, requires adding a certificate to the cache. Doing this
      requires an exclusive write lock. But it cannot obtain a write lock
      because a read lock is obtained higher in the stack, while the loop
      iterates. In other words, it's a deadlock.
      
      I was able to reproduce this issue consistently locally, after jumping
      through many hoops to force a renewal in a short time that bypasses
      Let's Encrypt's authz caching. I was also able to verify that by queuing
      renewals (like we do deletions and OCSP updates), lock contention is
      relieved and the deadlock is avoided.
      
      This only affects background renewals where the TLS-SNI(-01) challenge
      are used. Users report seeing strange errors in the logs after this
      happens ("tls: client offered an unsupported, maximum protocol version
      of 301"), but I was not able to reproduce these locally. I was also not
      able to reproduce the leak of sockets which are left in CLOSE_WAIT.
      I am not sure if those are symptoms of running in production on Linux
      and are related to this bug, or not.
      
      Either way, this is an important fix. I do not yet know the ripple
      effects this will have on other symptoms we've been chasing. But it
      definitely resolves a deadlock during renewals.
      0e34c7c9
  4. 18 Jan, 2017 1 commit
    • Tw's avatar
      proxy: fix TestReverseProxy failure on go tip (#1360) · ecf852ea
      Tw authored
      Because of this commit(6e36811c37399d60cbce587b7c48e611009c5aec) on go tip,
      it will probe the request's body to determine whether to use chunked transfer
      encoding which trailers depend on it.
      So we just offer a non empty body to make trailers work.
      
      fix issue #1359
      Signed-off-by: default avatarTw <tw19881113@gmail.com>
      ecf852ea
  5. 17 Jan, 2017 2 commits
  6. 14 Jan, 2017 3 commits
    • M-A's avatar
      Add {whenISO} to record timestamp in ISO 8601 format in UTC. (#1353) · 8464020f
      M-A authored
      * Add {whenISO} to record timestamp in ISO 8601 format in UTC.
      
      ISO 8601 is the standard time format and is easy to parse.
      
      This change assumes users desiring ISO 8016 generally prefer UTC for simplicity.
      This results in {whenISO} to be significantly shorter than {when}:
      {when}    = "02/Jan/2006:15:04:05 +0000"
      {whenISO} = "2006-01-02T15:04:12Z"
      
      Add unit test to verify both, as there was no unit test for {when}.
      
      * Rename {whenISO} to {when_iso}
      8464020f
    • Henrique Dias's avatar
      Add StartupHooks to Plugins (#1330) · 0155b0c5
      Henrique Dias authored
      * Update run.go
      
      * Update plugins.go
      
      * Update plugins.go
      
      * Update run.go
      
      * typo
      
      * Update plugins.go
      
      * Update plugins.go
      
      * Requested changes by @mholt
      0155b0c5
    • Toby Allen's avatar
      Add a cli parameter to -validate a Caddyfile. Issue #1328 (#1344) · 21d92d68
      Toby Allen authored
      * Allow -validate flag to validate caddyfile and return
      
      * Ensure logging without -log flag
      
      * Changes to validate seperatly to Starup func
      
      * Removed change to Start signature.  Created function to ValidateCaddyfile
      
      * comment and tidyup
      
      * ValidateandExecuteDirectives with justValidate option
      
      * remove debugging code
      
      * Tidy up comments
      
      * additional parameter added to calls to mustLogFataf
      
      * ValidateAndExecuteDirectives needs to only return err
      21d92d68
  7. 11 Jan, 2017 4 commits
  8. 10 Jan, 2017 3 commits
  9. 09 Jan, 2017 2 commits
  10. 08 Jan, 2017 1 commit
  11. 04 Jan, 2017 2 commits
  12. 03 Jan, 2017 1 commit
  13. 01 Jan, 2017 4 commits
  14. 30 Dec, 2016 3 commits
  15. 29 Dec, 2016 1 commit
  16. 28 Dec, 2016 2 commits
  17. 27 Dec, 2016 1 commit
  18. 26 Dec, 2016 2 commits
    • Leonard Hecker's avatar
      Added end-to-end test case for #1292 · 20483c23
      Leonard Hecker authored
      20483c23
    • Leonard Hecker's avatar
      Fixed #1292: Failure to proxy WebSockets over HTTPS · 9f9ad21a
      Leonard Hecker authored
      This issue was caused by connHijackerTransport trying to record HTTP
      response headers by "hijacking" the Read() method of the plain net.Conn.
      This does not simply work over TLS though since this will record the TLS
      handshake and encrypted data instead of the actual content.
      This commit fixes the problem by providing an alternative transport.DialTLS
      which correctly hijacks the overlying tls.Conn instead.
      9f9ad21a