- 16 Jan, 2019 1 commit
-
-
Matthew Holt authored
-
- 15 Jan, 2019 1 commit
-
-
Adam Woodbeck authored
-
- 14 Jan, 2019 1 commit
-
-
Marten Seemann authored
A tls.Config must have Certificates or GetCertificate set, in order to be accepted by tls.Listen and quic.Listen.
-
- 08 Jan, 2019 1 commit
-
-
Henrique Dias authored
-
- 20 Dec, 2018 1 commit
-
-
Matthew Holt authored
-
- 18 Dec, 2018 1 commit
-
-
Kurtis Rader authored
Implement `{when_iso_local}` placeholder This implements the `{when_iso_local}` placeholder. This is like the `{when_iso}` placeholder but the output is in the current timezone rather than UTC. Resolves #2362
-
- 13 Dec, 2018 2 commits
-
-
Matthew Holt authored
-
Matthew Holt authored
-
- 12 Dec, 2018 5 commits
-
-
Matthew Holt authored
-
Matthew Holt authored
-
Matthew Holt authored
-
Matthew Holt authored
-
Matthew Holt authored
-
- 11 Dec, 2018 5 commits
-
-
Matthew Holt authored
-
Matthew Holt authored
-
Matthew Holt authored
-
Matthew Holt authored
-
Matthew Holt authored
All code relating to a caddytls.Config and setting it up from the Caddyfile is still intact; only the certificate management-related code was removed into a separate package. I don't expect this to build in CI successfully; updating dependencies and vendor is coming next. I've also removed the ad-hoc, half-baked storage plugins that we need to finish making first-class Caddy plugins (they were never documented anyway). The new certmagic package has a much better storage interface, and we can finally move toward making a new storage plugin type, but it shouldn't be configurable in the Caddyfile, I think, since it doesn't make sense for a Caddy instance to use more than one storage config... We also have the option of eliminating DNS provider plugins and just shipping all of lego's DNS providers by using a lego package (the caddytls/setup.go file has a comment describing how) -- but it doubles Caddy's binary size by 100% from about 19 MB to around 40 MB...!
-
- 08 Dec, 2018 3 commits
-
-
Abiola Ibrahim authored
Fix `s3browser` plugin name
-
Francis Lavoie authored
Thanks to @webprofusion-chrisc for spotting this: https://github.com/mholt/caddy/pull/2383#issuecomment-445432256
-
-
- 06 Dec, 2018 2 commits
-
-
Matthew Holt authored
-
Matt Holt authored
* tls: Add support for the tls-alpn-01 challenge Also updates lego/acme to latest on master. TODO: This implementation of the tls-alpn challenge is not yet solvable in a distributed Caddy cluster like the http challenge is. * build: Allow building with the race detector * tls: Support distributed solving of the TLS-ALPN-01 challenge * Update vendor and add a todo in MITM checker
-
- 02 Dec, 2018 1 commit
-
-
linquize authored
-
- 27 Nov, 2018 2 commits
-
-
Matthew Holt authored
This reverts commit 3a810c65.
-
zhsj authored
Signed-off-by: Shengjing Zhu <i@zhsj.me>
-
- 25 Nov, 2018 1 commit
-
-
Simon Legner authored
When using the Browse directive, this applies the filter when using the browser history to go the previous directory.
-
- 18 Nov, 2018 2 commits
-
-
Wèi Cōngruì authored
Fixes #1920
-
Christoph Blecker authored
-
- 17 Nov, 2018 3 commits
-
-
linquize authored
-
Matthew Holt authored
-
linquize authored
-
- 16 Nov, 2018 1 commit
-
-
Makeev Ivan authored
* Adding {when_unix_ms} requests placeholder (unix timestamp with a milliseconds precision) * Add an 499 HTTP status code on user's cancel request as NGINX doing (instead of 502 Bad Gateway status with 'Context canceled' message) * 499 HTTP status code was added as constant CustomStatusContextCancelled = 499
-
- 12 Nov, 2018 3 commits
-
-
Matthew Holt authored
-
Matthew Holt authored
-
Matt Holt authored
* caddytls: Raise TLS alert if no certificate matches SAN (closes #1303) I don't love this half-baked solution to the issue raised in #1303 way more than a year after the original issue was closed (the necro comments are about an issue separate from the original issue that started it), but I do like TLS alerts more than wrong certificates. * Restore test to match * Restore another previous test
-
- 30 Oct, 2018 4 commits
-
-
Jake Lucas authored
* Updates the existing proxy and reverse proxy tests to include a new fallback delay value * Adds a new fallback_delay sub-directive to the proxy directive and uses it in the creation of single host reverse proxies
-
16yuki0702 authored
Signed-off-by: Hiroyuki Sasagawa <hs19870702@gmail.com>
-
Billie Cleek authored
-
Matthew Holt authored
-