summaryrefslogtreecommitdiffhomepage
path: root/modules
AgeCommit message (Collapse)Author
2024-07-04encode: Don't compress already-compressed fonts (#6432)Kévin Dunglas
* fix: don't compress already compressed fonts * fix: remove WOFF
2024-07-03reverseproxy: Only log host is up status on change (fixes #6415) (#6419)klaxa
2024-07-03intercept: fix http.intercept.header.* placeholder (#6429)Kévin Dunglas
2024-06-28reverseproxy: Wire up TLS options for H3 transportMatthew Holt
2024-06-19fileserver: Remove newline characters from precomputed etags (#6394)Aziz Rmadi
* Removed newline characters from precomputed etags * Update modules/caddyhttp/fileserver/staticfiles.go --------- Co-authored-by: Matt Holt <[email protected]>
2024-06-18caddyhttp: Convert IDNs to ASCII when provisioning Host matcherMatthew Holt
2024-06-15reverseproxy: add Max-Age option to sticky cookie (#6398)Jason Yuan
* reverseproxy: add Max-Age option to sticky cookie * Update selectionpolicies.go Co-authored-by: Francis Lavoie <[email protected]> * Update selectionpolicies.go Co-authored-by: Francis Lavoie <[email protected]> --------- Co-authored-by: Francis Lavoie <[email protected]>
2024-06-12logging: set file mode when the file already exist (#6391)Ririsoft
101d3e7 introduced a configuration option to set the log file mode. This option was not taken into account if the file already exists, making users having to delete their logs to have new logs created with the right mode.
2024-06-10logging: Customizable zap cores (#6381)Omar Ramadan
2024-06-08logging: fix file mode configuration parsing (#6383)Ririsoft
Commit 101d3e7 introduced file mode setting, but was missing a JSON Marshaller so that CaddyFile can be converted to JSON safely.
2024-06-07caddyhttp: Write header if needed in responseRecorder.WriteResponse (#6380)Andreas Kohn
2024-06-06logging: Customize log file permissions (#6314)Ririsoft
Adding a "mode" option to overwrite the default logfile permissions. Default remains "0600" which is the one currently used by lumberjack.
2024-06-06events: Getters for event info (close #6377)Matthew Holt
2024-06-04caddyhttp: Add test cases to corpus (#6374)Matt Holt
* caddyhttp: Add test case to corpus * One more test case * Clean up stray comment * More tests
2024-06-04Make it possible to configure the `DisableStorageCheck` setting for ↵Andreas Kohn
certmagic (#6368) See discussion about this setting in https://github.com/caddyserver/certmagic/issues/201
2024-06-02caddyhttp: properly sanitize requests for root path (#6360)Will Norris
SanitizePathJoin protects against directory traversal attacks by checking for requests whose URL path look like they are trying to request something other than a local file, and returns the root directory in those cases. The method is also careful to ensure that requests which contain a trailing slash include a trailing slash in the returned value. However, for requests that contain only a slash (requests for the root path), the IsLocal check returns early before the matching trailing slash is re-added. This change updates SanitizePathJoin to only perform the filepath.IsLocal check if the cleaned request URL path is non-empty. --- This change also updates the existing SanitizePathJoin tests to use filepath.FromSlash rather than filepath.Join. This makes the expected value a little easier to read, but also has the advantage of not being processed by filepath.Clean like filepath.Join is. This means that the exact expect value will be compared, not the result of first cleaning it. Fixes #6352
2024-06-01I'm so tired of typosMatthew Holt
2024-06-01caddytls: Implement certmagic.RenewalInfoGetterMatthew Holt
Fixes ARI errors reported here: https://caddy.community/t/error-in-logs-with-updating-ari-after-upgrading-to-caddy-v2-8-1/24320
2024-05-30caddyhttp: Fix merging consecutive `client_ip` or `remote_ip` matchers (#6350)v2.8.1Francis Lavoie
2024-05-27acmeserver: Add `sign_with_root` for Caddyfile (#6345)v2.8.0Ranveer Avhad
* Added sign_with_root option available in the Caddyfile * Added tests for sign_with_root to validate the adapted JSON config
2024-05-21fix a typo (#6333)a
2024-05-20autohttps: Move log WARN to INFO, reduce confusion (#6185)v2.8.0-rc.1Francis Lavoie
* autohttps: Move log WARN to INFO, reduce confusion * Change implicit condition back to WARN --------- Co-authored-by: Matthew Holt <[email protected]>
2024-05-20reverseproxy: Support HTTP/3 transport to backend (#6312)Matt Holt
Closes #5086
2024-05-20context: AppIfConfigured returns error; consider not-yet-provisioned modules ↵Francis Lavoie
(#6292) * context: Add new `AppStrict()` method to avoid instantiating empty apps * Rename AppStrict -> AppIfConfigured --------- Co-authored-by: Matthew Holt <[email protected]>
2024-05-20Fix lint error about deprecated method in smallstep/certificates/authorityMatthew Holt
2024-05-20caddytls: fix permission requirement with AutomationPolicy (#6328)Will Norris
Certificate automation has permission modules that are designed to prevent inappropriate issuance of unbounded or wildcard certificates. When an explicit cert manager is used, no additional permission should be necessary. For example, this should be a valid caddyfile: https:// { tls { get_certificate tailscale } respond OK } This is accomplished when provisioning an AutomationPolicy by tracking whether there were explicit managers configured directly on the policy (in the ManagersRaw field). Only when a number of potentially unsafe conditions are present AND no explicit cert managers are configured is an error returned. The problem arises from the fact that ctx.LoadModule deletes the raw bytes after loading in order to save memory. The first time an AutomationPolicy is provisioned, the ManagersRaw field is populated, and everything is fine. An AutomationPolicy with no subjects is treated as a special "catch-all" policy. App.createAutomationPolicies ensures that this catch-all policy has an ACME issuer, and then calls its Provision method again because it may have changed. This second time Provision is called, ManagesRaw is no longer populated, and the permission check fails because it appears as though the policy has no explicit managers. Address this by storing a new boolean on AutomationPolicy recording whether it had explicit cert managers configured on it. Also fix an inverted boolean check on this value when setting failClosed. Updates #6060 Updates #6229 Updates #6327 Signed-off-by: Will Norris <[email protected]>
2024-05-18caddytls: remove ClientHelloSNICtxKey (#6326)Will Norris
2024-05-18caddyhttp: Trace individual middleware handlers (#6313)Matt Holt
* caddyhttp: Trace individual middleware handlers * Fix typo
2024-05-18templates: Add `pathEscape` template function and use it in file browser (#6278)deneb
* use url.PathEscape in file-server browse template - add `pathEscape` to c.tpl.Funcs, using `url.PathEscape` - use `pathEscape` in browse.html in place of `replace` * document `pathEscape` * Remove unnecessary pipe of img src to `html`
2024-05-18caddytls: set server name in context (#6324)Will Norris
Set the requested server name in a context value for CertGetter implementations to use. Pass ctx to tscert.GetCertificateWithContext. Signed-off-by: Will Norris <[email protected]>
2024-05-13caddyhttp: New experimental handler for intercepting responses (#6232)Kévin Dunglas
* feat: add generic response interceptors * fix: cs * rename intercept * add some docs * @francislavoie review (first round) * Update modules/caddyhttp/intercept/intercept.go Co-authored-by: Francis Lavoie <[email protected]> * shorthands: ir to resp * mark exported symbols as experimental --------- Co-authored-by: Francis Lavoie <[email protected]>
2024-05-11logging: Add support for additional logger filters other than hostname (#6082)Aziz Rmadi
Co-authored-by: Francis Lavoie <[email protected]>
2024-05-10caddyhttp: Log 4xx as INFO; 5xx as ERROR (close #6106)Matthew Holt
2024-05-10Second half of 6dce493Matthew Holt
Not sure how it got unstaged
2024-05-10caddyhttp: Alter log message when request is unhandled (close #5182)Matthew Holt
2024-05-10Fix typos (#6311)Viktor Szépe
* Fix typos * Revert * Revert to "htlm" * fix indentations
2024-05-08reverseproxy: Pointer to struct when loading modules; remove LazyCertPool ↵WeidiDeng
(#6307) * use pointer when loading modules * change method to pointer type and remove LazyCertPool * remove lazy pool test * remove yet another lazy pool test
2024-05-08tracing: add trace_id var (`http.vars.trace_id` placeholder) (#6308)Matthew Penner
2024-05-07reverseproxy: Implement health_follow_redirects (#6302)Ali Asgar
* added health_follow_redirect in active health checks * chore: code format * chore: refactore reversproxy healthcheck redirect variable name and description of the same * chore: formatting * changed reverse proxy health check status code range to be between 200-299 * chore: formatting --------- Co-authored-by: aliasgar <[email protected]>
2024-05-07caddypki: Allow use of root CA without a key. Fixes #6290 (#6298)Florian Apolloner
* Allow usage of root CA without a key. Fixes #6290 * Update modules/caddypki/crypto.go --------- Co-authored-by: Matt Holt <[email protected]>
2024-05-06reverseproxy: HTTP transport: fix PROXY protocol initialization (#6301)Mohammed Al Sahaf
2024-05-06caddytls: Ability to drop connections (close #6294)Matthew Holt
2024-04-30caddytls: Evict internal certs from cache based on issuer (#6266)v2.8.0-beta.1Matt Holt
* caddytls: Evict internal certs from cache based on issuer During a config reload, we would keep certs in the cache fi they were used by the next config. If one config uses InternalIssuer and the other uses a public CA, this behavior is problematic / unintuitive, because there is a big difference between private/public CAs. This change should ensure that internal issuers are considered when deciding whether to keep or evict from the cache during a reload, by making them distinct from each other and certs from public CAs. * Make sure new TLS app manages configured certs * Actually make it work
2024-04-27chore: add warn logs when using deprecated fields (#6276)Mohammed Al Sahaf
2024-04-27caddyhttp: Fix linter warning about deprecationMatthew Holt
2024-04-27go.mod: Upgrade to quic-go v0.43.0Matthew Holt
2024-04-26fileserver: Set "Vary: Accept-Encoding" header (see #5849)Matthew Holt
2024-04-26events: Add debug logMatthew Holt
2024-04-26reverseproxy: handle buffered data during hijack (#6274)WeidiDeng
2024-04-24run `golangci-lint run --fix --fast` (#6270)Mohammed Al Sahaf