2019-02-16 20:20:53 by Benny Siegert | Files touched by this commit (2) |
Log message:
Update caddy to 0.11.4.
0.11.4 (February 15, 2019)
* New -json-to-caddyfile and -caddyfile-to-json flags
* Fix leaking logging goroutine on SIGUSR1
* basicauth: Error is logged when authentication fails
* proxy: Fix bug by re-adding pre-existing trailing slashes
* tls: Fix bug related to certificate storage path
0.11.3 (February 5, 2019)
* New {server_port} placeholder
* New third-party plugin: extauth
* New flags -log-roll-mb and -log-roll-compress
* basicauth: Bypass for OPTIONS method
* errors/log: Ability to disable log rolling
* proxy: New subdirective 'ca_certificates'
* staticfiles: Require GET method to serve static files
* tls: Fixes to self-signed certs, IP certs, email prompts, & more
* SOLVED REGRESSIONS: #2356, #2414
* A number of other important fixes and improvements
0.11.2 (January 16, 2019)
* Extracted automagic TLS code into CertMagic library
* Add support for new clustering plugins
* New placeholder: '{when_iso_local}'
* New third-party plugins: s3browser, filebrowser
* Removed third-party plugins: jekyll, hugo
* bind: Support multiple interface values
* import: Can now be used within directive blocks
* proxy: Status 499 when clients close connection early
* templates: No longer emit ETag and Last-Modified headers
* tls: Support for the ACME TLS-ALPN-01 challenge
* KNOWN/UNRESOLVED REGRESSIONS: #2356, #2414
* Several bug fixes and minor improvements
0.11.0
This release has been about 6 months in the making! Featuring an integrated
telemetry client, you can now view stats about your Caddy instance and
contribute to Internet research. Telemetry is entirely optional. Read the blog
post and telemetry docs for more information, and check out our global stats!
You can also look up details about your own instances there.
Full change list:
* Built with Go 1.10.2
* Integrated optional telemetry client
* proxy: Fixed file descriptor leak
0.10.14
* tls: Fix error handling bug when obtaining certificates
0.10.13
Caddy 0.10.13 is a minor release that fixes security flaws in TLS client
authentication and On-Demand TLS. It is recommended that everyone relying on
these capabilities upgrade. This release also has bug fixes for the Caddyfile
parser (caught by fuzzing) and handling errors when a certificate could not be
obtained via ACME.
Do not use this version, it cannot obtain certificates due to a bug. Version
0.10.14 fixed this.
Change list:
* New third-party plugin: supervisor
* Updated QUIC
* proxy: Fix transparent pass-thru of X-Forwarded-For
* proxy: Configurable timeout to upstream
* rewrite: Now supports regular expressions on single-line
* tls: StrictHostMatching mode to prevent client auth bypass
* tls: Disable client auth when using QUIC
* tls: Require same client auth cert pools per hostname
* tls: Prevent On-Demand TLS directory traversal
* tls: Fix empty files when using ACME fails to obtain cert
* Fixed test broken by 1.1.1.1 resolving
* Improved Caddyfile parser robustness by fuzzing
0.10.12
This release brings ACMEv2 and wildcard certificate support!
Read the release announcement blog post for details. There's some things in
there you should know, including a description of how some really cool features
work.
Thanks to everyone who contributed to this release!
Change list:
* Switch to Let's Encrypt ACMEv2 production endpoint
* Support for automated wildcard certificates
* Support distributed solving of HTTP-01 challenge
* New {labelN}, {tls_cipher}, and {tls_version} placeholders
* Curly braces can now be escaped when not used as placeholders
* New third-party plugin: geoip
* Updated QUIC
* fastcgi: Add SSL_CIPHER and SSL_PROTOCOL environment variables
* log: New 'except' subdirective to exempt paths from logging
* startup/shutdown: Removed in favor of 'on'
* tls: Default minimum version is TLS 1.2
* tls: Revert to fallback cert if no cert matches SNI
* tls: New 'wildcard' subdirective to force automated wildcard cert
* Several significant bug fixes and improvements!
|
2019-01-24 11:00:46 by Benny Siegert | Files touched by this commit (144) | |
Log message:
Revbump Go packages after lang/go111 update.
|
2018-12-19 16:47:12 by Benny Siegert | Files touched by this commit (141) | |
Log message:
Revbump all Go packages after go111 update.
|
2018-11-04 19:38:09 by Benny Siegert | Files touched by this commit (122) | |
Log message:
Revbump all Go packages after go111 update.
|
2018-06-12 19:50:29 by Benny Siegert | Files touched by this commit (102) | |
Log message:
Revbump all Go packages after lang/go update.
|
2018-03-30 13:56:27 by Benny Siegert | Files touched by this commit (94) | |
Log message:
Revbump all Go packages after 1.10.1 update.
ok wiz@ for committing during freeze
|
2018-03-14 09:41:32 by Benny Siegert | Files touched by this commit (2) |
Log message:
Update caddy to 0.10.11.
This release improves automatic HTTPS in cluster configurations, internal TLS
asset management, adds service discovery support to reverse proxying, reusable
snippets for the Caddyfile, and more!
Read the details in the announcement blog post!
https://caddyserver.com/blog/caddy-0_10_11-released
A few minor "breaking" changes include how signals are handled, \
conflicting TLS
configurations are no longer allowed (an error is raised), and a TLS alert is
raised if SNI is used but no certificate is available, rather than serving a
default certificate.
Special thanks to Ed for helping us patch a minor path-based open redirect
possibility!
Full change log:
Reusable snippets for the Caddyfile
Updated QUIC
Auto-HTTPS certificates may be shared by multiple instances
Expand globbed values in -conf flag
Swap behavior of SIGTERM and SIGQUIT; ignore SIGHUP
9 new DNS provider plugins for the ACME DNS challenge
New placeholder for {<Response-Header} values
basicauth: Username put in {user} placeholder
fastcgi: GET requests can now send a body
proxy: Service discovery with DNS SRV load balancing
request_id: Allow reusing request ID from header field
tls: Improved efficiency of many certificates and reloads
tls: Raise error if conflicting TLS configurations collide
tls: Raise TLS alert if SNI used and no cert matched
tls: Reject OCSP responses that expire after the certificate
tls: Clients can use SNI to request a specific certificate
tls: Add option for backend to approve on-demand certificate
tls: Synchronize maintenance of shared, managed certificates
Numerous fabulous bug fixes
|
2018-03-04 16:52:21 by Benny Siegert | Files touched by this commit (95) | |
Log message:
Revbump all Go packages after Go 1.10 update.
|
2018-01-09 21:55:12 by Benny Siegert | Files touched by this commit (2) |
Log message:
Update caddy to 0.10.10.
0.10.10
-------
- Removed Caddy-Sponsors header
- New 'on' directive that deprecates 'startup' and 'shutdown'
- Changed CASE_SENSITIVE_PATH default to false
- fastcgi: Support for SRV upstreams
- redir: Rules with if statements are not checked for duplicates
- Several minor bug fixes
0.10.9
------
- EULA bundled with official binaries
- Caddy-Sponsors header to indicate personal-use license
- proxy: Support for QUIC backends
- templates: Write proper status code if proxied
- tls: Fix bug related to cert renewals
0.10.8
------
This is mainly a security release, with a couple other bug fixes (see commit
history for details on those).
This release fixes issue #1859. Previously, Caddy would not compress/merge
multiple consecutive forward slashes in the URL for comparisons, causing
certain comparisons to fail falsely not because of technical correctness, but
rather semantic correctness (i.e. it depends on what is using the path, but
most often, file systems will annoyingly collapse multiple slashes). Now,
Caddy's path matching behaves similar to NGINX's location block if
merge_slashes is enabled. Caddy now merges slashes by default when comparing
paths using Go's path.Clean(), which also evaluates .. in paths to ensure
equivalence on a semantic level.
|
2017-09-04 19:56:18 by Benny Siegert | Files touched by this commit (2) |
Log message:
Update Caddy to 0.10.7.
0.10.7
This release introduces 3 new HTTP plugins: awses, jekyll, and forwardproxy,
and supports SIGUSR2 for graceful binary upgrades. Read the release blog post
for more information.
A huge thanks to our sponsors for making continued development possible, and
for keeping this release of Caddy free for everyone to use: Minio, Uptime
Robot, and Sourcegraph!
Change list:
- Built with Go 1.9
- New 3rd-party plugin HTTP directives: jekyll, awses, forwardproxy
- Different exit codes
- Plan 9 support
- Graceful binary upgrades with SIGUSR2
- internal: Support X-Accel-Redir without paths to protect
- templates: Can execute templates loaded by other middleware
- A few really good bug fixes
0.10.6
This is a hotfix for 0.10.5's fastcgi directive which invokes a runtime error
on 32-bit and ARM architectures, due to a known, documented bug in Go. We
don't run tests on 32-bit or ARM (yet) which would have been the only way to
catch this error in an automated fashion. Sorry about that. Enjoy this
release! It's the best one yet.
0.10.5
It's been kind of a crummy week for a lot of people, but here's some good
news: Caddy 0.10.5 is out! This release fixes subtle issues that were present
in proxying WebSockets or FastCGI connections. We've also improved MITM
detection for iOS clients. There is a new header-based load balancing policy.
On top of these changes, of note are these:
The requestid directive has been renamed to request_id to be more consistent
with other directives and subdirectives.
There is a new default timeout in town: the idle timeout now has a default
value of 5 minutes. Unlike the previous default timeouts, we don't expect this
will negatively impact anyone. There is generally no good use for idle
connections, and if you have a good use for them, you can disable this timeout
in your Caddyfile. (We've tested this timeout on several kinds of sites for
months and have had zero problems, only improvements in memory and FD usage.)
This release is compatible with three new 3rd-party plugins! The http.cache
plugin acts as a caching layer of middleware, which can drastically improve
performance of serving your site. http.nobots attempts to dissuade bots from
accessing your site. http.webdav was extracted from the filemanager plugin and
enables webdav serving.
As usual, a HUGE thanks to contributors who made this possible! Most of these
changes were implemented by contributors to the project, while the maintainers
have been busy working on improved proxy middleware and other things (that
hopefully we can reveal soon). Our community is fantastic, and we and all
Caddy users appreciate you. Thank you!
Full change log:
- Renamed requestid directive to request_id
- Set default idle timeout of 5 minutes
- New 3rd-party plugin directives: cache, nobots, webdav
- New Unix timestamp placeholder {when_unix}
- Improved MITM detection on iOS clients
- errors, log: Fix log rolling parsing
- gzip: Convert any ETag header to weak etag
- fastcgi: Reverted persistent connections (issue #1736)
- proxy: Added header loaded balancing policy
- proxy: Fix hang on chunked WebSockets (e.g. with HomeAssistant)
- Several other bug fixes and minor internal improvements
|