Commits
Commit:
54203115cd0121ee0e44f5e58202a4d8054b9c09
Date:
Fri Apr 8 13:52:35 2022
UTC
don't load the built-in list when using `types'
Commit:
d8d170aa5ee1498babee095078b3888f1525a2b3
Date:
Fri Apr 8 13:44:49 2022
UTC
allow add_mime to fail
add_mime nows allocate dinamically copies of the passed strings, so
that we can actually free what we parse from the config file.
This matters a lot especially with lengthy `types' block: strings that
reach the internal mapping are never free'd, so every manual addition
is leaked.
Commit:
ea27eaaa83d61792e75858dc624c58fe1fa13dc9
Date:
Sun Mar 27 12:52:59 2022
UTC
fix an out-of-bound access in start_cgi
Long time ago, client->req was a static buffer so the memcpy was safe.
However, it's been since moved to a dynamically allocated string, so
it's very often smaller than sizeof(req.buf) (1024), hence the out of
bound access which results in a SIGSEGV very often on OpenBSD thanks to
Otto' malloc.
The situation with the iri parser, client->req and how the request is
forwarded to the other process needs to be improved: this is just a fix
to address the issue quickly, a better one would be to restructure the
iri parser APIs and rethink how the info is forwarded to the ex process.
Commit:
3fdc457c8db0550a6143ab626bfefe3351ab0b93
Date:
Sat Mar 26 11:32:26 2022
UTC
swap try_client_by_id with client_by_id
i.e. allow client_by_id to fail and return NULL.
Initially I thought it was a good idea to shut down a server process
if we receive an invalid client id as reply from one of our requests
to the executor process. This turned out not to be correct since a
client can (read: will) disconnect in the delay beteewn we acknowledge
their request and the cgi script execution.
The fastcgi and proxy handler already handled this situation, so
they're unaffected.
This allows an attacker to make gmid unresponsible by just making
enough requests until they hit the right timing.
Commit:
1cdea97b6c74ec86e202431a208b5c99343f7273
Date:
Sun Jan 30 10:14:44 2022
UTC
allow using a custom hostname for SNI during proxying
add a `sni' option for the `proxy' block: the given name is used instead
of the one extracted by the `relay-to' rule.
Commit:
e0f6dc646d6c257869c17f16db977cd064262830
Date:
Thu Jan 27 09:55:52 2022
UTC
improve proxy error path
properly release everything when during client_close if the request
was managed by a proxy.
Commit:
ba94a608a89110740cb24ef098c476c84d371918
Date:
Tue Jan 4 23:14:34 2022
UTC
add `require client ca' for proxy blocks
refactor the code that calls validate_against_ca into an helper
function to reuse it in both apply_require_ca and (optionally) in
apply_reverse_proxy.
Commit:
b7967bc1f695126e1bf2705bfd486bbc32aaf8b0
Date:
Sun Jan 2 16:33:28 2022
UTC
proxy: allow multiple proxy blocks, matching options and validations
as a side effect the order of the content of a server block is relaxed:
options, location or proxy blocks can be put in any order.
Commit:
593e412b4988ca8b72bb7ef9b1cc663cb1184215
Date:
Sat Jan 1 20:16:14 2022
UTC
allow to disable TLS when proxying requests
Commit:
c7c8ef448bc8832998606ec217907c7dc66fec6c
Date:
Sat Jan 1 19:04:50 2022
UTC
add `protocols' option to `proxy' rule
Commit:
5128c0b0e3b51737783c4c68c9e34a76ec8c8b0e
Date:
Sat Jan 1 18:50:10 2022
UTC
add `verifyname' option for `proxy' rule
Commit:
7bdcc91ec70ddde092ac5d7b4f75d54915e7b221
Date:
Sat Jan 1 17:08:39 2022
UTC
simplify the proxying code
it doesn't make any sense to keep the proxying info per-location:
proxying only one per-vhost. It can't work differently, it doesn't make
sense anyway.
Commit:
bd5f79542cf6491ed9e30bca926286e3b9e2600c
Date:
Sat Jan 1 16:36:17 2022
UTC
update copyright years
Commit:
d49093c105e7e9af2638bce945374ac0036b3498
Date:
Sat Jan 1 16:33:44 2022
UTC
support optional client certificate for proxy rule
Commit:
72b033ef18ae3f82922f6f11ce0f5194e95f667d
Date:
Wed Dec 29 20:36:54 2021
UTC
add ability to proxy requests
Add to gmid the ability to forwad a request to another gemini server and
thus acting like a reverse proxy. The current syntax for the config
file is
server "example.com" {
...
proxy relay-to host:port
}
Further options (like the use of custom certificates) are planned.
cf. github issue #7
Omar Polo