Commits
- Commit:
a14b9f779f14edee7c22e12f1ad8a4ba2d3134df
- From:
- Omar Polo <op@omarpolo.com>
- Date:
prepare 1.8 release
- Commit:
c586dfead7204405c72eccdad2a249e961fec319
- From:
- Omar Polo <op@omarpolo.com>
- Date:
rename MIME section to "MEDIA TYPES"
- Commit:
1cdea97b6c74ec86e202431a208b5c99343f7273
- From:
- Omar Polo <op@omarpolo.com>
- Date:
allow using a custom hostname for SNI during proxying
add a `sni' option for the `proxy' block: the given name is used instead
of the one extracted by the `relay-to' rule.
- Commit:
14cee92646640af05523eb0bbe30946ab0c9d0d3
- From:
- Omar Polo <op@omarpolo.com>
- Date:
some Pa -> Ar; while here drop two `The' from the start of the sentence
- Commit:
7c2374af2ca2f65b70211b03350618635d16063e
- From:
- Omar Polo <op@omarpolo.com>
- Date:
document `require client ca' for proxies
- Commit:
207dc0f9f68d7946e1db13dd025d4a30a68ca840
- From:
- Omar Polo <op@omarpolo.com>
- Date:
sync manpage
- Commit:
53884ec00adf7fa7e8a62b41b589a95892d34b2b
- From:
- Omar Polo <op@omarpolo.com>
- Date:
document use-tls
- Commit:
ee68c36198e0e1f0142b18e130c55b73747027e1
- From:
- Omar Polo <op@omarpolo.com>
- Date:
document the new proxy stuff
- Commit:
c143dcfa85413062ac50f526c8b560bbeb9e8566
- From:
- Omar Polo <op@omarpolo.com>
- Date:
document the `proxy relay-to' rule
- Commit:
ebf3373d66fba1ff5fbfd822edefd83cc50a7630
- From:
- Omar Polo <op@omarpolo.com>
- Date:
explain config-less mode
- Commit:
ff05125eb81e5bbf2cf05b8434d03bce584936e0
- From:
- Stephen Gregoratto <dev@sgregoratto.me>
- Via:
- omar-polo <op@omarpolo.com>
- Date:
Implement OCSP stapling support
Currently dogfooding this patch at gemini.sgregoratto.me. To test,
run the following command and look for the "OCSP response" header:
openssl s_client -connect "gemini.sgregoratto.me:1965" -status
- Commit:
f0a01fc742e83b3f4736b5d64af3ab18148afc5a
- From:
- Omar Polo <op@omarpolo.com>
- Date:
two -n to dump the parsed configuration
This adds a barebone dumping of the parsed configuration. It is not
complete, but I'm interested in dumping the full path to `cert' and
`key' in order to write some scripts that can inspect the
configuration, extract the certificates and renew them when expired
automatically.
It's not easy to parse gmid configuration otherwise because the syntax
is flexible and users can use macros. Instead, the idea is to run
gmid and let it dump the configuration once it's been parsed in a
static and predictable format.
Now is possible to parse gmid configuration with, say, awk or perl.
- Commit:
1298e4307f587041ae2a31611a92bb92799bff5a
- From:
- Omar Polo <op@omarpolo.com>
- Date:
split the cert generation example on multiple lines
- Commit:
fba809b5c775fd4d3c28a012259ee3b1908d4e40
- From:
- Omar Polo <op@omarpolo.com>
- Date:
tag 1.7.3
bump version number
- Commit:
2bb1776bacc96357fc182ef396508fe71816e0b0
- From:
- Omar Polo <op@omarpolo.com>
- Date:
keep the openssl key generation example under 80 columns