summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* minor docs tweak on reverse proxy setupproxy-updatesMichael Merickel2019-01-031-3/+3
|
* error if trusted_proxy_count is set without trusted_proxyMichael Merickel2019-01-032-5/+28
|
* simplify conditional when clearing untrusted headersMichael Merickel2019-01-031-1/+1
|
* fix docs to not support comma-separated settingsMichael Merickel2019-01-031-1/+1
| | | | fixes #225
* allow clear_untrusted_proxy_headers when trusted_proxy is NoneMichael Merickel2019-01-032-11/+4
| | | | fixes #227
* fix pastedeploy urlMichael Merickel2019-01-031-1/+1
|
* Prep v1.2.0b2v1.2.0b2Bert JW Regeer2019-01-021-1/+1
|
* Add CHANGES.txtBert JW Regeer2019-01-021-0/+11
|
* Only warn/fake bytes written if there is dataBert JW Regeer2019-01-021-1/+1
|
* Add link to documentationBert JW Regeer2018-12-311-0/+3
|
* FormattingBert JW Regeer2018-12-311-1/+1
|
* Prep 1.2.0b1v1.2.0b1Bert JW Regeer2018-12-311-1/+1
|
* Move history from CHANGES.txtBert JW Regeer2018-12-312-95/+95
|
* Add CHANGES.txt for #224Bert JW Regeer2018-12-311-2/+13
|
* Merge pull request #224 from Estartu/masterBert JW Regeer2018-12-121-1/+1
|\ | | | | added any as valid value for the trusted_proxy adjustable
| * changed any to * as any could potentially be a valid remote_peerGerhard Schmidt2018-12-131-1/+1
| |
| * added any as valid value for the trusted_proxy adjustableGerhard Schmidt2018-12-121-1/+1
|/ | | | | | | | | | | Backgound is when waitress is running inside a container, any request is originates from the gateway of the container network, not from the outside ip. The container network changes every time the container is restarted to a random new network number. So setting one IP as trusted_proxy isn't possible but still needed as most of the time an reverse proxy is between the client an the container. So if it's ensured that only requests from the reverse proxy can reach the container, trusting any host is not a problem.
* Merge pull request #209 from Pylons/bugfix/socket-server-name-portBert JW Regeer2018-12-029-205/+1336
|\ | | | | Use Forwarded/X-Forwarded-{For,Host,By,Port,Proto} to fixup WSGI environ
| * clear untrusted headers if trusted_proxy is set but does not matchMichael Merickel2018-12-022-109/+128
| |
| * fix docs formattingMichael Merickel2018-12-023-82/+120
| |
| * Update CHANGES.txt for #215bugfix/socket-server-name-portBert JW Regeer2018-12-021-0/+5
| |
| * Add note to CHANGES.txt for proxy header supportBert JW Regeer2018-12-021-0/+22
| |
| * Update reverse proxy documentationBert JW Regeer2018-12-021-92/+49
| | | | | | | | Get rid of paste middleware
| * Add documentation for new argumentsBert JW Regeer2018-12-021-2/+77
| |
| * Try harder at getting the WSGI environ rightBert JW Regeer2018-12-022-4/+62
| | | | | | | | When facing the possibility of a proxy that is sending wacky values
| * If no trusted_proxy, don't allow other variablesBert JW Regeer2018-12-022-6/+28
| | | | | | | | | | This way we don't accidentally mislead users into thinking those settings are doing anything when they are not.
| * Define PROXY_HEADERS onceBert JW Regeer2018-12-023-19/+14
| |
| * Add tests for adjustments: trusted_proxy_headersBert JW Regeer2018-12-021-0/+50
| |
| * Add test for X-Forwarded-ByBert JW Regeer2018-12-021-0/+1
| | | | | | | | It shouldn't be removed from headers if trusted
| * Don't accidentally remove X-Forwarded-By if trustedBert JW Regeer2018-12-021-0/+5
| |
| * Add new tests for proxy header parsingBert JW Regeer2018-12-021-14/+475
| |
| * Add new adjustmentsBert JW Regeer2018-12-021-0/+86
| |
| * addr should be a tuple of (ip, port)Bert JW Regeer2018-12-021-1/+1
| |
| * Use Forwarded/X-Forwarded-{For,Host,By,Port,Proto} to fixup environBert JW Regeer2018-12-022-20/+277
| | | | | | | | | | | | | | | | | | This will trust the proxy provided information and override the default provided by waitress. This is useful when using Waitress behind nginx or some other proxy to make sure the WSGI environment contains all of the appropriate settings/updates.
| * Add Forwarded namedtupleBert JW Regeer2018-12-011-1/+5
| |
| * Add undquote utility functionBert JW Regeer2018-12-012-0/+76
|/
* Merge pull request #220 from Pylons/docs-grammar-fixBert JW Regeer2018-11-141-1/+1
|\ | | | | grammar fix
| * grammar fixdocs-grammar-fixSteve Piercy2018-11-141-1/+1
|/
* Merge pull request #215 from ↵Bert JW Regeer2018-11-148-19/+343
|\ | | | | | | | | Frank-Krick/feature/allow_passing_of_sockets_for_socket_activation Allow passing of sockets for socket activation
| * Changes for reviewFrank Krick2018-11-141-3/+2
| |
| * Fixed error in check_sockets method in adjustments when using WindowsFrank Krick2018-11-131-1/+3
| |
| * Check in adjustments to prevent mixing of Internet and UNIX sockets as well ↵Frank Krick2018-11-134-3/+50
| | | | | | | | as the use of unsupported sockets
| * Removed unix socket from code exampleFrank Krick2018-11-131-4/+2
| |
| * Implemented checks in adjustments for issue #217Frank Krick2018-11-132-3/+22
| |
| * Changes for pull request reviewFrank Krick2018-11-132-3/+4
| |
| * Changed error messageFrank Krick2018-10-291-1/+1
| |
| * Signed CONTRIBUTORS.txt and changes for reviewFrank Krick2018-10-295-7/+9
| |
| * Undo changes for getsocknameFrank Krick2018-10-281-15/+18
| |
| * Fixed commentFrank Krick2018-10-281-1/+1
| |
| * Fix for test cases on WindowsFrank Krick2018-10-281-1/+4
| |