Guillaume Ayoub
62588477f6
Merge pull request #429 from Unrud/hook
...
Add hook for storage changes
2016-07-30 15:26:17 +02:00
Unrud
0306ee6dcc
Point well-known to /
...
Fixes #431
2016-07-14 10:13:20 +02:00
Unrud
0263251ecf
Add hook for storage changes
2016-07-14 07:57:46 +02:00
Guillaume Ayoub
ef63865e31
Merge pull request #428 from Unrud/patch-22
...
Add timeout to connections, limit size of request body and limit number of parallel connections
2016-07-14 02:06:24 +02:00
Unrud
83ea9da2b4
Limit number of parallel connections
2016-06-11 13:19:26 +02:00
Unrud
e438d9fd4b
Limit size of request body
2016-06-11 13:16:45 +02:00
Unrud
b55d2181ed
Add timeout to integrated sever
2016-06-11 13:14:58 +02:00
Unrud
d4e6205745
Don't include passwords in logs
2016-06-11 12:58:28 +02:00
Guillaume Ayoub
1001bcb676
Remove extra auth, rights and storage modules
2016-04-07 19:02:52 +02:00
Guillaume Ayoub
9875db9a6c
Add md5 and bcrypt as available encryptions methods for htpasswd in config file
2015-10-21 02:09:11 +02:00
Marc Kleine-Budde
13c61bf936
auth/htpasswd: add support for salted sha1 passwords
...
This patch adds support for salted sha1 passwords.
2014-11-09 01:00:23 +01:00
Guillaume Ayoub
9b225d1b5b
Comment all out in sample config ( fix #155 )
2014-10-22 14:33:29 +02:00
deronnax
b863e8390e
add ".well-known" addresses feature ( closes #126 )
2014-10-20 18:51:43 +02:00
Guillaume Ayoub
9ad9c466e2
Add an option allowing requests without base_prefix
...
Related to #147 , patch proposed by jheidemann
2014-08-06 11:51:11 +02:00
Julien Miotte
aabebb5578
Adding a new "authenticated" ACL type.
...
When set, all authenticated users will have rw permissions on all
collections, but no anonymous user will be able to read or write any
collection.
2014-04-09 00:02:39 +02:00
Guillaume Ayoub
f9ce1d0e6d
Remove the backend/type split for rights in configuration
2014-02-05 14:11:40 +01:00
Guillaume Ayoub
f6a6e77fb0
Typo fixes in config file
2014-02-05 13:58:30 +01:00
Guillaume Ayoub
2ad8b57305
Merge branch 'apache_auth' of git://github.com/jaesivsm/Radicale into jaesivsm-apache_auth
...
Conflicts:
radicale/__init__.py
2014-02-05 13:09:37 +01:00
François Schmidts
b9ff564c1f
not only apache uses REMOTE_USER
...
removing the apache mention to make the config more "webserver agnostic"
2014-01-15 23:01:36 +01:00
François Schmidts
34163c5020
making radicale support authenticated user from apache
2014-01-15 09:50:22 +01:00
Sergey Fursov
1362976400
fixed default config
2013-12-29 18:30:53 +04:00
Sergey Fursov
1d0418594d
Allow attach custom rights backend, small fix in default config file
2013-12-29 15:13:35 +04:00
Sergey Fursov
3b0328ca1e
Allow attach custom storage backend
2013-12-28 14:15:35 +04:00
Sergey Fursov
a91a7790c5
Allow attach custom auth handler
2013-12-28 13:31:32 +04:00
Sergey Fursov
dca10fa14e
Different rights management backends
...
Initially only one backend - regular expressions based
2013-12-25 03:44:24 +04:00
Guillaume Ayoub
8969dae12f
Merge pull request #90 from cristen/master
...
Refs #87 Add ssl options
2013-12-13 06:22:16 -08:00
Jean-Marc Martins
f377bd1356
Fix ssl protocol
2013-12-13 15:17:30 +01:00
Guillaume Ayoub
f133b8a588
Add an example for multiple IP addresses in the configuration file
2013-12-13 14:56:03 +01:00
Jean-Marc Martins
d765544edd
Add ssl protocol and ciphers in config
2013-12-13 14:31:09 +01:00
Jean-Marc Martins
6c40f5e24a
Merge branch 'authentication' of github.com:cristen/Radicale into authentication
2013-09-13 17:41:21 +02:00
Jean-Marc Martins
fe28b040bd
Adds the committer in the config + python3 support
2013-09-13 17:26:03 +02:00
Guillaume Ayoub
ff535b62b0
Remove useless config keys
2013-09-06 16:00:12 +02:00
Jean-Marc Martins
6e98b1b3e8
Adds multifilesystem storage backend (See #30 )
2013-08-29 16:55:36 +02:00
Guillaume Ayoub
586773148e
Use a more simple rights manager
2013-08-14 10:50:59 +02:00
Guillaume Ayoub
faa331ccc3
Change a couple of things in regex-based rights manager
2013-07-23 18:05:22 +02:00
mail@sweil.de
eed0f74fad
New rights management method: regex
...
user and collection are matched against regular expression to determine read/write access
2013-07-19 15:16:36 +02:00
Guillaume Ayoub
de1e57081b
Put the realm in the configuration file ( fix #37 )
2013-06-28 16:39:09 +02:00
Guillaume Ayoub
fab7796ca0
Allow additional HTTP headers in configuration file
...
Best ratio coolness/sloc ever!
2013-05-13 18:15:08 +02:00
Guillaume Ayoub
bf8e874e4d
Merge *base_prefix config keys into base_prefix ( fixes #996 )
2013-04-30 14:02:17 +02:00
Guillaume Ayoub
eaa969a05c
Merge pull request #24 from vuntz/radicale-in-subdir
...
Allow running radicale in a subdir, as well as in a subdir behind a proxy
2013-04-26 08:33:12 -07:00
Guillaume Ayoub
22077aa7a1
Clean the http-based auth module
2013-04-26 01:14:33 +02:00
Guillaume Ayoub
494ffbd762
Merge pull request #15 from MelianLabs/http
...
Added HTTP-based authentication
2013-04-25 16:07:49 -07:00
Guillaume Ayoub
2738d10830
Support SSL for IMAP authentication
...
Based on Nikita Koshikov's commit:
https://github.com/interlegis/Radicale/commit/000fc2a
2013-04-26 00:56:56 +02:00
Guillaume Ayoub
16c6f55ebd
Initial *untested* support for database storage
2013-04-20 12:51:32 +02:00
Vincent Untz
74590cfd0c
Add proxy_base_prefix option to help run in a subdir behind a proxy
...
I have a setup where Radicale is running as the normal process, and
nginx is acting as proxy for Radicale for requests under /radicale/.
This means that all requests to nginx that go to /radicale/ are sent to
a radicale server that expects requests coming at /.
Obviously, all the href need to have the /radicale/ prefix to have
things work. So a new option proxy_base_prefix is added to allow having
such a setup.
All href that are sent in the replies will have the proxy_base_prefix
prepended.
2013-03-18 18:20:06 +01:00
Vincent Untz
0dbf71f57f
Fix issues with base_prefix option
2013-03-18 18:13:28 +01:00
Fabrice Bellet
54bda5594c
Handle use in a subdir. Patch from Clint Adams <clint@softwarefreedom.org> adapted from http://redmine.kozea.fr/issues/996
2013-03-18 18:10:13 +01:00
Ehsanul Hoque
dbc622e8d7
Added HTTP-based authentication
...
The purpose of this is in order to tie CalDAV accounts to an external web
application. This application must provide a URL end point to which a POST
request can be made, with the username/password sent as the payload. A 200 or
201 response is considered successful authentication. Any other response is
a failure.
2012-09-28 09:52:17 +06:00
Matthias Jordan
58748e748b
Fixed comments in config
2012-08-11 01:04:02 +02:00
Matthias Jordan
e3bc6afdd3
Added file-based rights management
2012-08-11 00:56:45 +02:00