Commit Graph

87 Commits

Author SHA1 Message Date
f5f52582a1 Add option to disable syncing to disk
Disabling syncing increases the risk of data loss when the system crashes or power fails. On the positive it can increase the performance to a great extent.
2016-08-08 05:20:25 +02:00
fd977891e8 Remove /.well-known
I can't think of a sane use-case for this.
2016-08-01 09:31:25 +02:00
62588477f6 Merge pull request #429 from Unrud/hook
Add hook for storage changes
2016-07-30 15:26:17 +02:00
0306ee6dcc Point well-known to /
Fixes #431
2016-07-14 10:13:20 +02:00
0263251ecf Add hook for storage changes 2016-07-14 07:57:46 +02:00
ef63865e31 Merge pull request #428 from Unrud/patch-22
Add timeout to connections, limit size of request body and limit number of parallel connections
2016-07-14 02:06:24 +02:00
83ea9da2b4 Limit number of parallel connections 2016-06-11 13:19:26 +02:00
e438d9fd4b Limit size of request body 2016-06-11 13:16:45 +02:00
b55d2181ed Add timeout to integrated sever 2016-06-11 13:14:58 +02:00
d4e6205745 Don't include passwords in logs 2016-06-11 12:58:28 +02:00
1001bcb676 Remove extra auth, rights and storage modules 2016-04-07 19:02:52 +02:00
9875db9a6c Add md5 and bcrypt as available encryptions methods for htpasswd in config file 2015-10-21 02:09:11 +02:00
13c61bf936 auth/htpasswd: add support for salted sha1 passwords
This patch adds support for salted sha1 passwords.
2014-11-09 01:00:23 +01:00
9b225d1b5b Comment all out in sample config (fix #155) 2014-10-22 14:33:29 +02:00
b863e8390e add ".well-known" addresses feature (closes #126) 2014-10-20 18:51:43 +02:00
9ad9c466e2 Add an option allowing requests without base_prefix
Related to #147, patch proposed by jheidemann
2014-08-06 11:51:11 +02:00
aabebb5578 Adding a new "authenticated" ACL type.
When set, all authenticated users will have rw permissions on all
collections, but no anonymous user will be able to read or write any
collection.
2014-04-09 00:02:39 +02:00
f9ce1d0e6d Remove the backend/type split for rights in configuration 2014-02-05 14:11:40 +01:00
f6a6e77fb0 Typo fixes in config file 2014-02-05 13:58:30 +01:00
2ad8b57305 Merge branch 'apache_auth' of git://github.com/jaesivsm/Radicale into jaesivsm-apache_auth
Conflicts:
	radicale/__init__.py
2014-02-05 13:09:37 +01:00
b9ff564c1f not only apache uses REMOTE_USER
removing the apache mention to make the config more "webserver agnostic"
2014-01-15 23:01:36 +01:00
34163c5020 making radicale support authenticated user from apache 2014-01-15 09:50:22 +01:00
1362976400 fixed default config 2013-12-29 18:30:53 +04:00
1d0418594d Allow attach custom rights backend, small fix in default config file 2013-12-29 15:13:35 +04:00
3b0328ca1e Allow attach custom storage backend 2013-12-28 14:15:35 +04:00
a91a7790c5 Allow attach custom auth handler 2013-12-28 13:31:32 +04:00
dca10fa14e Different rights management backends
Initially only one backend - regular expressions based
2013-12-25 03:44:24 +04:00
8969dae12f Merge pull request #90 from cristen/master
Refs #87 Add ssl options
2013-12-13 06:22:16 -08:00
f377bd1356 Fix ssl protocol 2013-12-13 15:17:30 +01:00
f133b8a588 Add an example for multiple IP addresses in the configuration file 2013-12-13 14:56:03 +01:00
d765544edd Add ssl protocol and ciphers in config 2013-12-13 14:31:09 +01:00
6c40f5e24a Merge branch 'authentication' of github.com:cristen/Radicale into authentication 2013-09-13 17:41:21 +02:00
fe28b040bd Adds the committer in the config + python3 support 2013-09-13 17:26:03 +02:00
ff535b62b0 Remove useless config keys 2013-09-06 16:00:12 +02:00
6e98b1b3e8 Adds multifilesystem storage backend (See #30) 2013-08-29 16:55:36 +02:00
586773148e Use a more simple rights manager 2013-08-14 10:50:59 +02:00
faa331ccc3 Change a couple of things in regex-based rights manager 2013-07-23 18:05:22 +02:00
eed0f74fad New rights management method: regex
user and collection are matched against regular expression to determine read/write access
2013-07-19 15:16:36 +02:00
de1e57081b Put the realm in the configuration file (fix #37) 2013-06-28 16:39:09 +02:00
fab7796ca0 Allow additional HTTP headers in configuration file
Best ratio coolness/sloc ever!
2013-05-13 18:15:08 +02:00
bf8e874e4d Merge *base_prefix config keys into base_prefix (fixes #996) 2013-04-30 14:02:17 +02:00
eaa969a05c Merge pull request #24 from vuntz/radicale-in-subdir
Allow running radicale in a subdir, as well as in a subdir behind a proxy
2013-04-26 08:33:12 -07:00
22077aa7a1 Clean the http-based auth module 2013-04-26 01:14:33 +02:00
494ffbd762 Merge pull request #15 from MelianLabs/http
Added HTTP-based authentication
2013-04-25 16:07:49 -07:00
2738d10830 Support SSL for IMAP authentication
Based on Nikita Koshikov's commit:
https://github.com/interlegis/Radicale/commit/000fc2a
2013-04-26 00:56:56 +02:00
16c6f55ebd Initial *untested* support for database storage 2013-04-20 12:51:32 +02:00
74590cfd0c Add proxy_base_prefix option to help run in a subdir behind a proxy
I have a setup where Radicale is running as the normal process, and
nginx is acting as proxy for Radicale for requests under /radicale/.
This means that all requests to nginx that go to /radicale/ are sent to
a radicale server that expects requests coming at /.

Obviously, all the href need to have the /radicale/ prefix to have
things work. So a new option proxy_base_prefix is added to allow having
such a setup.

All href that are sent in the replies will have the proxy_base_prefix
prepended.
2013-03-18 18:20:06 +01:00
0dbf71f57f Fix issues with base_prefix option 2013-03-18 18:13:28 +01:00
54bda5594c Handle use in a subdir. Patch from Clint Adams <clint@softwarefreedom.org> adapted from http://redmine.kozea.fr/issues/996 2013-03-18 18:10:13 +01:00
dbc622e8d7 Added HTTP-based authentication
The purpose of this is in order to tie CalDAV accounts to an external web
application. This application must provide a URL end point to which a POST
request can be made, with the username/password sent as the payload. A 200 or
201 response is considered successful authentication. Any other response is
a failure.
2012-09-28 09:52:17 +06:00