Nuno Diegues
c54e8cd8e6
TUN-5851: Update all references to point to Apache License 2.0
2022-03-08 17:35:31 +00:00
João Oliveirinha
706523389c
TUN-5679: Add support for service install using Tunnel Token
2022-03-03 18:59:03 +00:00
Nuno Diegues
a1d485eca5
TUN-5823: Warn about legacy flags that are ignored when ingress rules are used
2022-03-02 10:48:03 +00:00
Devin Carr
8a1ba1f8ca
TUN-5824: Update updater no-update-in-shell link
2022-02-28 15:06:18 -06:00
João Oliveirinha
b6d7076400
TUN-5681: Add support for running tunnel using Token
2022-02-23 10:09:45 +00:00
João Oliveirinha
22cd8ceb8c
TUN-5682: Remove name field from credentials
2022-02-23 10:08:29 +00:00
Sudarsan Reddy
9909e9d63c
TUN-5754: Allow ingress validate to take plaintext option
...
Ingress validate currently validates config from a file. This PR adds a
new --json/-j flag to provide the ingress/config data as a plaintext
command line argument.
2022-02-22 16:56:22 +00:00
cthuang
d68ff390ca
TUN-5698: Make ingress rules and warp routing dynamically configurable
2022-02-16 09:38:28 +00:00
cthuang
e22422aafb
TUN-5749: Refactor cloudflared to pave way for reconfigurable ingress
...
- Split origin into supervisor and proxy packages
- Create configManager to handle dynamic config
2022-02-14 15:37:09 +00:00
Sudarsan Reddy
a84cbcde7e
TUN-5669: Change network command to vnet
2022-01-24 11:26:16 +00:00
Sudarsan Reddy
1a92f1acfe
TUN-5477: Unhide vnet commands
2022-01-21 12:41:58 +00:00
Nuno Diegues
a39d95d5f7
TUN-5551: Show whether the binary was built for FIPS compliance
...
This is shown in 3 ways:
- the version output with `cloudflared version` and alike commands
- the build_info prometheus metric
- a logging message
2021-12-28 19:03:16 +00:00
Nuno Diegues
6822e4f8ab
TUN-5482: Refactor tunnelstore client related packages for more coherent package
2021-12-28 17:17:49 +00:00
Nuno Diegues
70e675f42c
TUN-5551: Reintroduce FIPS compliance for linux amd64 now as separate binaries
...
This is a cherry-pick of 157f5d1412
followed by build/CI changes so that amd64/linux FIPS compliance is
provided by new/separate binaries/artifacts/packages.
The reasoning being that FIPS compliance places excessive requirements
in the encryption algorithms used for regular users that do not care
about that. This can cause cloudflared to reject HTTPS origins that
would otherwise be accepted without FIPS checks.
This way, by having separate binaries, existing ones remain as they
were, and only FIPS-needy users will opt-in to the new FIPS binaries.
2021-12-20 21:50:42 +00:00
Nuno Diegues
571380b3f5
TUN-5362: Adjust route ip commands to be aware of virtual networks
2021-12-03 09:10:20 +00:00
Nuno Diegues
eec6b87eea
TUN-5361: Commands for managing virtual networks
2021-12-03 08:48:52 +00:00
Dimitris Apostolou
197a70c9c4
Fix typos
2021-11-12 17:38:06 +02:00
Silver
36479ef11f
Merge pull request #478 from echtish/secret-flag
...
Add flag to 'tunnel create' subcommand to specify a base64-encoded secret
2021-11-02 16:21:01 -05:00
Nuno Diegues
958650be1f
TUN-5262: Improvements to `max-fetch-size` that allow to deal with large number of tunnels in account
...
* `max-fetch-size` can now be set up in the config YAML
* we no longer pass that to filter commands that filter by name
* flag changed to signed int since altsrc does not support UInt flags
* we now look up each non UUID (to convert it to a UUID) when needed, separately
2021-10-19 18:28:29 +01:00
Nuno Diegues
eb51ff0a6d
TUN-5262: Allow to configure max fetch size for listing queries
...
This can be useful/important for accounts with many tunnels that exceed
the 1000 default page size.
There are various tunnel subcommands that use listing underneath, so we make
that flag a tunnel one, rather than adding it to each subcommand.
2021-10-18 11:07:02 +01:00
Nuno Diegues
6cbf90883d
TUN-5255: Fix potential panic if Cloudflare API fails to respond to GetTunnel(id) during delete command
2021-10-14 15:18:34 +00:00
Sudarsan Reddy
ceb509ee98
TUN-5138: Switch to QUIC on auto protocol based on threshold
2021-10-14 09:18:20 +01:00
Sudarsan Reddy
2822fbe3db
TUN-5249: Revert "TUN-5138: Switch to QUIC on auto protocol based on threshold"
...
This reverts commit e445fd92f7
2021-10-13 19:06:31 +01:00
Sudarsan Reddy
5148d00516
TUN-5246: Use protocol: quic for Quick tunnels if one is not already set
2021-10-13 08:04:21 +00:00
Sudarsan Reddy
e445fd92f7
TUN-5138: Switch to QUIC on auto protocol based on threshold
2021-10-11 11:05:20 +00:00
Jeremy Teale
1239006e96
Add flag to 'tunnel create' subcommand to specify a base64-encoded secret
2021-09-29 18:56:38 -05:00
Nuno Diegues
cbdf88ea28
TUN-5164: Update README and clean up references to Argo Tunnel (using Cloudflare Tunnel instead)
2021-09-29 08:27:47 +00:00
Nuno Diegues
f985ed567f
TUN-5128: Enforce maximum grace period
...
This maximum grace period will be honored by Cloudflare edge such that
either side will close the connection after unregistration at most
by this time (3min as of this commit):
- If the connection is unused, it is already closed as soon as possible.
- If the connection is still used, it is closed on the cloudflared configured grace-period.
Even if cloudflared does not close the connection by the grace-period time,
the edge will do so.
2021-09-21 16:48:37 +00:00
Riley Flynn
6968b714d0
Add support for taking named tunnel credentials from an environment variable
2021-09-13 13:51:37 -02:30
Silver
89d408e3bd
Merge pull request #386 from Maartincm/allow_token_secret_as_env_var_in_cloudflared_access
...
Allow TokenID and TokenSecret as env vars for cloudflares access
2021-09-02 10:15:29 -05:00
cthuang
98c3957d30
TUN-5010: --region should be a string flag
2021-08-30 14:40:07 +00:00
cthuang
27cd83c2d3
Revert "TUN-4926: Implement --region configuration option"
...
This reverts commit d0a1daac3b
.
2021-08-28 16:42:55 +01:00
Areg Harutyunyan
d0a1daac3b
TUN-4926: Implement --region configuration option
2021-08-27 09:11:10 +00:00
Nuno Diegues
2afa307765
TUN-4981: Improve readability of prepareTunnelConfig method
2021-08-26 18:15:36 +01:00
Rishabh Bector
a4a9f45b0a
TUN-4821: Make quick tunnels the default in cloudflared
2021-08-26 15:53:02 +00:00
Sudarsan Reddy
071d595371
TUN-4940: Fix cloudflared not picking up correct NextProtos for quic
2021-08-23 15:30:45 +00:00
Sudarsan Reddy
12ad264eb3
TUN-4866: Add Control Stream for QUIC
...
This commit adds support to Register and Unregister Connections via RPC
on the QUIC transport protocol
2021-08-17 14:50:32 +00:00
Nuno Diegues
8527d03a29
TUN-4847: Allow to list tunnels by prefix name or exclusion prefix name
2021-07-30 12:00:26 +01:00
Nuno Diegues
aa24338225
TUN-4832: Prevent tunnel from running accidentally when only proxy-dns should run
2021-07-29 11:05:12 +00:00
Nuno Diegues
0924549efd
TUN-4811: Publish quick tunnels' hostname in /metrics under `userHostname` for backwards-compatibility
2021-07-29 10:20:43 +01:00
Sudarsan Reddy
ed1389ef08
TUN-4814: Revert "TUN-4699: Make quick tunnels the default in cloudflared"
...
This reverts commit 18992efa0c
.
2021-07-28 10:02:55 +01:00
Rishabh Bector
18992efa0c
TUN-4699: Make quick tunnels the default in cloudflared
2021-07-26 15:57:36 +00:00
Rishabh Bector
59cae0f622
TUN-4698: Add cloudflared metrics endpoint to serve quick tunnel hostname
2021-07-12 09:26:07 +00:00
Rishabh Bector
3eb9efd9f0
TUN-4521: Modify cloudflared to use zoneless-tunnels-worker for free tunnels
2021-06-29 09:39:18 +01:00
Nuno Diegues
f88732277a
TUN-4502: Make `cloudflared tunnel route` subcommands described consistently
2021-06-07 09:20:11 +01:00
Martin Cuesta
a11c64b091
🎨 Prefix env var parameters with TUNNEL
...
This is for TokenID and TokenSecret in the cloudflare access CLI.
2021-05-31 15:38:46 -03:00
Martin Cuesta
e404c29edb
🖌️ Allow providing TokenID and TokenSecret as env vars when calling cloudflared access
...
Implements #232
2021-05-31 13:04:39 -03:00
Michael Borkenstein
235897ba21
AUTH-3426: Point to new transfer service URL and eliminate PUT /ok
2021-05-19 19:39:56 +00:00
Adam Chalmers
4c5ebccacc
TUN-4425: --overwrite-dns flag for in adhoc and route dns cmds
2021-05-19 18:22:01 +00:00
cthuang
6526211a69
TUN-4421: Named Tunnels will automatically select the protocol to connect to Cloudflare's edge network
2021-05-17 15:57:44 +01:00
Nuno Diegues
ae460b340b
TUN-4342: Fix false positive warning about unused hostname property
2021-05-13 02:05:19 +01:00
Adam Chalmers
75c3ca2f4a
TUN-4384: Silence log from automaxprocs
2021-05-13 02:05:19 +01:00
Adam Chalmers
4bd17766a9
TUN-4359: Warn about unused keys in 'tunnel ingress validate'
2021-05-13 02:05:19 +01:00
Adam Chalmers
07af2a33b7
TUN-4356: Set AUTOMAXPROCS to the CPU limit when running in a Linux container
2021-05-13 02:05:18 +01:00
Areg Harutyunyan
4d43a70a38
Setup a Github action for checking the cloudflared build
2021-05-04 14:31:22 +01:00
Areg Harutyunyan
1073f8db40
TUN-2853: rename STDIN-CONTROL env var to STDIN_CONTROL
2021-04-09 16:43:01 +01:00
Nuno Diegues
b25d38dd72
TUN-4177: Running with proxy-dns should not prevent running Named Tunnels
2021-04-05 11:28:05 +01:00
Adam Chalmers
5afa3251dd
TUN-4150: Only show the connector table in 'tunnel info' if there are connectors. Don't show rows with zero connections.
2021-03-30 20:13:00 +00:00
Igor Postelnik
8ca0d86c85
TUN-3863: Consolidate header handling logic in the connection package; move headers definitions from h2mux to packages that manage them; cleanup header conversions
...
All header transformation code from h2mux has been consolidated in the connection package since it's used by both h2mux and http2 logic.
Exported headers used by proxying between edge and cloudflared so then can be shared by tunnel service on the edge.
Moved access-related headers to corresponding packages that have the code that sets/uses these headers.
Removed tunnel hostname tracking from h2mux since it wasn't used by anything. We will continue to set the tunnel hostname header from the edge for backward compatibilty, but it's no longer used by cloudflared.
Move bastion-related logic into carrier package, untangled dependencies between carrier, origin, and websocket packages.
2021-03-29 21:57:56 +00:00
Adam Chalmers
ebf5292bf9
TUN-4146: Unhide and document grace-period
2021-03-29 16:29:18 -05:00
Adam Chalmers
f9062ab473
TUN-4141: Better error messages for tunnel info subcommand.
2021-03-26 14:45:35 -05:00
Michael Borkenstein
63833b07dd
AUTH-3455: Generate short-lived ssh cert per hostname
2021-03-25 10:38:43 -05:00
Igor Postelnik
da4d0b2bae
TUN-4067: Reformat code for consistent import order, grouping, and fix formatting. Added goimports target to the Makefile to make this easier in the future.
2021-03-24 10:53:29 -05:00
Igor Postelnik
50435546c5
TUN-4118: Don't overwrite existing file with tunnel credentials. For ad-hoc tunnels, this means tunnel won't start if there's a file in the way.
2021-03-24 08:26:22 -05:00
Igor Postelnik
9018ee5d5e
TUN-4116: Ingore credentials-file setting in configuration file during tunnel create and delete opeations.
...
This change has two parts:
1. Update to newer version of the urfave/cli fork that correctly sets flag value along the context hierarchy while respecting config file overide behavior of the most specific instance of the flag.
2. Redefine --credentials-file flag so that create and delete subcommand don't use value from the config file.
2021-03-24 08:15:36 -05:00
Nuno Diegues
8250b67a9f
TUN-4111: Warn the user if both properties "tunnel" and "hostname" are used
2021-03-23 20:14:29 +00:00
Nuno Diegues
4a7763e497
TUN-3998: Allow to cleanup the connections of a tunnel limited to a single client
2021-03-23 08:48:54 +00:00
Michael Borkenstein
2c75326021
AUTH-3394: Ensure scheme on token command
2021-03-17 10:50:03 -05:00
Igor Postelnik
9023daba24
TUN-3715: Apply input source to the correct context
2021-03-17 14:59:39 +00:00
Nuno Diegues
89d0e45d62
TUN-3993: New `cloudflared tunnel info` to obtain details about the active connectors for a tunnel
2021-03-17 14:08:18 +00:00
Igor Postelnik
a34099724e
TUN-4094: Don't read configuration file for access commands
2021-03-16 17:36:46 -05:00
Igor Postelnik
8c5498fad1
TUN-3715: Only read config file once, right before invoking the command
2021-03-16 17:22:13 -05:00
Adam Chalmers
2c746b3361
TUN-4081: Update log severities to use Zerolog's levels
2021-03-16 19:04:49 +00:00
Michael Borkenstein
841344f1e7
AUTH-3394: Creates a token per app instead of per path - with fix for
...
free tunnels
2021-03-12 15:49:47 +00:00
Adam Chalmers
b0e69c4b8a
Revert "AUTH-3394: Creates a token per app instead of per path"
...
This reverts commit 8e340d9598
.
2021-03-10 13:54:38 -06:00
Adam Chalmers
aa5ebb817a
TUN-4075: Dedup test should not compare order of list
2021-03-10 13:48:59 -06:00
Michael Borkenstein
8e340d9598
AUTH-3394: Creates a token per app instead of per path
2021-03-10 17:15:16 +00:00
Igor Postelnik
39065377b5
TUN-4063: Cleanup dependencies between packages.
...
- Move packages the provide generic functionality (such as config) from `cmd` subtree to top level.
- Remove all dependencies on `cmd` subtree from top level packages.
- Consolidate all code dealing with token generation and transfer to a single cohesive package.
2021-03-09 14:02:59 +00:00
Areg Harutyunyan
d83d6d54ed
TUN-3905: Cannot run go mod vendor in cloudflared due to fips
2021-03-09 17:31:59 +04:00
Nuno Diegues
a2b41ea3e6
TUN-4016: Delegate decision to update for Worker service
2021-03-08 19:25:42 +00:00
Adam Chalmers
ded9dec4f0
TUN-3819: Remove client-side check that deleted tunnels have no connections
2021-03-05 21:21:10 +00:00
Adam Chalmers
4f88982584
TUN-3994: Log client_id when running a named tunnel
2021-03-03 17:27:23 +00:00
Nuno Diegues
bcd71b56e9
TUN-3989: Check in with Updater service in more situations and convey messages to user
2021-03-03 13:57:04 +00:00
Adam Chalmers
5c7b451e17
TUN-3995: Optional --features flag for tunnel run.
...
These features will be included in the ClientInfo.Features field when
running a named tunnel.
2021-03-02 16:21:17 -06:00
cthuang
b73c039070
TUN-3988: Log why it cannot check if origin cert exists
2021-03-01 21:37:44 +00:00
Nuno Diegues
f1ca2de515
TUN-3978: Unhide teamnet commands and improve their help
2021-03-01 11:59:46 +00:00
Adam Chalmers
27507ab192
TUN-3970: Route ip show has alias route ip list
2021-02-26 17:15:43 +00:00
Nuno Diegues
5ba3b3b309
TUN-3939: Add logging that shows that Warp-routing is enabled
2021-02-23 14:19:47 +00:00
cthuang
63a29f421a
TUN-3895: Tests for socks stream handler
2021-02-23 14:19:47 +00:00
Igor Postelnik
9c298e4851
TUN-3855: Add ability to override target of 'access ssh' command to a different host for testing
2021-02-23 14:19:47 +00:00
Nuno Diegues
6681d179dc
TUN-3809: Allow routes ip show to output as JSON or YAML
...
It also fixes the marshelling of CIDR into JSON since otherwise
it would show garbled characters as the mask.
2021-02-23 14:19:47 +00:00
cthuang
2146f71b45
TUN-3753: Select http2 protocol when warp routing is enabled
2021-02-23 14:19:47 +00:00
Sudarsan Reddy
b4700a52e3
TUN-3725: Warp-routing is independent of ingress
...
- Changed warp-routing configuration to its own yaml.
- Ingress Rules host matching is indepedent of warp-routing.
2021-02-23 14:19:47 +00:00
cthuang
e2262085e5
TUN-3617: Separate service from client, and implement different client for http vs. tcp origins
...
- extracted ResponseWriter from proxyConnection
- added bastion tests over websocket
- removed HTTPResp()
- added some docstrings
- Renamed some ingress clients as proxies
- renamed instances of client to proxy in connection and origin
- Stream no longer takes a context and logger.Service
2021-02-23 14:19:44 +00:00
Areg Harutyunyan
117766562b
TUN-3945: Fix runApp signature for generic service
2021-02-19 22:06:57 +00:00
Igor Postelnik
a8ae6de213
TUN-3924: Removed db-connect command. Added a placeholder handler for this command that informs users that command is no longer supported.
2021-02-17 20:13:51 -06:00
David Jimenez
d7c4a89106
Add max upstream connections dns-proxy option ( #290 )
...
* Add max upstream connections dns-proxy option
Allows defining a limit to the number of connections that can be
established with the upstream DNS host.
If left unset, there may be situations where connections fail to
establish, which causes the Transport to create an influx of connections
causing upstream to throttle our requests and triggering a runaway
effect resulting in high CPU usage. See https://github.com/cloudflare/cloudflared/issues/91
* Code review with proposed changes
* Add max upstream connections flag to tunnel flags
* Reduce DNS proxy max upstream connections default value
Reduce the default value of maximum upstream connections on the DNS
proxy to guarantee it works on single-core and other low-end hardware.
Further testing could allow for a safe increase of this value.
* Update dns-proxy flag name
Also remove `MaxUpstreamConnsFlag` const as it's no longer referenced in more than one place and to make things more consistent with how the other flags are referenced.
Co-authored-by: Adam Chalmers <achalmers@cloudflare.com>
2021-02-12 21:32:29 +04:00
Adam Chalmers
7f97e2f030
TUN-3913: Help gives wrong exit code for autoupdate
2021-02-11 08:39:56 -06:00
Adam Chalmers
a278753bbf
TUN-3902: Add jitter to backoffhandler
...
Jitter is important to avoid every cloudflared in the world trying to
reconnect at t=1, 2, 4, etc. That could overwhelm the backend. But
if each cloudflared randomly waits for up to 2, then up to 4, then up
to 8 etc, then the retries get spread out evenly across time.
On average, wait times should be the same (e.g. instead of waiting for
exactly 1 second, cloudflared will wait betweeen 0 and 2 seconds).
This is the "Full Jitter" algorithm from https://aws.amazon.com/blogs/architecture/exponential-backoff-and-jitter/
2021-02-11 14:36:13 +00:00
Akemi Davisson
67680f5536
AUTH-3375 exchangeOrgToken deleted cookie fix
2021-02-10 16:09:50 +00:00
Security Generation
a4f185fd28
Update error message to use login command
...
Unless I'm mistaken, when there is no existing token for an app, the `login` command needs to be run to obtain a token (not the `token` command, which itself doesn't generate a token).
2021-02-09 17:15:13 +00:00
Igor Postelnik
cf562ef8c8
TUN-3635: Send event when unregistering tunnel for gracful shutdown so /ready endpoint reports down status befoe connections finish handling pending requests.
2021-02-08 15:38:42 +00:00
Adam Chalmers
dbd90f270e
TUN-3864: Users can choose where credentials file is written after creating a tunnel
2021-02-05 11:20:51 -06:00
Adam Chalmers
dca77ee13e
TUN-3854: cloudflared tunnel list flags to sort output
2021-02-03 23:47:49 +00:00
Adam Chalmers
0d22106416
TUN-3848: Use transport logger for h2mux
2021-02-03 17:31:16 -06:00
Areg Harutyunyan
88b53eb886
TUN-3826: Use go-fips when building cloudflared for linux/amd64
2021-02-02 18:12:14 +00:00
Igor Postelnik
6cdd20e820
TUN-3792: Handle graceful shutdown correctly when running as a windows service. Only expose one shutdown channel globally, which now triggers the graceful shutdown sequence across all modes. Removed separate handling of zero-duration grace period, instead it's checked only when we need to wait for exit.
2021-01-27 07:21:34 -06:00
Areg Harutyunyan
c4fbb05c1b
TUN-3165: Add reference to Argo Tunnel documentation in the help output
2021-01-25 16:17:00 +00:00
Igor Postelnik
d503aeaf77
TUN-3118: Changed graceful shutdown to immediately unregister tunnel from the edge, keep the connection open until the edge drops it or grace period expires
2021-01-22 11:14:36 -06:00
Nuno Diegues
2d0b86f2e4
TUN-3777: Fix /ready endpoint for classic tunnels
...
Classic tunnels flow was triggering an event for RegisteringTunnel for
every connection that was about to be established, and then a Connected
event for every connection established.
However, the RegistreringTunnel event had no connection ID, always
causing it to unset/disconnect the 0th connection making the /ready
endpoint report incorrect numbers for classic tunnels.
2021-01-19 13:02:44 +00:00
Igor Postelnik
4a76ed12e7
TUN-3766: Print flags defined at all levels of command hierarchy, not just locally defined flags for a command. This fixes output of overriden settings for subcommand.
2021-01-18 11:16:42 +00:00
Igor Postelnik
04b1e4f859
TUN-3738: Refactor observer to avoid potential of blocking on tunnel notifications
2021-01-18 11:16:23 +00:00
Nuno Diegues
7c3ceeeaef
TUN-3757: Fix legacy Uint flags that are incorrectly handled by ufarve library
...
The following UInt flags:
* Uint64 - heartbeat-count, compression-quality
* Uint - retries, port, proxy-port
were not being correctly picked from the configuration YAML
since the multi origin refactor
This is due to a limitation of the ufarve library, which we
overcome for now with handling those as Int flags.
2021-01-14 13:08:55 +00:00
Nuno Diegues
01f0d67875
TUN-3744: Fix compilation error in windows service
2021-01-13 16:20:41 +00:00
Nuno Diegues
9ed536c990
TUN-3738: Consume UI events even when UI is disabled
...
Not doing so was causing cloudflared to become stuck after
some time. This would happen because the Observer pattern
was sending events to the UI channel (that has 16 slots) but
no one was consuming those when the UI is not enabled (which
is the default case).
Hence, events (such as connection disconnect / reconnect) would
cause that buffer to be full and cause cloudflared to become
apparently stuck, in the sense that the connections would not be
reconnected.
2021-01-13 13:10:30 +00:00
Adam Chalmers
94ca4f98dd
Review from Igor
2021-01-11 19:36:31 +00:00
Adam Chalmers
b601b24f52
Adam's suggestions
2021-01-11 19:36:31 +00:00
TownLake
b40d8557cf
TUN-3691: Edit Teamnet help text
2021-01-11 19:36:31 +00:00
Adam Chalmers
78ffb1b846
TUN-3688: Subcommand for users to check which route an IP proxies through
2021-01-07 15:31:26 +00:00
Areg Harutyunyan
55bf904689
TUN-3471: Add structured log context to logs
2021-01-05 20:21:16 +00:00
Adam Chalmers
b855e33327
TUN-3706: Quit if any origin service fails to start
2020-12-30 13:48:19 -06:00
Adam Chalmers
32336859f8
TUN-3689: Delete routes via cloudflared CLI
2020-12-29 13:53:48 -06:00
Adam Chalmers
94c639d225
TUN-3669: Teamnet commands to add/show Teamnet routes.
2020-12-29 17:39:08 +00:00
Areg Harutyunyan
2ea491b1d0
TUN-3607: Set up single-file logger with zerolog
2020-12-23 14:15:39 -06:00
Areg Harutyunyan
870f5fa907
TUN-3470: Replace in-house logger calls with zerolog
2020-12-23 14:15:17 -06:00
Sudarsan Reddy
1c0dac77d7
TUN-3599: improved delete if credentials isnt found.
...
Tunnel delete is successful even if we don't find the credentials
file in the user's filesystem. We no longer "error" indicating this
is a problem. This fix also enables chaining of the delete command
by removing a pre-mature return if the credentials file is not found.
2020-12-04 11:44:13 +00:00
Adam Chalmers
38fb0b28b6
TUN-3593: /ready endpoint for k8s readiness. Move tunnel events out of UI package, into connection package.
2020-12-02 15:22:59 -06:00
Adam Chalmers
69fd502db3
TUN-3581: Tunnels can be run by name using only --credentials-file, no
...
origin cert necessary.
2020-11-25 09:54:28 -06:00
Michael Borkenstein
fcc393e2f0
AUTH-3221: Saves org token to disk and uses it to refresh the app token
2020-11-24 21:38:59 +00:00
Areg Harutyunyan
cad58b9b57
TUN-3561: Unified logger configuration
2020-11-23 16:49:07 +00:00
Adam Chalmers
a08a7030d1
TUN-3578: cloudflared tunnel route dns should allow wildcard subdomains
2020-11-23 09:37:46 -06:00
Adam Chalmers
b7e91466f5
TUN-3558: cloudflared allows empty config files
2020-11-18 21:13:06 +00:00
Adam Chalmers
029f7e0378
TUN-3555: Single origin service should default to localhost:8080
2020-11-17 23:12:32 +00:00
cthuang
c40cb7dc56
TUN-3514: Stop setting --is-autoupdated flag after autoupdate because it can break named tunnel running in k8s
2020-11-16 09:40:38 +00:00
Adam Chalmers
1475cf61ee
TUN-3534: Specific error message when credentials file is a .pem not .json
2020-11-12 16:38:24 +00:00
cthuang
ebc003d478
TUN-3514: Transport logger write to UI when UI is enabled
2020-11-11 15:21:00 +00:00
cthuang
5974fb4cfd
TUN-3500: Integrate replace h2mux by http2 work with multiple origin support
2020-11-11 15:20:57 +00:00
cthuang
a490443630
TUN-3458: Upgrade to http2 when available, fallback to h2mux when we reach max retries
2020-11-11 15:11:42 +00:00
cthuang
b5cdf3b2c7
TUN-3456: New protocol option auto to automatically select between http2 and h2mux
2020-11-11 15:11:42 +00:00
cthuang
9ac40dcf04
TUN-3462: Refactor cloudflared to separate origin from connection
2020-11-11 15:11:42 +00:00
cthuang
8d7b2575ba
TUN-3400: Use Go HTTP2 library as transport to connect with the edge
2020-11-11 15:11:42 +00:00
cthuang
d7498b0c03
TUN-3449: Use flag to select transport protocol implementation
2020-11-11 15:11:42 +00:00
Adam Chalmers
196762d9d3
TUN-3527: More specific error for invalid YAML/JSON
2020-11-10 21:42:26 +00:00
Adam Chalmers
4698ec8dee
TUN-3461: Show all origin services in the UI
2020-11-10 14:25:37 +00:00
Igor Postelnik
8c6181db9f
TUN-3524: Don't ignore errors from app-level action handler ( #248 )
2020-11-10 13:06:49 +00:00
Adam Chalmers
64d3836645
TUN-3522: ingress validate checks that the config file exists
2020-11-09 12:31:50 -06:00
Adam Chalmers
87e2679744
TUN-3516: Better error message when parsing invalid YAML config
2020-11-09 10:35:28 -06:00
Adam Chalmers
d01770107e
TUN-3492: Refactor OriginService, shrink its interface
2020-11-04 21:28:33 +00:00
Adam Chalmers
e933ef9e1a
TUN-2640: Users can configure per-origin config. Unify single-rule CLI
...
flow with multi-rule config file code.
2020-10-30 07:42:20 -05:00
cthuang
ea71b78e6d
TUN-3478: Increase download timeout to 60s
2020-10-22 10:38:18 +01:00