GoncaloGarcia
3ac69f2d06
TUN-8621: Fix cloudflared version in change notes.
2024-09-10 10:01:22 +01:00
GoncaloGarcia
e05939f1c9
TUN-8621: Prevent QUIC connection from closing before grace period after unregistering
...
Whenever cloudflared receives a SIGTERM or SIGINT it goes into graceful shutdown mode, which unregisters the connection and closes the control stream. Unregistering makes it so we no longer receive any new requests and makes the edge close the connection, allowing in-flight requests to finish (within a 3 minute period).
This was working fine for http2 connections, but the quic proxy was cancelling the context as soon as the controls stream ended, forcing the process to stop immediately.
This commit changes the behavior so that we wait the full grace period before cancelling the request
2024-09-05 13:15:00 +00:00
João Oliveirinha
dc2c76738a
TUN-8242: Update Changes.md file with new remote diagnostics behaviour
2024-02-20 16:22:20 +00:00
João Oliveirinha
fc0ecf4185
TUN-7776: Remove warp-routing flag from cloudflared
2023-09-18 10:02:56 +01:00
Devin Carr
5abb90b539
TUN-7582: Correct changelog wording for --management-diagnostics
2023-07-13 09:47:21 -07:00
Devin Carr
fdab68aa08
Release 2023.7.0
2023-07-11 10:28:45 -07:00
Devin Carr
8a3eade6d3
TUN-7553: Add flag to enable management diagnostic services
...
With the new flag --management-diagnostics (an opt-in flag)
cloudflared's will be able to report additional diagnostic information
over the management.argotunnel.com request path.
Additions include the /metrics prometheus endpoint; which is already
bound to a local port via --metrics.
/debug/pprof/(goroutine|heap) are also provided to allow for remotely
retrieving heap information from a running cloudflared connector.
2023-07-06 17:31:11 +00:00
Devin Carr
3996b1adca
Release 2023.4.1
2023-04-17 10:04:12 -07:00
João Oliveirinha
f686da832f
TUN-7275: Make QuickTunnels only use a single connection to the edge
2023-03-13 15:32:46 +00:00
Sudarsan Reddy
be341fa055
Updated CHANGES.md for 2023.3.1
2023-03-13 15:15:13 +00:00
Sudarsan Reddy
1742379ba4
TUN-7271: Return 503 status code when no ingress rules configured
2023-03-13 09:25:34 +00:00
Devin Carr
7b8b3f73e7
TUN-7259: Add warning for missing ingress rules
...
Providing no ingress rules in the configuration file or via the CLI will now provide a warning and return 502 for all incoming HTTP requests.
2023-03-10 01:49:54 +00:00
João Oliveirinha
079631ccea
TUN-7151: Update changes file with latest release notices
2023-02-07 19:24:07 +00:00
Sudarsan Reddy
045439f0ab
TUN-7010: Changelog for release 2022.12.0
2022-12-19 11:52:37 +00:00
Devin Carr
f7a14d9200
TUN-6728: Verify http status code ingress rule
2022-09-02 09:14:03 -07:00
Sudarsan Reddy
bd88093de0
TUN-6617: Updated CHANGES.md for protocol stickiness
2022-08-15 17:41:06 +01:00
Nuno Diegues
7607ead143
TUN-6503: Fix transport fallback from QUIC in face of dial error "no network activity"
2022-07-06 13:05:45 +01:00
Nuno Diegues
c5d1662244
TUN-5960: Do not log the tunnel token or json credentials
2022-03-28 10:54:39 +01:00
Nuno Diegues
092e76eb55
TUN-5954: Start cloudflared service in Linux too similarly to other OSs
2022-03-25 13:57:47 +00:00
Nuno Diegues
98736a03e1
TUN-5915: New cloudflared command to allow to retrieve the token credentials for a Tunnel
2022-03-23 10:35:16 +00:00
Nuno Diegues
5e2e757403
TUN-5907: Change notes for 2022.3.3
2022-03-18 18:24:44 +00:00
Nuno Diegues
aeda35699e
TUN-5850: Update CHANGES.md with latest releases
2022-03-08 17:35:11 +00:00
Nuno Diegues
581cfb8480
TUN-5584: Changes for release 2021.12.2
2021-12-22 08:58:11 +00:00
Nuno Diegues
2dc5f6ec8c
TUN-5549: Revert "TUN-5277: Ensure cloudflared binary is FIPS compliant on linux amd64"
...
This reverts commit 157f5d1412
.
FIPS compliant binaries (for linux/amd64) are causing HTTPS origins to not
be reachable by cloudflared in certain cases (e.g. with Let's Encrypt certificates).
Origins that are not HTTPS for cloudflared are not affected.
2021-12-16 00:29:01 +00:00
Nuno Diegues
173190aa79
TUN-5544: Update CHANGES.md for next release
2021-12-15 09:15:53 +00:00
Sudarsan Reddy
6bcc9a76e9
TUN-5387: Updated CHANGES.md for 2021.11.0
2021-11-04 14:55:18 +00:00
cthuang
f6f10305a6
Update change log for release 2021.10.4
2021-10-25 09:37:47 +00:00
Sudarsan Reddy
79ebfa8304
TUN-5169: Release 2021.9.2 CHANGES.md
2021-09-29 08:21:22 +00:00
Rishabh Bector
a4a9f45b0a
TUN-4821: Make quick tunnels the default in cloudflared
2021-08-26 15:53:02 +00:00
Sudarsan Reddy
b8333b44a2
TUN-4795: Remove Equinox releases
2021-08-05 08:24:36 +00:00
Sudarsan Reddy
fd4000184c
TUN-4855: Added CHANGES.md for release 2021.8.0
2021-08-02 09:50:44 +01:00
Nuno Diegues
5d84874d53
TUN-4571: Changelog for 2021.6.0
2021-06-21 12:04:05 +01:00
Nuno Diegues
f88732277a
TUN-4502: Make `cloudflared tunnel route` subcommands described consistently
2021-06-07 09:20:11 +01:00
Michael Borkenstein
e99d0b5bc4
Update changelog
2021-05-20 13:09:07 -05:00
Adam Chalmers
4c5ebccacc
TUN-4425: --overwrite-dns flag for in adhoc and route dns cmds
2021-05-19 18:22:01 +00:00
cthuang
6526211a69
TUN-4421: Named Tunnels will automatically select the protocol to connect to Cloudflare's edge network
2021-05-17 15:57:44 +01:00
Jonathon Belotti
14ea6298bc
Fix typo in Changes.md
2021-05-17 12:03:59 +10:00
Adam Chalmers
2dcf3bd011
Release 2021.5.0
2021-05-13 02:05:19 +01:00
abelinkinbio
209091da39
TUN-4000: Release notes for cloudflared replica model
2021-05-13 02:05:18 +01:00
Igor Postelnik
7ce0aefea4
Publish change log for 2021.4.0
2021-04-07 11:59:24 -05:00
Igor Postelnik
3ad99b241c
TUN-4168: Transparently proxy websocket connections using stdlib HTTP client instead of gorilla/websocket; move websocket client code into carrier package since it's only used by access subcommands now ( #345 ).
2021-04-07 16:25:46 +00:00
Nuno Diegues
36787d9cf7
TUN-4153: Revert best-effort HTTP2 usage when talking to origins
...
This commit reverts part of 1cf6ae37eb
.
2021-03-31 08:25:59 +01:00
Nuno Diegues
fd0529748a
Publish change log for 2021.3.5
2021-03-26 18:27:45 +00:00
Sudarsan Reddy
1cf6ae37eb
TUN-3896: http-service and tunnelstore client use http2 transport.
...
- If origin services are http2 and https is the service url, http2
transport is preferred.
- The tunnelstore client is now upgraded to use http2.
2021-03-26 10:31:40 +00:00
Michael Borkenstein
4494a27fab
Update changelog 2021.3.3
2021-03-25 11:51:12 -05:00
Igor Postelnik
50435546c5
TUN-4118: Don't overwrite existing file with tunnel credentials. For ad-hoc tunnels, this means tunnel won't start if there's a file in the way.
2021-03-24 08:26:22 -05:00
Igor Postelnik
9018ee5d5e
TUN-4116: Ingore credentials-file setting in configuration file during tunnel create and delete opeations.
...
This change has two parts:
1. Update to newer version of the urfave/cli fork that correctly sets flag value along the context hierarchy while respecting config file overide behavior of the most specific instance of the flag.
2. Redefine --credentials-file flag so that create and delete subcommand don't use value from the config file.
2021-03-24 08:15:36 -05:00
Michael Borkenstein
9dd7898792
Publish changelog for 2021.3.2
2021-03-23 10:31:46 -05:00
Nuno Diegues
89d0e45d62
TUN-3993: New `cloudflared tunnel info` to obtain details about the active connectors for a tunnel
2021-03-17 14:08:18 +00:00
Igor Postelnik
8c5498fad1
TUN-3715: Only read config file once, right before invoking the command
2021-03-16 17:22:13 -05:00