mirror of
				https://github.com/caddyserver/caddy.git
				synced 2025-11-04 03:27:23 -05:00 
			
		
		
		
	Update comment and Caddy 1 EOL
This commit is contained in:
		
							parent
							
								
									66863aad3b
								
							
						
					
					
						commit
						e385be9225
					
				
							
								
								
									
										4
									
								
								.github/SECURITY.md
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										4
									
								
								.github/SECURITY.md
									
									
									
									
										vendored
									
									
								
							@ -11,12 +11,12 @@ Please note that we consider publicly-registered domain names to be public infor
 | 
				
			|||||||
| Version | Supported          |
 | 
					| Version | Supported          |
 | 
				
			||||||
| ------- | ------------------ |
 | 
					| ------- | ------------------ |
 | 
				
			||||||
| 2.x     | :white_check_mark: |
 | 
					| 2.x     | :white_check_mark: |
 | 
				
			||||||
| 1.x     | :white_check_mark: (deprecating soon) |
 | 
					| 1.x     | :white_check_mark: (EOL 1 Oct 2020) |
 | 
				
			||||||
| < 1.x   | :x:                |
 | 
					| < 1.x   | :x:                |
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## Reporting a Vulnerability
 | 
					## Reporting a Vulnerability
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Please email Matt Holt (the author) directly: matt [at] lightcodelabs [dot com].
 | 
					Please email Matt Holt (the author) directly: matt [at] ardanlabs [dot com].
 | 
				
			||||||
 | 
					
 | 
				
			||||||
We'll need enough information to verify the bug and make a patch. It will speed things up if you suggest a working patch, such as a code diff, and explain why and how it works. Reports that are not actionable, do not contain enough information, are too pushy/demanding, or are not able to convince us that it is a viable and practical attack on the web server itself may be deferred to a later time or possibly ignored, resources permitting. Priority will be given to credible, responsible reports that are constructive, specific, and actionable. Thank you for understanding.
 | 
					We'll need enough information to verify the bug and make a patch. It will speed things up if you suggest a working patch, such as a code diff, and explain why and how it works. Reports that are not actionable, do not contain enough information, are too pushy/demanding, or are not able to convince us that it is a viable and practical attack on the web server itself may be deferred to a later time or possibly ignored, resources permitting. Priority will be given to credible, responsible reports that are constructive, specific, and actionable. Thank you for understanding.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
				
			|||||||
@ -77,6 +77,7 @@ func parseBind(h Helper) ([]ConfigValue, error) {
 | 
				
			|||||||
//         ca_root   <pem_file>
 | 
					//         ca_root   <pem_file>
 | 
				
			||||||
//         dns       <provider_name>
 | 
					//         dns       <provider_name>
 | 
				
			||||||
//         on_demand
 | 
					//         on_demand
 | 
				
			||||||
 | 
					//         eab    <key_id> <mac_key>
 | 
				
			||||||
//         issuer <module_name> ...
 | 
					//         issuer <module_name> ...
 | 
				
			||||||
//     }
 | 
					//     }
 | 
				
			||||||
//
 | 
					//
 | 
				
			||||||
 | 
				
			|||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user