Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Main v2 merge #2944

Merged
merged 48 commits into from
Mar 28, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
48 commits
Select commit Hold shift + click to select a range
2d3027e
Update pull_request_template.md
ReneWerner87 Dec 3, 2023
9bcc7f3
Update v3-changes.md
ReneWerner87 Dec 3, 2023
a80b288
Update CONTRIBUTING.md (#2752)
tokelo-12 Dec 5, 2023
e4d7e84
chore(encryptcookie)!: update default config (#2753)
sixcolors Dec 7, 2023
8aa8868
build(deps): bump actions/setup-go from 4 to 5 (#2754)
dependabot[bot] Dec 7, 2023
c441bdf
🩹 middleware/logger/: log client IP address by default (#2755)
iredmail Dec 8, 2023
b185083
fix: don't constrain middlewares' context-keys to strings :bug: (#2751)
benjajaja Dec 12, 2023
090acbb
📚 Update app.md for indentation (#2761)
MehmetFiratKomurcu Dec 13, 2023
c3fed55
build(deps): bump github.com/google/uuid from 1.4.0 to 1.5.0 (#2762)
dependabot[bot] Dec 13, 2023
b0925dc
build(deps): bump github/codeql-action from 2 to 3 (#2763)
dependabot[bot] Dec 16, 2023
dc2d2ef
Changing default log output (#2730)
brunodmartins Dec 18, 2023
43fa236
Update hooks.md
ReneWerner87 Dec 19, 2023
1fac52a
🩹 Fix: CORS middleware should use the defined AllowedOriginsFunc conf…
muhammadkholidb Dec 22, 2023
c49faf9
🐛 [Bug]: Adaptator + otelfiber issue #2641 (#2772)
ReneWerner87 Dec 22, 2023
d6c8876
🩹🚨 - fix for redirect with query params (#2748)
gilwo Dec 22, 2023
38eb4bd
♻️ logger/middleware colorize logger error message #2593 (#2773)
ReneWerner87 Dec 23, 2023
6249bc4
:sparkles: feat: add liveness and readiness checks (#2509)
luk3skyw4lker Jan 3, 2024
89f551b
prepare release v2.52.0
ReneWerner87 Jan 5, 2024
476e1ed
fix healthcheck.md
ReneWerner87 Jan 5, 2024
2e66937
configure workflows for V2 branch
ReneWerner87 Jan 6, 2024
7ba3137
configure workflows for V2 branch
ReneWerner87 Jan 6, 2024
e524b73
Fix default value to false in docs of QueryBool (#2811)
CAEL0 Jan 28, 2024
8325ed0
update queryParser config
ReneWerner87 Feb 6, 2024
56d2ec7
Update ctx.md
ReneWerner87 Feb 6, 2024
4e0f180
Update routing.md
ReneWerner87 Feb 8, 2024
a84a7ce
:books: Doc: Fix code snippet indentation in /docs/api/middleware/key…
grivera64 Feb 19, 2024
cf54c25
Merge pull request #2867 from grivera64/v2
gaby Feb 19, 2024
5e30112
fix: healthcheck middleware not working with route group (#2863)
luk3skyw4lker Feb 19, 2024
f0cd3b4
Merge pull request from GHSA-fmg4-x8pw-hjhg
gaby Feb 21, 2024
f9fcb02
Update app.go
ReneWerner87 Feb 21, 2024
70f21d5
fix cors domain normalize
ReneWerner87 Feb 21, 2024
0df0e08
fix sync-docs workflow
ReneWerner87 Feb 21, 2024
ddc6b23
fix sync-docs workflow
ReneWerner87 Feb 21, 2024
d456e7d
fix(middleware/cors): Validation of multiple Origins (#2883)
sixcolors Mar 1, 2024
109e91a
prepare release v2.52.2
ReneWerner87 Mar 2, 2024
68d90cd
refactor(docs): deactivate docs sync for v2
ReneWerner87 Mar 2, 2024
d2b19e2
refactor(docs): deactivate docs sync for v2
ReneWerner87 Mar 2, 2024
1aac6f6
fix(middleware/cors): Handling and wildcard subdomain matching (#2915)
sixcolors Mar 17, 2024
1607d87
fix(middleware/cors): Categorize requests correctly (#2921)
sixcolors Mar 20, 2024
ba10e68
test(middleware/csrf): Fix Benchmark Tests (#2932)
sixcolors Mar 25, 2024
43d5091
Prepare release v2.52.3
ReneWerner87 Mar 25, 2024
e574c0d
fix(middleware/cors): CORS handling (#2937)
sixcolors Mar 26, 2024
a6f4c13
fix(middleware/cors): Vary header handling non-cors OPTIONS requests …
sixcolors Mar 26, 2024
fd811cf
prepare release v2.52.4
ReneWerner87 Mar 26, 2024
464d667
Merge remote-tracking branch 'origin/v2'
ReneWerner87 Mar 28, 2024
08db30e
merge v2 in main(v3)
ReneWerner87 Mar 28, 2024
a910451
merge v2 in main(v3)
ReneWerner87 Mar 28, 2024
2f7d837
merge v2 in main(v3)
ReneWerner87 Mar 28, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/api/app.md
Original file line number Diff line number Diff line change
Expand Up @@ -664,4 +664,4 @@ Hooks is a method to return [hooks](../guide/hooks.md) property.

```go title="Signature"
func (app *App) Hooks() *Hooks
```
```
2 changes: 1 addition & 1 deletion docs/api/middleware/cors.md
Original file line number Diff line number Diff line change
Expand Up @@ -214,4 +214,4 @@ When configuring CORS, misconfiguration can potentially expose your application

- **Inadequate `AllowOriginsFunc` Validation**: When using `AllowOriginsFunc` for dynamic origin validation, ensure the function includes robust checks to prevent unauthorized origins from being accepted. Overly permissive validation can lead to security vulnerabilities. Never allow `AllowOriginsFunc` to return `true` for all origins. This is particularly crucial when `AllowCredentials` is set to `true`. Doing so can bypass the restriction of using a wildcard origin with credentials, exposing your application to serious security threats. If you need to allow wildcard origins, use `AllowOrigins` with a wildcard `"*"` instead of `AllowOriginsFunc`.

Remember, the key to secure CORS configuration is specificity and caution. By carefully selecting which origins, methods, and headers are allowed, you can help protect your application from cross-origin attacks.
Remember, the key to secure CORS configuration is specificity and caution. By carefully selecting which origins, methods, and headers are allowed, you can help protect your application from cross-origin attacks.
1 change: 0 additions & 1 deletion middleware/csrf/csrf.go
Original file line number Diff line number Diff line change
Expand Up @@ -318,7 +318,6 @@ func originMatchesHost(c fiber.Ctx, trustedOrigins []string, trustedSubOrigins [
// returns nil if the referer header is valid
func refererMatchesHost(c fiber.Ctx, trustedOrigins []string, trustedSubOrigins []subdomain) error {
referer := strings.ToLower(c.Get(fiber.HeaderReferer))

if referer == "" {
return ErrRefererNotFound
}
Expand Down
Loading