koa-sslify
Version:
Enforces HTTPS for node.js koa projects
92 lines (70 loc) • 2.43 kB
Markdown
# Changelog
## 6.0.0
- Compatibility with koa 3
- Remove setting for `skipDefaultport` due to incompatibility with koa 3
- default behaviour is now enforced
## 5.0.1
- Improve documentation credits @tommoor
- Bump dependecies
- Switch to Github actions
## 5.0.0
- Replace `hostname` string configuration with more flexible `hostname => hostname` function
to allow more flexible redirect rules between domains & sub domains. For backwad compatibility use `() => "mydomain.com"`
credits @newhouse
## 4.0.3
- fix temporary status (302 -> 307)
- not sure how this mistake happend but given it can be consider
as being out of spec or bug this I'm going with PATCH bump and hope
it won't break anyone downstream
## 4.0.2
- **hotfix** return next middleware
## 4.0.1
- `__esModule` flag to enable support of ES style import via esm.js
## 4.0.0
- Fixes in documentation
- Remove odd behaviour cumulated over time
- remove special handling of OPTIONS requests
- remove internal redirect support
- Allow header only for 405 status
- rename option `disallowedStatus -> disallowStatus`
## 3.0.0
- module exports hash and not function (function can be found in `default` key)
- replace flags with resolvers
- default disallow method status is `405`
- flag `specCompliantDisallow` removed (default behaviour)
- for compatibility with old behaviour set `disallowStatus` to `403`
- support for `Forwarded` header (via resolver) #25
- see https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Forwarded
## 2.2.0
- Support for `customProtoHeader`
## 2.1.2
- Remove pre-release flag
## 2.1.1
- Koa 2.0.0 stable - documentation changes
## 2.1.0
- `specCompiantDisallow` support
## v2.0.0
- Koa 2.0.0 (async/await)
## v1.1.0
- Skip `403` port in URL by default
- new option `skipDefaultPort` to disable this beaviour
- *CREDITS: [@MathRobin](https://github.com/MathRobin)*
## v1.0.1
- Avoid install warnings with latest node versions
## v1.0.0
- Add method based handling when redirecting
- whitelist methods for `301/302` redirect (defaults: `GET`, `HEAD`)
- whitelist methods for `307` redirect (defaults: none)
- respond with `403` to all other methods
## v0.1.2
- fix `hostname` option
- more tests
## v0.1.1
- Do not use global settings
- add tests
## v0.1.0
- **BREAKING**: options to hash
## v0.0.3
- Support for Azure
- Support for pure HTTPS
# 0.0.1 && 0.0.2 only proto header supported!