From 3bf7aade1a8ba20683326971815d23ce0330f600 Mon Sep 17 00:00:00 2001 From: AJ ONeal Date: Thu, 8 Oct 2020 15:22:11 -0600 Subject: [PATCH] add Webi installer, and Linux & Windows hints --- src/docs/markdown/download.md | 32 +++++++++++++++++++++++++++++++- 1 file changed, 31 insertions(+), 1 deletion(-) diff --git a/src/docs/markdown/download.md b/src/docs/markdown/download.md index 19ea054..069fd9f 100644 --- a/src/docs/markdown/download.md +++ b/src/docs/markdown/download.md @@ -10,7 +10,7 @@ All our [official distributions](https://github.com/caddyserver/dist) come with ## Static binaries -You can **[download Caddy from GitHub](https://github.com/caddyserver/caddy/releases)**, where new releases are immediately published. +You can **[download Caddy from GitHub](https://github.com/caddyserver/caddy/releases)**, where new releases are immediately published, and place it in your PATH. Using `curl`: @@ -31,6 +31,22 @@ Replace `ASSET` with the filename for your platform. [**View on Docker Hub**](https://hub.docker.com/_/caddy) +## Linux & Raspberry Pi + +You can use Webi to automate the processes of downloading the latest release and putting it +in your PATH, without requiring admin permissions. + +
curl -sS https://webinstall.dev/caddy | bash
+ +If you'd like a simple way to launch Caddy as a system service and bind to privilege ports, +see the Webi [Caddy Cheat Sheet](https://webinstall.dev/caddy). + +To allow non-root users to bind to ports 80 and 443, use setcap. + +``` +sudo setcap cap_net_bind_service=+ep +``` + ## Debian, Ubuntu, Raspbian
echo "deb [trusted=yes] https://apt.fury.io/caddy/ /" \
@@ -65,6 +81,20 @@ RHEL/CentOS 7:
 
 ## macOS
 
+**Homebrew**
+
 
brew install caddy
[**View the Homebrew formula**](https://formulae.brew.sh/formula/caddy) + +**Webi** + +
curl -sS https://webinstall.dev/caddy | bash
+ +[**View the Webi installer**](https://github.com/webinstall/webi-installers/tree/master/caddy) + +## Windows 10 + +
curl.exe -A MS https://webinstall.dev/caddy | powershell
+ +You may need to adjust the Windows firewall rules to allow non-localhost incoming connections.