Foundry is a Markdown-first CMS written in Go. It keeps content in files, renders through themes, and extends through both first-class compiled Go plugins and out-of-process RPC plugins.
The project is aimed at teams that want a file-based workflow without giving up CMS-style features such as taxonomies, theme-owned custom fields, feeds, plugin hooks, and an admin surface.
See more of Foundry here: Foundry Screenshots
- Stores pages and posts as Markdown with frontmatter
- Supports language-aware routing and content grouping
- Builds a normalized site graph in memory
- Uses themes for layouts, partials, and theme assets
- Supports first-class compiled Go plugins for deep CMS integration
- Supports out-of-process RPC plugins for process-isolated extension points
- Uses plugins for hooks, asset injection, admin pages, and runtime extensions
- Generates RSS and sitemap output
- Publishes static output to
public/ - Serves the site locally with live reload during development
- Tracks document, template, data, and taxonomy dependencies for incremental rebuilds
The fastest way to get the project running locally is via Docker:
sh scripts/docker-init.sh
docker compose up -d --buildThe default docker-compose.yml is local-development oriented:
- it bind-mounts the project source into the container
- it keeps
data/andpublic/on named Docker volumes - it reads
.envwhen present scripts/docker-init.shcreates a.envfile with random local secrets for local use
For a harder production shape, use docker-compose.prod.yml:
export FOUNDRY_ADMIN_SESSION_SECRET="$(openssl rand -hex 32)"
export FOUNDRY_ADMIN_TOTP_SECRET_KEY="$(openssl rand -base64 32)"
docker compose -f docker-compose.prod.yml up -d --buildThe production compose setup:
- uses explicit required secrets
- runs with a read-only root filesystem
- drops Linux capabilities
- enables
no-new-privileges - uses a tmpfs for
/tmp - uses named volumes for
content/,themes/,plugins/,data/, andpublic/
Before using the production overlay in anything real, update
content/config/site.docker.prod.yaml so base_url matches your deployed
HTTPS origin.
Otherwise, see the Getting Started section for how to install the foundry command, run Foundry locally, or run it in portable standalone mode without Docker.
Foundry will run on http://localhost:8080/ by default, and the admin panel
is reachable at http://localhost:8080/__admin. The default login on a
new install is admin:admin.
Production note: set admin.session_secret in content/config/site.yaml or
FOUNDRY_ADMIN_SESSION_SECRET in the environment. Foundry stores only hashed
session tokens at rest, and an explicit session secret strengthens that hashing.
cmd/
foundry/ main CLI entrypoint
plugin-sync/ generated plugin import synchronizer
internal/
admin/ admin auth, HTTP handlers, service layer, UI templates
assets/ asset sync and CSS bundling
commands/ CLI command implementations
config/ config loading, editing, validation
content/ document parsing, loading, site graph assembly
data/ data file loading
deps/ dependency graph and incremental rebuild planning
feed/ RSS and sitemap generation
markup/ Markdown rendering
plugins/ plugin metadata, loading, lifecycle, sync
renderer/ template rendering and output writing
router/ URL assignment
server/ preview server, watcher, incremental rebuild orchestration
site/ higher-level graph loading helpers
taxonomy/ taxonomy indexing and archive helpers
theme/ theme management and validation
plugins/ built-in plugins
themes/ installed themes
content/ project content
data/ project data files
docs/ GitHub Pages site and published coverage
scripts/ release and maintenance utilities
Foundry keeps a clean separation between content loading, route assignment, rendering, and runtime orchestration.
The main pipeline is:
config -> content/data load -> site graph -> route assignment
-> dependency graph -> renderer -> build output or preview server
Two graph types matter:
SiteGraph: the in-memory representation of documents, routes, taxonomies, config, and loaded dataDependencyGraph: the rebuild graph used to decide which outputs must be regenerated after a change
The dependency graph includes taxonomy archive outputs, so incremental rebuilds can target both document pages and taxonomy pages.
Foundry uses:
go fmtfor Go codeprettierfor JS, CSS, HTML, and Markdown assets/docs
Install the formatter tooling once:
npm installThen run:
make fmt
make fmt-web
make fmt-allFoundry now includes local-only browser coverage using Playwright for:
- the shipped default frontend theme
- the shipped default admin theme
Install the tooling once:
npm install
npx playwright installThen run:
make test-e2eUseful variants:
npm run test:e2e
npm run test:e2e:full
npm run test:e2e:headed
npm run test:e2e:uiNotes:
- these tests start a real local Foundry server against a disposable temp workspace, so
content/,data/,public/, and backup output are isolated from the repo during the run - they are intended for local development only right now; there is no GitHub Action for them yet
make test-e2eandnpm run test:e2e:fullrun pre/post cleanup soe2e-*documents, media, users, backups, and lifecycle artifacts do not accumulate- admin tests default to
admin/admin, but you can override credentials with:FOUNDRY_E2E_ADMIN_USERFOUNDRY_E2E_ADMIN_PASS
Foundry now ships two official framework-agnostic JavaScript SDKs under sdk/:
sdk/adminsdk/frontend
They exist to give admin frontends, plugin UIs, and JS-powered themes a supported client contract instead of forcing each consumer to hand-roll fetch logic against unstable internal endpoints.
The Admin SDK targets the authenticated admin API under admin.path + /api.
The Frontend SDK targets the public Foundry platform surface under /__foundry, with a live JSON API in preview/server mode and generated static artifacts under public/__foundry/ for built sites.
The shared SDK core handles:
- request construction
- normalized JSON/error handling
- capability discovery helpers
- common client configuration
The current official browser entrypoints are:
/__foundry/sdk/admin/index.js
/__foundry/sdk/frontend/index.js
Example:
import { createAdminClient } from '/__foundry/sdk/admin/index.js';
import { createFrontendClient } from '/__foundry/sdk/frontend/index.js';
const admin = createAdminClient({ baseURL: '/__admin' });
const frontend = createFrontendClient({ mode: 'auto' });Current capability discovery endpoints:
- admin:
<admin.path>/api/capabilities - frontend:
/__foundry/api/capabilities
Built sites also emit frontend SDK data artifacts under:
public/__foundry/
capabilities.json
site.json
navigation.json
routes.json
collections.json
search.json
preview.json
content/<id>.json
sdk/...
The shipped themes use these SDKs too:
- the default admin theme imports the Admin SDK from
/__foundry/sdk/admin/index.js - the default frontend theme boots a small SDK-based runtime from
/theme/js/foundry-theme.js
Plugin-defned admin pages and widgets can also target a stable shell contract now. A plugin can declare admin page and widget bundles in plugin.yaml, Foundry exposes those bundles under <admin.path>/extensions/<plugin>/..., and the default admin shell will automatically import them when their page or widget slot is active. Admin pages can also declare nav_group (dashboard, content, manage, or admin) so they land in the right sidebar group. The shell dispatches foundry:admin-extension-page and foundry:admin-extension-widget and exposes window.FoundryAdmin so plugin code can mount against a supported runtime surface instead of private admin internals. The built-in Extensions admin page itself uses a separate route, <admin.path>/a-extensions, so it does not collide with the plugin asset namespace.
Foundry now treats themes and plugins as different security surfaces.
- Themes are restricted through
theme.yaml -> security - Plugins declare intended power through
plugin.yaml -> permissions
Theme security currently covers:
- a curated public-safe template context instead of raw config
- CSP generation for public pages
- validation of undeclared remote assets in theme HTML, CSS, and JS
- explicit declaration of outbound frontend request origins
Plugin permissions currently cover declaration and visibility, not true sandboxing.
In-process plugins are still trusted Go code today, but Foundry now also has a
working out-of-process RPC host for the first migrated hook family
(OnContext). Foundry can now:
- load and validate structured permission declarations
- surface plugin risk and approval requirements in the admin UI
- report declared permissions with
foundry plugin security <name> - run
foundry plugin validate --securityfor explicit security validation - statically analyze plugin source for risky imports, hooks, and calls
- compare detected capabilities against declared permissions
- require explicit approval for risky or mismatched plugins during CLI and admin install, enable, and update flows
- record security-oriented plugin approval actions in the audit log
- execute
runtime.mode: rpcplugins out of process when they use the supported RPC protocol and hook family
See the full authoring guides for details:
docs/themes/fortheme.yaml -> securitydocs/plugins/forplugin.yaml -> permissionsdocs/plugins/also includes the full structured permission reference for plugin authors
Plugin runtime metadata now supports a real runtime block. The current RPC
host supports the context hook family over a JSON RPC transport, with a
sanitized environment and no host-granted filesystem, network, or process
capability channels. Broader hook migration and stronger OS-level sandboxing
still build on that foundation.
- Go
1.22or newer - A working
PATHthat includes$(go env GOPATH)/binif you install withgo install
Install the CLI:
go install github.com/sphireinc/foundry/cmd/foundry@latestVerify the install:
foundry versionThat prints runtime-aware version metadata, including the current version, commit, build date, install mode, target platform, and executable path.
If you are working from a local checkout instead of a global install, you can run:
go run ./cmd/foundry versionFoundry expects a file-based project layout. The quickest way to get running is to start with this shape:
content/
config/
site.yaml
pages/
index.md
posts/
images/
uploads/
data/
themes/
plugins/
Minimal content/config/site.yaml (though you can just cope the example.site.yaml):
title: My Site
base_url: http://localhost:8080
theme: default
content_dir: content
public_dir: public
themes_dir: themes
data_dir: data
plugins_dir: plugins
server:
addr: :8080
live_reload: true
live_reload_mode: streamMinimal content/pages/index.md:
---
title: Home
---
# Hello from FoundryLocal development with Docker:
sh scripts/docker-init.sh
docker compose up -d --buildThat uses:
The default Docker setup is intentionally development-oriented:
- the project root is bind-mounted into the container
data/andpublic/stay on named Docker volumes- local Docker secrets can live in
.env
Production-shaped Docker deployment:
export FOUNDRY_ADMIN_SESSION_SECRET="$(openssl rand -hex 32)"
export FOUNDRY_ADMIN_TOTP_SECRET_KEY="$(openssl rand -base64 32)"
docker compose -f docker-compose.prod.yml up -d --buildThat uses:
The production compose shape is stricter:
- explicit required secrets
- read-only root filesystem
tmpfsfor/tmpcap_drop: ALLno-new-privileges- named volumes for
content/,themes/,plugins/,data/, andpublic/
Before using the production Docker overlay, set the real HTTPS origin in
content/config/site.docker.prod.yaml.
Start the local preview server from the project root:
foundry serveThen open http://localhost:8080/.
If you want Foundry to stay running after you close the terminal, use standalone mode:
foundry serve-standalone
foundry status
foundry logs -f
foundry stop
foundry update check
foundry service install
foundry service status
foundry service restartStandalone mode stores its runtime files under .foundry/run/ in the project:
standalone.jsonstandalone.log
To produce static output:
foundry buildGenerated files will be written to public/.
For preview-oriented output that includes non-published workflow states:
foundry build --previewThat also writes a preview manifest at public/preview-links.json.
foundry version
foundry build
foundry build --preview
foundry build --env preview --target production
foundry serve
foundry serve --debug
foundry serve-standalone
foundry serve-preview
foundry status
foundry restart
foundry stop
foundry logs -f
foundry service install
foundry service status
foundry service restart
foundry service uninstall
foundry release cut v1.3.3
foundry update check
foundry update apply
foundry plugin list --enabled
foundry theme list
foundry theme migrate field-contracts
foundry routes check
foundry admin hash-password your-password- Update
content/config/site.yaml. - Add pages and posts under
content/pagesandcontent/posts. - Put media under the dedicated collection roots:
content/images,content/videos,content/audio, andcontent/documents. - Reference media from Markdown with the
media:scheme. - Run
foundry serveduring development. - Run
foundry buildbefore publishing or checking generated output.
For simple self-hosting or local development where you want Foundry to keep running in the background without Docker, use:
foundry serve-standaloneThen manage it with:
foundry status
foundry logs
foundry logs -f
foundry restart
foundry stop
foundry update check
foundry update applyNotes:
- standalone mode is designed for macOS and Linux
- it writes state and logs under
.foundry/run/ - if you launch standalone from source with
go run, Foundry first builds a managed binary under.foundry/run/and keeps that binary running instead of keepinggo runalive after logout - it is a portable convenience runtime, not a replacement for Docker,
systemd, orlaunchdin more serious production setups
For a more durable self-hosted runtime that behaves more like nginx, install
Foundry as a user-level OS service:
foundry service install
foundry service status
foundry service restart
foundry service uninstallBehavior by platform:
- Linux: installs a user service under
~/.config/systemd/user/ - macOS: installs a LaunchAgent under
~/Library/LaunchAgents/
Foundry stores service metadata and logs under .foundry/run/ in the project.
If Foundry was launched from source via go run, service installation first
builds a managed binary under .foundry/run/ and points the service at that
binary.
On Linux, user services may need lingering enabled to survive logout and reboot:
loginctl enable-linger "$USER"Embedded media uses normal Markdown image syntax:

File links use normal Markdown link syntax:
[Download the spec](media:documents/spec-sheet.pdf)Admin uploads return stable references in the same format, for example:
media:images/posts/launch/diagram.png
media:videos/posts/launch/demo.mp4
media:documents/posts/launch/spec-sheet.pdf
If a page appears to hang during local preview, run foundry serve --debug to emit per-request timing plus runtime snapshots, including:
- heap allocation and in-use heap
- stack and total runtime memory
- goroutine count
- active request count
- GC count
- process user/system CPU time and request CPU percentage estimates
If live reload causes browser connection stalls in development, switch server.live_reload_mode from stream to poll. stream uses Server-Sent Events and refreshes immediately. poll trades a small delay for simpler connection behavior.
Foundry supports environment-specific config overlays and named deploy targets.
If content/config/site.preview.yaml exists, it can be layered on top of the base config with:
foundry build --env previewNamed targets are configured under deploy.targets and applied with:
foundry build --target production
foundry build --env staging --target edgeIf deploy.default_target is set, Foundry applies that target automatically when no explicit --target flag is provided.
foundry doctor now reports timing breakdowns for:
- plugin config hooks
- content/data loading
- route assignment
- route hooks
- asset sync
- renderer
- feed generation
foundry validate now checks:
- broken internal links
- broken
media:references - missing layout templates
- orphaned media
- duplicate URLs
- duplicate type/lang slug combinations
- taxonomy inconsistencies
The content command set also includes portability and migration helpers:
foundry content export bundle.zip
foundry backup create
foundry backup list
foundry content import markdown ./legacy-markdown
foundry content import wordpress ./wordpress.xml
foundry content migrate layout page landing --dry-run
foundry content migrate field-rename marketing old_field new_field --dry-runFoundry now has a dedicated backup flow for the content tree:
foundry backup create
foundry backup create ./archives/manual-snapshot.zip
foundry backup list
foundry backup git-snapshot "before launch"
foundry backup git-log 10By default, managed backups are written under:
.foundry/backups
Backups are zip archives of content/ plus a small backup-manifest.json
entry. Before writing the archive, Foundry checks free disk space on the target
filesystem and refuses to start the backup if there is not enough headroom.
Foundry also supports local Git-backed snapshots as a second backup format:
- the snapshot repo lives under
.foundry/backups/git - each snapshot copies the current
content/tree into that repo - Foundry commits only when there are actual content changes
- this is a local history mechanism today, not a remote Git push integration yet
You can also enable debounced on-change backups in content/config/site.yaml:
backup:
enabled: true
dir: ".foundry/backups"
on_change: true
debounce_seconds: 45
retention_count: 20
min_free_mb: 256
headroom_percent: 125When backup.on_change is enabled, foundry serve and foundry serve-preview
will create a backup after the content tree goes quiet for the configured
debounce window. Foundry also prunes older backups beyond retention_count.
The admin Themes screen now also exposes manual zip backup creation, download, and restore actions for the same archive set.
Foundry includes a release-aware updater for managed standalone installs:
foundry update check
foundry update applyBehavior depends on install mode:
standalone: self-update supporteddocker: update availability only, roll out a new image manuallysource: update availability only, pull and rebuild manuallybinary: update availability only unless you run it underserve-standalone
Self-update uses GitHub Releases metadata, compares the running version against
the latest release tag, downloads the matching release asset, verifies a
published .sha256 asset when available, replaces the binary, and restarts the
standalone runtime.
This repository also includes a GitHub Actions release workflow at
.github/workflows/release.yml. Pushing a v*.*.* tag now generates and uploads:
foundry-linux-amd64.tar.gzfoundry-linux-arm64.tar.gzfoundry-darwin-amd64.tar.gzfoundry-darwin-arm64.tar.gzfoundry-windows-amd64.tar.gz- matching
.sha256files for each archive
The admin Themes screen also shows current version, latest release version, install mode, and whether self-update is supported.
To cut a release tag locally:
foundry release cut v1.3.3To cut and push the tag in one step:
foundry release cut v1.3.3 --pushYou can also use the repo-local wrapper:
scripts/release.sh v1.3.3 --pushRelease cutting rules:
- run it from the repository root
- the worktree must be clean
- versions must be in
vX.Y.Zformat
When the tag is pushed, .github/workflows/release.yml builds and uploads the
foundry-*.tar.gz archives and matching .sha256 files to GitHub Releases.
Foundry currently supports two primary document types:
pagepost
Content is loaded from:
content/pagescontent/postscontent/imagescontent/videoscontent/audiocontent/documents
Language variants are represented by a leading language directory. For example:
content/pages/about.md
content/pages/fr/about.md
content/posts/launch.md
content/posts/fr/launch.md
Markdown files use frontmatter for metadata such as:
titlesluglayoutdraftsummarydateupdated_attagscategories- custom
taxonomies fields- arbitrary
params
Foundry supports images, video, audo, and downloadable files through the media: reference scheme.
media:images/...resolves to/images/...media:uploads/...resolves to/uploads/...media:assets/...resolves to/assets/...
The renderer infers the output element from the target file extension:
- image files render as
<img> - video files render as
<video controls> - audio files render as
<audio controls> - other files remain standard links
The main config file is typically:
content/config/site.yaml
The admin Settings area edits this same file through structured forms and an
Advanced YAML tab. Foundry keeps YAML as the storage format on disk, but the
admin works with a structured config object so common settings can be edited as
forms and then written back safely to site.yaml.
Important config groups:
admin: admin service settingsserver: preview server settingscontent: content directory conventions and default layoutstaxonomies: taxonomy definitions and archive layoutsplugins: enabled pluginssecurity: security-sensitive rendering settingsfeed: RSS and sitemap output paths
Foundry handles advanced custom fields through theme-owned contracts, not through content/config/site.yaml.
Canonical guide:
-
GitHub Pages: Advanced Custom Fields
-
Themes declare supported fields in
theme.yamlunderfield_contracts -
Page-specific field values stay in page frontmatter under
fields: -
Shared/global field values live in
content/custom-fields.yaml -
The admin editor resolves the current page's available fields from the active theme
-
The admin
Custom Fieldssection edits shared/global field groups declared by the active theme -
fields:is for persisted schema-backed content only; plugins must not write derived render metadata into document fields -
Plugin-derived values such as TOC data should be exposed at render time through runtime context data instead
Example theme.yaml:
field_contracts:
- key: marketing-page
title: Marketing Page
description: Fields for standard marketing pages.
target:
scope: document
types: [page]
layouts: [page]
slugs: [pricing, about, contact]
fields:
- name: hero_title
type: text
label: Hero Title
required: true
- name: hero_body
type: textarea
label: Hero Body
- key: site_marketing
title: Site Marketing
target:
scope: shared
key: site_marketing
fields:
- name: primary_cta_label
type: text
label: Primary CTA LabelExample page frontmatter:
---
title: Pricing
slug: pricing
layout: page
fields:
hero_title: Clear pricing for modern teams
hero_body: Foundry keeps publishing infrastructure calm and predictable.
---Example shared values:
values:
site_marketing:
primary_cta_label: Start with FoundryIf you still have legacy config-owned field schemas, migrate them with:
foundry theme migrate field-contractsPlugin-author note:
- Do not use
doc.Fieldsfor derived values liketoc,has_toc,reading_time, or similar render-time metadata doc.Fieldsnow belongs to the active theme contract and is validated as persisted content- Runtime-only plugin data should be recomputed or attached through render-time context data
(
ctx.Data)
admin.path controls where the themeable admin shell is mounted. By default it is /__admin. The shell itself is public so the browser can load HTML, CSS, and JavaScript. Authenticated API access is session-based by default.
Admin users live in a filesystem-backed YAM file, which defaults to:
content/config/admin-users.yaml
Example:
users:
- username: admin
name: Admin User
email: admin@example.com
role: admin
password_hash: argon2id$...Generate a password hash with:
foundry admin hash-password "your-password"Or generate a starter YAML snippet with:
foundry admin sample-user admin "Admin User" admin@example.com "your-password"Browser sessions are stored in a secure cookie scoped to admin.path, expire
after 30 minutes of inactivity by default, and are renewed while the user
remains active. Foundry persists only a token hash in
data/admin/sessions.yaml, not the raw reusable bearer token.
- set
admin.session_secretorFOUNDRY_ADMIN_SESSION_SECRETin production - without it, session tokens are still hashed at rest, but with plain SHA-256 instead of keyed HMAC-SHA-256
- set
admin.totp_secret_keyorFOUNDRY_ADMIN_TOTP_SECRET_KEYin production to encrypt stored TOTP secrets at rest - TOTP setup now requires that key; legacy plaintext TOTP secrets still verify and are migrated to encrypted form when used
- admin password hashes now default to
argon2id$... - legacy PBKDF2 password hashes still verify and are upgraded automatically on successful login
admin.session_idle_timeout_minutescontrols inactivity expiryadmin.session_max_age_minutescaps total session lifetime even if the session remains activeadmin.single_session_per_useroptionally revokes older sessions when the same user signs in again- for non-local admin access, set
base_urlto anhttps://...origin and make sure your reverse proxy forwards HTTPS correctly so secure cookies behave as expected - rotating
admin.session_secretinvalidates all persisted browser sessions - rotating
admin.totp_secret_keyrequires users with stored TOTP secrets to re-enroll if their secret has not already been migrated with the new key - if either secret is suspected compromised, rotate it, revoke sessions, and review the audit log before restoring access
- compatibility note: legacy plaintext sessions, legacy plaintext TOTP secrets, and legacy PBKDF2 password hashes remain supported only as a migration bridge and are intended to be removed after the
1.4.xline
admin.access_token is now optional. If set, it still works for API automation with:
Authorization: Bearer <token>X-Foundry-Admin-Token: <token>
Admin themes live under:
themes/admin-themes/<name>/
admin-theme.yaml
index.html
assets/
admin.css
admin.js
admin-theme.yaml is the admin-theme manifest. It now supports:
admin_apisdk_versioncompatibility_versioncomponentswidget_slotsscreenshots
Both shipped themes now declare and validate against the current SDK contract:
- frontend theme
sdk_version: v1 - admin theme
sdk_version: v1
The current stable admin-theme component contract is:
shellloginnavigationdocumentsmediausersconfigpluginsthemesaudit
The current stable admin-theme widget-slot contract is:
overview.afterdocuments.sidebarmedia.sidebarplugins.sidebar
Set the active admin theme with:
admin:
enabled: true
path: /__admin
session_secret: replace-this-in-production
totp_secret_key: replace-this-with-base64-32-byte-key
theme: default
users_file: content/config/admin-users.yaml
session_ttl_minutes: 30
session_idle_timeout_minutes: 30
session_max_age_minutes: 480
single_session_per_user: falseadmin.local_only is an optional convenience restriction for local development. It is not the default posture and should not be treated as the only security boundary in front of a reverse proxy.
The dfault admin theme now includes:
- a structured frontmatter editor that stays in sync with raw Markdown
- media-picker insertion for stable
media:references - document and media history/trash views with restore and purge actions
- restore-preview flows that load a diff before a document restore is committed
- media replacement while preserving the canonical reference path
- an audit log view
- dedicated user-security flows for password reset tokens, TOTP setup/disable, and session revocation
- a Debug page with runtime, content, storage, integrity, activity, and persisted build-report visibility when
admin.debug.pprofis enabled - keyboard shortcuts:
Cmd/Ctrl+Ssave the current formCmd/Ctrl+Enterpreview the current documentCmd/Ctrl+Kopen the command paletteShift+/toggle shortcut helpg d,g m,g u,g ajump to Documents, Media, Users, and Audit
The admin UI also includes breadcrumbs, toast notifications, unsaved-change warnings, clearer error panels, a command palette for fast navigation and creation shortcuts, review/scheduled overview queues, and client-side pagination/sorting for the major management tables.
security.allow_unsafe_html controls whether raw HTML in Markdown is preserved in rendered output.
server.live_reload turns live reload on during local preview.
server.live_reload_mode controls the transport:
stream: uses a long-lived SSE connection to/__reloadpoll: polls/__reload/pollevery 1.5 seconds and reloads when the rebuild version changes
Use poll if your browser or proxy environment is sensitive to long-lived local connections.
The preview/admin server uses explicit read, write, and idle timeouts by default.
Static builds now also emit a frontend search index at:
public/search.json
The generated and live search surfaces now include snippets, and the search APIs apply simple weighted ranking so title and summary matches are promoted ahead of body-only matches.
foundry validate now checks for:
- broken
media:references - broken internal links to routes and static files
Themes live under themes/<name>/.
A theme typically contains:
themes/default/
assets/
css/
layouts/
base.html
index.html
page.html
post.html
list.html
partials/
head.html
header.html
footer.html
theme.yaml
Themes are responsible for:
- page and post presentation
- shared base layout
- taxonomy archive templates
- theme-specific assets
Theme manifests now support richer metadata:
supported_layoutsconfig_schemafield_contractsscreenshotscompatibility_version
Launch themes are also expected to support the current minimum slot contract:
head.endbody.startbody.endpage.before_mainpage.after_mainpage.before_contentpage.after_contentpost.before_headerpost.after_headerpost.before_contentpost.after_contentpost.sidebar.toppost.sidebar.overviewpost.sidebar.bottom
Theme validation now checks both of these conditions:
- the theme manifest declares the required slots
- the corresponding layouts actually render those slots
It also checks:
- required layouts and partials
- template references to missing partials/layouts
- template parse failures with diagnostics suitable for admin reporting
Plugins live under plugins/<name>/. Foundry supports two plugin runtime shapes:
- In-process Go plugins are compiled into the Foundry binary. They register through Go
init()functions, so enabling one from the Admin UI only changes config; it cannot import new Go code into an already-built binary. After enabling a newly installed in-process plugin, runfoundry plugin syncorgo run ./cmd/plugin-sync, rebuild, and restart. - Out-of-process RPC plugins declare
runtime.mode: rpcinplugin.yaml. They do not need generated Go imports because Foundry launches the configured command and talks to it through the RPC protocol. The current RPC host supports the context hook family.
Built-in in-process plugins that ship with Foundry may already be compiled into the binary. Locally installed third-party in-process plugins still require generated imports and a rebuild.
Current plugin capabilities include:
- lifecycle hooks during load/build/serve
- route and rendering hooks
- HTML slot injection
- asset injection
- plugin validation and dependency checks
Plugin manifests now also support:
dependenciescompatibility_versionconfig_schemascreenshots
Plugin installation is intentionally conservative now: install sources are restricted to GitHub over https or git@github.com. Installing a plugin still means trusting third-party code, so treat it as a supply-chain boundary.
Plugin management is safer now:
- updates keep rollback snapshots under
plugins/.rollback/<name>/... - plugins can be rolled back to the latest preserved snapshot
- admin plugin records now include health/diagnostic reporting, dependency/config metadata, and rollback availability
Foundry maintains a dependency graph that relates:
- source files to documents
- templates to outputs
- data keys to outputs
- documents to taxonomy archives
- taxonomy archives to rendered URLs
When possible, the preview server rebuilds only the affected outputs instead of running a full site rebuild.
The asset pipeline can:
- copy content assets
- copy images
- copy uploads
- copy theme assets
- copy enabled plugin assets
- build a bundled CSS file in
public/assets/css/foundry.bundle.css
Asset roots and plugin/theme names are validated as safe paths, and symlinked asset files are rejected.
The repository publishes a small docs site from docs/ that includes:
- a project overview
- the CLI contract
- the latest HTML coverage report generated in CI
Useful commands while working on the repo:
go test ./...
go vet ./...
go run ./cmd/plugin-syncThe main CI workflow also verifies formatting, syncs generated plugin imports, builds the project, runs tests, and publishes the coverage report to GitHub Pages on main.
Please see LICENSE, LICENSE.PLUGIN.EXCEPTION, and LICENSE.THEMES.EXCEPTION for full license information.
Foundry includes additional permissions under AGPLv3 section 7 for
third-party plugins and themes. Plugins, extensions, modules, themes,
templates, skins, style packages, and similar customizations that work
with Foundry solely through its documented public extension and theming
interfaces are treated as separate and independent works. They are not
subject to the AGPL solely because they interoperate with Foundry
through those public interfaces, and their authors may license them
under terms of their choice, including proprietary terms.
These permissions do not apply to Foundry itself, to modifications of
Foundry, to works based on non-public or internal interfaces, or to
works that copy code from Foundry except as otherwise permitted.
