Merge branch 'master' into leaf-verifier-caddyfile
commit
31e367ba1b
|
@ -51,7 +51,7 @@ jobs:
|
||||||
check-latest: true
|
check-latest: true
|
||||||
|
|
||||||
- name: golangci-lint
|
- name: golangci-lint
|
||||||
uses: golangci/golangci-lint-action@v6
|
uses: golangci/golangci-lint-action@v8
|
||||||
with:
|
with:
|
||||||
version: latest
|
version: latest
|
||||||
|
|
||||||
|
|
218
.golangci.yml
218
.golangci.yml
|
@ -1,27 +1,15 @@
|
||||||
linters-settings:
|
version: "2"
|
||||||
errcheck:
|
run:
|
||||||
exclude-functions:
|
issues-exit-code: 1
|
||||||
- fmt.*
|
tests: false
|
||||||
- (go.uber.org/zap/zapcore.ObjectEncoder).AddObject
|
output:
|
||||||
- (go.uber.org/zap/zapcore.ObjectEncoder).AddArray
|
formats:
|
||||||
gci:
|
text:
|
||||||
sections:
|
path: stdout
|
||||||
- standard # Standard section: captures all standard packages.
|
print-linter-name: true
|
||||||
- default # Default section: contains all imports that could not be matched to another section type.
|
print-issued-lines: true
|
||||||
- prefix(github.com/caddyserver/caddy/v2/cmd) # ensure that this is always at the top and always has a line break.
|
|
||||||
- prefix(github.com/caddyserver/caddy) # Custom section: groups all imports with the specified Prefix.
|
|
||||||
# Skip generated files.
|
|
||||||
# Default: true
|
|
||||||
skip-generated: true
|
|
||||||
# Enable custom order of sections.
|
|
||||||
# If `true`, make the section order the same as the order of `sections`.
|
|
||||||
# Default: false
|
|
||||||
custom-order: true
|
|
||||||
exhaustive:
|
|
||||||
ignore-enum-types: reflect.Kind|svc.Cmd
|
|
||||||
|
|
||||||
linters:
|
linters:
|
||||||
disable-all: true
|
default: none
|
||||||
enable:
|
enable:
|
||||||
- asasalint
|
- asasalint
|
||||||
- asciicheck
|
- asciicheck
|
||||||
|
@ -35,148 +23,96 @@ linters:
|
||||||
- errcheck
|
- errcheck
|
||||||
- errname
|
- errname
|
||||||
- exhaustive
|
- exhaustive
|
||||||
- gci
|
|
||||||
- gofmt
|
|
||||||
- goimports
|
|
||||||
- gofumpt
|
|
||||||
- gosec
|
- gosec
|
||||||
- gosimple
|
|
||||||
- govet
|
- govet
|
||||||
- ineffassign
|
|
||||||
- importas
|
- importas
|
||||||
|
- ineffassign
|
||||||
- misspell
|
- misspell
|
||||||
- prealloc
|
- prealloc
|
||||||
- promlinter
|
- promlinter
|
||||||
- sloglint
|
- sloglint
|
||||||
- sqlclosecheck
|
- sqlclosecheck
|
||||||
- staticcheck
|
- staticcheck
|
||||||
- tenv
|
|
||||||
- testableexamples
|
- testableexamples
|
||||||
- testifylint
|
- testifylint
|
||||||
- tparallel
|
- tparallel
|
||||||
- typecheck
|
|
||||||
- unconvert
|
- unconvert
|
||||||
- unused
|
- unused
|
||||||
- wastedassign
|
- wastedassign
|
||||||
- whitespace
|
- whitespace
|
||||||
- zerologlint
|
- zerologlint
|
||||||
# these are implicitly disabled:
|
settings:
|
||||||
# - containedctx
|
staticcheck:
|
||||||
# - contextcheck
|
checks: ["all", "-ST1000", "-ST1003", "-ST1016", "-ST1020", "-ST1021", "-ST1022", "-QF1006", "-QF1008"] # default, and exclude 1 more undesired check
|
||||||
# - cyclop
|
errcheck:
|
||||||
# - depguard
|
exclude-functions:
|
||||||
# - errchkjson
|
- fmt.*
|
||||||
# - errorlint
|
- (go.uber.org/zap/zapcore.ObjectEncoder).AddObject
|
||||||
# - exhaustruct
|
- (go.uber.org/zap/zapcore.ObjectEncoder).AddArray
|
||||||
# - execinquery
|
exhaustive:
|
||||||
# - exhaustruct
|
ignore-enum-types: reflect.Kind|svc.Cmd
|
||||||
# - forbidigo
|
exclusions:
|
||||||
# - forcetypeassert
|
generated: lax
|
||||||
# - funlen
|
presets:
|
||||||
# - ginkgolinter
|
- comments
|
||||||
# - gocheckcompilerdirectives
|
- common-false-positives
|
||||||
# - gochecknoglobals
|
- legacy
|
||||||
# - gochecknoinits
|
- std-error-handling
|
||||||
# - gochecksumtype
|
rules:
|
||||||
# - gocognit
|
- linters:
|
||||||
# - goconst
|
|
||||||
# - gocritic
|
|
||||||
# - gocyclo
|
|
||||||
# - godot
|
|
||||||
# - godox
|
|
||||||
# - goerr113
|
|
||||||
# - goheader
|
|
||||||
# - gomnd
|
|
||||||
# - gomoddirectives
|
|
||||||
# - gomodguard
|
|
||||||
# - goprintffuncname
|
|
||||||
# - gosmopolitan
|
|
||||||
# - grouper
|
|
||||||
# - inamedparam
|
|
||||||
# - interfacebloat
|
|
||||||
# - ireturn
|
|
||||||
# - lll
|
|
||||||
# - loggercheck
|
|
||||||
# - maintidx
|
|
||||||
# - makezero
|
|
||||||
# - mirror
|
|
||||||
# - musttag
|
|
||||||
# - nakedret
|
|
||||||
# - nestif
|
|
||||||
# - nilerr
|
|
||||||
# - nilnil
|
|
||||||
# - nlreturn
|
|
||||||
# - noctx
|
|
||||||
# - nolintlint
|
|
||||||
# - nonamedreturns
|
|
||||||
# - nosprintfhostport
|
|
||||||
# - paralleltest
|
|
||||||
# - perfsprint
|
|
||||||
# - predeclared
|
|
||||||
# - protogetter
|
|
||||||
# - reassign
|
|
||||||
# - revive
|
|
||||||
# - rowserrcheck
|
|
||||||
# - stylecheck
|
|
||||||
# - tagalign
|
|
||||||
# - tagliatelle
|
|
||||||
# - testpackage
|
|
||||||
# - thelper
|
|
||||||
# - unparam
|
|
||||||
# - usestdlibvars
|
|
||||||
# - varnamelen
|
|
||||||
# - wrapcheck
|
|
||||||
# - wsl
|
|
||||||
|
|
||||||
run:
|
|
||||||
# default concurrency is a available CPU number.
|
|
||||||
# concurrency: 4 # explicitly omit this value to fully utilize available resources.
|
|
||||||
timeout: 5m
|
|
||||||
issues-exit-code: 1
|
|
||||||
tests: false
|
|
||||||
|
|
||||||
# output configuration options
|
|
||||||
output:
|
|
||||||
formats:
|
|
||||||
- format: 'colored-line-number'
|
|
||||||
print-issued-lines: true
|
|
||||||
print-linter-name: true
|
|
||||||
|
|
||||||
issues:
|
|
||||||
exclude-rules:
|
|
||||||
- text: 'G115' # TODO: Either we should fix the issues or nuke the linter if it's bad
|
|
||||||
linters:
|
|
||||||
- gosec
|
- gosec
|
||||||
# we aren't calling unknown URL
|
text: G115 # TODO: Either we should fix the issues or nuke the linter if it's bad
|
||||||
- text: 'G107' # G107: Url provided to HTTP request as taint input
|
- linters:
|
||||||
linters:
|
|
||||||
- gosec
|
- gosec
|
||||||
# as a web server that's expected to handle any template, this is totally in the hands of the user.
|
text: G107 # we aren't calling unknown URL
|
||||||
- text: 'G203' # G203: Use of unescaped data in HTML templates
|
- linters:
|
||||||
linters:
|
|
||||||
- gosec
|
- gosec
|
||||||
# we're shelling out to known commands, not relying on user-defined input.
|
text: G203 # as a web server that's expected to handle any template, this is totally in the hands of the user.
|
||||||
- text: 'G204' # G204: Audit use of command execution
|
- linters:
|
||||||
linters:
|
- gosec
|
||||||
|
text: G204 # we're shelling out to known commands, not relying on user-defined input.
|
||||||
|
- linters:
|
||||||
- gosec
|
- gosec
|
||||||
# the choice of weakrand is deliberate, hence the named import "weakrand"
|
# the choice of weakrand is deliberate, hence the named import "weakrand"
|
||||||
- path: modules/caddyhttp/reverseproxy/selectionpolicies.go
|
path: modules/caddyhttp/reverseproxy/selectionpolicies.go
|
||||||
text: 'G404' # G404: Insecure random number source (rand)
|
text: G404
|
||||||
linters:
|
- linters:
|
||||||
- gosec
|
- gosec
|
||||||
- path: modules/caddyhttp/reverseproxy/streaming.go
|
path: modules/caddyhttp/reverseproxy/streaming.go
|
||||||
text: 'G404' # G404: Insecure random number source (rand)
|
text: G404
|
||||||
linters:
|
- linters:
|
||||||
- gosec
|
|
||||||
- path: modules/logging/filters.go
|
|
||||||
linters:
|
|
||||||
- dupl
|
- dupl
|
||||||
- path: modules/caddyhttp/matchers.go
|
path: modules/logging/filters.go
|
||||||
linters:
|
- linters:
|
||||||
- dupl
|
- dupl
|
||||||
- path: modules/caddyhttp/vars.go
|
path: modules/caddyhttp/matchers.go
|
||||||
linters:
|
- linters:
|
||||||
- dupl
|
- dupl
|
||||||
- path: _test\.go
|
path: modules/caddyhttp/vars.go
|
||||||
linters:
|
- linters:
|
||||||
- errcheck
|
- errcheck
|
||||||
|
path: _test\.go
|
||||||
|
paths:
|
||||||
|
- third_party$
|
||||||
|
- builtin$
|
||||||
|
- examples$
|
||||||
|
formatters:
|
||||||
|
enable:
|
||||||
|
- gci
|
||||||
|
- gofmt
|
||||||
|
- gofumpt
|
||||||
|
- goimports
|
||||||
|
settings:
|
||||||
|
gci:
|
||||||
|
sections:
|
||||||
|
- standard # Standard section: captures all standard packages.
|
||||||
|
- default # Default section: contains all imports that could not be matched to another section type.
|
||||||
|
- prefix(github.com/caddyserver/caddy/v2/cmd) # ensure that this is always at the top and always has a line break.
|
||||||
|
- prefix(github.com/caddyserver/caddy) # Custom section: groups all imports with the specified Prefix.
|
||||||
|
custom-order: true
|
||||||
|
exclusions:
|
||||||
|
generated: lax
|
||||||
|
paths:
|
||||||
|
- third_party$
|
||||||
|
- builtin$
|
||||||
|
- examples$
|
||||||
|
|
14
admin.go
14
admin.go
|
@ -424,6 +424,13 @@ func replaceLocalAdminServer(cfg *Config, ctx Context) error {
|
||||||
|
|
||||||
handler := cfg.Admin.newAdminHandler(addr, false, ctx)
|
handler := cfg.Admin.newAdminHandler(addr, false, ctx)
|
||||||
|
|
||||||
|
// run the provisioners for loaded modules to make sure local
|
||||||
|
// state is properly re-initialized in the new admin server
|
||||||
|
err = cfg.Admin.provisionAdminRouters(ctx)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
ln, err := addr.Listen(context.TODO(), 0, net.ListenConfig{})
|
ln, err := addr.Listen(context.TODO(), 0, net.ListenConfig{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
@ -545,6 +552,13 @@ func replaceRemoteAdminServer(ctx Context, cfg *Config) error {
|
||||||
// because we are using TLS authentication instead
|
// because we are using TLS authentication instead
|
||||||
handler := cfg.Admin.newAdminHandler(addr, true, ctx)
|
handler := cfg.Admin.newAdminHandler(addr, true, ctx)
|
||||||
|
|
||||||
|
// run the provisioners for loaded modules to make sure local
|
||||||
|
// state is properly re-initialized in the new admin server
|
||||||
|
err = cfg.Admin.provisionAdminRouters(ctx)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
// create client certificate pool for TLS mutual auth, and extract public keys
|
// create client certificate pool for TLS mutual auth, and extract public keys
|
||||||
// so that we can enforce access controls at the application layer
|
// so that we can enforce access controls at the application layer
|
||||||
clientCertPool := x509.NewCertPool()
|
clientCertPool := x509.NewCertPool()
|
||||||
|
|
|
@ -19,6 +19,7 @@ import (
|
||||||
"crypto/x509"
|
"crypto/x509"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"maps"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/http/httptest"
|
"net/http/httptest"
|
||||||
"reflect"
|
"reflect"
|
||||||
|
@ -335,9 +336,7 @@ func TestAdminHandlerBuiltinRouteErrors(t *testing.T) {
|
||||||
|
|
||||||
func testGetMetricValue(labels map[string]string) float64 {
|
func testGetMetricValue(labels map[string]string) float64 {
|
||||||
promLabels := prometheus.Labels{}
|
promLabels := prometheus.Labels{}
|
||||||
for k, v := range labels {
|
maps.Copy(promLabels, labels)
|
||||||
promLabels[k] = v
|
|
||||||
}
|
|
||||||
|
|
||||||
metric, err := adminMetrics.requestErrors.GetMetricWith(promLabels)
|
metric, err := adminMetrics.requestErrors.GetMetricWith(promLabels)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -377,9 +376,7 @@ func (m *mockModule) CaddyModule() ModuleInfo {
|
||||||
|
|
||||||
func TestNewAdminHandlerRouterRegistration(t *testing.T) {
|
func TestNewAdminHandlerRouterRegistration(t *testing.T) {
|
||||||
originalModules := make(map[string]ModuleInfo)
|
originalModules := make(map[string]ModuleInfo)
|
||||||
for k, v := range modules {
|
maps.Copy(originalModules, modules)
|
||||||
originalModules[k] = v
|
|
||||||
}
|
|
||||||
defer func() {
|
defer func() {
|
||||||
modules = originalModules
|
modules = originalModules
|
||||||
}()
|
}()
|
||||||
|
@ -479,9 +476,7 @@ func TestAdminRouterProvisioning(t *testing.T) {
|
||||||
for _, test := range tests {
|
for _, test := range tests {
|
||||||
t.Run(test.name, func(t *testing.T) {
|
t.Run(test.name, func(t *testing.T) {
|
||||||
originalModules := make(map[string]ModuleInfo)
|
originalModules := make(map[string]ModuleInfo)
|
||||||
for k, v := range modules {
|
maps.Copy(originalModules, modules)
|
||||||
originalModules[k] = v
|
|
||||||
}
|
|
||||||
defer func() {
|
defer func() {
|
||||||
modules = originalModules
|
modules = originalModules
|
||||||
}()
|
}()
|
||||||
|
@ -774,9 +769,7 @@ func (m *mockIssuerModule) CaddyModule() ModuleInfo {
|
||||||
|
|
||||||
func TestManageIdentity(t *testing.T) {
|
func TestManageIdentity(t *testing.T) {
|
||||||
originalModules := make(map[string]ModuleInfo)
|
originalModules := make(map[string]ModuleInfo)
|
||||||
for k, v := range modules {
|
maps.Copy(originalModules, modules)
|
||||||
originalModules[k] = v
|
|
||||||
}
|
|
||||||
defer func() {
|
defer func() {
|
||||||
modules = originalModules
|
modules = originalModules
|
||||||
}()
|
}()
|
||||||
|
|
24
caddy.go
24
caddy.go
|
@ -505,14 +505,6 @@ func provisionContext(newCfg *Config, replaceAdminServer bool) (Context, error)
|
||||||
return ctx, err
|
return ctx, err
|
||||||
}
|
}
|
||||||
|
|
||||||
// start the admin endpoint (and stop any prior one)
|
|
||||||
if replaceAdminServer {
|
|
||||||
err = replaceLocalAdminServer(newCfg, ctx)
|
|
||||||
if err != nil {
|
|
||||||
return ctx, fmt.Errorf("starting caddy administration endpoint: %v", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// create the new filesystem map
|
// create the new filesystem map
|
||||||
newCfg.fileSystems = &filesystems.FileSystemMap{}
|
newCfg.fileSystems = &filesystems.FileSystemMap{}
|
||||||
|
|
||||||
|
@ -544,6 +536,14 @@ func provisionContext(newCfg *Config, replaceAdminServer bool) (Context, error)
|
||||||
return ctx, err
|
return ctx, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// start the admin endpoint (and stop any prior one)
|
||||||
|
if replaceAdminServer {
|
||||||
|
err = replaceLocalAdminServer(newCfg, ctx)
|
||||||
|
if err != nil {
|
||||||
|
return ctx, fmt.Errorf("starting caddy administration endpoint: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Load and Provision each app and their submodules
|
// Load and Provision each app and their submodules
|
||||||
err = func() error {
|
err = func() error {
|
||||||
for appName := range newCfg.AppsRaw {
|
for appName := range newCfg.AppsRaw {
|
||||||
|
@ -1104,9 +1104,15 @@ func (e Event) Origin() Module { return e.origin } // Returns the module t
|
||||||
// CloudEvents spec.
|
// CloudEvents spec.
|
||||||
func (e Event) CloudEvent() CloudEvent {
|
func (e Event) CloudEvent() CloudEvent {
|
||||||
dataJSON, _ := json.Marshal(e.Data)
|
dataJSON, _ := json.Marshal(e.Data)
|
||||||
|
var source string
|
||||||
|
if e.Origin() == nil {
|
||||||
|
source = "caddy"
|
||||||
|
} else {
|
||||||
|
source = string(e.Origin().CaddyModule().ID)
|
||||||
|
}
|
||||||
return CloudEvent{
|
return CloudEvent{
|
||||||
ID: e.id.String(),
|
ID: e.id.String(),
|
||||||
Source: e.origin.CaddyModule().String(),
|
Source: source,
|
||||||
SpecVersion: "1.0",
|
SpecVersion: "1.0",
|
||||||
Type: e.name,
|
Type: e.name,
|
||||||
Time: e.ts,
|
Time: e.ts,
|
||||||
|
|
|
@ -15,6 +15,7 @@
|
||||||
package caddy
|
package caddy
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
)
|
)
|
||||||
|
@ -72,3 +73,21 @@ func TestParseDuration(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestEvent_CloudEvent_NilOrigin(t *testing.T) {
|
||||||
|
ctx, _ := NewContext(Context{Context: context.Background()}) // module will be nil by default
|
||||||
|
event, err := NewEvent(ctx, "started", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("NewEvent() error = %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// This should not panic
|
||||||
|
ce := event.CloudEvent()
|
||||||
|
|
||||||
|
if ce.Source != "caddy" {
|
||||||
|
t.Errorf("Expected CloudEvent Source to be 'caddy', got '%s'", ce.Source)
|
||||||
|
}
|
||||||
|
if ce.Type != "started" {
|
||||||
|
t.Errorf("Expected CloudEvent Type to be 'started', got '%s'", ce.Type)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -68,7 +68,7 @@ func (a Adapter) Adapt(body []byte, options map[string]any) ([]byte, []caddyconf
|
||||||
// TODO: also perform this check on imported files
|
// TODO: also perform this check on imported files
|
||||||
func FormattingDifference(filename string, body []byte) (caddyconfig.Warning, bool) {
|
func FormattingDifference(filename string, body []byte) (caddyconfig.Warning, bool) {
|
||||||
// replace windows-style newlines to normalize comparison
|
// replace windows-style newlines to normalize comparison
|
||||||
normalizedBody := bytes.Replace(body, []byte("\r\n"), []byte("\n"), -1)
|
normalizedBody := bytes.ReplaceAll(body, []byte("\r\n"), []byte("\n"))
|
||||||
|
|
||||||
formatted := Format(normalizedBody)
|
formatted := Format(normalizedBody)
|
||||||
if bytes.Equal(formatted, normalizedBody) {
|
if bytes.Equal(formatted, normalizedBody) {
|
||||||
|
|
|
@ -94,7 +94,7 @@ func Format(input []byte) []byte {
|
||||||
}
|
}
|
||||||
|
|
||||||
// detect whether we have the start of a heredoc
|
// detect whether we have the start of a heredoc
|
||||||
if !quoted && !(heredoc != heredocClosed || heredocEscaped) &&
|
if !quoted && (heredoc == heredocClosed && !heredocEscaped) &&
|
||||||
space && last == '<' && ch == '<' {
|
space && last == '<' && ch == '<' {
|
||||||
write(ch)
|
write(ch)
|
||||||
heredoc = heredocOpening
|
heredoc = heredocOpening
|
||||||
|
|
|
@ -137,7 +137,7 @@ func (l *lexer) next() (bool, error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// detect whether we have the start of a heredoc
|
// detect whether we have the start of a heredoc
|
||||||
if !(quoted || btQuoted) && !(inHeredoc || heredocEscaped) &&
|
if (!quoted && !btQuoted) && (!inHeredoc && !heredocEscaped) &&
|
||||||
len(val) > 1 && string(val[:2]) == "<<" {
|
len(val) > 1 && string(val[:2]) == "<<" {
|
||||||
// a space means it's just a regular token and not a heredoc
|
// a space means it's just a regular token and not a heredoc
|
||||||
if ch == ' ' {
|
if ch == ' ' {
|
||||||
|
|
|
@ -15,6 +15,7 @@
|
||||||
package httpcaddyfile
|
package httpcaddyfile
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
"html"
|
"html"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
@ -843,13 +844,18 @@ func parseHandleErrors(h Helper) ([]ConfigValue, error) {
|
||||||
return nil, h.Errf("segment was not parsed as a subroute")
|
return nil, h.Errf("segment was not parsed as a subroute")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// wrap the subroutes
|
||||||
|
wrappingRoute := caddyhttp.Route{
|
||||||
|
HandlersRaw: []json.RawMessage{caddyconfig.JSONModuleObject(subroute, "handler", "subroute", nil)},
|
||||||
|
}
|
||||||
|
subroute = &caddyhttp.Subroute{
|
||||||
|
Routes: []caddyhttp.Route{wrappingRoute},
|
||||||
|
}
|
||||||
if expression != "" {
|
if expression != "" {
|
||||||
statusMatcher := caddy.ModuleMap{
|
statusMatcher := caddy.ModuleMap{
|
||||||
"expression": h.JSON(caddyhttp.MatchExpression{Expr: expression}),
|
"expression": h.JSON(caddyhttp.MatchExpression{Expr: expression}),
|
||||||
}
|
}
|
||||||
for i := range subroute.Routes {
|
subroute.Routes[0].MatcherSetsRaw = []caddy.ModuleMap{statusMatcher}
|
||||||
subroute.Routes[i].MatcherSetsRaw = []caddy.ModuleMap{statusMatcher}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
return []ConfigValue{
|
return []ConfigValue{
|
||||||
{
|
{
|
||||||
|
|
|
@ -16,6 +16,7 @@ package httpcaddyfile
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
|
"maps"
|
||||||
"net"
|
"net"
|
||||||
"slices"
|
"slices"
|
||||||
"sort"
|
"sort"
|
||||||
|
@ -173,10 +174,12 @@ func RegisterDirectiveOrder(dir string, position Positional, standardDir string)
|
||||||
if d != standardDir {
|
if d != standardDir {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
if position == Before {
|
switch position {
|
||||||
|
case Before:
|
||||||
newOrder = append(newOrder[:i], append([]string{dir}, newOrder[i:]...)...)
|
newOrder = append(newOrder[:i], append([]string{dir}, newOrder[i:]...)...)
|
||||||
} else if position == After {
|
case After:
|
||||||
newOrder = append(newOrder[:i+1], append([]string{dir}, newOrder[i+1:]...)...)
|
newOrder = append(newOrder[:i+1], append([]string{dir}, newOrder[i+1:]...)...)
|
||||||
|
case First, Last:
|
||||||
}
|
}
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
|
@ -365,9 +368,7 @@ func parseSegmentAsConfig(h Helper) ([]ConfigValue, error) {
|
||||||
// copy existing matcher definitions so we can augment
|
// copy existing matcher definitions so we can augment
|
||||||
// new ones that are defined only in this scope
|
// new ones that are defined only in this scope
|
||||||
matcherDefs := make(map[string]caddy.ModuleMap, len(h.matcherDefs))
|
matcherDefs := make(map[string]caddy.ModuleMap, len(h.matcherDefs))
|
||||||
for key, val := range h.matcherDefs {
|
maps.Copy(matcherDefs, h.matcherDefs)
|
||||||
matcherDefs[key] = val
|
|
||||||
}
|
|
||||||
|
|
||||||
// find and extract any embedded matcher definitions in this scope
|
// find and extract any embedded matcher definitions in this scope
|
||||||
for i := 0; i < len(segments); i++ {
|
for i := 0; i < len(segments); i++ {
|
||||||
|
@ -483,12 +484,29 @@ func sortRoutes(routes []ConfigValue) {
|
||||||
// we can only confidently compare path lengths if both
|
// we can only confidently compare path lengths if both
|
||||||
// directives have a single path to match (issue #5037)
|
// directives have a single path to match (issue #5037)
|
||||||
if iPathLen > 0 && jPathLen > 0 {
|
if iPathLen > 0 && jPathLen > 0 {
|
||||||
|
// trim the trailing wildcard if there is one
|
||||||
|
iPathTrimmed := strings.TrimSuffix(iPM[0], "*")
|
||||||
|
jPathTrimmed := strings.TrimSuffix(jPM[0], "*")
|
||||||
|
|
||||||
// if both paths are the same except for a trailing wildcard,
|
// if both paths are the same except for a trailing wildcard,
|
||||||
// sort by the shorter path first (which is more specific)
|
// sort by the shorter path first (which is more specific)
|
||||||
if strings.TrimSuffix(iPM[0], "*") == strings.TrimSuffix(jPM[0], "*") {
|
if iPathTrimmed == jPathTrimmed {
|
||||||
return iPathLen < jPathLen
|
return iPathLen < jPathLen
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// we use the trimmed length to compare the paths
|
||||||
|
// https://github.com/caddyserver/caddy/issues/7012#issuecomment-2870142195
|
||||||
|
// credit to https://github.com/Hellio404
|
||||||
|
// for sorts with many items, mixing matchers w/ and w/o wildcards will confuse the sort and result in incorrect orders
|
||||||
|
iPathLen = len(iPathTrimmed)
|
||||||
|
jPathLen = len(jPathTrimmed)
|
||||||
|
|
||||||
|
// if both paths have the same length, sort lexically
|
||||||
|
// https://github.com/caddyserver/caddy/pull/7015#issuecomment-2871993588
|
||||||
|
if iPathLen == jPathLen {
|
||||||
|
return iPathTrimmed < jPathTrimmed
|
||||||
|
}
|
||||||
|
|
||||||
// sort most-specific (longest) path first
|
// sort most-specific (longest) path first
|
||||||
return iPathLen > jPathLen
|
return iPathLen > jPathLen
|
||||||
}
|
}
|
||||||
|
|
|
@ -633,12 +633,6 @@ func (st *ServerType) serversFromPairings(
|
||||||
srv.AutoHTTPS = new(caddyhttp.AutoHTTPSConfig)
|
srv.AutoHTTPS = new(caddyhttp.AutoHTTPSConfig)
|
||||||
}
|
}
|
||||||
srv.AutoHTTPS.IgnoreLoadedCerts = true
|
srv.AutoHTTPS.IgnoreLoadedCerts = true
|
||||||
|
|
||||||
case "prefer_wildcard":
|
|
||||||
if srv.AutoHTTPS == nil {
|
|
||||||
srv.AutoHTTPS = new(caddyhttp.AutoHTTPSConfig)
|
|
||||||
}
|
|
||||||
srv.AutoHTTPS.PreferWildcard = true
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -706,16 +700,6 @@ func (st *ServerType) serversFromPairings(
|
||||||
return specificity(iLongestHost) > specificity(jLongestHost)
|
return specificity(iLongestHost) > specificity(jLongestHost)
|
||||||
})
|
})
|
||||||
|
|
||||||
// collect all hosts that have a wildcard in them
|
|
||||||
wildcardHosts := []string{}
|
|
||||||
for _, sblock := range p.serverBlocks {
|
|
||||||
for _, addr := range sblock.parsedKeys {
|
|
||||||
if strings.HasPrefix(addr.Host, "*.") {
|
|
||||||
wildcardHosts = append(wildcardHosts, addr.Host[2:])
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
var hasCatchAllTLSConnPolicy, addressQualifiesForTLS bool
|
var hasCatchAllTLSConnPolicy, addressQualifiesForTLS bool
|
||||||
autoHTTPSWillAddConnPolicy := srv.AutoHTTPS == nil || !srv.AutoHTTPS.Disabled
|
autoHTTPSWillAddConnPolicy := srv.AutoHTTPS == nil || !srv.AutoHTTPS.Disabled
|
||||||
|
|
||||||
|
@ -801,7 +785,13 @@ func (st *ServerType) serversFromPairings(
|
||||||
cp.FallbackSNI = fallbackSNI
|
cp.FallbackSNI = fallbackSNI
|
||||||
}
|
}
|
||||||
|
|
||||||
// only append this policy if it actually changes something
|
// only append this policy if it actually changes something,
|
||||||
|
// or if the configuration explicitly automates certs for
|
||||||
|
// these names (this is necessary to hoist a connection policy
|
||||||
|
// above one that may manually load a wildcard cert that would
|
||||||
|
// otherwise clobber the automated one; the code that appends
|
||||||
|
// policies that manually load certs comes later, so they're
|
||||||
|
// lower in the list)
|
||||||
if !cp.SettingsEmpty() || mapContains(forceAutomatedNames, hosts) {
|
if !cp.SettingsEmpty() || mapContains(forceAutomatedNames, hosts) {
|
||||||
srv.TLSConnPolicies = append(srv.TLSConnPolicies, cp)
|
srv.TLSConnPolicies = append(srv.TLSConnPolicies, cp)
|
||||||
hasCatchAllTLSConnPolicy = len(hosts) == 0
|
hasCatchAllTLSConnPolicy = len(hosts) == 0
|
||||||
|
@ -841,18 +831,6 @@ func (st *ServerType) serversFromPairings(
|
||||||
addressQualifiesForTLS = true
|
addressQualifiesForTLS = true
|
||||||
}
|
}
|
||||||
|
|
||||||
// If prefer wildcard is enabled, then we add hosts that are
|
|
||||||
// already covered by the wildcard to the skip list
|
|
||||||
if addressQualifiesForTLS && srv.AutoHTTPS != nil && srv.AutoHTTPS.PreferWildcard {
|
|
||||||
baseDomain := addr.Host
|
|
||||||
if idx := strings.Index(baseDomain, "."); idx != -1 {
|
|
||||||
baseDomain = baseDomain[idx+1:]
|
|
||||||
}
|
|
||||||
if !strings.HasPrefix(addr.Host, "*.") && slices.Contains(wildcardHosts, baseDomain) {
|
|
||||||
srv.AutoHTTPS.SkipCerts = append(srv.AutoHTTPS.SkipCerts, addr.Host)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// predict whether auto-HTTPS will add the conn policy for us; if so, we
|
// predict whether auto-HTTPS will add the conn policy for us; if so, we
|
||||||
// may not need to add one for this server
|
// may not need to add one for this server
|
||||||
autoHTTPSWillAddConnPolicy = autoHTTPSWillAddConnPolicy &&
|
autoHTTPSWillAddConnPolicy = autoHTTPSWillAddConnPolicy &&
|
||||||
|
@ -1083,11 +1061,40 @@ func consolidateConnPolicies(cps caddytls.ConnectionPolicies) (caddytls.Connecti
|
||||||
|
|
||||||
// if they're exactly equal in every way, just keep one of them
|
// if they're exactly equal in every way, just keep one of them
|
||||||
if reflect.DeepEqual(cps[i], cps[j]) {
|
if reflect.DeepEqual(cps[i], cps[j]) {
|
||||||
cps = append(cps[:j], cps[j+1:]...)
|
cps = slices.Delete(cps, j, j+1)
|
||||||
i--
|
i--
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// as a special case, if there are adjacent TLS conn policies that are identical except
|
||||||
|
// by their matchers, and the matchers are specifically just ServerName ("sni") matchers
|
||||||
|
// (by far the most common), we can combine them into a single policy
|
||||||
|
if i == j-1 && len(cps[i].MatchersRaw) == 1 && len(cps[j].MatchersRaw) == 1 {
|
||||||
|
if iSNIMatcherJSON, ok := cps[i].MatchersRaw["sni"]; ok {
|
||||||
|
if jSNIMatcherJSON, ok := cps[j].MatchersRaw["sni"]; ok {
|
||||||
|
// position of policies and the matcher criteria check out; if settings are
|
||||||
|
// the same, then we can combine the policies; we have to unmarshal and
|
||||||
|
// remarshal the matchers though
|
||||||
|
if cps[i].SettingsEqual(*cps[j]) {
|
||||||
|
var iSNIMatcher caddytls.MatchServerName
|
||||||
|
if err := json.Unmarshal(iSNIMatcherJSON, &iSNIMatcher); err == nil {
|
||||||
|
var jSNIMatcher caddytls.MatchServerName
|
||||||
|
if err := json.Unmarshal(jSNIMatcherJSON, &jSNIMatcher); err == nil {
|
||||||
|
iSNIMatcher = append(iSNIMatcher, jSNIMatcher...)
|
||||||
|
cps[i].MatchersRaw["sni"], err = json.Marshal(iSNIMatcher)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("recombining SNI matchers: %v", err)
|
||||||
|
}
|
||||||
|
cps = slices.Delete(cps, j, j+1)
|
||||||
|
i--
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// if they have the same matcher, try to reconcile each field: either they must
|
// if they have the same matcher, try to reconcile each field: either they must
|
||||||
// be identical, or we have to be able to combine them safely
|
// be identical, or we have to be able to combine them safely
|
||||||
if reflect.DeepEqual(cps[i].MatchersRaw, cps[j].MatchersRaw) {
|
if reflect.DeepEqual(cps[i].MatchersRaw, cps[j].MatchersRaw) {
|
||||||
|
@ -1189,12 +1196,13 @@ func consolidateConnPolicies(cps caddytls.ConnectionPolicies) (caddytls.Connecti
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
cps = append(cps[:j], cps[j+1:]...)
|
cps = slices.Delete(cps, j, j+1)
|
||||||
i--
|
i--
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return cps, nil
|
return cps, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -92,11 +92,9 @@ func (st ServerType) buildTLSApp(
|
||||||
tlsApp.Automation.Policies = append(tlsApp.Automation.Policies, catchAllAP)
|
tlsApp.Automation.Policies = append(tlsApp.Automation.Policies, catchAllAP)
|
||||||
}
|
}
|
||||||
|
|
||||||
// collect all hosts that have a wildcard in them, and arent HTTP
|
var wildcardHosts []string // collect all hosts that have a wildcard in them, and aren't HTTP
|
||||||
wildcardHosts := []string{}
|
forcedAutomatedNames := make(map[string]struct{}) // explicitly configured to be automated, even if covered by a wildcard
|
||||||
// hosts that have been explicitly marked to be automated,
|
|
||||||
// even if covered by another wildcard
|
|
||||||
forcedAutomatedNames := make(map[string]struct{})
|
|
||||||
for _, p := range pairings {
|
for _, p := range pairings {
|
||||||
var addresses []string
|
var addresses []string
|
||||||
for _, addressWithProtocols := range p.addressesWithProtocols {
|
for _, addressWithProtocols := range p.addressesWithProtocols {
|
||||||
|
@ -153,7 +151,7 @@ func (st ServerType) buildTLSApp(
|
||||||
ap.OnDemand = true
|
ap.OnDemand = true
|
||||||
}
|
}
|
||||||
|
|
||||||
// collect hosts that are forced to be automated
|
// collect hosts that are forced to have certs automated for their specific name
|
||||||
if _, ok := sblock.pile["tls.force_automate"]; ok {
|
if _, ok := sblock.pile["tls.force_automate"]; ok {
|
||||||
for _, host := range sblockHosts {
|
for _, host := range sblockHosts {
|
||||||
forcedAutomatedNames[host] = struct{}{}
|
forcedAutomatedNames[host] = struct{}{}
|
||||||
|
@ -375,8 +373,10 @@ func (st ServerType) buildTLSApp(
|
||||||
return nil, warnings, err
|
return nil, warnings, err
|
||||||
}
|
}
|
||||||
for _, cfg := range ech.Configs {
|
for _, cfg := range ech.Configs {
|
||||||
|
if cfg.PublicName != "" {
|
||||||
ap.SubjectsRaw = append(ap.SubjectsRaw, cfg.PublicName)
|
ap.SubjectsRaw = append(ap.SubjectsRaw, cfg.PublicName)
|
||||||
}
|
}
|
||||||
|
}
|
||||||
if tlsApp.Automation == nil {
|
if tlsApp.Automation == nil {
|
||||||
tlsApp.Automation = new(caddytls.AutomationConfig)
|
tlsApp.Automation = new(caddytls.AutomationConfig)
|
||||||
}
|
}
|
||||||
|
|
|
@ -281,7 +281,7 @@ func validateTestPrerequisites(tc *Tester) error {
|
||||||
tc.t.Cleanup(func() {
|
tc.t.Cleanup(func() {
|
||||||
os.Remove(f.Name())
|
os.Remove(f.Name())
|
||||||
})
|
})
|
||||||
if _, err := f.WriteString(fmt.Sprintf(initConfig, tc.config.AdminPort)); err != nil {
|
if _, err := fmt.Fprintf(f, initConfig, tc.config.AdminPort); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -12,13 +12,14 @@ import (
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/caddyserver/caddy/v2"
|
|
||||||
"github.com/caddyserver/caddy/v2/caddytest"
|
|
||||||
"github.com/mholt/acmez/v3"
|
"github.com/mholt/acmez/v3"
|
||||||
"github.com/mholt/acmez/v3/acme"
|
"github.com/mholt/acmez/v3/acme"
|
||||||
smallstepacme "github.com/smallstep/certificates/acme"
|
smallstepacme "github.com/smallstep/certificates/acme"
|
||||||
"go.uber.org/zap"
|
"go.uber.org/zap"
|
||||||
"go.uber.org/zap/exp/zapslog"
|
"go.uber.org/zap/exp/zapslog"
|
||||||
|
|
||||||
|
"github.com/caddyserver/caddy/v2"
|
||||||
|
"github.com/caddyserver/caddy/v2/caddytest"
|
||||||
)
|
)
|
||||||
|
|
||||||
const acmeChallengePort = 9081
|
const acmeChallengePort = 9081
|
||||||
|
|
|
@ -9,11 +9,12 @@ import (
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/caddyserver/caddy/v2/caddytest"
|
|
||||||
"github.com/mholt/acmez/v3"
|
"github.com/mholt/acmez/v3"
|
||||||
"github.com/mholt/acmez/v3/acme"
|
"github.com/mholt/acmez/v3/acme"
|
||||||
"go.uber.org/zap"
|
"go.uber.org/zap"
|
||||||
"go.uber.org/zap/exp/zapslog"
|
"go.uber.org/zap/exp/zapslog"
|
||||||
|
|
||||||
|
"github.com/caddyserver/caddy/v2/caddytest"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestACMEServerDirectory(t *testing.T) {
|
func TestACMEServerDirectory(t *testing.T) {
|
||||||
|
|
|
@ -0,0 +1,72 @@
|
||||||
|
{
|
||||||
|
pki {
|
||||||
|
ca custom-ca {
|
||||||
|
name "Custom CA"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
acme.example.com {
|
||||||
|
acme_server {
|
||||||
|
ca custom-ca
|
||||||
|
allow {
|
||||||
|
domains host-1.internal.example.com host-2.internal.example.com
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
----------
|
||||||
|
{
|
||||||
|
"apps": {
|
||||||
|
"http": {
|
||||||
|
"servers": {
|
||||||
|
"srv0": {
|
||||||
|
"listen": [
|
||||||
|
":443"
|
||||||
|
],
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"match": [
|
||||||
|
{
|
||||||
|
"host": [
|
||||||
|
"acme.example.com"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"ca": "custom-ca",
|
||||||
|
"handler": "acme_server",
|
||||||
|
"policy": {
|
||||||
|
"allow": {
|
||||||
|
"domains": [
|
||||||
|
"host-1.internal.example.com",
|
||||||
|
"host-2.internal.example.com"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"terminal": true
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"pki": {
|
||||||
|
"certificate_authorities": {
|
||||||
|
"custom-ca": {
|
||||||
|
"name": "Custom CA"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,80 @@
|
||||||
|
{
|
||||||
|
pki {
|
||||||
|
ca custom-ca {
|
||||||
|
name "Custom CA"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
acme.example.com {
|
||||||
|
acme_server {
|
||||||
|
ca custom-ca
|
||||||
|
allow {
|
||||||
|
domains host-1.internal.example.com host-2.internal.example.com
|
||||||
|
}
|
||||||
|
deny {
|
||||||
|
domains dc.internal.example.com
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
----------
|
||||||
|
{
|
||||||
|
"apps": {
|
||||||
|
"http": {
|
||||||
|
"servers": {
|
||||||
|
"srv0": {
|
||||||
|
"listen": [
|
||||||
|
":443"
|
||||||
|
],
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"match": [
|
||||||
|
{
|
||||||
|
"host": [
|
||||||
|
"acme.example.com"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"ca": "custom-ca",
|
||||||
|
"handler": "acme_server",
|
||||||
|
"policy": {
|
||||||
|
"allow": {
|
||||||
|
"domains": [
|
||||||
|
"host-1.internal.example.com",
|
||||||
|
"host-2.internal.example.com"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"deny": {
|
||||||
|
"domains": [
|
||||||
|
"dc.internal.example.com"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"terminal": true
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"pki": {
|
||||||
|
"certificate_authorities": {
|
||||||
|
"custom-ca": {
|
||||||
|
"name": "Custom CA"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,71 @@
|
||||||
|
{
|
||||||
|
pki {
|
||||||
|
ca custom-ca {
|
||||||
|
name "Custom CA"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
acme.example.com {
|
||||||
|
acme_server {
|
||||||
|
ca custom-ca
|
||||||
|
deny {
|
||||||
|
domains dc.internal.example.com
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
----------
|
||||||
|
{
|
||||||
|
"apps": {
|
||||||
|
"http": {
|
||||||
|
"servers": {
|
||||||
|
"srv0": {
|
||||||
|
"listen": [
|
||||||
|
":443"
|
||||||
|
],
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"match": [
|
||||||
|
{
|
||||||
|
"host": [
|
||||||
|
"acme.example.com"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"ca": "custom-ca",
|
||||||
|
"handler": "acme_server",
|
||||||
|
"policy": {
|
||||||
|
"deny": {
|
||||||
|
"domains": [
|
||||||
|
"dc.internal.example.com"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"terminal": true
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"pki": {
|
||||||
|
"certificate_authorities": {
|
||||||
|
"custom-ca": {
|
||||||
|
"name": "Custom CA"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -1,109 +0,0 @@
|
||||||
{
|
|
||||||
auto_https prefer_wildcard
|
|
||||||
}
|
|
||||||
|
|
||||||
*.example.com {
|
|
||||||
tls {
|
|
||||||
dns mock
|
|
||||||
}
|
|
||||||
respond "fallback"
|
|
||||||
}
|
|
||||||
|
|
||||||
foo.example.com {
|
|
||||||
respond "foo"
|
|
||||||
}
|
|
||||||
----------
|
|
||||||
{
|
|
||||||
"apps": {
|
|
||||||
"http": {
|
|
||||||
"servers": {
|
|
||||||
"srv0": {
|
|
||||||
"listen": [
|
|
||||||
":443"
|
|
||||||
],
|
|
||||||
"routes": [
|
|
||||||
{
|
|
||||||
"match": [
|
|
||||||
{
|
|
||||||
"host": [
|
|
||||||
"foo.example.com"
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"handle": [
|
|
||||||
{
|
|
||||||
"handler": "subroute",
|
|
||||||
"routes": [
|
|
||||||
{
|
|
||||||
"handle": [
|
|
||||||
{
|
|
||||||
"body": "foo",
|
|
||||||
"handler": "static_response"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"terminal": true
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"match": [
|
|
||||||
{
|
|
||||||
"host": [
|
|
||||||
"*.example.com"
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"handle": [
|
|
||||||
{
|
|
||||||
"handler": "subroute",
|
|
||||||
"routes": [
|
|
||||||
{
|
|
||||||
"handle": [
|
|
||||||
{
|
|
||||||
"body": "fallback",
|
|
||||||
"handler": "static_response"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"terminal": true
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"automatic_https": {
|
|
||||||
"skip_certificates": [
|
|
||||||
"foo.example.com"
|
|
||||||
],
|
|
||||||
"prefer_wildcard": true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"tls": {
|
|
||||||
"automation": {
|
|
||||||
"policies": [
|
|
||||||
{
|
|
||||||
"subjects": [
|
|
||||||
"*.example.com"
|
|
||||||
],
|
|
||||||
"issuers": [
|
|
||||||
{
|
|
||||||
"challenges": {
|
|
||||||
"dns": {
|
|
||||||
"provider": {
|
|
||||||
"name": "mock"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"module": "acme"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,268 +0,0 @@
|
||||||
{
|
|
||||||
auto_https prefer_wildcard
|
|
||||||
}
|
|
||||||
|
|
||||||
# Covers two domains
|
|
||||||
*.one.example.com {
|
|
||||||
tls {
|
|
||||||
dns mock
|
|
||||||
}
|
|
||||||
respond "one fallback"
|
|
||||||
}
|
|
||||||
|
|
||||||
# Is covered, should not get its own AP
|
|
||||||
foo.one.example.com {
|
|
||||||
respond "foo one"
|
|
||||||
}
|
|
||||||
|
|
||||||
# This one has its own tls config so it doesn't get covered (escape hatch)
|
|
||||||
bar.one.example.com {
|
|
||||||
respond "bar one"
|
|
||||||
tls bar@bar.com
|
|
||||||
}
|
|
||||||
|
|
||||||
# Covers nothing but AP gets consolidated with the first
|
|
||||||
*.two.example.com {
|
|
||||||
tls {
|
|
||||||
dns mock
|
|
||||||
}
|
|
||||||
respond "two fallback"
|
|
||||||
}
|
|
||||||
|
|
||||||
# Is HTTP so it should not cover
|
|
||||||
http://*.three.example.com {
|
|
||||||
respond "three fallback"
|
|
||||||
}
|
|
||||||
|
|
||||||
# Has no wildcard coverage so it gets an AP
|
|
||||||
foo.three.example.com {
|
|
||||||
respond "foo three"
|
|
||||||
}
|
|
||||||
----------
|
|
||||||
{
|
|
||||||
"apps": {
|
|
||||||
"http": {
|
|
||||||
"servers": {
|
|
||||||
"srv0": {
|
|
||||||
"listen": [
|
|
||||||
":443"
|
|
||||||
],
|
|
||||||
"routes": [
|
|
||||||
{
|
|
||||||
"match": [
|
|
||||||
{
|
|
||||||
"host": [
|
|
||||||
"foo.three.example.com"
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"handle": [
|
|
||||||
{
|
|
||||||
"handler": "subroute",
|
|
||||||
"routes": [
|
|
||||||
{
|
|
||||||
"handle": [
|
|
||||||
{
|
|
||||||
"body": "foo three",
|
|
||||||
"handler": "static_response"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"terminal": true
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"match": [
|
|
||||||
{
|
|
||||||
"host": [
|
|
||||||
"foo.one.example.com"
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"handle": [
|
|
||||||
{
|
|
||||||
"handler": "subroute",
|
|
||||||
"routes": [
|
|
||||||
{
|
|
||||||
"handle": [
|
|
||||||
{
|
|
||||||
"body": "foo one",
|
|
||||||
"handler": "static_response"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"terminal": true
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"match": [
|
|
||||||
{
|
|
||||||
"host": [
|
|
||||||
"bar.one.example.com"
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"handle": [
|
|
||||||
{
|
|
||||||
"handler": "subroute",
|
|
||||||
"routes": [
|
|
||||||
{
|
|
||||||
"handle": [
|
|
||||||
{
|
|
||||||
"body": "bar one",
|
|
||||||
"handler": "static_response"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"terminal": true
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"match": [
|
|
||||||
{
|
|
||||||
"host": [
|
|
||||||
"*.one.example.com"
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"handle": [
|
|
||||||
{
|
|
||||||
"handler": "subroute",
|
|
||||||
"routes": [
|
|
||||||
{
|
|
||||||
"handle": [
|
|
||||||
{
|
|
||||||
"body": "one fallback",
|
|
||||||
"handler": "static_response"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"terminal": true
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"match": [
|
|
||||||
{
|
|
||||||
"host": [
|
|
||||||
"*.two.example.com"
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"handle": [
|
|
||||||
{
|
|
||||||
"handler": "subroute",
|
|
||||||
"routes": [
|
|
||||||
{
|
|
||||||
"handle": [
|
|
||||||
{
|
|
||||||
"body": "two fallback",
|
|
||||||
"handler": "static_response"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"terminal": true
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"automatic_https": {
|
|
||||||
"skip_certificates": [
|
|
||||||
"foo.one.example.com",
|
|
||||||
"bar.one.example.com"
|
|
||||||
],
|
|
||||||
"prefer_wildcard": true
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"srv1": {
|
|
||||||
"listen": [
|
|
||||||
":80"
|
|
||||||
],
|
|
||||||
"routes": [
|
|
||||||
{
|
|
||||||
"match": [
|
|
||||||
{
|
|
||||||
"host": [
|
|
||||||
"*.three.example.com"
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"handle": [
|
|
||||||
{
|
|
||||||
"handler": "subroute",
|
|
||||||
"routes": [
|
|
||||||
{
|
|
||||||
"handle": [
|
|
||||||
{
|
|
||||||
"body": "three fallback",
|
|
||||||
"handler": "static_response"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"terminal": true
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"automatic_https": {
|
|
||||||
"prefer_wildcard": true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"tls": {
|
|
||||||
"automation": {
|
|
||||||
"policies": [
|
|
||||||
{
|
|
||||||
"subjects": [
|
|
||||||
"foo.three.example.com"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"subjects": [
|
|
||||||
"bar.one.example.com"
|
|
||||||
],
|
|
||||||
"issuers": [
|
|
||||||
{
|
|
||||||
"email": "bar@bar.com",
|
|
||||||
"module": "acme"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"ca": "https://acme.zerossl.com/v2/DV90",
|
|
||||||
"email": "bar@bar.com",
|
|
||||||
"module": "acme"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"subjects": [
|
|
||||||
"*.one.example.com",
|
|
||||||
"*.two.example.com"
|
|
||||||
],
|
|
||||||
"issuers": [
|
|
||||||
{
|
|
||||||
"challenges": {
|
|
||||||
"dns": {
|
|
||||||
"provider": {
|
|
||||||
"name": "mock"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"module": "acme"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -101,6 +101,11 @@ example.com {
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
"handle": [
|
"handle": [
|
||||||
{
|
{
|
||||||
"handler": "subroute",
|
"handler": "subroute",
|
||||||
|
@ -126,6 +131,10 @@ example.com {
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
],
|
],
|
||||||
"terminal": true
|
"terminal": true
|
||||||
}
|
}
|
||||||
|
|
|
@ -159,6 +159,11 @@ bar.localhost {
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"handle": [
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
{
|
{
|
||||||
"handler": "subroute",
|
"handler": "subroute",
|
||||||
"routes": [
|
"routes": [
|
||||||
|
@ -168,6 +173,10 @@ bar.localhost {
|
||||||
"body": "404 or 410 error",
|
"body": "404 or 410 error",
|
||||||
"handler": "static_response"
|
"handler": "static_response"
|
||||||
}
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
],
|
],
|
||||||
"match": [
|
"match": [
|
||||||
{
|
{
|
||||||
|
@ -175,12 +184,21 @@ bar.localhost {
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
{
|
{
|
||||||
"handle": [
|
"handle": [
|
||||||
{
|
{
|
||||||
"body": "Error In range [500 .. 599]",
|
"body": "Error In range [500 .. 599]",
|
||||||
"handler": "static_response"
|
"handler": "static_response"
|
||||||
}
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
],
|
],
|
||||||
"match": [
|
"match": [
|
||||||
{
|
{
|
||||||
|
@ -202,6 +220,11 @@ bar.localhost {
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"handle": [
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
{
|
{
|
||||||
"handler": "subroute",
|
"handler": "subroute",
|
||||||
"routes": [
|
"routes": [
|
||||||
|
@ -211,6 +234,10 @@ bar.localhost {
|
||||||
"body": "404 or 410 error from second site",
|
"body": "404 or 410 error from second site",
|
||||||
"handler": "static_response"
|
"handler": "static_response"
|
||||||
}
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
],
|
],
|
||||||
"match": [
|
"match": [
|
||||||
{
|
{
|
||||||
|
@ -218,12 +245,21 @@ bar.localhost {
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
{
|
{
|
||||||
"handle": [
|
"handle": [
|
||||||
{
|
{
|
||||||
"body": "Error In range [500 .. 599] from second site",
|
"body": "Error In range [500 .. 599] from second site",
|
||||||
"handler": "static_response"
|
"handler": "static_response"
|
||||||
}
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
],
|
],
|
||||||
"match": [
|
"match": [
|
||||||
{
|
{
|
||||||
|
|
|
@ -90,6 +90,11 @@ localhost:3010 {
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"handle": [
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
{
|
{
|
||||||
"handler": "subroute",
|
"handler": "subroute",
|
||||||
"routes": [
|
"routes": [
|
||||||
|
@ -99,6 +104,10 @@ localhost:3010 {
|
||||||
"body": "Error in the [400 .. 499] range",
|
"body": "Error in the [400 .. 499] range",
|
||||||
"handler": "static_response"
|
"handler": "static_response"
|
||||||
}
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
],
|
],
|
||||||
"match": [
|
"match": [
|
||||||
{
|
{
|
||||||
|
|
|
@ -110,6 +110,11 @@ localhost:2099 {
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"handle": [
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
{
|
{
|
||||||
"handler": "subroute",
|
"handler": "subroute",
|
||||||
"routes": [
|
"routes": [
|
||||||
|
@ -119,6 +124,10 @@ localhost:2099 {
|
||||||
"body": "Error in the [400 .. 499] range",
|
"body": "Error in the [400 .. 499] range",
|
||||||
"handler": "static_response"
|
"handler": "static_response"
|
||||||
}
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
],
|
],
|
||||||
"match": [
|
"match": [
|
||||||
{
|
{
|
||||||
|
@ -126,12 +135,21 @@ localhost:2099 {
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
{
|
{
|
||||||
"handle": [
|
"handle": [
|
||||||
{
|
{
|
||||||
"body": "Error code is equal to 500 or in the [300..399] range",
|
"body": "Error code is equal to 500 or in the [300..399] range",
|
||||||
"handler": "static_response"
|
"handler": "static_response"
|
||||||
}
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
],
|
],
|
||||||
"match": [
|
"match": [
|
||||||
{
|
{
|
||||||
|
|
|
@ -90,6 +90,11 @@ localhost:3010 {
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"handle": [
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
{
|
{
|
||||||
"handler": "subroute",
|
"handler": "subroute",
|
||||||
"routes": [
|
"routes": [
|
||||||
|
@ -99,6 +104,10 @@ localhost:3010 {
|
||||||
"body": "404 or 410 error",
|
"body": "404 or 410 error",
|
||||||
"handler": "static_response"
|
"handler": "static_response"
|
||||||
}
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
],
|
],
|
||||||
"match": [
|
"match": [
|
||||||
{
|
{
|
||||||
|
|
|
@ -110,6 +110,11 @@ localhost:2099 {
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"handle": [
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
{
|
{
|
||||||
"handler": "subroute",
|
"handler": "subroute",
|
||||||
"routes": [
|
"routes": [
|
||||||
|
@ -119,6 +124,10 @@ localhost:2099 {
|
||||||
"body": "Error in the [400 .. 499] range",
|
"body": "Error in the [400 .. 499] range",
|
||||||
"handler": "static_response"
|
"handler": "static_response"
|
||||||
}
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
],
|
],
|
||||||
"match": [
|
"match": [
|
||||||
{
|
{
|
||||||
|
@ -126,6 +135,11 @@ localhost:2099 {
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
{
|
{
|
||||||
"handle": [
|
"handle": [
|
||||||
{
|
{
|
||||||
|
@ -136,6 +150,10 @@ localhost:2099 {
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
],
|
],
|
||||||
"terminal": true
|
"terminal": true
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,260 @@
|
||||||
|
{
|
||||||
|
http_port 2099
|
||||||
|
}
|
||||||
|
localhost:2099 {
|
||||||
|
root * /var/www/
|
||||||
|
file_server
|
||||||
|
|
||||||
|
handle_errors 404 {
|
||||||
|
handle /en/* {
|
||||||
|
respond "not found" 404
|
||||||
|
}
|
||||||
|
handle /es/* {
|
||||||
|
respond "no encontrado"
|
||||||
|
}
|
||||||
|
handle {
|
||||||
|
respond "default not found"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
handle_errors {
|
||||||
|
handle /en/* {
|
||||||
|
respond "English error"
|
||||||
|
}
|
||||||
|
handle /es/* {
|
||||||
|
respond "Spanish error"
|
||||||
|
}
|
||||||
|
handle {
|
||||||
|
respond "Default error"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
----------
|
||||||
|
{
|
||||||
|
"apps": {
|
||||||
|
"http": {
|
||||||
|
"http_port": 2099,
|
||||||
|
"servers": {
|
||||||
|
"srv0": {
|
||||||
|
"listen": [
|
||||||
|
":2099"
|
||||||
|
],
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"match": [
|
||||||
|
{
|
||||||
|
"host": [
|
||||||
|
"localhost"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "vars",
|
||||||
|
"root": "/var/www/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"handler": "file_server",
|
||||||
|
"hide": [
|
||||||
|
"./Caddyfile"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"terminal": true
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"errors": {
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"match": [
|
||||||
|
{
|
||||||
|
"host": [
|
||||||
|
"localhost"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"group": "group3",
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"body": "not found",
|
||||||
|
"handler": "static_response",
|
||||||
|
"status_code": 404
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"match": [
|
||||||
|
{
|
||||||
|
"path": [
|
||||||
|
"/en/*"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"group": "group3",
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"body": "no encontrado",
|
||||||
|
"handler": "static_response"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"match": [
|
||||||
|
{
|
||||||
|
"path": [
|
||||||
|
"/es/*"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"group": "group3",
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"body": "default not found",
|
||||||
|
"handler": "static_response"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"match": [
|
||||||
|
{
|
||||||
|
"expression": "{http.error.status_code} in [404]"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"group": "group8",
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"body": "English error",
|
||||||
|
"handler": "static_response"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"match": [
|
||||||
|
{
|
||||||
|
"path": [
|
||||||
|
"/en/*"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"group": "group8",
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"body": "Spanish error",
|
||||||
|
"handler": "static_response"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"match": [
|
||||||
|
{
|
||||||
|
"path": [
|
||||||
|
"/es/*"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"group": "group8",
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"handler": "subroute",
|
||||||
|
"routes": [
|
||||||
|
{
|
||||||
|
"handle": [
|
||||||
|
{
|
||||||
|
"body": "Default error",
|
||||||
|
"handler": "static_response"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"terminal": true
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -131,13 +131,7 @@ shadowed.example.com {
|
||||||
{
|
{
|
||||||
"match": {
|
"match": {
|
||||||
"sni": [
|
"sni": [
|
||||||
"automated1.example.com"
|
"automated1.example.com",
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"match": {
|
|
||||||
"sni": [
|
|
||||||
"automated2.example.com"
|
"automated2.example.com"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
|
|
@ -10,7 +10,6 @@ import (
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/caddyserver/caddy/v2/caddytest"
|
"github.com/caddyserver/caddy/v2/caddytest"
|
||||||
|
|
||||||
_ "github.com/caddyserver/caddy/v2/internal/testmocks"
|
_ "github.com/caddyserver/caddy/v2/internal/testmocks"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
|
@ -615,7 +615,6 @@ func TestReplaceWithReplacementPlaceholder(t *testing.T) {
|
||||||
respond "{query}"`, "caddyfile")
|
respond "{query}"`, "caddyfile")
|
||||||
|
|
||||||
tester.AssertGetResponse("http://localhost:9080/endpoint?placeholder=baz&foo=bar", 200, "foo=baz&placeholder=baz")
|
tester.AssertGetResponse("http://localhost:9080/endpoint?placeholder=baz&foo=bar", 200, "foo=baz&placeholder=baz")
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestReplaceWithKeyPlaceholder(t *testing.T) {
|
func TestReplaceWithKeyPlaceholder(t *testing.T) {
|
||||||
|
@ -783,6 +782,46 @@ func TestHandleErrorRangeAndCodes(t *testing.T) {
|
||||||
tester.AssertGetResponse("http://localhost:9080/private", 410, "Error in the [400 .. 499] range")
|
tester.AssertGetResponse("http://localhost:9080/private", 410, "Error in the [400 .. 499] range")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestHandleErrorSubHandlers(t *testing.T) {
|
||||||
|
tester := caddytest.NewTester(t)
|
||||||
|
tester.InitServer(`{
|
||||||
|
admin localhost:2999
|
||||||
|
http_port 9080
|
||||||
|
}
|
||||||
|
localhost:9080 {
|
||||||
|
root * /srv
|
||||||
|
file_server
|
||||||
|
error /*/internalerr* "Internal Server Error" 500
|
||||||
|
|
||||||
|
handle_errors 404 {
|
||||||
|
handle /en/* {
|
||||||
|
respond "not found" 404
|
||||||
|
}
|
||||||
|
handle /es/* {
|
||||||
|
respond "no encontrado" 404
|
||||||
|
}
|
||||||
|
handle {
|
||||||
|
respond "default not found"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
handle_errors {
|
||||||
|
handle {
|
||||||
|
respond "Default error"
|
||||||
|
}
|
||||||
|
handle /en/* {
|
||||||
|
respond "English error"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
`, "caddyfile")
|
||||||
|
// act and assert
|
||||||
|
tester.AssertGetResponse("http://localhost:9080/en/notfound", 404, "not found")
|
||||||
|
tester.AssertGetResponse("http://localhost:9080/es/notfound", 404, "no encontrado")
|
||||||
|
tester.AssertGetResponse("http://localhost:9080/notfound", 404, "default not found")
|
||||||
|
tester.AssertGetResponse("http://localhost:9080/es/internalerr", 500, "Default error")
|
||||||
|
tester.AssertGetResponse("http://localhost:9080/en/internalerr", 500, "English error")
|
||||||
|
}
|
||||||
|
|
||||||
func TestInvalidSiteAddressesAsDirectives(t *testing.T) {
|
func TestInvalidSiteAddressesAsDirectives(t *testing.T) {
|
||||||
type testCase struct {
|
type testCase struct {
|
||||||
config, expectedError string
|
config, expectedError string
|
||||||
|
|
|
@ -3,10 +3,11 @@ package integration
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
|
||||||
"github.com/caddyserver/caddy/v2"
|
|
||||||
"github.com/caddyserver/caddy/v2/caddyconfig/caddyfile"
|
|
||||||
"github.com/caddyserver/certmagic"
|
"github.com/caddyserver/certmagic"
|
||||||
"github.com/libdns/libdns"
|
"github.com/libdns/libdns"
|
||||||
|
|
||||||
|
"github.com/caddyserver/caddy/v2"
|
||||||
|
"github.com/caddyserver/caddy/v2/caddyconfig/caddyfile"
|
||||||
)
|
)
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
|
@ -55,7 +56,9 @@ func (MockDNSProvider) SetRecords(ctx context.Context, zone string, recs []libdn
|
||||||
}
|
}
|
||||||
|
|
||||||
// Interface guard
|
// Interface guard
|
||||||
var _ caddyfile.Unmarshaler = (*MockDNSProvider)(nil)
|
var (
|
||||||
var _ certmagic.DNSProvider = (*MockDNSProvider)(nil)
|
_ caddyfile.Unmarshaler = (*MockDNSProvider)(nil)
|
||||||
var _ caddy.Provisioner = (*MockDNSProvider)(nil)
|
_ certmagic.DNSProvider = (*MockDNSProvider)(nil)
|
||||||
var _ caddy.Module = (*MockDNSProvider)(nil)
|
_ caddy.Provisioner = (*MockDNSProvider)(nil)
|
||||||
|
_ caddy.Module = (*MockDNSProvider)(nil)
|
||||||
|
)
|
||||||
|
|
|
@ -13,9 +13,10 @@ import (
|
||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/caddyserver/caddy/v2/caddytest"
|
|
||||||
"golang.org/x/net/http2"
|
"golang.org/x/net/http2"
|
||||||
"golang.org/x/net/http2/h2c"
|
"golang.org/x/net/http2/h2c"
|
||||||
|
|
||||||
|
"github.com/caddyserver/caddy/v2/caddytest"
|
||||||
)
|
)
|
||||||
|
|
||||||
// (see https://github.com/caddyserver/caddy/issues/3556 for use case)
|
// (see https://github.com/caddyserver/caddy/issues/3556 for use case)
|
||||||
|
|
|
@ -24,6 +24,7 @@ import (
|
||||||
"io"
|
"io"
|
||||||
"io/fs"
|
"io/fs"
|
||||||
"log"
|
"log"
|
||||||
|
"maps"
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
"os"
|
"os"
|
||||||
|
@ -703,9 +704,7 @@ func AdminAPIRequest(adminAddr, method, uri string, headers http.Header, body io
|
||||||
if body != nil {
|
if body != nil {
|
||||||
req.Header.Set("Content-Type", "application/json")
|
req.Header.Set("Content-Type", "application/json")
|
||||||
}
|
}
|
||||||
for k, v := range headers {
|
maps.Copy(req.Header, headers)
|
||||||
req.Header[k] = v
|
|
||||||
}
|
|
||||||
|
|
||||||
// make an HTTP client that dials our network type, since admin
|
// make an HTTP client that dials our network type, since admin
|
||||||
// endpoints aren't always TCP, which is what the default transport
|
// endpoints aren't always TCP, which is what the default transport
|
||||||
|
|
|
@ -418,7 +418,7 @@ func parseEnvFile(envInput io.Reader) (map[string]string, error) {
|
||||||
// quoted value: support newlines
|
// quoted value: support newlines
|
||||||
if strings.HasPrefix(val, `"`) || strings.HasPrefix(val, "'") {
|
if strings.HasPrefix(val, `"`) || strings.HasPrefix(val, "'") {
|
||||||
quote := string(val[0])
|
quote := string(val[0])
|
||||||
for !(strings.HasSuffix(line, quote) && !strings.HasSuffix(line, `\`+quote)) {
|
for !strings.HasSuffix(line, quote) || strings.HasSuffix(line, `\`+quote) {
|
||||||
val = strings.ReplaceAll(val, `\`+quote, quote)
|
val = strings.ReplaceAll(val, `\`+quote, quote)
|
||||||
if !scanner.Scan() {
|
if !scanner.Scan() {
|
||||||
break
|
break
|
||||||
|
|
|
@ -235,7 +235,6 @@ func Test_isCaddyfile(t *testing.T) {
|
||||||
wantErr: false,
|
wantErr: false,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
||||||
name: "json is not caddyfile but not error",
|
name: "json is not caddyfile but not error",
|
||||||
args: args{
|
args: args{
|
||||||
configFile: "./Caddyfile.json",
|
configFile: "./Caddyfile.json",
|
||||||
|
@ -245,7 +244,6 @@ func Test_isCaddyfile(t *testing.T) {
|
||||||
wantErr: false,
|
wantErr: false,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
||||||
name: "prefix of Caddyfile and ./ with any extension is Caddyfile",
|
name: "prefix of Caddyfile and ./ with any extension is Caddyfile",
|
||||||
args: args{
|
args: args{
|
||||||
configFile: "./Caddyfile.prd",
|
configFile: "./Caddyfile.prd",
|
||||||
|
@ -255,7 +253,6 @@ func Test_isCaddyfile(t *testing.T) {
|
||||||
wantErr: false,
|
wantErr: false,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
||||||
name: "prefix of Caddyfile without ./ with any extension is Caddyfile",
|
name: "prefix of Caddyfile without ./ with any extension is Caddyfile",
|
||||||
args: args{
|
args: args{
|
||||||
configFile: "Caddyfile.prd",
|
configFile: "Caddyfile.prd",
|
||||||
|
|
|
@ -84,7 +84,7 @@ func cmdAddPackage(fl Flags) (int, error) {
|
||||||
return caddy.ExitCodeFailedStartup, fmt.Errorf("invalid module name: %v", err)
|
return caddy.ExitCodeFailedStartup, fmt.Errorf("invalid module name: %v", err)
|
||||||
}
|
}
|
||||||
// only allow a version to be specified if it's different from the existing version
|
// only allow a version to be specified if it's different from the existing version
|
||||||
if _, ok := pluginPkgs[module]; ok && !(version != "" && pluginPkgs[module].Version != version) {
|
if _, ok := pluginPkgs[module]; ok && (version == "" || pluginPkgs[module].Version == version) {
|
||||||
return caddy.ExitCodeFailedStartup, fmt.Errorf("package is already added")
|
return caddy.ExitCodeFailedStartup, fmt.Errorf("package is already added")
|
||||||
}
|
}
|
||||||
pluginPkgs[module] = pluginPackage{Version: version, Path: module}
|
pluginPkgs[module] = pluginPackage{Version: version, Path: module}
|
||||||
|
|
|
@ -577,11 +577,11 @@ func (ctx Context) Slogger() *slog.Logger {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic("config missing, unable to create dev logger: " + err.Error())
|
panic("config missing, unable to create dev logger: " + err.Error())
|
||||||
}
|
}
|
||||||
return slog.New(zapslog.NewHandler(l.Core(), nil))
|
return slog.New(zapslog.NewHandler(l.Core()))
|
||||||
}
|
}
|
||||||
mod := ctx.Module()
|
mod := ctx.Module()
|
||||||
if mod == nil {
|
if mod == nil {
|
||||||
return slog.New(zapslog.NewHandler(Log().Core(), nil))
|
return slog.New(zapslog.NewHandler(Log().Core()))
|
||||||
}
|
}
|
||||||
return slog.New(zapslog.NewHandler(ctx.cfg.Logging.Logger(mod).Core(),
|
return slog.New(zapslog.NewHandler(ctx.cfg.Logging.Logger(mod).Core(),
|
||||||
zapslog.WithName(string(mod.CaddyModule().ID)),
|
zapslog.WithName(string(mod.CaddyModule().ID)),
|
||||||
|
|
4
go.mod
4
go.mod
|
@ -19,7 +19,7 @@ require (
|
||||||
github.com/klauspost/cpuid/v2 v2.2.10
|
github.com/klauspost/cpuid/v2 v2.2.10
|
||||||
github.com/mholt/acmez/v3 v3.1.2
|
github.com/mholt/acmez/v3 v3.1.2
|
||||||
github.com/prometheus/client_golang v1.19.1
|
github.com/prometheus/client_golang v1.19.1
|
||||||
github.com/quic-go/quic-go v0.50.1
|
github.com/quic-go/quic-go v0.51.0
|
||||||
github.com/smallstep/certificates v0.26.1
|
github.com/smallstep/certificates v0.26.1
|
||||||
github.com/smallstep/nosql v0.6.1
|
github.com/smallstep/nosql v0.6.1
|
||||||
github.com/smallstep/truststore v0.13.0
|
github.com/smallstep/truststore v0.13.0
|
||||||
|
@ -39,7 +39,7 @@ require (
|
||||||
go.uber.org/zap/exp v0.3.0
|
go.uber.org/zap/exp v0.3.0
|
||||||
golang.org/x/crypto v0.36.0
|
golang.org/x/crypto v0.36.0
|
||||||
golang.org/x/crypto/x509roots/fallback v0.0.0-20250305170421-49bf5b80c810
|
golang.org/x/crypto/x509roots/fallback v0.0.0-20250305170421-49bf5b80c810
|
||||||
golang.org/x/net v0.37.0
|
golang.org/x/net v0.38.0
|
||||||
golang.org/x/sync v0.12.0
|
golang.org/x/sync v0.12.0
|
||||||
golang.org/x/term v0.30.0
|
golang.org/x/term v0.30.0
|
||||||
golang.org/x/time v0.11.0
|
golang.org/x/time v0.11.0
|
||||||
|
|
8
go.sum
8
go.sum
|
@ -397,8 +397,8 @@ github.com/prometheus/procfs v0.12.0 h1:jluTpSng7V9hY0O2R9DzzJHYb2xULk9VTR1V1R/k
|
||||||
github.com/prometheus/procfs v0.12.0/go.mod h1:pcuDEFsWDnvcgNzo4EEweacyhjeA9Zk3cnaOZAZEfOo=
|
github.com/prometheus/procfs v0.12.0/go.mod h1:pcuDEFsWDnvcgNzo4EEweacyhjeA9Zk3cnaOZAZEfOo=
|
||||||
github.com/quic-go/qpack v0.5.1 h1:giqksBPnT/HDtZ6VhtFKgoLOWmlyo9Ei6u9PqzIMbhI=
|
github.com/quic-go/qpack v0.5.1 h1:giqksBPnT/HDtZ6VhtFKgoLOWmlyo9Ei6u9PqzIMbhI=
|
||||||
github.com/quic-go/qpack v0.5.1/go.mod h1:+PC4XFrEskIVkcLzpEkbLqq1uCoxPhQuvK5rH1ZgaEg=
|
github.com/quic-go/qpack v0.5.1/go.mod h1:+PC4XFrEskIVkcLzpEkbLqq1uCoxPhQuvK5rH1ZgaEg=
|
||||||
github.com/quic-go/quic-go v0.50.1 h1:unsgjFIUqW8a2oopkY7YNONpV1gYND6Nt9hnt1PN94Q=
|
github.com/quic-go/quic-go v0.51.0 h1:K8exxe9zXxeRKxaXxi/GpUqYiTrtdiWP8bo1KFya6Wc=
|
||||||
github.com/quic-go/quic-go v0.50.1/go.mod h1:Vim6OmUvlYdwBhXP9ZVrtGmCMWa3wEqhq3NgYrI8b4E=
|
github.com/quic-go/quic-go v0.51.0/go.mod h1:MFlGGpcpJqRAfmYi6NC2cptDPSxRWTOGNuP4wqrWmzQ=
|
||||||
github.com/rogpeppe/go-internal v1.3.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4=
|
github.com/rogpeppe/go-internal v1.3.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4=
|
||||||
github.com/rogpeppe/go-internal v1.13.1 h1:KvO1DLK/DRN07sQ1LQKScxyZJuNnedQ5/wKSR38lUII=
|
github.com/rogpeppe/go-internal v1.13.1 h1:KvO1DLK/DRN07sQ1LQKScxyZJuNnedQ5/wKSR38lUII=
|
||||||
github.com/rogpeppe/go-internal v1.13.1/go.mod h1:uMEvuHeurkdAXX61udpOXGD/AzZDWNMNyH2VO9fmH0o=
|
github.com/rogpeppe/go-internal v1.13.1/go.mod h1:uMEvuHeurkdAXX61udpOXGD/AzZDWNMNyH2VO9fmH0o=
|
||||||
|
@ -633,8 +633,8 @@ golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v
|
||||||
golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
|
golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
|
||||||
golang.org/x/net v0.6.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs=
|
golang.org/x/net v0.6.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs=
|
||||||
golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg=
|
golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg=
|
||||||
golang.org/x/net v0.37.0 h1:1zLorHbz+LYj7MQlSf1+2tPIIgibq2eL5xkrGk6f+2c=
|
golang.org/x/net v0.38.0 h1:vRMAPTMaeGqVhG5QyLJHqNDwecKTomGeqbnfZyKlBI8=
|
||||||
golang.org/x/net v0.37.0/go.mod h1:ivrbrMbzFq5J41QOQh0siUuly180yBYtLp+CKbEaFx8=
|
golang.org/x/net v0.38.0/go.mod h1:ivrbrMbzFq5J41QOQh0siUuly180yBYtLp+CKbEaFx8=
|
||||||
golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
|
golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
|
||||||
golang.org/x/oauth2 v0.0.0-20181017192945-9dcd33a902f4/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
|
golang.org/x/oauth2 v0.0.0-20181017192945-9dcd33a902f4/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
|
||||||
golang.org/x/oauth2 v0.0.0-20181203162652-d668ce993890/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
|
golang.org/x/oauth2 v0.0.0-20181203162652-d668ce993890/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
|
||||||
|
|
|
@ -0,0 +1,22 @@
|
||||||
|
package internal
|
||||||
|
|
||||||
|
import "fmt"
|
||||||
|
|
||||||
|
// MaxSizeSubjectsListForLog returns the keys in the map as a slice of maximum length
|
||||||
|
// maxToDisplay. It is useful for logging domains being managed, for example, since a
|
||||||
|
// map is typically needed for quick lookup, but a slice is needed for logging, and this
|
||||||
|
// can be quite a doozy since there may be a huge amount (hundreds of thousands).
|
||||||
|
func MaxSizeSubjectsListForLog(subjects map[string]struct{}, maxToDisplay int) []string {
|
||||||
|
numberOfNamesToDisplay := min(len(subjects), maxToDisplay)
|
||||||
|
domainsToDisplay := make([]string, 0, numberOfNamesToDisplay)
|
||||||
|
for domain := range subjects {
|
||||||
|
domainsToDisplay = append(domainsToDisplay, domain)
|
||||||
|
if len(domainsToDisplay) >= numberOfNamesToDisplay {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(subjects) > maxToDisplay {
|
||||||
|
domainsToDisplay = append(domainsToDisplay, fmt.Sprintf("(and %d more...)", len(subjects)-maxToDisplay))
|
||||||
|
}
|
||||||
|
return domainsToDisplay
|
||||||
|
}
|
|
@ -185,8 +185,7 @@ func TestParseNetworkAddress(t *testing.T) {
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
input: "",
|
input: "",
|
||||||
expectAddr: NetworkAddress{
|
expectAddr: NetworkAddress{},
|
||||||
},
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
input: ":",
|
input: ":",
|
||||||
|
@ -312,8 +311,7 @@ func TestParseNetworkAddressWithDefaults(t *testing.T) {
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
input: "",
|
input: "",
|
||||||
expectAddr: NetworkAddress{
|
expectAddr: NetworkAddress{},
|
||||||
},
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
input: ":",
|
input: ":",
|
||||||
|
|
|
@ -20,6 +20,7 @@ import (
|
||||||
"io"
|
"io"
|
||||||
"log"
|
"log"
|
||||||
"os"
|
"os"
|
||||||
|
"slices"
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
|
@ -161,7 +162,9 @@ func (logging *Logging) setupNewDefault(ctx Context) error {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("setting up default log: %v", err)
|
return fmt.Errorf("setting up default log: %v", err)
|
||||||
}
|
}
|
||||||
newDefault.logger = zap.New(newDefault.CustomLog.core, options...)
|
|
||||||
|
filteringCore := &filteringCore{newDefault.CustomLog.core, newDefault.CustomLog}
|
||||||
|
newDefault.logger = zap.New(filteringCore, options...)
|
||||||
|
|
||||||
// redirect the default caddy logs
|
// redirect the default caddy logs
|
||||||
defaultLoggerMu.Lock()
|
defaultLoggerMu.Lock()
|
||||||
|
@ -490,12 +493,10 @@ func (cl *CustomLog) provision(ctx Context, logging *Logging) error {
|
||||||
if len(cl.Include) > 0 && len(cl.Exclude) > 0 {
|
if len(cl.Include) > 0 && len(cl.Exclude) > 0 {
|
||||||
// prevent intersections
|
// prevent intersections
|
||||||
for _, allow := range cl.Include {
|
for _, allow := range cl.Include {
|
||||||
for _, deny := range cl.Exclude {
|
if slices.Contains(cl.Exclude, allow) {
|
||||||
if allow == deny {
|
|
||||||
return fmt.Errorf("include and exclude must not intersect, but found %s in both lists", allow)
|
return fmt.Errorf("include and exclude must not intersect, but found %s in both lists", allow)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
// ensure namespaces are nested
|
// ensure namespaces are nested
|
||||||
outer:
|
outer:
|
||||||
|
|
|
@ -0,0 +1,106 @@
|
||||||
|
// Copyright 2015 Matthew Holt and The Caddy Authors
|
||||||
|
//
|
||||||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
// you may not use this file except in compliance with the License.
|
||||||
|
// You may obtain a copy of the License at
|
||||||
|
//
|
||||||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//
|
||||||
|
// Unless required by applicable law or agreed to in writing, software
|
||||||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
// See the License for the specific language governing permissions and
|
||||||
|
// limitations under the License.
|
||||||
|
|
||||||
|
package caddy
|
||||||
|
|
||||||
|
import "testing"
|
||||||
|
|
||||||
|
func TestCustomLog_loggerAllowed(t *testing.T) {
|
||||||
|
type fields struct {
|
||||||
|
BaseLog BaseLog
|
||||||
|
Include []string
|
||||||
|
Exclude []string
|
||||||
|
}
|
||||||
|
type args struct {
|
||||||
|
name string
|
||||||
|
isModule bool
|
||||||
|
}
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
fields fields
|
||||||
|
args args
|
||||||
|
want bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "include",
|
||||||
|
fields: fields{
|
||||||
|
Include: []string{"foo"},
|
||||||
|
},
|
||||||
|
args: args{
|
||||||
|
name: "foo",
|
||||||
|
isModule: true,
|
||||||
|
},
|
||||||
|
want: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "exclude",
|
||||||
|
fields: fields{
|
||||||
|
Exclude: []string{"foo"},
|
||||||
|
},
|
||||||
|
args: args{
|
||||||
|
name: "foo",
|
||||||
|
isModule: true,
|
||||||
|
},
|
||||||
|
want: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "include and exclude",
|
||||||
|
fields: fields{
|
||||||
|
Include: []string{"foo"},
|
||||||
|
Exclude: []string{"foo"},
|
||||||
|
},
|
||||||
|
args: args{
|
||||||
|
name: "foo",
|
||||||
|
isModule: true,
|
||||||
|
},
|
||||||
|
want: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "include and exclude (longer namespace)",
|
||||||
|
fields: fields{
|
||||||
|
Include: []string{"foo.bar"},
|
||||||
|
Exclude: []string{"foo"},
|
||||||
|
},
|
||||||
|
args: args{
|
||||||
|
name: "foo.bar",
|
||||||
|
isModule: true,
|
||||||
|
},
|
||||||
|
want: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "excluded module is not printed",
|
||||||
|
fields: fields{
|
||||||
|
Include: []string{"admin.api.load"},
|
||||||
|
Exclude: []string{"admin.api"},
|
||||||
|
},
|
||||||
|
args: args{
|
||||||
|
name: "admin.api",
|
||||||
|
isModule: false,
|
||||||
|
},
|
||||||
|
want: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
cl := &CustomLog{
|
||||||
|
BaseLog: tt.fields.BaseLog,
|
||||||
|
Include: tt.fields.Include,
|
||||||
|
Exclude: tt.fields.Exclude,
|
||||||
|
}
|
||||||
|
if got := cl.loggerAllowed(tt.args.name, tt.args.isModule); got != tt.want {
|
||||||
|
t.Errorf("CustomLog.loggerAllowed() = %v, want %v", got, tt.want)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
|
@ -152,7 +152,7 @@ type App struct {
|
||||||
tlsApp *caddytls.TLS
|
tlsApp *caddytls.TLS
|
||||||
|
|
||||||
// used temporarily between phases 1 and 2 of auto HTTPS
|
// used temporarily between phases 1 and 2 of auto HTTPS
|
||||||
allCertDomains []string
|
allCertDomains map[string]struct{}
|
||||||
}
|
}
|
||||||
|
|
||||||
// CaddyModule returns the Caddy module information.
|
// CaddyModule returns the Caddy module information.
|
||||||
|
|
|
@ -25,6 +25,7 @@ import (
|
||||||
"go.uber.org/zap"
|
"go.uber.org/zap"
|
||||||
|
|
||||||
"github.com/caddyserver/caddy/v2"
|
"github.com/caddyserver/caddy/v2"
|
||||||
|
"github.com/caddyserver/caddy/v2/internal"
|
||||||
"github.com/caddyserver/caddy/v2/modules/caddytls"
|
"github.com/caddyserver/caddy/v2/modules/caddytls"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -65,12 +66,6 @@ type AutoHTTPSConfig struct {
|
||||||
// enabled. To force automated certificate management
|
// enabled. To force automated certificate management
|
||||||
// regardless of loaded certificates, set this to true.
|
// regardless of loaded certificates, set this to true.
|
||||||
IgnoreLoadedCerts bool `json:"ignore_loaded_certificates,omitempty"`
|
IgnoreLoadedCerts bool `json:"ignore_loaded_certificates,omitempty"`
|
||||||
|
|
||||||
// If true, automatic HTTPS will prefer wildcard names
|
|
||||||
// and ignore non-wildcard names if both are available.
|
|
||||||
// This allows for writing a config with top-level host
|
|
||||||
// matchers without having those names produce certificates.
|
|
||||||
PreferWildcard bool `json:"prefer_wildcard,omitempty"`
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// automaticHTTPSPhase1 provisions all route matchers, determines
|
// automaticHTTPSPhase1 provisions all route matchers, determines
|
||||||
|
@ -163,33 +158,8 @@ func (app *App) automaticHTTPSPhase1(ctx caddy.Context, repl *caddy.Replacer) er
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// trim the list of domains covered by wildcards, if configured
|
|
||||||
if srv.AutoHTTPS.PreferWildcard {
|
|
||||||
wildcards := make(map[string]struct{})
|
|
||||||
for d := range serverDomainSet {
|
|
||||||
if strings.HasPrefix(d, "*.") {
|
|
||||||
wildcards[d[2:]] = struct{}{}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
for d := range serverDomainSet {
|
|
||||||
if strings.HasPrefix(d, "*.") {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
base := d
|
|
||||||
if idx := strings.Index(d, "."); idx != -1 {
|
|
||||||
base = d[idx+1:]
|
|
||||||
}
|
|
||||||
if _, ok := wildcards[base]; ok {
|
|
||||||
delete(serverDomainSet, d)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// build the list of domains that could be used with ECH (if enabled)
|
// build the list of domains that could be used with ECH (if enabled)
|
||||||
// so the TLS app can know to publish ECH configs for them; we do this
|
// so the TLS app can know to publish ECH configs for them
|
||||||
// after trimming domains covered by wildcards because, presumably,
|
|
||||||
// if the user wants to use wildcard certs, they also want to use the
|
|
||||||
// wildcard for ECH, rather than individual subdomains
|
|
||||||
echDomains := make([]string, 0, len(serverDomainSet))
|
echDomains := make([]string, 0, len(serverDomainSet))
|
||||||
for d := range serverDomainSet {
|
for d := range serverDomainSet {
|
||||||
echDomains = append(echDomains, d)
|
echDomains = append(echDomains, d)
|
||||||
|
@ -295,19 +265,10 @@ func (app *App) automaticHTTPSPhase1(ctx caddy.Context, repl *caddy.Replacer) er
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// we now have a list of all the unique names for which we need certs;
|
// we now have a list of all the unique names for which we need certs
|
||||||
// turn the set into a slice so that phase 2 can use it
|
|
||||||
app.allCertDomains = make([]string, 0, len(uniqueDomainsForCerts))
|
|
||||||
var internal, tailscale []string
|
var internal, tailscale []string
|
||||||
uniqueDomainsLoop:
|
uniqueDomainsLoop:
|
||||||
for d := range uniqueDomainsForCerts {
|
for d := range uniqueDomainsForCerts {
|
||||||
if !isTailscaleDomain(d) {
|
|
||||||
// whether or not there is already an automation policy for this
|
|
||||||
// name, we should add it to the list to manage a cert for it,
|
|
||||||
// unless it's a Tailscale domain, because we don't manage those
|
|
||||||
app.allCertDomains = append(app.allCertDomains, d)
|
|
||||||
}
|
|
||||||
|
|
||||||
// some names we've found might already have automation policies
|
// some names we've found might already have automation policies
|
||||||
// explicitly specified for them; we should exclude those from
|
// explicitly specified for them; we should exclude those from
|
||||||
// our hidden/implicit policy, since applying a name to more than
|
// our hidden/implicit policy, since applying a name to more than
|
||||||
|
@ -346,6 +307,7 @@ uniqueDomainsLoop:
|
||||||
}
|
}
|
||||||
if isTailscaleDomain(d) {
|
if isTailscaleDomain(d) {
|
||||||
tailscale = append(tailscale, d)
|
tailscale = append(tailscale, d)
|
||||||
|
delete(uniqueDomainsForCerts, d) // not managed by us; handled separately
|
||||||
} else if shouldUseInternal(d) {
|
} else if shouldUseInternal(d) {
|
||||||
internal = append(internal, d)
|
internal = append(internal, d)
|
||||||
}
|
}
|
||||||
|
@ -381,7 +343,7 @@ uniqueDomainsLoop:
|
||||||
// match on known domain names, unless it's our special case of a
|
// match on known domain names, unless it's our special case of a
|
||||||
// catch-all which is an empty string (common among catch-all sites
|
// catch-all which is an empty string (common among catch-all sites
|
||||||
// that enable on-demand TLS for yet-unknown domain names)
|
// that enable on-demand TLS for yet-unknown domain names)
|
||||||
if !(len(domains) == 1 && domains[0] == "") {
|
if len(domains) != 1 || domains[0] != "" {
|
||||||
matcherSet = append(matcherSet, MatchHost(domains))
|
matcherSet = append(matcherSet, MatchHost(domains))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -475,6 +437,9 @@ redirServersLoop:
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// persist the domains/IPs we're managing certs for through provisioning/startup
|
||||||
|
app.allCertDomains = uniqueDomainsForCerts
|
||||||
|
|
||||||
logger.Debug("adjusted config",
|
logger.Debug("adjusted config",
|
||||||
zap.Reflect("tls", app.tlsApp),
|
zap.Reflect("tls", app.tlsApp),
|
||||||
zap.Reflect("http", app))
|
zap.Reflect("http", app))
|
||||||
|
@ -777,7 +742,7 @@ func (app *App) automaticHTTPSPhase2() error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
app.logger.Info("enabling automatic TLS certificate management",
|
app.logger.Info("enabling automatic TLS certificate management",
|
||||||
zap.Strings("domains", app.allCertDomains),
|
zap.Strings("domains", internal.MaxSizeSubjectsListForLog(app.allCertDomains, 1000)),
|
||||||
)
|
)
|
||||||
err := app.tlsApp.Manage(app.allCertDomains)
|
err := app.tlsApp.Manage(app.allCertDomains)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -26,7 +26,7 @@
|
||||||
<path d="M9 7l4 0"/>
|
<path d="M9 7l4 0"/>
|
||||||
<path d="M9 11l4 0"/>
|
<path d="M9 11l4 0"/>
|
||||||
</svg>
|
</svg>
|
||||||
{{- else if .HasExt ".jpg" ".jpeg" ".png" ".gif" ".webp" ".tiff" ".bmp" ".heif" ".heic" ".svg"}}
|
{{- else if .HasExt ".jpg" ".jpeg" ".png" ".gif" ".webp" ".tiff" ".bmp" ".heif" ".heic" ".svg" ".avif"}}
|
||||||
{{- if eq .Tpl.Layout "grid"}}
|
{{- if eq .Tpl.Layout "grid"}}
|
||||||
<img loading="lazy" src="{{.Name | pathEscape}}">
|
<img loading="lazy" src="{{.Name | pathEscape}}">
|
||||||
{{- else}}
|
{{- else}}
|
||||||
|
|
|
@ -252,7 +252,7 @@ func celFileMatcherMacroExpander() parser.MacroExpander {
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, arg := range args {
|
for _, arg := range args {
|
||||||
if !(isCELStringLiteral(arg) || isCELCaddyPlaceholderCall(arg)) {
|
if !isCELStringLiteral(arg) && !isCELCaddyPlaceholderCall(arg) {
|
||||||
return nil, &common.Error{
|
return nil, &common.Error{
|
||||||
Location: eh.OffsetLocation(arg.ID()),
|
Location: eh.OffsetLocation(arg.ID()),
|
||||||
Message: "matcher only supports repeated string literal arguments",
|
Message: "matcher only supports repeated string literal arguments",
|
||||||
|
@ -616,15 +616,16 @@ func isCELTryFilesLiteral(e ast.Expr) bool {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
mapKeyStr := mapKey.AsLiteral().ConvertToType(types.StringType).Value()
|
mapKeyStr := mapKey.AsLiteral().ConvertToType(types.StringType).Value()
|
||||||
if mapKeyStr == "try_files" || mapKeyStr == "split_path" {
|
switch mapKeyStr {
|
||||||
|
case "try_files", "split_path":
|
||||||
if !isCELStringListLiteral(mapVal) {
|
if !isCELStringListLiteral(mapVal) {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
} else if mapKeyStr == "try_policy" || mapKeyStr == "root" {
|
case "try_policy", "root":
|
||||||
if !(isCELStringExpr(mapVal)) {
|
if !(isCELStringExpr(mapVal)) {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
} else {
|
default:
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -300,8 +300,10 @@ func (fsrv *FileServer) ServeHTTP(w http.ResponseWriter, r *http.Request, next c
|
||||||
info, err := fs.Stat(fileSystem, filename)
|
info, err := fs.Stat(fileSystem, filename)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
err = fsrv.mapDirOpenError(fileSystem, err, filename)
|
err = fsrv.mapDirOpenError(fileSystem, err, filename)
|
||||||
if errors.Is(err, fs.ErrNotExist) || errors.Is(err, fs.ErrInvalid) {
|
if errors.Is(err, fs.ErrNotExist) {
|
||||||
return fsrv.notFound(w, r, next)
|
return fsrv.notFound(w, r, next)
|
||||||
|
} else if errors.Is(err, fs.ErrInvalid) {
|
||||||
|
return caddyhttp.Error(http.StatusBadRequest, err)
|
||||||
} else if errors.Is(err, fs.ErrPermission) {
|
} else if errors.Is(err, fs.ErrPermission) {
|
||||||
return caddyhttp.Error(http.StatusForbidden, err)
|
return caddyhttp.Error(http.StatusForbidden, err)
|
||||||
}
|
}
|
||||||
|
@ -611,6 +613,11 @@ func (fsrv *FileServer) mapDirOpenError(fileSystem fs.FS, originalErr error, nam
|
||||||
return originalErr
|
return originalErr
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var pathErr *fs.PathError
|
||||||
|
if errors.As(originalErr, &pathErr) {
|
||||||
|
return fs.ErrInvalid
|
||||||
|
}
|
||||||
|
|
||||||
parts := strings.Split(name, separator)
|
parts := strings.Split(name, separator)
|
||||||
for i := range parts {
|
for i := range parts {
|
||||||
if parts[i] == "" {
|
if parts[i] == "" {
|
||||||
|
|
|
@ -118,6 +118,11 @@ func (irh interceptedResponseHandler) WriteHeader(statusCode int) {
|
||||||
irh.ResponseRecorder.WriteHeader(statusCode)
|
irh.ResponseRecorder.WriteHeader(statusCode)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// EXPERIMENTAL: Subject to change or removal.
|
||||||
|
func (irh interceptedResponseHandler) Unwrap() http.ResponseWriter {
|
||||||
|
return irh.ResponseRecorder
|
||||||
|
}
|
||||||
|
|
||||||
// EXPERIMENTAL: Subject to change or removal.
|
// EXPERIMENTAL: Subject to change or removal.
|
||||||
func (ir Intercept) ServeHTTP(w http.ResponseWriter, r *http.Request, next caddyhttp.Handler) error {
|
func (ir Intercept) ServeHTTP(w http.ResponseWriter, r *http.Request, next caddyhttp.Handler) error {
|
||||||
buf := bufPool.Get().(*bytes.Buffer)
|
buf := bufPool.Get().(*bytes.Buffer)
|
||||||
|
|
|
@ -552,7 +552,6 @@ func (MatchPath) matchPatternWithEscapeSequence(escapedPath, matchPath string) b
|
||||||
if iPattern >= len(matchPath) || iPath >= len(escapedPath) {
|
if iPattern >= len(matchPath) || iPath >= len(escapedPath) {
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
|
|
||||||
// get the next character from the request path
|
// get the next character from the request path
|
||||||
|
|
||||||
pathCh := string(escapedPath[iPath])
|
pathCh := string(escapedPath[iPath])
|
||||||
|
|
|
@ -9,8 +9,9 @@ import (
|
||||||
"sync"
|
"sync"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/caddyserver/caddy/v2"
|
|
||||||
"github.com/prometheus/client_golang/prometheus/testutil"
|
"github.com/prometheus/client_golang/prometheus/testutil"
|
||||||
|
|
||||||
|
"github.com/caddyserver/caddy/v2"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestServerNameFromContext(t *testing.T) {
|
func TestServerNameFromContext(t *testing.T) {
|
||||||
|
|
|
@ -363,13 +363,13 @@ func addHTTPVarsToReplacer(repl *caddy.Replacer, req *http.Request, w http.Respo
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
switch {
|
switch key {
|
||||||
case key == "http.shutting_down":
|
case "http.shutting_down":
|
||||||
server := req.Context().Value(ServerCtxKey).(*Server)
|
server := req.Context().Value(ServerCtxKey).(*Server)
|
||||||
server.shutdownAtMu.RLock()
|
server.shutdownAtMu.RLock()
|
||||||
defer server.shutdownAtMu.RUnlock()
|
defer server.shutdownAtMu.RUnlock()
|
||||||
return !server.shutdownAt.IsZero(), true
|
return !server.shutdownAt.IsZero(), true
|
||||||
case key == "http.time_until_shutdown":
|
case "http.time_until_shutdown":
|
||||||
server := req.Context().Value(ServerCtxKey).(*Server)
|
server := req.Context().Value(ServerCtxKey).(*Server)
|
||||||
server.shutdownAtMu.RLock()
|
server.shutdownAtMu.RLock()
|
||||||
defer server.shutdownAtMu.RUnlock()
|
defer server.shutdownAtMu.RUnlock()
|
||||||
|
|
|
@ -665,9 +665,10 @@ func (h *Handler) UnmarshalCaddyfile(d *caddyfile.Dispenser) error {
|
||||||
if d.NextArg() {
|
if d.NextArg() {
|
||||||
return d.ArgErr()
|
return d.ArgErr()
|
||||||
}
|
}
|
||||||
if subdir == "request_buffers" {
|
switch subdir {
|
||||||
|
case "request_buffers":
|
||||||
h.RequestBuffers = size
|
h.RequestBuffers = size
|
||||||
} else if subdir == "response_buffers" {
|
case "response_buffers":
|
||||||
h.ResponseBuffers = size
|
h.ResponseBuffers = size
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -122,9 +122,10 @@ func cmdReverseProxy(fs caddycmd.Flags) (int, error) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if fromAddr.Port == "" {
|
if fromAddr.Port == "" {
|
||||||
if fromAddr.Scheme == "http" {
|
switch fromAddr.Scheme {
|
||||||
|
case "http":
|
||||||
fromAddr.Port = httpPort
|
fromAddr.Port = httpPort
|
||||||
} else if fromAddr.Scheme == "https" {
|
case "https":
|
||||||
fromAddr.Port = httpsPort
|
fromAddr.Port = httpsPort
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -17,6 +17,7 @@ package fastcgi
|
||||||
import (
|
import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
"slices"
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
@ -314,7 +315,7 @@ func parsePHPFastCGI(h httpcaddyfile.Helper) ([]httpcaddyfile.ConfigValue, error
|
||||||
|
|
||||||
// if the index is turned off, we skip the redirect and try_files
|
// if the index is turned off, we skip the redirect and try_files
|
||||||
if indexFile != "off" {
|
if indexFile != "off" {
|
||||||
dirRedir := false
|
var dirRedir bool
|
||||||
dirIndex := "{http.request.uri.path}/" + indexFile
|
dirIndex := "{http.request.uri.path}/" + indexFile
|
||||||
tryPolicy := "first_exist_fallback"
|
tryPolicy := "first_exist_fallback"
|
||||||
|
|
||||||
|
@ -328,13 +329,7 @@ func parsePHPFastCGI(h httpcaddyfile.Helper) ([]httpcaddyfile.ConfigValue, error
|
||||||
tryPolicy = ""
|
tryPolicy = ""
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, tf := range tryFiles {
|
dirRedir = slices.Contains(tryFiles, dirIndex)
|
||||||
if tf == dirIndex {
|
|
||||||
dirRedir = true
|
|
||||||
|
|
||||||
break
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if dirRedir {
|
if dirRedir {
|
||||||
|
|
|
@ -484,7 +484,7 @@ func (h *Handler) doActiveHealthCheck(dialInfo DialInfo, hostAddr string, networ
|
||||||
|
|
||||||
markHealthy := func() {
|
markHealthy := func() {
|
||||||
// increment passes and then check if it has reached the threshold to be healthy
|
// increment passes and then check if it has reached the threshold to be healthy
|
||||||
err := upstream.Host.countHealthPass(1)
|
err := upstream.countHealthPass(1)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if c := h.HealthChecks.Active.logger.Check(zapcore.ErrorLevel, "could not count active health pass"); c != nil {
|
if c := h.HealthChecks.Active.logger.Check(zapcore.ErrorLevel, "could not count active health pass"); c != nil {
|
||||||
c.Write(
|
c.Write(
|
||||||
|
|
|
@ -353,7 +353,7 @@ func (h *HTTPTransport) NewTransport(caddyCtx caddy.Context) (*http.Transport, e
|
||||||
h.NetworkProxyRaw = caddyconfig.JSONModuleObject(u, "from", "url", nil)
|
h.NetworkProxyRaw = caddyconfig.JSONModuleObject(u, "from", "url", nil)
|
||||||
}
|
}
|
||||||
if len(h.NetworkProxyRaw) != 0 {
|
if len(h.NetworkProxyRaw) != 0 {
|
||||||
proxyMod, err := caddyCtx.LoadModule(h, "ForwardProxyRaw")
|
proxyMod, err := caddyCtx.LoadModule(h, "NetworkProxyRaw")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed to load network_proxy module: %v", err)
|
return nil, fmt.Errorf("failed to load network_proxy module: %v", err)
|
||||||
}
|
}
|
||||||
|
@ -382,6 +382,36 @@ func (h *HTTPTransport) NewTransport(caddyCtx caddy.Context) (*http.Transport, e
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("making TLS client config: %v", err)
|
return nil, fmt.Errorf("making TLS client config: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// servername has a placeholder, so we need to replace it
|
||||||
|
if strings.Contains(h.TLS.ServerName, "{") {
|
||||||
|
rt.DialTLSContext = func(ctx context.Context, network, addr string) (net.Conn, error) {
|
||||||
|
// reuses the dialer from above to establish a plaintext connection
|
||||||
|
conn, err := dialContext(ctx, network, addr)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// but add our own handshake logic
|
||||||
|
repl := ctx.Value(caddy.ReplacerCtxKey).(*caddy.Replacer)
|
||||||
|
tlsConfig := rt.TLSClientConfig.Clone()
|
||||||
|
tlsConfig.ServerName = repl.ReplaceAll(tlsConfig.ServerName, "")
|
||||||
|
tlsConn := tls.Client(conn, tlsConfig)
|
||||||
|
|
||||||
|
// complete the handshake before returning the connection
|
||||||
|
if rt.TLSHandshakeTimeout != 0 {
|
||||||
|
var cancel context.CancelFunc
|
||||||
|
ctx, cancel = context.WithTimeout(ctx, rt.TLSHandshakeTimeout)
|
||||||
|
defer cancel()
|
||||||
|
}
|
||||||
|
err = tlsConn.HandshakeContext(ctx)
|
||||||
|
if err != nil {
|
||||||
|
_ = tlsConn.Close()
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return tlsConn, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if h.KeepAlive != nil {
|
if h.KeepAlive != nil {
|
||||||
|
@ -453,45 +483,9 @@ func (h *HTTPTransport) NewTransport(caddyCtx caddy.Context) (*http.Transport, e
|
||||||
return rt, nil
|
return rt, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// replaceTLSServername checks TLS servername to see if it needs replacing
|
|
||||||
// if it does need replacing, it creates a new cloned HTTPTransport object to avoid any races
|
|
||||||
// and does the replacing of the TLS servername on that and returns the new object
|
|
||||||
// if no replacement is necessary it returns the original
|
|
||||||
func (h *HTTPTransport) replaceTLSServername(repl *caddy.Replacer) *HTTPTransport {
|
|
||||||
// check whether we have TLS and need to replace the servername in the TLSClientConfig
|
|
||||||
if h.TLSEnabled() && strings.Contains(h.TLS.ServerName, "{") {
|
|
||||||
// make a new h, "copy" the parts we don't need to touch, add a new *tls.Config and replace servername
|
|
||||||
newtransport := &HTTPTransport{
|
|
||||||
Resolver: h.Resolver,
|
|
||||||
TLS: h.TLS,
|
|
||||||
KeepAlive: h.KeepAlive,
|
|
||||||
Compression: h.Compression,
|
|
||||||
MaxConnsPerHost: h.MaxConnsPerHost,
|
|
||||||
DialTimeout: h.DialTimeout,
|
|
||||||
FallbackDelay: h.FallbackDelay,
|
|
||||||
ResponseHeaderTimeout: h.ResponseHeaderTimeout,
|
|
||||||
ExpectContinueTimeout: h.ExpectContinueTimeout,
|
|
||||||
MaxResponseHeaderSize: h.MaxResponseHeaderSize,
|
|
||||||
WriteBufferSize: h.WriteBufferSize,
|
|
||||||
ReadBufferSize: h.ReadBufferSize,
|
|
||||||
Versions: h.Versions,
|
|
||||||
Transport: h.Transport.Clone(),
|
|
||||||
h2cTransport: h.h2cTransport,
|
|
||||||
}
|
|
||||||
newtransport.Transport.TLSClientConfig.ServerName = repl.ReplaceAll(newtransport.Transport.TLSClientConfig.ServerName, "")
|
|
||||||
return newtransport
|
|
||||||
}
|
|
||||||
|
|
||||||
return h
|
|
||||||
}
|
|
||||||
|
|
||||||
// RoundTrip implements http.RoundTripper.
|
// RoundTrip implements http.RoundTripper.
|
||||||
func (h *HTTPTransport) RoundTrip(req *http.Request) (*http.Response, error) {
|
func (h *HTTPTransport) RoundTrip(req *http.Request) (*http.Response, error) {
|
||||||
// Try to replace TLS servername if needed
|
h.SetScheme(req)
|
||||||
repl := req.Context().Value(caddy.ReplacerCtxKey).(*caddy.Replacer)
|
|
||||||
transport := h.replaceTLSServername(repl)
|
|
||||||
|
|
||||||
transport.SetScheme(req)
|
|
||||||
|
|
||||||
// use HTTP/3 if enabled (TODO: This is EXPERIMENTAL)
|
// use HTTP/3 if enabled (TODO: This is EXPERIMENTAL)
|
||||||
if h.h3Transport != nil {
|
if h.h3Transport != nil {
|
||||||
|
@ -507,7 +501,7 @@ func (h *HTTPTransport) RoundTrip(req *http.Request) (*http.Response, error) {
|
||||||
return h.h2cTransport.RoundTrip(req)
|
return h.h2cTransport.RoundTrip(req)
|
||||||
}
|
}
|
||||||
|
|
||||||
return transport.Transport.RoundTrip(req)
|
return h.Transport.RoundTrip(req)
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetScheme ensures that the outbound request req
|
// SetScheme ensures that the outbound request req
|
||||||
|
@ -534,13 +528,7 @@ func (h *HTTPTransport) shouldUseTLS(req *http.Request) bool {
|
||||||
}
|
}
|
||||||
|
|
||||||
port := req.URL.Port()
|
port := req.URL.Port()
|
||||||
for i := range h.TLS.ExceptPorts {
|
return !slices.Contains(h.TLS.ExceptPorts, port)
|
||||||
if h.TLS.ExceptPorts[i] == port {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return true
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// TLSEnabled returns true if TLS is enabled.
|
// TLSEnabled returns true if TLS is enabled.
|
||||||
|
@ -652,7 +640,7 @@ func (t *TLSConfig) MakeTLSClientConfig(ctx caddy.Context) (*tls.Config, error)
|
||||||
return nil, fmt.Errorf("getting tls app: %v", err)
|
return nil, fmt.Errorf("getting tls app: %v", err)
|
||||||
}
|
}
|
||||||
tlsApp := tlsAppIface.(*caddytls.TLS)
|
tlsApp := tlsAppIface.(*caddytls.TLS)
|
||||||
err = tlsApp.Manage([]string{t.ClientCertificateAutomate})
|
err = tlsApp.Manage(map[string]struct{}{t.ClientCertificateAutomate: {}})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("managing client certificate: %v", err)
|
return nil, fmt.Errorf("managing client certificate: %v", err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -1150,7 +1150,7 @@ func (lb LoadBalancing) tryAgain(ctx caddy.Context, start time.Time, retries int
|
||||||
// we have to assume the upstream received the request, and
|
// we have to assume the upstream received the request, and
|
||||||
// retries need to be carefully decided, because some requests
|
// retries need to be carefully decided, because some requests
|
||||||
// are not idempotent
|
// are not idempotent
|
||||||
if !isDialError && !(isHandlerError && errors.Is(herr, errNoUpstream)) {
|
if !isDialError && (!isHandlerError || !errors.Is(herr, errNoUpstream)) {
|
||||||
if lb.RetryMatch == nil && req.Method != "GET" {
|
if lb.RetryMatch == nil && req.Method != "GET" {
|
||||||
// by default, don't retry requests if they aren't GET
|
// by default, don't retry requests if they aren't GET
|
||||||
return false
|
return false
|
||||||
|
|
|
@ -808,7 +808,7 @@ func leastRequests(upstreams []*Upstream) *Upstream {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
var best []*Upstream
|
var best []*Upstream
|
||||||
var bestReqs int = -1
|
bestReqs := -1
|
||||||
for _, upstream := range upstreams {
|
for _, upstream := range upstreams {
|
||||||
if upstream == nil {
|
if upstream == nil {
|
||||||
continue
|
continue
|
||||||
|
|
|
@ -52,5 +52,4 @@ func TestResolveIpVersion(t *testing.T) {
|
||||||
t.Errorf("resolveIpVersion(): Expected %s got %s", test.expectedIpVersion, ipVersion)
|
t.Errorf("resolveIpVersion(): Expected %s got %s", test.expectedIpVersion, ipVersion)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -377,11 +377,7 @@ func buildQueryString(qs string, repl *caddy.Replacer) string {
|
||||||
// performed in normalized/unescaped space.
|
// performed in normalized/unescaped space.
|
||||||
func trimPathPrefix(escapedPath, prefix string) string {
|
func trimPathPrefix(escapedPath, prefix string) string {
|
||||||
var iPath, iPrefix int
|
var iPath, iPrefix int
|
||||||
for {
|
for iPath < len(escapedPath) && iPrefix < len(prefix) {
|
||||||
if iPath >= len(escapedPath) || iPrefix >= len(prefix) {
|
|
||||||
break
|
|
||||||
}
|
|
||||||
|
|
||||||
prefixCh := prefix[iPrefix]
|
prefixCh := prefix[iPrefix]
|
||||||
ch := string(escapedPath[iPath])
|
ch := string(escapedPath[iPath])
|
||||||
|
|
||||||
|
|
|
@ -171,6 +171,7 @@ func BenchmarkServer_LogRequest_WithTrace(b *testing.B) {
|
||||||
s.logRequest(accLog, req, wrec, &duration, repl, bodyReader, false)
|
s.logRequest(accLog, req, wrec, &duration, repl, bodyReader, false)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestServer_TrustedRealClientIP_NoTrustedHeaders(t *testing.T) {
|
func TestServer_TrustedRealClientIP_NoTrustedHeaders(t *testing.T) {
|
||||||
req := httptest.NewRequest("GET", "/", nil)
|
req := httptest.NewRequest("GET", "/", nil)
|
||||||
req.RemoteAddr = "192.0.2.1:12345"
|
req.RemoteAddr = "192.0.2.1:12345"
|
||||||
|
|
|
@ -22,6 +22,7 @@ import (
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/textproto"
|
"net/textproto"
|
||||||
"os"
|
"os"
|
||||||
|
"slices"
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
"text/template"
|
"text/template"
|
||||||
|
@ -323,13 +324,7 @@ func cmdRespond(fl caddycmd.Flags) (int, error) {
|
||||||
|
|
||||||
// figure out if status code was explicitly specified; this lets
|
// figure out if status code was explicitly specified; this lets
|
||||||
// us set a non-zero value as the default but is a little hacky
|
// us set a non-zero value as the default but is a little hacky
|
||||||
var statusCodeFlagSpecified bool
|
statusCodeFlagSpecified := slices.Contains(os.Args, "--status")
|
||||||
for _, fl := range os.Args {
|
|
||||||
if fl == "--status" {
|
|
||||||
statusCodeFlagSpecified = true
|
|
||||||
break
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// try to determine what kind of parameter the unnamed argument is
|
// try to determine what kind of parameter the unnamed argument is
|
||||||
if arg != "" {
|
if arg != "" {
|
||||||
|
|
|
@ -91,8 +91,7 @@ func parseACMEServer(h httpcaddyfile.Helper) ([]httpcaddyfile.ConfigValue, error
|
||||||
acmeServer.Policy.AllowWildcardNames = true
|
acmeServer.Policy.AllowWildcardNames = true
|
||||||
case "allow":
|
case "allow":
|
||||||
r := &RuleSet{}
|
r := &RuleSet{}
|
||||||
for h.Next() {
|
for nesting := h.Nesting(); h.NextBlock(nesting); {
|
||||||
for h.NextBlock(h.Nesting() - 1) {
|
|
||||||
if h.CountRemainingArgs() == 0 {
|
if h.CountRemainingArgs() == 0 {
|
||||||
return nil, h.ArgErr() // TODO:
|
return nil, h.ArgErr() // TODO:
|
||||||
}
|
}
|
||||||
|
@ -105,15 +104,13 @@ func parseACMEServer(h httpcaddyfile.Helper) ([]httpcaddyfile.ConfigValue, error
|
||||||
return nil, h.Errf("unrecognized 'allow' subdirective: %s", h.Val())
|
return nil, h.Errf("unrecognized 'allow' subdirective: %s", h.Val())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
|
||||||
if acmeServer.Policy == nil {
|
if acmeServer.Policy == nil {
|
||||||
acmeServer.Policy = &Policy{}
|
acmeServer.Policy = &Policy{}
|
||||||
}
|
}
|
||||||
acmeServer.Policy.Allow = r
|
acmeServer.Policy.Allow = r
|
||||||
case "deny":
|
case "deny":
|
||||||
r := &RuleSet{}
|
r := &RuleSet{}
|
||||||
for h.Next() {
|
for nesting := h.Nesting(); h.NextBlock(nesting); {
|
||||||
for h.NextBlock(h.Nesting() - 1) {
|
|
||||||
if h.CountRemainingArgs() == 0 {
|
if h.CountRemainingArgs() == 0 {
|
||||||
return nil, h.ArgErr() // TODO:
|
return nil, h.ArgErr() // TODO:
|
||||||
}
|
}
|
||||||
|
@ -126,7 +123,6 @@ func parseACMEServer(h httpcaddyfile.Helper) ([]httpcaddyfile.ConfigValue, error
|
||||||
return nil, h.Errf("unrecognized 'deny' subdirective: %s", h.Val())
|
return nil, h.Errf("unrecognized 'deny' subdirective: %s", h.Val())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
|
||||||
if acmeServer.Policy == nil {
|
if acmeServer.Policy == nil {
|
||||||
acmeServer.Policy = &Policy{}
|
acmeServer.Policy = &Policy{}
|
||||||
}
|
}
|
||||||
|
|
|
@ -220,7 +220,7 @@ func (iss *ACMEIssuer) makeIssuerTemplate(ctx caddy.Context) (certmagic.ACMEIssu
|
||||||
}
|
}
|
||||||
|
|
||||||
if len(iss.NetworkProxyRaw) != 0 {
|
if len(iss.NetworkProxyRaw) != 0 {
|
||||||
proxyMod, err := ctx.LoadModule(iss, "ForwardProxyRaw")
|
proxyMod, err := ctx.LoadModule(iss, "NetworkProxyRaw")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return template, fmt.Errorf("failed to load network_proxy module: %v", err)
|
return template, fmt.Errorf("failed to load network_proxy module: %v", err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -388,10 +388,8 @@ func (ap *AutomationPolicy) onlyInternalIssuer() bool {
|
||||||
// isWildcardOrDefault determines if the subjects include any wildcard domains,
|
// isWildcardOrDefault determines if the subjects include any wildcard domains,
|
||||||
// or is the "default" policy (i.e. no subjects) which is unbounded.
|
// or is the "default" policy (i.e. no subjects) which is unbounded.
|
||||||
func (ap *AutomationPolicy) isWildcardOrDefault() bool {
|
func (ap *AutomationPolicy) isWildcardOrDefault() bool {
|
||||||
isWildcardOrDefault := false
|
isWildcardOrDefault := len(ap.subjects) == 0
|
||||||
if len(ap.subjects) == 0 {
|
|
||||||
isWildcardOrDefault = true
|
|
||||||
}
|
|
||||||
for _, sub := range ap.subjects {
|
for _, sub := range ap.subjects {
|
||||||
if strings.HasPrefix(sub, "*") {
|
if strings.HasPrefix(sub, "*") {
|
||||||
isWildcardOrDefault = true
|
isWildcardOrDefault = true
|
||||||
|
|
|
@ -5,6 +5,7 @@ import (
|
||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/url"
|
"net/url"
|
||||||
"strings"
|
"strings"
|
||||||
|
@ -143,6 +144,10 @@ func (hcg HTTPCertGetter) GetCertificate(ctx context.Context, hello *tls.ClientH
|
||||||
qs.Set("server_name", hello.ServerName)
|
qs.Set("server_name", hello.ServerName)
|
||||||
qs.Set("signature_schemes", strings.Join(sigs, ","))
|
qs.Set("signature_schemes", strings.Join(sigs, ","))
|
||||||
qs.Set("cipher_suites", strings.Join(suites, ","))
|
qs.Set("cipher_suites", strings.Join(suites, ","))
|
||||||
|
localIP, _, err := net.SplitHostPort(hello.Conn.LocalAddr().String())
|
||||||
|
if err == nil && localIP != "" {
|
||||||
|
qs.Set("local_ip", localIP)
|
||||||
|
}
|
||||||
parsed.RawQuery = qs.Encode()
|
parsed.RawQuery = qs.Encode()
|
||||||
|
|
||||||
req, err := http.NewRequestWithContext(hcg.ctx, http.MethodGet, parsed.String(), nil)
|
req, err := http.NewRequestWithContext(hcg.ctx, http.MethodGet, parsed.String(), nil)
|
||||||
|
|
|
@ -87,13 +87,7 @@ nextChoice:
|
||||||
}
|
}
|
||||||
|
|
||||||
if len(p.AnyTag) > 0 {
|
if len(p.AnyTag) > 0 {
|
||||||
var found bool
|
found := slices.ContainsFunc(p.AnyTag, cert.HasTag)
|
||||||
for _, tag := range p.AnyTag {
|
|
||||||
if cert.HasTag(tag) {
|
|
||||||
found = true
|
|
||||||
break
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if !found {
|
if !found {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
|
@ -24,6 +24,8 @@ import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"os"
|
"os"
|
||||||
|
"reflect"
|
||||||
|
"slices"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/mholt/acmez/v3"
|
"github.com/mholt/acmez/v3"
|
||||||
|
@ -368,13 +370,7 @@ func (p *ConnectionPolicy) buildStandardTLSConfig(ctx caddy.Context) error {
|
||||||
}
|
}
|
||||||
|
|
||||||
// ensure ALPN includes the ACME TLS-ALPN protocol
|
// ensure ALPN includes the ACME TLS-ALPN protocol
|
||||||
var alpnFound bool
|
alpnFound := slices.Contains(p.ALPN, acmez.ACMETLS1Protocol)
|
||||||
for _, a := range p.ALPN {
|
|
||||||
if a == acmez.ACMETLS1Protocol {
|
|
||||||
alpnFound = true
|
|
||||||
break
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if !alpnFound && (cfg.NextProtos == nil || len(cfg.NextProtos) > 0) {
|
if !alpnFound && (cfg.NextProtos == nil || len(cfg.NextProtos) > 0) {
|
||||||
cfg.NextProtos = append(cfg.NextProtos, acmez.ACMETLS1Protocol)
|
cfg.NextProtos = append(cfg.NextProtos, acmez.ACMETLS1Protocol)
|
||||||
}
|
}
|
||||||
|
@ -461,6 +457,14 @@ func (p ConnectionPolicy) SettingsEmpty() bool {
|
||||||
p.InsecureSecretsLog == ""
|
p.InsecureSecretsLog == ""
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// SettingsEmpty returns true if p's settings (fields
|
||||||
|
// except the matchers) are the same as q.
|
||||||
|
func (p ConnectionPolicy) SettingsEqual(q ConnectionPolicy) bool {
|
||||||
|
p.MatchersRaw = nil
|
||||||
|
q.MatchersRaw = nil
|
||||||
|
return reflect.DeepEqual(p, q)
|
||||||
|
}
|
||||||
|
|
||||||
// UnmarshalCaddyfile sets up the ConnectionPolicy from Caddyfile tokens. Syntax:
|
// UnmarshalCaddyfile sets up the ConnectionPolicy from Caddyfile tokens. Syntax:
|
||||||
//
|
//
|
||||||
// connection_policy {
|
// connection_policy {
|
||||||
|
@ -1037,11 +1041,9 @@ func (l LeafCertClientAuth) VerifyClientCertificate(rawCerts [][]byte, _ [][]*x5
|
||||||
return fmt.Errorf("can't parse the given certificate: %s", err.Error())
|
return fmt.Errorf("can't parse the given certificate: %s", err.Error())
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, trustedLeafCert := range l.trustedLeafCerts {
|
if slices.ContainsFunc(l.trustedLeafCerts, remoteLeafCert.Equal) {
|
||||||
if remoteLeafCert.Equal(trustedLeafCert) {
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
return fmt.Errorf("client leaf certificate failed validation")
|
return fmt.Errorf("client leaf certificate failed validation")
|
||||||
}
|
}
|
||||||
|
|
|
@ -138,7 +138,6 @@ func (ech *ECH) Provision(ctx caddy.Context) ([]string, error) {
|
||||||
// all existing configs are now loaded; see if we need to make any new ones
|
// all existing configs are now loaded; see if we need to make any new ones
|
||||||
// based on the input configuration, and also mark the most recent one(s) as
|
// based on the input configuration, and also mark the most recent one(s) as
|
||||||
// current/active, so they can be used for ECH retries
|
// current/active, so they can be used for ECH retries
|
||||||
|
|
||||||
for _, cfg := range ech.Configs {
|
for _, cfg := range ech.Configs {
|
||||||
publicName := strings.ToLower(strings.TrimSpace(cfg.PublicName))
|
publicName := strings.ToLower(strings.TrimSpace(cfg.PublicName))
|
||||||
|
|
||||||
|
@ -279,7 +278,7 @@ func (t *TLS) publishECHConfigs() error {
|
||||||
// if all the (inner) domains have had this ECH config list published
|
// if all the (inner) domains have had this ECH config list published
|
||||||
// by this publisher, then try the next publication config
|
// by this publisher, then try the next publication config
|
||||||
if len(serverNamesSet) == 0 {
|
if len(serverNamesSet) == 0 {
|
||||||
logger.Debug("ECH config list already published by publisher for associated domains",
|
logger.Debug("ECH config list already published by publisher for associated domains (or no domains to publish for)",
|
||||||
zap.Uint8s("config_ids", configIDs),
|
zap.Uint8s("config_ids", configIDs),
|
||||||
zap.String("publisher", publisherKey))
|
zap.String("publisher", publisherKey))
|
||||||
continue
|
continue
|
||||||
|
@ -300,7 +299,7 @@ func (t *TLS) publishECHConfigs() error {
|
||||||
err := publisher.PublishECHConfigList(t.ctx, dnsNamesToPublish, echCfgListBin)
|
err := publisher.PublishECHConfigList(t.ctx, dnsNamesToPublish, echCfgListBin)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
t.logger.Info("published ECH configuration list",
|
t.logger.Info("published ECH configuration list",
|
||||||
zap.Strings("domains", publication.Domains),
|
zap.Strings("domains", dnsNamesToPublish),
|
||||||
zap.Uint8s("config_ids", configIDs),
|
zap.Uint8s("config_ids", configIDs),
|
||||||
zap.Error(err))
|
zap.Error(err))
|
||||||
// update publication history, so that we don't unnecessarily republish every time
|
// update publication history, so that we don't unnecessarily republish every time
|
||||||
|
@ -390,17 +389,22 @@ func loadECHConfig(ctx caddy.Context, configID string) (echConfig, error) {
|
||||||
return echConfig{}, nil
|
return echConfig{}, nil
|
||||||
}
|
}
|
||||||
metaBytes, err := storage.Load(ctx, metaKey)
|
metaBytes, err := storage.Load(ctx, metaKey)
|
||||||
if err != nil {
|
if errors.Is(err, fs.ErrNotExist) {
|
||||||
|
logger.Warn("ECH config metadata file missing; will recreate at next publication",
|
||||||
|
zap.String("config_id", configID),
|
||||||
|
zap.Error(err))
|
||||||
|
} else if err != nil {
|
||||||
delErr := storage.Delete(ctx, cfgIDKey)
|
delErr := storage.Delete(ctx, cfgIDKey)
|
||||||
if delErr != nil {
|
if delErr != nil {
|
||||||
return echConfig{}, fmt.Errorf("error loading ECH metadata (%v) and cleaning up parent storage key %s: %v", err, cfgIDKey, delErr)
|
return echConfig{}, fmt.Errorf("error loading ECH config metadata (%v) and cleaning up parent storage key %s: %v", err, cfgIDKey, delErr)
|
||||||
}
|
}
|
||||||
logger.Warn("could not load ECH metadata; deleted its config folder",
|
logger.Warn("could not load ECH config metadata; deleted its folder",
|
||||||
zap.String("config_id", configID),
|
zap.String("config_id", configID),
|
||||||
zap.Error(err))
|
zap.Error(err))
|
||||||
return echConfig{}, nil
|
return echConfig{}, nil
|
||||||
}
|
}
|
||||||
var meta echConfigMeta
|
var meta echConfigMeta
|
||||||
|
if len(metaBytes) > 0 {
|
||||||
if err := json.Unmarshal(metaBytes, &meta); err != nil {
|
if err := json.Unmarshal(metaBytes, &meta); err != nil {
|
||||||
// even though it's just metadata, reset the whole config since we can't reliably maintain it
|
// even though it's just metadata, reset the whole config since we can't reliably maintain it
|
||||||
delErr := storage.Delete(ctx, cfgIDKey)
|
delErr := storage.Delete(ctx, cfgIDKey)
|
||||||
|
@ -412,6 +416,7 @@ func loadECHConfig(ctx caddy.Context, configID string) (echConfig, error) {
|
||||||
zap.Error(err))
|
zap.Error(err))
|
||||||
return echConfig{}, nil
|
return echConfig{}, nil
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
cfg.privKeyBin = privKeyBytes
|
cfg.privKeyBin = privKeyBytes
|
||||||
cfg.configBin = echConfigBytes
|
cfg.configBin = echConfigBytes
|
||||||
|
@ -701,7 +706,7 @@ nextName:
|
||||||
// HTTPS and SVCB RRs: RFC 9460 (https://www.rfc-editor.org/rfc/rfc9460)
|
// HTTPS and SVCB RRs: RFC 9460 (https://www.rfc-editor.org/rfc/rfc9460)
|
||||||
Scheme: "https",
|
Scheme: "https",
|
||||||
Name: relName,
|
Name: relName,
|
||||||
TTL: 1 * time.Minute, // TODO: for testing only
|
TTL: 5 * time.Minute, // TODO: low hard-coded value only temporary; change to a higher value once more field-tested and key rotation is implemented
|
||||||
Priority: 2, // allows a manual override with priority 1
|
Priority: 2, // allows a manual override with priority 1
|
||||||
Target: ".",
|
Target: ".",
|
||||||
Params: params,
|
Params: params,
|
||||||
|
|
|
@ -33,6 +33,7 @@ import (
|
||||||
"go.uber.org/zap/zapcore"
|
"go.uber.org/zap/zapcore"
|
||||||
|
|
||||||
"github.com/caddyserver/caddy/v2"
|
"github.com/caddyserver/caddy/v2"
|
||||||
|
"github.com/caddyserver/caddy/v2/internal"
|
||||||
"github.com/caddyserver/caddy/v2/modules/caddyevents"
|
"github.com/caddyserver/caddy/v2/modules/caddyevents"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -55,8 +56,10 @@ type TLS struct {
|
||||||
//
|
//
|
||||||
// The "automate" certificate loader module can be used to
|
// The "automate" certificate loader module can be used to
|
||||||
// specify a list of subjects that need certificates to be
|
// specify a list of subjects that need certificates to be
|
||||||
// managed automatically. The first matching automation
|
// managed automatically, including subdomains that may
|
||||||
// policy will be applied to manage the certificate(s).
|
// already be covered by a managed wildcard certificate.
|
||||||
|
// The first matching automation policy will be used
|
||||||
|
// to manage automated certificate(s).
|
||||||
//
|
//
|
||||||
// All loaded certificates get pooled
|
// All loaded certificates get pooled
|
||||||
// into the same cache and may be used to complete TLS
|
// into the same cache and may be used to complete TLS
|
||||||
|
@ -123,7 +126,7 @@ type TLS struct {
|
||||||
dns any // technically, it should be any/all of the libdns interfaces (RecordSetter, RecordAppender, etc.)
|
dns any // technically, it should be any/all of the libdns interfaces (RecordSetter, RecordAppender, etc.)
|
||||||
|
|
||||||
certificateLoaders []CertificateLoader
|
certificateLoaders []CertificateLoader
|
||||||
automateNames []string
|
automateNames map[string]struct{}
|
||||||
ctx caddy.Context
|
ctx caddy.Context
|
||||||
storageCleanTicker *time.Ticker
|
storageCleanTicker *time.Ticker
|
||||||
storageCleanStop chan struct{}
|
storageCleanStop chan struct{}
|
||||||
|
@ -218,12 +221,13 @@ func (t *TLS) Provision(ctx caddy.Context) error {
|
||||||
// special case; these will be loaded in later using our automation facilities,
|
// special case; these will be loaded in later using our automation facilities,
|
||||||
// which we want to avoid doing during provisioning
|
// which we want to avoid doing during provisioning
|
||||||
if automateNames, ok := modIface.(*AutomateLoader); ok && automateNames != nil {
|
if automateNames, ok := modIface.(*AutomateLoader); ok && automateNames != nil {
|
||||||
repl := caddy.NewReplacer()
|
if t.automateNames == nil {
|
||||||
subjects := make([]string, len(*automateNames))
|
t.automateNames = make(map[string]struct{})
|
||||||
for i, sub := range *automateNames {
|
}
|
||||||
subjects[i] = repl.ReplaceAll(sub, "")
|
repl := caddy.NewReplacer()
|
||||||
|
for _, sub := range *automateNames {
|
||||||
|
t.automateNames[repl.ReplaceAll(sub, "")] = struct{}{}
|
||||||
}
|
}
|
||||||
t.automateNames = append(t.automateNames, subjects...)
|
|
||||||
} else {
|
} else {
|
||||||
return fmt.Errorf("loading certificates with 'automate' requires array of strings, got: %T", modIface)
|
return fmt.Errorf("loading certificates with 'automate' requires array of strings, got: %T", modIface)
|
||||||
}
|
}
|
||||||
|
@ -283,7 +287,7 @@ func (t *TLS) Provision(ctx caddy.Context) error {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("provisioning default public automation policy: %v", err)
|
return fmt.Errorf("provisioning default public automation policy: %v", err)
|
||||||
}
|
}
|
||||||
for _, n := range t.automateNames {
|
for n := range t.automateNames {
|
||||||
// if any names specified by the "automate" loader do not qualify for a public
|
// if any names specified by the "automate" loader do not qualify for a public
|
||||||
// certificate, we should initialize a default internal automation policy
|
// certificate, we should initialize a default internal automation policy
|
||||||
// (but we don't want to do this unnecessarily, since it may prompt for password!)
|
// (but we don't want to do this unnecessarily, since it may prompt for password!)
|
||||||
|
@ -339,8 +343,14 @@ func (t *TLS) Provision(ctx caddy.Context) error {
|
||||||
|
|
||||||
// outer names should have certificates to reduce client brittleness
|
// outer names should have certificates to reduce client brittleness
|
||||||
for _, outerName := range outerNames {
|
for _, outerName := range outerNames {
|
||||||
|
if outerName == "" {
|
||||||
|
continue
|
||||||
|
}
|
||||||
if !t.HasCertificateForSubject(outerName) {
|
if !t.HasCertificateForSubject(outerName) {
|
||||||
t.automateNames = append(t.automateNames, outerNames...)
|
if t.automateNames == nil {
|
||||||
|
t.automateNames = make(map[string]struct{})
|
||||||
|
}
|
||||||
|
t.automateNames[outerName] = struct{}{}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -449,7 +459,8 @@ func (t *TLS) Cleanup() error {
|
||||||
// app instance (which is being stopped) that are not managed or loaded by the
|
// app instance (which is being stopped) that are not managed or loaded by the
|
||||||
// new app instance (which just started), and remove them from the cache
|
// new app instance (which just started), and remove them from the cache
|
||||||
var noLongerManaged []certmagic.SubjectIssuer
|
var noLongerManaged []certmagic.SubjectIssuer
|
||||||
var reManage, noLongerLoaded []string
|
var noLongerLoaded []string
|
||||||
|
reManage := make(map[string]struct{})
|
||||||
for subj, currentIssuerKey := range t.managing {
|
for subj, currentIssuerKey := range t.managing {
|
||||||
// It's a bit nuanced: managed certs can sometimes be different enough that we have to
|
// It's a bit nuanced: managed certs can sometimes be different enough that we have to
|
||||||
// swap them out for a different one, even if they are for the same subject/domain.
|
// swap them out for a different one, even if they are for the same subject/domain.
|
||||||
|
@ -467,7 +478,7 @@ func (t *TLS) Cleanup() error {
|
||||||
|
|
||||||
// then, if the next app is managing a cert for this name, but with a different issuer, re-manage it
|
// then, if the next app is managing a cert for this name, but with a different issuer, re-manage it
|
||||||
if ok && nextIssuerKey != currentIssuerKey {
|
if ok && nextIssuerKey != currentIssuerKey {
|
||||||
reManage = append(reManage, subj)
|
reManage[subj] = struct{}{}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -488,7 +499,7 @@ func (t *TLS) Cleanup() error {
|
||||||
if err := nextTLSApp.Manage(reManage); err != nil {
|
if err := nextTLSApp.Manage(reManage); err != nil {
|
||||||
if c := t.logger.Check(zapcore.ErrorLevel, "re-managing unloaded certificates with new config"); c != nil {
|
if c := t.logger.Check(zapcore.ErrorLevel, "re-managing unloaded certificates with new config"); c != nil {
|
||||||
c.Write(
|
c.Write(
|
||||||
zap.Strings("subjects", reManage),
|
zap.Strings("subjects", internal.MaxSizeSubjectsListForLog(reManage, 1000)),
|
||||||
zap.Error(err),
|
zap.Error(err),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
@ -509,17 +520,31 @@ func (t *TLS) Cleanup() error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Manage immediately begins managing names according to the
|
// Manage immediately begins managing subjects according to the
|
||||||
// matching automation policy.
|
// matching automation policy. The subjects are given in a map
|
||||||
func (t *TLS) Manage(names []string) error {
|
// to prevent duplication and also because quick lookups are
|
||||||
|
// needed to assess wildcard coverage, if any, depending on
|
||||||
|
// certain config parameters (with lots of subjects, computing
|
||||||
|
// wildcard coverage over a slice can be highly inefficient).
|
||||||
|
func (t *TLS) Manage(subjects map[string]struct{}) error {
|
||||||
// for a large number of names, we can be more memory-efficient
|
// for a large number of names, we can be more memory-efficient
|
||||||
// by making only one certmagic.Config for all the names that
|
// by making only one certmagic.Config for all the names that
|
||||||
// use that config, rather than calling ManageAsync once for
|
// use that config, rather than calling ManageAsync once for
|
||||||
// every name; so first, bin names by AutomationPolicy
|
// every name; so first, bin names by AutomationPolicy
|
||||||
policyToNames := make(map[*AutomationPolicy][]string)
|
policyToNames := make(map[*AutomationPolicy][]string)
|
||||||
for _, name := range names {
|
for subj := range subjects {
|
||||||
ap := t.getAutomationPolicyForName(name)
|
ap := t.getAutomationPolicyForName(subj)
|
||||||
policyToNames[ap] = append(policyToNames[ap], name)
|
// by default, if a wildcard that covers the subj is also being
|
||||||
|
// managed, either by a previous call to Manage or by this one,
|
||||||
|
// prefer using that over individual certs for its subdomains;
|
||||||
|
// but users can disable this and force getting a certificate for
|
||||||
|
// subdomains by adding the name to the 'automate' cert loader
|
||||||
|
if t.managingWildcardFor(subj, subjects) {
|
||||||
|
if _, ok := t.automateNames[subj]; !ok {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
}
|
||||||
|
policyToNames[ap] = append(policyToNames[ap], subj)
|
||||||
}
|
}
|
||||||
|
|
||||||
// now that names are grouped by policy, we can simply make one
|
// now that names are grouped by policy, we can simply make one
|
||||||
|
@ -530,7 +555,7 @@ func (t *TLS) Manage(names []string) error {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
const maxNamesToDisplay = 100
|
const maxNamesToDisplay = 100
|
||||||
if len(names) > maxNamesToDisplay {
|
if len(names) > maxNamesToDisplay {
|
||||||
names = append(names[:maxNamesToDisplay], fmt.Sprintf("(%d more...)", len(names)-maxNamesToDisplay))
|
names = append(names[:maxNamesToDisplay], fmt.Sprintf("(and %d more...)", len(names)-maxNamesToDisplay))
|
||||||
}
|
}
|
||||||
return fmt.Errorf("automate: manage %v: %v", names, err)
|
return fmt.Errorf("automate: manage %v: %v", names, err)
|
||||||
}
|
}
|
||||||
|
@ -555,6 +580,43 @@ func (t *TLS) Manage(names []string) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// managingWildcardFor returns true if the app is managing a certificate that covers that
|
||||||
|
// subject name (including consideration of wildcards), either from its internal list of
|
||||||
|
// names that it IS managing certs for, or from the otherSubjsToManage which includes names
|
||||||
|
// that WILL be managed.
|
||||||
|
func (t *TLS) managingWildcardFor(subj string, otherSubjsToManage map[string]struct{}) bool {
|
||||||
|
// TODO: we could also consider manually-loaded certs using t.HasCertificateForSubject(),
|
||||||
|
// but that does not account for how manually-loaded certs may be restricted as to which
|
||||||
|
// hostnames or ClientHellos they can be used with by tags, etc; I don't *think* anyone
|
||||||
|
// necessarily wants this anyway, but I thought I'd note this here for now (if we did
|
||||||
|
// consider manually-loaded certs, we'd probably want to rename the method since it
|
||||||
|
// wouldn't be just about managed certs anymore)
|
||||||
|
|
||||||
|
// IP addresses must match exactly
|
||||||
|
if ip := net.ParseIP(subj); ip != nil {
|
||||||
|
_, managing := t.managing[subj]
|
||||||
|
return managing
|
||||||
|
}
|
||||||
|
|
||||||
|
// replace labels of the domain with wildcards until we get a match
|
||||||
|
labels := strings.Split(subj, ".")
|
||||||
|
for i := range labels {
|
||||||
|
if labels[i] == "*" {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
labels[i] = "*"
|
||||||
|
candidate := strings.Join(labels, ".")
|
||||||
|
if _, ok := t.managing[candidate]; ok {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
if _, ok := otherSubjsToManage[candidate]; ok {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
// RegisterServerNames registers the provided DNS names with the TLS app.
|
// RegisterServerNames registers the provided DNS names with the TLS app.
|
||||||
// This is currently used to auto-publish Encrypted ClientHello (ECH)
|
// This is currently used to auto-publish Encrypted ClientHello (ECH)
|
||||||
// configurations, if enabled. Use of this function by apps using the TLS
|
// configurations, if enabled. Use of this function by apps using the TLS
|
||||||
|
|
|
@ -317,7 +317,7 @@ func TestFileModeToJSON(t *testing.T) {
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "none zero",
|
name: "none zero",
|
||||||
mode: 0644,
|
mode: 0o644,
|
||||||
want: `"0644"`,
|
want: `"0644"`,
|
||||||
wantErr: false,
|
wantErr: false,
|
||||||
},
|
},
|
||||||
|
@ -358,7 +358,7 @@ func TestFileModeModification(t *testing.T) {
|
||||||
defer os.RemoveAll(dir)
|
defer os.RemoveAll(dir)
|
||||||
|
|
||||||
fpath := path.Join(dir, "test.log")
|
fpath := path.Join(dir, "test.log")
|
||||||
f_tmp, err := os.OpenFile(fpath, os.O_WRONLY|os.O_APPEND|os.O_CREATE, os.FileMode(0600))
|
f_tmp, err := os.OpenFile(fpath, os.O_WRONLY|os.O_APPEND|os.O_CREATE, os.FileMode(0o600))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("failed to create test file: %v", err)
|
t.Fatalf("failed to create test file: %v", err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,9 +3,10 @@ package logging
|
||||||
import (
|
import (
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
"go.uber.org/zap/zapcore"
|
||||||
|
|
||||||
"github.com/caddyserver/caddy/v2"
|
"github.com/caddyserver/caddy/v2"
|
||||||
"github.com/caddyserver/caddy/v2/modules/caddyhttp"
|
"github.com/caddyserver/caddy/v2/modules/caddyhttp"
|
||||||
"go.uber.org/zap/zapcore"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestIPMaskSingleValue(t *testing.T) {
|
func TestIPMaskSingleValue(t *testing.T) {
|
||||||
|
|
Loading…
Reference in New Issue