pull/6941/merge
Pascal 2025-06-13 16:26:17 -05:00 committed by GitHub
commit 71a2bd9027
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 26 additions and 17 deletions

View File

@ -72,17 +72,16 @@ func (sl *StorageLoader) Provision(ctx caddy.Context) error {
return nil return nil
} }
// LoadCertificates returns the certificates to be loaded by sl. func (sl StorageLoader) Initialize(updateCertificates func(add []Certificate, remove []string) error) error {
func (sl StorageLoader) LoadCertificates() ([]Certificate, error) {
certs := make([]Certificate, 0, len(sl.Pairs)) certs := make([]Certificate, 0, len(sl.Pairs))
for _, pair := range sl.Pairs { for _, pair := range sl.Pairs {
certData, err := sl.storage.Load(sl.ctx, pair.Certificate) certData, err := sl.storage.Load(sl.ctx, pair.Certificate)
if err != nil { if err != nil {
return nil, err return err
} }
keyData, err := sl.storage.Load(sl.ctx, pair.Key) keyData, err := sl.storage.Load(sl.ctx, pair.Key)
if err != nil { if err != nil {
return nil, err return err
} }
var cert tls.Certificate var cert tls.Certificate
@ -94,21 +93,21 @@ func (sl StorageLoader) LoadCertificates() ([]Certificate, error) {
// if the start of the key file looks like an encrypted private key, // if the start of the key file looks like an encrypted private key,
// reject it with a helpful error message // reject it with a helpful error message
if strings.Contains(string(keyData[:40]), "ENCRYPTED") { if strings.Contains(string(keyData[:40]), "ENCRYPTED") {
return nil, fmt.Errorf("encrypted private keys are not supported; please decrypt the key first") return fmt.Errorf("encrypted private keys are not supported; please decrypt the key first")
} }
cert, err = tls.X509KeyPair(certData, keyData) cert, err = tls.X509KeyPair(certData, keyData)
default: default:
return nil, fmt.Errorf("unrecognized certificate/key encoding format: %s", pair.Format) return fmt.Errorf("unrecognized certificate/key encoding format: %s", pair.Format)
} }
if err != nil { if err != nil {
return nil, err return err
} }
certs = append(certs, Certificate{Certificate: cert, Tags: pair.Tags}) certs = append(certs, Certificate{Certificate: cert, Tags: pair.Tags})
} }
return certs, nil return updateCertificates(certs, []string{})
} }
// Interface guard // Interface guard

View File

@ -252,18 +252,14 @@ func (t *TLS) Provision(ctx caddy.Context) error {
DisableStorageCheck: t.DisableStorageCheck, DisableStorageCheck: t.DisableStorageCheck,
}) })
certCacheMu.RUnlock() certCacheMu.RUnlock()
for _, loader := range t.certificateLoaders { for _, loader := range t.certificateLoaders {
certs, err := loader.LoadCertificates() err := loader.Initialize(func(add []Certificate, remove []string) error {
return t.updateCertificates(ctx, magic, add, remove)
})
if err != nil { if err != nil {
return fmt.Errorf("loading certificates: %v", err) return fmt.Errorf("loading certificates: %v", err)
} }
for _, cert := range certs {
hash, err := magic.CacheUnmanagedTLSCertificate(ctx, cert.Certificate, cert.Tags)
if err != nil {
return fmt.Errorf("caching unmanaged certificate: %v", err)
}
t.loaded[hash] = ""
}
} }
// on-demand permission module // on-demand permission module
@ -782,6 +778,20 @@ func (t *TLS) HasCertificateForSubject(subject string) bool {
return false return false
} }
func (t *TLS) updateCertificates(ctx caddy.Context, magic *certmagic.Config, add []Certificate, remove []string) error {
for _, cert := range add {
hash, err := magic.CacheUnmanagedTLSCertificate(ctx, cert.Certificate, cert.Tags)
if err != nil {
return fmt.Errorf("caching unmanaged certificate: %v", err)
}
t.loaded[hash] = ""
}
certCacheMu.Lock()
certCache.Remove(remove)
certCacheMu.Unlock()
return nil
}
// keepStorageClean starts a goroutine that immediately cleans up all // keepStorageClean starts a goroutine that immediately cleans up all
// known storage units if it was not recently done, and then runs the // known storage units if it was not recently done, and then runs the
// operation at every tick from t.storageCleanTicker. // operation at every tick from t.storageCleanTicker.
@ -887,7 +897,7 @@ func (t *TLS) onEvent(ctx context.Context, eventName string, data map[string]any
// CertificateLoader is a type that can load certificates. // CertificateLoader is a type that can load certificates.
// Certificates can optionally be associated with tags. // Certificates can optionally be associated with tags.
type CertificateLoader interface { type CertificateLoader interface {
LoadCertificates() ([]Certificate, error) Initialize(updateCertificates func(add []Certificate, remove []string) error) error
} }
// Certificate is a TLS certificate, optionally // Certificate is a TLS certificate, optionally