mirror of
https://github.com/caddyserver/caddy.git
synced 2024-12-02 05:33:38 +08:00
Merge branch 'master' into getcertificate
This commit is contained in:
commit
178c4d11d9
|
@ -25,6 +25,7 @@ func saveRSAPrivateKey(key *rsa.PrivateKey, file string) error {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
keyOut.Chmod(0600)
|
||||||
defer keyOut.Close()
|
defer keyOut.Close()
|
||||||
return pem.Encode(keyOut, &pemKey)
|
return pem.Encode(keyOut, &pemKey)
|
||||||
}
|
}
|
||||||
|
|
|
@ -6,6 +6,7 @@ import (
|
||||||
"crypto/rsa"
|
"crypto/rsa"
|
||||||
"crypto/x509"
|
"crypto/x509"
|
||||||
"os"
|
"os"
|
||||||
|
"runtime"
|
||||||
"testing"
|
"testing"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -28,13 +29,26 @@ func TestSaveAndLoadRSAPrivateKey(t *testing.T) {
|
||||||
t.Fatal("error saving private key:", err)
|
t.Fatal("error saving private key:", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// it doesn't make sense to test file permission on windows
|
||||||
|
if runtime.GOOS != "windows" {
|
||||||
|
// get info of the key file
|
||||||
|
info, err := os.Stat(keyFile)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal("error stating private key:", err)
|
||||||
|
}
|
||||||
|
// verify permission of key file is correct
|
||||||
|
if info.Mode().Perm() != 0600 {
|
||||||
|
t.Error("Expected key file to have permission 0600, but it wasn't")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// test load
|
// test load
|
||||||
loadedKey, err := loadRSAPrivateKey(keyFile)
|
loadedKey, err := loadRSAPrivateKey(keyFile)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Error("error loading private key:", err)
|
t.Error("error loading private key:", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// very loaded key is correct
|
// verify loaded key is correct
|
||||||
if !rsaPrivateKeysSame(privateKey, loadedKey) {
|
if !rsaPrivateKeysSame(privateKey, loadedKey) {
|
||||||
t.Error("Expected key bytes to be the same, but they weren't")
|
t.Error("Expected key bytes to be the same, but they weren't")
|
||||||
}
|
}
|
||||||
|
|
|
@ -322,7 +322,7 @@ func newClientPort(leEmail, port string) (*acme.Client, error) {
|
||||||
client.SetHTTPAddress(":" + port)
|
client.SetHTTPAddress(":" + port)
|
||||||
client.SetTLSAddress(":" + port)
|
client.SetTLSAddress(":" + port)
|
||||||
}
|
}
|
||||||
client.ExcludeChallenges([]string{"tls-sni-01", "dns-01"}) // We can only guarantee http-01 at this time, but tls-01 should work if port is not custom!
|
client.ExcludeChallenges([]acme.Challenge{acme.TLSSNI01, acme.DNS01}) // We can only guarantee http-01 at this time, but tls-01 should work if port is not custom!
|
||||||
|
|
||||||
// If not registered, the user must register an account with the CA
|
// If not registered, the user must register an account with the CA
|
||||||
// and agree to terms
|
// and agree to terms
|
||||||
|
|
|
@ -32,6 +32,8 @@ func init() {
|
||||||
// work if executing with `go run`, since the binary is cleaned up
|
// work if executing with `go run`, since the binary is cleaned up
|
||||||
// when `go run` sees the initial parent process exit.
|
// when `go run` sees the initial parent process exit.
|
||||||
func Restart(newCaddyfile Input) error {
|
func Restart(newCaddyfile Input) error {
|
||||||
|
log.Println("[INFO] Restarting")
|
||||||
|
|
||||||
if newCaddyfile == nil {
|
if newCaddyfile == nil {
|
||||||
caddyfileMu.Lock()
|
caddyfileMu.Lock()
|
||||||
newCaddyfile = caddyfile
|
newCaddyfile = caddyfile
|
||||||
|
|
|
@ -1,8 +1,12 @@
|
||||||
package caddy
|
package caddy
|
||||||
|
|
||||||
|
import "log"
|
||||||
|
|
||||||
// Restart restarts Caddy forcefully using newCaddyfile,
|
// Restart restarts Caddy forcefully using newCaddyfile,
|
||||||
// or, if nil, the current/existing Caddyfile is reused.
|
// or, if nil, the current/existing Caddyfile is reused.
|
||||||
func Restart(newCaddyfile Input) error {
|
func Restart(newCaddyfile Input) error {
|
||||||
|
log.Println("[INFO] Restarting")
|
||||||
|
|
||||||
if newCaddyfile == nil {
|
if newCaddyfile == nil {
|
||||||
caddyfileMu.Lock()
|
caddyfileMu.Lock()
|
||||||
newCaddyfile = caddyfile
|
newCaddyfile = caddyfile
|
||||||
|
|
|
@ -214,6 +214,7 @@ td .name {
|
||||||
margin-left: 1.75em;
|
margin-left: 1.75em;
|
||||||
word-break: break-all;
|
word-break: break-all;
|
||||||
overflow-wrap: break-word;
|
overflow-wrap: break-word;
|
||||||
|
white-space: pre-wrap;
|
||||||
}
|
}
|
||||||
|
|
||||||
footer {
|
footer {
|
||||||
|
|
|
@ -47,7 +47,7 @@ func gzipParse(c *Controller) ([]gzip.Config, error) {
|
||||||
return configs, c.ArgErr()
|
return configs, c.ArgErr()
|
||||||
}
|
}
|
||||||
for _, e := range exts {
|
for _, e := range exts {
|
||||||
if !strings.HasPrefix(e, ".") && e != gzip.ExtWildCard {
|
if !strings.HasPrefix(e, ".") && e != gzip.ExtWildCard && e != "" {
|
||||||
return configs, fmt.Errorf(`gzip: invalid extension "%v" (must start with dot)`, e)
|
return configs, fmt.Errorf(`gzip: invalid extension "%v" (must start with dot)`, e)
|
||||||
}
|
}
|
||||||
extFilter.Exts.Add(e)
|
extFilter.Exts.Add(e)
|
||||||
|
|
|
@ -50,6 +50,9 @@ func TestGzip(t *testing.T) {
|
||||||
level 1
|
level 1
|
||||||
}
|
}
|
||||||
gzip`, false},
|
gzip`, false},
|
||||||
|
{`gzip {
|
||||||
|
ext ""
|
||||||
|
}`, false},
|
||||||
{`gzip { not /file
|
{`gzip { not /file
|
||||||
ext .html
|
ext .html
|
||||||
level 1
|
level 1
|
||||||
|
|
6
dist/CHANGES.txt
vendored
6
dist/CHANGES.txt
vendored
|
@ -1,9 +1,9 @@
|
||||||
CHANGES
|
CHANGES
|
||||||
|
|
||||||
<master>
|
0.8.1 (January 12, 2016)
|
||||||
- Improved OCSP stapling
|
- Improved OCSP stapling
|
||||||
- Can reload config with new hosts that need certs from Let's Encrypt
|
- Better graceful reload when new hosts need certificates from Let's Encrypt
|
||||||
- If pidfile is created, it is deleted when Caddy exits
|
- Current pidfile is now deleted when Caddy exits
|
||||||
- browse: New default template
|
- browse: New default template
|
||||||
- gzip: Added min_length setting
|
- gzip: Added min_length setting
|
||||||
- import: Support for glob patterns (*) to import multiple files
|
- import: Support for glob patterns (*) to import multiple files
|
||||||
|
|
2
dist/README.txt
vendored
2
dist/README.txt
vendored
|
@ -1,4 +1,4 @@
|
||||||
CADDY 0.8
|
CADDY 0.8.1
|
||||||
|
|
||||||
Website
|
Website
|
||||||
https://caddyserver.com
|
https://caddyserver.com
|
||||||
|
|
2
main.go
2
main.go
|
@ -27,7 +27,7 @@ var (
|
||||||
|
|
||||||
const (
|
const (
|
||||||
appName = "Caddy"
|
appName = "Caddy"
|
||||||
appVersion = "0.8"
|
appVersion = "0.8.1"
|
||||||
)
|
)
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
|
|
|
@ -196,7 +196,7 @@ func directoryListing(files []os.FileInfo, r *http.Request, canGoUp bool, root s
|
||||||
fileCount++
|
fileCount++
|
||||||
}
|
}
|
||||||
|
|
||||||
url := url.URL{Path: name}
|
url := url.URL{Path: "./" + name} // prepend with "./" to fix paths with ':' in the name
|
||||||
|
|
||||||
fileinfos = append(fileinfos, FileInfo{
|
fileinfos = append(fileinfos, FileInfo{
|
||||||
IsDir: f.IsDir(),
|
IsDir: f.IsDir(),
|
||||||
|
|
|
@ -147,11 +147,11 @@ func TestBrowseTemplate(t *testing.T) {
|
||||||
|
|
||||||
<h1>/photos/</h1>
|
<h1>/photos/</h1>
|
||||||
|
|
||||||
<a href="test.html">test.html</a><br>
|
<a href="./test.html">test.html</a><br>
|
||||||
|
|
||||||
<a href="test2.html">test2.html</a><br>
|
<a href="./test2.html">test2.html</a><br>
|
||||||
|
|
||||||
<a href="test3.html">test3.html</a><br>
|
<a href="./test3.html">test3.html</a><br>
|
||||||
|
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
@ -209,7 +209,7 @@ func TestBrowseJson(t *testing.T) {
|
||||||
name += "/"
|
name += "/"
|
||||||
}
|
}
|
||||||
|
|
||||||
url := url.URL{Path: name}
|
url := url.URL{Path: "./" + name}
|
||||||
|
|
||||||
fileinfos = append(fileinfos, FileInfo{
|
fileinfos = append(fileinfos, FileInfo{
|
||||||
IsDir: f.IsDir(),
|
IsDir: f.IsDir(),
|
||||||
|
|
|
@ -15,7 +15,7 @@ type RequestFilter interface {
|
||||||
}
|
}
|
||||||
|
|
||||||
// defaultExtensions is the list of default extensions for which to enable gzipping.
|
// defaultExtensions is the list of default extensions for which to enable gzipping.
|
||||||
var defaultExtensions = []string{"", ".txt", ".htm", ".html", ".css", ".php", ".js", ".json", ".md", ".xml"}
|
var defaultExtensions = []string{"", ".txt", ".htm", ".html", ".css", ".php", ".js", ".json", ".md", ".xml", ".svg"}
|
||||||
|
|
||||||
// DefaultExtFilter creates an ExtFilter with default extensions.
|
// DefaultExtFilter creates an ExtFilter with default extensions.
|
||||||
func DefaultExtFilter() ExtFilter {
|
func DefaultExtFilter() ExtFilter {
|
||||||
|
|
|
@ -57,6 +57,10 @@ func (uh *UpstreamHost) Down() bool {
|
||||||
return uh.CheckDown(uh)
|
return uh.CheckDown(uh)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// tryDuration is how long to try upstream hosts; failures result in
|
||||||
|
// immediate retries until this duration ends or we get a nil host.
|
||||||
|
var tryDuration = 60 * time.Second
|
||||||
|
|
||||||
// ServeHTTP satisfies the middleware.Handler interface.
|
// ServeHTTP satisfies the middleware.Handler interface.
|
||||||
func (p Proxy) ServeHTTP(w http.ResponseWriter, r *http.Request) (int, error) {
|
func (p Proxy) ServeHTTP(w http.ResponseWriter, r *http.Request) (int, error) {
|
||||||
|
|
||||||
|
@ -68,7 +72,7 @@ func (p Proxy) ServeHTTP(w http.ResponseWriter, r *http.Request) (int, error) {
|
||||||
|
|
||||||
// Since Select() should give us "up" hosts, keep retrying
|
// Since Select() should give us "up" hosts, keep retrying
|
||||||
// hosts until timeout (or until we get a nil host).
|
// hosts until timeout (or until we get a nil host).
|
||||||
for time.Now().Sub(start) < (60 * time.Second) {
|
for time.Now().Sub(start) < tryDuration {
|
||||||
host := upstream.Select()
|
host := upstream.Select()
|
||||||
if host == nil {
|
if host == nil {
|
||||||
return http.StatusBadGateway, errUnreachable
|
return http.StatusBadGateway, errUnreachable
|
||||||
|
|
|
@ -4,10 +4,13 @@ import (
|
||||||
"bufio"
|
"bufio"
|
||||||
"bytes"
|
"bytes"
|
||||||
"io"
|
"io"
|
||||||
|
"io/ioutil"
|
||||||
|
"log"
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/http/httptest"
|
"net/http/httptest"
|
||||||
"net/url"
|
"net/url"
|
||||||
|
"os"
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
|
@ -15,6 +18,70 @@ import (
|
||||||
"golang.org/x/net/websocket"
|
"golang.org/x/net/websocket"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
tryDuration = 50 * time.Millisecond // prevent tests from hanging
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestReverseProxy(t *testing.T) {
|
||||||
|
log.SetOutput(ioutil.Discard)
|
||||||
|
defer log.SetOutput(os.Stderr)
|
||||||
|
|
||||||
|
var requestReceived bool
|
||||||
|
backend := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
requestReceived = true
|
||||||
|
w.Write([]byte("Hello, client"))
|
||||||
|
}))
|
||||||
|
defer backend.Close()
|
||||||
|
|
||||||
|
// set up proxy
|
||||||
|
p := &Proxy{
|
||||||
|
Upstreams: []Upstream{newFakeUpstream(backend.URL, false)},
|
||||||
|
}
|
||||||
|
|
||||||
|
// create request and response recorder
|
||||||
|
r, err := http.NewRequest("GET", "/", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create request: %v", err)
|
||||||
|
}
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
|
||||||
|
p.ServeHTTP(w, r)
|
||||||
|
|
||||||
|
if !requestReceived {
|
||||||
|
t.Error("Expected backend to receive request, but it didn't")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestReverseProxyInsecureSkipVerify(t *testing.T) {
|
||||||
|
log.SetOutput(ioutil.Discard)
|
||||||
|
defer log.SetOutput(os.Stderr)
|
||||||
|
|
||||||
|
var requestReceived bool
|
||||||
|
backend := httptest.NewTLSServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
requestReceived = true
|
||||||
|
w.Write([]byte("Hello, client"))
|
||||||
|
}))
|
||||||
|
defer backend.Close()
|
||||||
|
|
||||||
|
// set up proxy
|
||||||
|
p := &Proxy{
|
||||||
|
Upstreams: []Upstream{newFakeUpstream(backend.URL, true)},
|
||||||
|
}
|
||||||
|
|
||||||
|
// create request and response recorder
|
||||||
|
r, err := http.NewRequest("GET", "/", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create request: %v", err)
|
||||||
|
}
|
||||||
|
w := httptest.NewRecorder()
|
||||||
|
|
||||||
|
p.ServeHTTP(w, r)
|
||||||
|
|
||||||
|
if !requestReceived {
|
||||||
|
t.Error("Even with insecure HTTPS, expected backend to receive request, but it didn't")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func TestWebSocketReverseProxyServeHTTPHandler(t *testing.T) {
|
func TestWebSocketReverseProxyServeHTTPHandler(t *testing.T) {
|
||||||
// No-op websocket backend simply allows the WS connection to be
|
// No-op websocket backend simply allows the WS connection to be
|
||||||
// accepted then it will be immediately closed. Perfect for testing.
|
// accepted then it will be immediately closed. Perfect for testing.
|
||||||
|
@ -93,18 +160,24 @@ func TestWebSocketReverseProxyFromWSClient(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// newWebSocketTestProxy returns a test proxy that will
|
func newFakeUpstream(name string, insecure bool) *fakeUpstream {
|
||||||
// redirect to the specified backendAddr. The function
|
uri, _ := url.Parse(name)
|
||||||
// also sets up the rules/environment for testing WebSocket
|
u := &fakeUpstream{
|
||||||
// proxy.
|
name: name,
|
||||||
func newWebSocketTestProxy(backendAddr string) *Proxy {
|
host: &UpstreamHost{
|
||||||
return &Proxy{
|
Name: name,
|
||||||
Upstreams: []Upstream{&fakeUpstream{name: backendAddr}},
|
ReverseProxy: NewSingleHostReverseProxy(uri, ""),
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
if insecure {
|
||||||
|
u.host.ReverseProxy.Transport = InsecureTransport
|
||||||
|
}
|
||||||
|
return u
|
||||||
}
|
}
|
||||||
|
|
||||||
type fakeUpstream struct {
|
type fakeUpstream struct {
|
||||||
name string
|
name string
|
||||||
|
host *UpstreamHost
|
||||||
}
|
}
|
||||||
|
|
||||||
func (u *fakeUpstream) From() string {
|
func (u *fakeUpstream) From() string {
|
||||||
|
@ -112,6 +185,32 @@ func (u *fakeUpstream) From() string {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (u *fakeUpstream) Select() *UpstreamHost {
|
func (u *fakeUpstream) Select() *UpstreamHost {
|
||||||
|
return u.host
|
||||||
|
}
|
||||||
|
|
||||||
|
func (u *fakeUpstream) IsAllowedPath(requestPath string) bool {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// newWebSocketTestProxy returns a test proxy that will
|
||||||
|
// redirect to the specified backendAddr. The function
|
||||||
|
// also sets up the rules/environment for testing WebSocket
|
||||||
|
// proxy.
|
||||||
|
func newWebSocketTestProxy(backendAddr string) *Proxy {
|
||||||
|
return &Proxy{
|
||||||
|
Upstreams: []Upstream{&fakeWsUpstream{name: backendAddr}},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type fakeWsUpstream struct {
|
||||||
|
name string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (u *fakeWsUpstream) From() string {
|
||||||
|
return "/"
|
||||||
|
}
|
||||||
|
|
||||||
|
func (u *fakeWsUpstream) Select() *UpstreamHost {
|
||||||
uri, _ := url.Parse(u.name)
|
uri, _ := url.Parse(u.name)
|
||||||
return &UpstreamHost{
|
return &UpstreamHost{
|
||||||
Name: u.name,
|
Name: u.name,
|
||||||
|
@ -122,7 +221,7 @@ func (u *fakeUpstream) Select() *UpstreamHost {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (u *fakeUpstream) IsAllowedPath(requestPath string) bool {
|
func (u *fakeWsUpstream) IsAllowedPath(requestPath string) bool {
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -12,6 +12,7 @@
|
||||||
package proxy
|
package proxy
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"crypto/tls"
|
||||||
"io"
|
"io"
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
@ -103,6 +104,16 @@ var hopHeaders = []string{
|
||||||
"Upgrade",
|
"Upgrade",
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var InsecureTransport http.RoundTripper = &http.Transport{
|
||||||
|
Proxy: http.ProxyFromEnvironment,
|
||||||
|
Dial: (&net.Dialer{
|
||||||
|
Timeout: 30 * time.Second,
|
||||||
|
KeepAlive: 30 * time.Second,
|
||||||
|
}).Dial,
|
||||||
|
TLSHandshakeTimeout: 10 * time.Second,
|
||||||
|
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
|
||||||
|
}
|
||||||
|
|
||||||
func (p *ReverseProxy) ServeHTTP(rw http.ResponseWriter, req *http.Request, extraHeaders http.Header) error {
|
func (p *ReverseProxy) ServeHTTP(rw http.ResponseWriter, req *http.Request, extraHeaders http.Header) error {
|
||||||
transport := p.Transport
|
transport := p.Transport
|
||||||
if transport == nil {
|
if transport == nil {
|
||||||
|
|
|
@ -19,10 +19,11 @@ var (
|
||||||
)
|
)
|
||||||
|
|
||||||
type staticUpstream struct {
|
type staticUpstream struct {
|
||||||
from string
|
from string
|
||||||
proxyHeaders http.Header
|
proxyHeaders http.Header
|
||||||
Hosts HostPool
|
Hosts HostPool
|
||||||
Policy Policy
|
Policy Policy
|
||||||
|
insecureSkipVerify bool
|
||||||
|
|
||||||
FailTimeout time.Duration
|
FailTimeout time.Duration
|
||||||
MaxFails int32
|
MaxFails int32
|
||||||
|
@ -90,6 +91,9 @@ func NewStaticUpstreams(c parse.Dispenser) ([]Upstream, error) {
|
||||||
}
|
}
|
||||||
if baseURL, err := url.Parse(uh.Name); err == nil {
|
if baseURL, err := url.Parse(uh.Name); err == nil {
|
||||||
uh.ReverseProxy = NewSingleHostReverseProxy(baseURL, uh.WithoutPathPrefix)
|
uh.ReverseProxy = NewSingleHostReverseProxy(baseURL, uh.WithoutPathPrefix)
|
||||||
|
if upstream.insecureSkipVerify {
|
||||||
|
uh.ReverseProxy.Transport = InsecureTransport
|
||||||
|
}
|
||||||
} else {
|
} else {
|
||||||
return upstreams, err
|
return upstreams, err
|
||||||
}
|
}
|
||||||
|
@ -175,6 +179,8 @@ func parseBlock(c *parse.Dispenser, u *staticUpstream) error {
|
||||||
return c.ArgErr()
|
return c.ArgErr()
|
||||||
}
|
}
|
||||||
u.IgnoredSubPaths = ignoredPaths
|
u.IgnoredSubPaths = ignoredPaths
|
||||||
|
case "insecure_skip_verify":
|
||||||
|
u.insecureSkipVerify = true
|
||||||
default:
|
default:
|
||||||
return c.Errf("unknown property '%s'", c.Val())
|
return c.Errf("unknown property '%s'", c.Val())
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue
Block a user