mirror of
				https://github.com/caddyserver/caddy.git
				synced 2025-11-04 03:27:23 -05:00 
			
		
		
		
	Merge branch 'letsencrypt' into le-graceful
Conflicts: caddy/letsencrypt/letsencrypt.go caddy/letsencrypt/renew.go
This commit is contained in:
		
						commit
						c46898592f
					
				@ -238,6 +238,9 @@ func saveCertsAndKeys(certificates []acme.CertificateResource) error {
 | 
				
			|||||||
// autoConfigure enables TLS on cfg and appends, if necessary, a new config
 | 
					// autoConfigure enables TLS on cfg and appends, if necessary, a new config
 | 
				
			||||||
// to allConfigs that redirects plaintext HTTP to its new HTTPS counterpart.
 | 
					// to allConfigs that redirects plaintext HTTP to its new HTTPS counterpart.
 | 
				
			||||||
func autoConfigure(cfg *server.Config, allConfigs []server.Config) []server.Config {
 | 
					func autoConfigure(cfg *server.Config, allConfigs []server.Config) []server.Config {
 | 
				
			||||||
 | 
						bundleBytes, _ := ioutil.ReadFile(storage.SiteCertFile(cfg.Host))
 | 
				
			||||||
 | 
						ocsp, _ := acme.GetOCSPForCert(bundleBytes)
 | 
				
			||||||
 | 
						cfg.TLS.OCSPStaple = ocsp
 | 
				
			||||||
	cfg.TLS.Certificate = storage.SiteCertFile(cfg.Host)
 | 
						cfg.TLS.Certificate = storage.SiteCertFile(cfg.Host)
 | 
				
			||||||
	cfg.TLS.Key = storage.SiteKeyFile(cfg.Host)
 | 
						cfg.TLS.Key = storage.SiteKeyFile(cfg.Host)
 | 
				
			||||||
	cfg.TLS.Enabled = true
 | 
						cfg.TLS.Enabled = true
 | 
				
			||||||
 | 
				
			|||||||
@ -92,6 +92,7 @@ func processCertificateRenewal(configs []server.Config) (int, []error) {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
			// Renew certificate.
 | 
								// Renew certificate.
 | 
				
			||||||
			// TODO: revokeOld should be an option in the caddyfile
 | 
								// TODO: revokeOld should be an option in the caddyfile
 | 
				
			||||||
 | 
								// TODO: bundle should be an option in the caddyfile as well :)
 | 
				
			||||||
			newCertMeta, err := client.RenewCertificate(certMeta, true, true)
 | 
								newCertMeta, err := client.RenewCertificate(certMeta, true, true)
 | 
				
			||||||
			if err != nil {
 | 
								if err != nil {
 | 
				
			||||||
				time.Sleep(10 * time.Second)
 | 
									time.Sleep(10 * time.Second)
 | 
				
			||||||
 | 
				
			|||||||
@ -56,6 +56,7 @@ type TLSConfig struct {
 | 
				
			|||||||
	Certificate              string
 | 
						Certificate              string
 | 
				
			||||||
	Key                      string
 | 
						Key                      string
 | 
				
			||||||
	LetsEncryptEmail         string
 | 
						LetsEncryptEmail         string
 | 
				
			||||||
 | 
						OCSPStaple               []byte
 | 
				
			||||||
	Ciphers                  []uint16
 | 
						Ciphers                  []uint16
 | 
				
			||||||
	ProtocolMinVersion       uint16
 | 
						ProtocolMinVersion       uint16
 | 
				
			||||||
	ProtocolMaxVersion       uint16
 | 
						ProtocolMaxVersion       uint16
 | 
				
			||||||
 | 
				
			|||||||
@ -179,6 +179,7 @@ func serveTLSWithSNI(s *Server, ln net.Listener, tlsConfigs []TLSConfig) error {
 | 
				
			|||||||
	config.Certificates = make([]tls.Certificate, len(tlsConfigs))
 | 
						config.Certificates = make([]tls.Certificate, len(tlsConfigs))
 | 
				
			||||||
	for i, tlsConfig := range tlsConfigs {
 | 
						for i, tlsConfig := range tlsConfigs {
 | 
				
			||||||
		config.Certificates[i], err = tls.LoadX509KeyPair(tlsConfig.Certificate, tlsConfig.Key)
 | 
							config.Certificates[i], err = tls.LoadX509KeyPair(tlsConfig.Certificate, tlsConfig.Key)
 | 
				
			||||||
 | 
							config.Certificates[i].OCSPStaple = tlsConfig.OCSPStaple
 | 
				
			||||||
		if err != nil {
 | 
							if err != nil {
 | 
				
			||||||
			return err
 | 
								return err
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
				
			|||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user