Skip to content

Instantly share code, notes, and snippets.

@SirLouen
Created January 31, 2025 11:03
Show Gist options
  • Save SirLouen/334af9332ae75769837f18e73a92bf54 to your computer and use it in GitHub Desktop.
Save SirLouen/334af9332ae75769837f18e73a92bf54 to your computer and use it in GitHub Desktop.
caddy.log
caddy | {"level":"info","ts":1738321291.2513785,"msg":"using config from file","file":"/etc/caddy/Caddyfile"}
caddy | {"level":"info","ts":1738321291.2548294,"msg":"adapted config to JSON","adapter":"caddyfile"}
caddy | {"level":"warn","ts":1738321291.2549934,"msg":"Caddyfile input is not formatted; run 'caddy fmt --overwrite' to fix inconsistencies","adapter":"caddyfile","file":"/etc/caddy/Caddyfile","line":6}
caddy | {"level":"info","ts":1738321291.258292,"logger":"admin","msg":"admin endpoint started","address":"localhost:2019","enforce_origin":false,"origins":["//localhost:2019","//[::1]:2019","//127.0.0.1:2019"]}
caddy | {"level":"info","ts":1738321291.2588859,"logger":"http.auto_https","msg":"server is listening only on the HTTPS port but has no TLS connection policies; adding one to enable TLS","server_name":"srv0","https_port":443}
caddy | {"level":"info","ts":1738321291.2589095,"logger":"http.auto_https","msg":"enabling automatic HTTP->HTTPS redirects","server_name":"srv0"}
caddy | {"level":"info","ts":1738321291.2589588,"logger":"tls.cache.maintenance","msg":"started background certificate maintenance","cache":"0xc0006abd00"}
caddy | {"level":"debug","ts":1738321291.2590353,"logger":"http.auto_https","msg":"adjusted config","tls":{"automation":{"policies":[{"subjects":["*.wabisabi.com.es"]},{}]}},"http":{"servers":{"remaining_auto_https_redirects":{"listen":[":80"],"routes":[{},{}]},"srv0":{"listen":[":443"],"routes":[{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"vars","root":"/srv/site"},{"encodings":{"gzip":{},"zstd":{}},"handler":"encode","prefer":["gzip","zstd"]}]},{"handle":[{"body":"Lets go","handler":"static_response","status_code":200}],"match":[{"path":["/health-check"]}]},{"handle":[{"handler":"static_response","headers":{"Location":["{http.request.orig_uri.path}/{http.request.orig_uri.prefixed_query}"]},"status_code":308}],"match":[{"file":{"try_files":["{http.request.uri.path}/index.php"]},"not":[{"path":["*/"]}]}]},{"handle":[{"handler":"rewrite","uri":"{http.matchers.file.relative}"}],"match":[{"file":{"split_path":[".php"],"try_files":["{http.request.uri.path}","{http.request.uri.path}/index.php","index.php"],"try_policy":"first_exist_fallback"}}]},{"handle":[{"handler":"reverse_proxy","transport":{"protocol":"fastcgi","root":"/var/www/html","split_path":[".php"]},"upstreams":[{"dial":"unix//run/php/php-fpm-site.sock"}]}],"match":[{"path":["*.php"]}]},{"handle":[{"handler":"file_server","hide":["/etc/caddy/Caddyfile"]}]}]}],"terminal":true}],"tls_connection_policies":[{}],"automatic_https":{}}}}}
caddy | {"level":"debug","ts":1738321291.260903,"logger":"http","msg":"starting server loop","address":"[::]:443","tls":true,"http3":false}
caddy | {"level":"info","ts":1738321291.2609413,"logger":"http","msg":"enabling HTTP/3 listener","addr":":443"}
caddy | {"level":"info","ts":1738321291.2615123,"msg":"failed to sufficiently increase receive buffer size (was: 208 kiB, wanted: 7168 kiB, got: 416 kiB). See https://github.com/quic-go/quic-go/wiki/UDP-Buffer-Sizes for details."}
caddy | {"level":"info","ts":1738321291.261816,"logger":"http.log","msg":"server running","name":"srv0","protocols":["h1","h2","h3"]}
caddy | {"level":"debug","ts":1738321291.2619026,"logger":"http","msg":"starting server loop","address":"[::]:80","tls":false,"http3":false}
caddy | {"level":"warn","ts":1738321291.2619207,"logger":"http","msg":"HTTP/2 skipped because it requires TLS","network":"tcp","addr":":80"}
caddy | {"level":"warn","ts":1738321291.261926,"logger":"http","msg":"HTTP/3 skipped because it requires TLS","network":"tcp","addr":":80"}
caddy | {"level":"info","ts":1738321291.2619302,"logger":"http.log","msg":"server running","name":"remaining_auto_https_redirects","protocols":["h1","h2","h3"]}
caddy | {"level":"info","ts":1738321291.2619348,"logger":"http","msg":"enabling automatic TLS certificate management","domains":["*.wabisabi.com.es"]}
caddy | {"level":"info","ts":1738321291.2622728,"msg":"autosaved config (load with --resume flag)","file":"/config/caddy/autosave.json"}
caddy | {"level":"info","ts":1738321291.2622857,"msg":"serving initial configuration"}
caddy | {"level":"info","ts":1738321291.2832031,"logger":"tls","msg":"storage cleaning happened too recently; skipping for now","storage":"FileStorage:/data/caddy","instance":"08672d5a-23e1-4e8a-bee9-761b2ba9fbd6","try_again":1738407691.2831926,"try_again_in":86399.999999316}
caddy | {"level":"info","ts":1738321291.2833383,"logger":"tls","msg":"finished cleaning storage units"}
caddy | {"level":"info","ts":1738321291.304811,"logger":"tls.obtain","msg":"acquiring lock","identifier":"*.wabisabi.com.es"}
caddy | {"level":"info","ts":1738321291.3074272,"logger":"tls.obtain","msg":"lock acquired","identifier":"*.wabisabi.com.es"}
caddy | {"level":"info","ts":1738321291.3075836,"logger":"tls.obtain","msg":"obtaining certificate","identifier":"*.wabisabi.com.es"}
caddy | {"level":"debug","ts":1738321291.3076186,"logger":"events","msg":"event","name":"cert_obtaining","id":"d24facdb-c5e3-4668-afa4-5375443f2451","origin":"tls","data":{"identifier":"*.wabisabi.com.es"}}
caddy | {"level":"debug","ts":1738321291.3081312,"logger":"tls","msg":"created CSR","identifiers":["*.wabisabi.com.es"],"san_dns_names":["*.wabisabi.com.es"],"san_emails":[],"common_name":"","extra_extensions":0}
caddy | {"level":"debug","ts":1738321291.3116083,"logger":"tls.obtain","msg":"trying issuer 1/1","issuer":"acme-staging-v02.api.letsencrypt.org-directory"}
caddy | {"level":"debug","ts":1738321291.313152,"logger":"tls.issuance.acme","msg":"using existing ACME account because key found in storage associated with email","email":"default","ca":"https://acme-staging-v02.api.letsencrypt.org/directory"}
caddy | {"level":"debug","ts":1738321291.3134813,"logger":"tls.issuance.acme","msg":"using existing ACME account because key found in storage associated with email","email":"","ca":"https://acme-staging-v02.api.letsencrypt.org/directory"}
caddy | {"level":"info","ts":1738321291.313547,"logger":"tls.issuance.acme","msg":"waiting on internal rate limiter","identifiers":["*.wabisabi.com.es"],"ca":"https://acme-staging-v02.api.letsencrypt.org/directory","account":""}
caddy | {"level":"info","ts":1738321291.3135583,"logger":"tls.issuance.acme","msg":"done waiting on internal rate limiter","identifiers":["*.wabisabi.com.es"],"ca":"https://acme-staging-v02.api.letsencrypt.org/directory","account":""}
caddy | {"level":"info","ts":1738321291.3135786,"logger":"tls.issuance.acme","msg":"using ACME account","account_id":"https://acme-staging-v02.api.letsencrypt.org/acme/acct/182600414","account_contact":[]}
site | [31-Jan-2025 11:01:31] NOTICE: fpm is running, pid 1
site | [31-Jan-2025 11:01:31] NOTICE: ready to handle connections
caddy | {"level":"debug","ts":1738321291.8237832,"msg":"http request","method":"GET","url":"https://acme-staging-v02.api.letsencrypt.org/directory","headers":{"User-Agent":["Caddy/2.9.1 CertMagic acmez (linux; amd64)"]},"response_headers":{"Cache-Control":["public, max-age=0, no-cache"],"Content-Length":["974"],"Content-Type":["application/json"],"Date":["Fri, 31 Jan 2025 11:01:31 GMT"],"Server":["nginx"],"Strict-Transport-Security":["max-age=604800"],"X-Frame-Options":["DENY"]},"status_code":200}
caddy | {"level":"debug","ts":1738321291.8242826,"msg":"creating order","account":"https://acme-staging-v02.api.letsencrypt.org/acme/acct/182600414","identifiers":["*.wabisabi.com.es"]}
caddy | {"level":"debug","ts":1738321291.9833057,"msg":"http request","method":"HEAD","url":"https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce","headers":{"User-Agent":["Caddy/2.9.1 CertMagic acmez (linux; amd64)"]},"response_headers":{"Cache-Control":["public, max-age=0, no-cache"],"Date":["Fri, 31 Jan 2025 11:01:31 GMT"],"Link":["<https://acme-staging-v02.api.letsencrypt.org/directory>;rel=\"index\""],"Replay-Nonce":["xMYr_xatfGQdLqITlzdDBIGdJbZsAKQVgXViU2XYvOf18GN1RFI"],"Server":["nginx"],"Strict-Transport-Security":["max-age=604800"],"X-Frame-Options":["DENY"]},"status_code":200}
caddy | {"level":"debug","ts":1738321292.178689,"msg":"http request","method":"POST","url":"https://acme-staging-v02.api.letsencrypt.org/acme/new-order","headers":{"Content-Type":["application/jose+json"],"User-Agent":["Caddy/2.9.1 CertMagic acmez (linux; amd64)"]},"response_headers":{"Boulder-Requester":["182600414"],"Cache-Control":["public, max-age=0, no-cache"],"Content-Length":["363"],"Content-Type":["application/json"],"Date":["Fri, 31 Jan 2025 11:01:32 GMT"],"Link":["<https://acme-staging-v02.api.letsencrypt.org/directory>;rel=\"index\""],"Location":["https://acme-staging-v02.api.letsencrypt.org/acme/order/182600414/22325050484"],"Replay-Nonce":["xMYr_xatqgEFN5vFq8D4ff-FiqaR8qNaBzYlzuZdHDlX6Xxljx0"],"Server":["nginx"],"Strict-Transport-Security":["max-age=604800"],"X-Frame-Options":["DENY"]},"status_code":201}
caddy | {"level":"debug","ts":1738321292.3457396,"msg":"http request","method":"POST","url":"https://acme-staging-v02.api.letsencrypt.org/acme/authz/182600414/15896915374","headers":{"Content-Type":["application/jose+json"],"User-Agent":["Caddy/2.9.1 CertMagic acmez (linux; amd64)"]},"response_headers":{"Boulder-Requester":["182600414"],"Cache-Control":["public, max-age=0, no-cache"],"Content-Length":["403"],"Content-Type":["application/json"],"Date":["Fri, 31 Jan 2025 11:01:32 GMT"],"Link":["<https://acme-staging-v02.api.letsencrypt.org/directory>;rel=\"index\""],"Replay-Nonce":["xMYr_xatydESmPM4Qw6Su7vYcnE3uMw7iLhhB7wU8Y-xYILc1gQ"],"Server":["nginx"],"Strict-Transport-Security":["max-age=604800"],"X-Frame-Options":["DENY"]},"status_code":200}
caddy | {"level":"info","ts":1738321292.3465037,"msg":"trying to solve challenge","identifier":"*.wabisabi.com.es","challenge_type":"dns-01","ca":"https://acme-staging-v02.api.letsencrypt.org/directory"}
caddy | {"level":"debug","ts":1738321292.3519666,"logger":"dns.providers.bunny","msg":"creating TXT record in zone _acme-challenge.wabisabi.com.es","record":{"ID":"","Type":"TXT","Name":"","Value":"-91XCI0GNbSTEGzuoA6p-t9xBbgA73FuDrrb_Wiebds","TTL":0,"Priority":0,"Weight":0}}
caddy | {"level":"debug","ts":1738321292.352295,"logger":"dns.providers.bunny","msg":"fetching zone ID for _acme-challenge.wabisabi.com.es"}
caddy | {"level":"debug","ts":1738321292.4273577,"logger":"dns.providers.bunny","msg":"found zone ID 475635 for _acme-challenge.wabisabi.com.es using name wabisabi.com.es"}
caddy | {"level":"debug","ts":1738321292.5152059,"logger":"dns.providers.bunny","msg":"done creating TXT record 7785284 in zone _acme-challenge.wabisabi.com.es","record":{"ID":"7785284","Type":"TXT","Name":"","Value":"-91XCI0GNbSTEGzuoA6p-t9xBbgA73FuDrrb_Wiebds","TTL":0,"Priority":0,"Weight":0}}
caddy | {"level":"debug","ts":1738321292.5153277,"msg":"waiting for solver before continuing","identifier":"*.wabisabi.com.es","challenge_type":"dns-01"}
caddy | {"level":"debug","ts":1738321294.5189006,"msg":"done waiting for solver","identifier":"*.wabisabi.com.es","challenge_type":"dns-01"}
caddy | {"level":"debug","ts":1738321294.518979,"logger":"dns.providers.bunny","msg":"deleting TXT record in zone _acme-challenge.wabisabi.com.es","record":{"ID":"7785284","Type":"TXT","Name":"","Value":"-91XCI0GNbSTEGzuoA6p-t9xBbgA73FuDrrb_Wiebds","TTL":0,"Priority":0,"Weight":0}}
caddy | {"level":"debug","ts":1738321294.5190032,"logger":"dns.providers.bunny","msg":"fetching zone ID for _acme-challenge.wabisabi.com.es"}
caddy | {"level":"debug","ts":1738321294.5737581,"logger":"dns.providers.bunny","msg":"found zone ID 475635 for _acme-challenge.wabisabi.com.es using name wabisabi.com.es"}
caddy | {"level":"debug","ts":1738321294.6546867,"logger":"dns.providers.bunny","msg":"done deleting TXT record 7785284 in zone _acme-challenge.wabisabi.com.es","record":{"ID":"7785284","Type":"TXT","Name":"","Value":"-91XCI0GNbSTEGzuoA6p-t9xBbgA73FuDrrb_Wiebds","TTL":0,"Priority":0,"Weight":0}}
caddy | {"level":"debug","ts":1738321294.8266542,"msg":"http request","method":"POST","url":"https://acme-staging-v02.api.letsencrypt.org/acme/authz/182600414/15896915374","headers":{"Content-Type":["application/jose+json"],"User-Agent":["Caddy/2.9.1 CertMagic acmez (linux; amd64)"]},"response_headers":{"Boulder-Requester":["182600414"],"Cache-Control":["public, max-age=0, no-cache"],"Content-Length":["407"],"Content-Type":["application/json"],"Date":["Fri, 31 Jan 2025 11:01:34 GMT"],"Link":["<https://acme-staging-v02.api.letsencrypt.org/directory>;rel=\"index\""],"Replay-Nonce":["xMYr_xatMfyOYAul6ZuftonNfpZZRl2PITaYPuWnHXjks4qK3_Y"],"Server":["nginx"],"Strict-Transport-Security":["max-age=604800"],"X-Frame-Options":["DENY"]},"status_code":200}
caddy | {"level":"error","ts":1738321294.8269224,"logger":"tls.obtain","msg":"could not get certificate from issuer","identifier":"*.wabisabi.com.es","issuer":"acme-staging-v02.api.letsencrypt.org-directory","error":"[*.wabisabi.com.es] solving challenges: waiting for solver certmagic.solverWrapper to be ready: checking DNS propagation of \"_acme-challenge.wabisabi.com.es.\" (relative= zone=_acme-challenge.wabisabi.com.es. resolvers=[127.0.0.11:53]): looking up authoritative nameservers: could not determine authoritative nameservers (order=https://acme-staging-v02.api.letsencrypt.org/acme/order/182600414/22325050484) (ca=https://acme-staging-v02.api.letsencrypt.org/directory)"}
caddy | {"level":"debug","ts":1738321294.8269858,"logger":"events","msg":"event","name":"cert_failed","id":"28b43f5c-a36a-4747-81ba-457ae53f1729","origin":"tls","data":{"error":{},"identifier":"*.wabisabi.com.es","issuers":["acme-staging-v02.api.letsencrypt.org-directory"],"renewal":false}}
caddy | {"level":"error","ts":1738321294.8270981,"logger":"tls.obtain","msg":"will retry","error":"[*.wabisabi.com.es] Obtain: [*.wabisabi.com.es] solving challenges: waiting for solver certmagic.solverWrapper to be ready: checking DNS propagation of \"_acme-challenge.wabisabi.com.es.\" (relative= zone=_acme-challenge.wabisabi.com.es. resolvers=[127.0.0.11:53]): looking up authoritative nameservers: could not determine authoritative nameservers (order=https://acme-staging-v02.api.letsencrypt.org/acme/order/182600414/22325050484) (ca=https://acme-staging-v02.api.letsencrypt.org/directory)","attempt":1,"retrying_in":60,"elapsed":3.519636337,"max_duration":2592000}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment