Created
January 30, 2025 17:29
-
-
Save SirLouen/5c6443068ac9d9935b5e3b5f74e77b19 to your computer and use it in GitHub Desktop.
caddy.log
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
caddy | {"level":"info","ts":1738258091.2478912,"msg":"using config from file","file":"/etc/caddy/Caddyfile"} | |
caddy | {"level":"info","ts":1738258091.2534478,"msg":"adapted config to JSON","adapter":"caddyfile"} | |
caddy | {"level":"warn","ts":1738258091.2534971,"msg":"Caddyfile input is not formatted; run 'caddy fmt --overwrite' to fix inconsistencies","adapter":"caddyfile","file":"/etc/caddy/Caddyfile","line":6} | |
caddy | {"level":"info","ts":1738258091.2715175,"logger":"admin","msg":"admin endpoint started","address":"localhost:2019","enforce_origin":false,"origins":["//[::1]:2019","//127.0.0.1:2019","//localhost:2019"]} | |
caddy | {"level":"info","ts":1738258091.2730436,"logger":"tls.cache.maintenance","msg":"started background certificate maintenance","cache":"0xc000760480"} | |
caddy | {"level":"info","ts":1738258091.2737021,"logger":"http.auto_https","msg":"server is listening only on the HTTPS port but has no TLS connection policies; adding one to enable TLS","server_name":"srv0","https_port":443} | |
caddy | {"level":"info","ts":1738258091.27378,"logger":"http.auto_https","msg":"enabling automatic HTTP->HTTPS redirects","server_name":"srv0"} | |
caddy | {"level":"debug","ts":1738258091.2739034,"logger":"http.auto_https","msg":"adjusted config","tls":{"automation":{"policies":[{"subjects":["*.wabisabi.com.es"]},{}]}},"http":{"servers":{"remaining_auto_https_redirects":{"listen":[":80"],"routes":[{},{}]},"srv0":{"listen":[":443"],"routes":[{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"vars","root":"/srv/site"},{"encodings":{"gzip":{},"zstd":{}},"handler":"encode","prefer":["gzip","zstd"]}]},{"handle":[{"body":"Lets go","handler":"static_response","status_code":200}],"match":[{"path":["/health-check"]}]},{"handle":[{"handler":"static_response","headers":{"Location":["{http.request.orig_uri.path}/{http.request.orig_uri.prefixed_query}"]},"status_code":308}],"match":[{"file":{"try_files":["{http.request.uri.path}/index.php"]},"not":[{"path":["*/"]}]}]},{"handle":[{"handler":"rewrite","uri":"{http.matchers.file.relative}"}],"match":[{"file":{"split_path":[".php"],"try_files":["{http.request.uri.path}","{http.request.uri.path}/index.php","index.php"],"try_policy":"first_exist_fallback"}}]},{"handle":[{"handler":"reverse_proxy","transport":{"protocol":"fastcgi","root":"/var/www/html","split_path":[".php"]},"upstreams":[{"dial":"unix//run/php/php-fpm-site.sock"}]}],"match":[{"path":["*.php"]}]},{"handle":[{"handler":"file_server","hide":["/etc/caddy/Caddyfile"]}]}]}],"terminal":true}],"tls_connection_policies":[{}],"automatic_https":{}}}}} | |
caddy | {"level":"debug","ts":1738258091.27711,"logger":"http","msg":"starting server loop","address":"[::]:443","tls":true,"http3":false} | |
caddy | {"level":"info","ts":1738258091.27751,"logger":"http","msg":"enabling HTTP/3 listener","addr":":443"} | |
caddy | {"level":"info","ts":1738258091.2786086,"msg":"failed to sufficiently increase receive buffer size (was: 208 kiB, wanted: 7168 kiB, got: 416 kiB). See https://github.com/quic-go/quic-go/wiki/UDP-Buffer-Sizes for details."} | |
caddy | {"level":"info","ts":1738258091.2794173,"logger":"http.log","msg":"server running","name":"srv0","protocols":["h1","h2","h3"]} | |
caddy | {"level":"debug","ts":1738258091.2798302,"logger":"http","msg":"starting server loop","address":"[::]:80","tls":false,"http3":false} | |
caddy | {"level":"warn","ts":1738258091.2799094,"logger":"http","msg":"HTTP/2 skipped because it requires TLS","network":"tcp","addr":":80"} | |
caddy | {"level":"warn","ts":1738258091.2799323,"logger":"http","msg":"HTTP/3 skipped because it requires TLS","network":"tcp","addr":":80"} | |
caddy | {"level":"info","ts":1738258091.2799475,"logger":"http.log","msg":"server running","name":"remaining_auto_https_redirects","protocols":["h1","h2","h3"]} | |
caddy | {"level":"info","ts":1738258091.279952,"logger":"http","msg":"enabling automatic TLS certificate management","domains":["*.wabisabi.com.es"]} | |
caddy | {"level":"info","ts":1738258091.2815835,"msg":"autosaved config (load with --resume flag)","file":"/config/caddy/autosave.json"} | |
caddy | {"level":"info","ts":1738258091.281788,"msg":"serving initial configuration"} | |
caddy | {"level":"info","ts":1738258091.2952511,"logger":"tls","msg":"cleaning storage unit","storage":"FileStorage:/data/caddy"} | |
caddy | {"level":"info","ts":1738258091.2953222,"logger":"tls.obtain","msg":"acquiring lock","identifier":"*.wabisabi.com.es"} | |
caddy | {"level":"info","ts":1738258091.2969396,"logger":"tls.obtain","msg":"lock acquired","identifier":"*.wabisabi.com.es"} | |
caddy | {"level":"info","ts":1738258091.2975023,"logger":"tls.obtain","msg":"obtaining certificate","identifier":"*.wabisabi.com.es"} | |
caddy | {"level":"debug","ts":1738258091.2975914,"logger":"events","msg":"event","name":"cert_obtaining","id":"7552fb40-29b9-4f4d-b3af-fd306b3bcaac","origin":"tls","data":{"identifier":"*.wabisabi.com.es"}} | |
caddy | {"level":"debug","ts":1738258091.29799,"logger":"tls","msg":"created CSR","identifiers":["*.wabisabi.com.es"],"san_dns_names":["*.wabisabi.com.es"],"san_emails":[],"common_name":"","extra_extensions":0} | |
caddy | {"level":"debug","ts":1738258091.2985094,"logger":"tls.obtain","msg":"trying issuer 1/1","issuer":"acme-staging-v02.api.letsencrypt.org-directory"} | |
caddy | {"level":"info","ts":1738258091.2986977,"logger":"tls.issuance.acme","msg":"creating new account because no account for configured email is known to us","email":"","ca":"https://acme-staging-v02.api.letsencrypt.org/directory","error":"open /data/caddy/acme/acme-staging-v02.api.letsencrypt.org-directory/users/default/default.json: no such file or directory"} | |
caddy | {"level":"info","ts":1738258091.2988348,"logger":"tls.issuance.acme","msg":"ACME account has empty status; registering account with ACME server","contact":[],"location":""} | |
caddy | {"level":"info","ts":1738258091.3008323,"logger":"tls.issuance.acme","msg":"creating new account because no account for configured email is known to us","email":"","ca":"https://acme-staging-v02.api.letsencrypt.org/directory","error":"open /data/caddy/acme/acme-staging-v02.api.letsencrypt.org-directory/users/default/default.json: no such file or directory"} | |
caddy | {"level":"info","ts":1738258091.3015237,"logger":"tls","msg":"finished cleaning storage units"} | |
caddy | {"level":"debug","ts":1738258091.7502737,"msg":"http request","method":"GET","url":"https://acme-staging-v02.api.letsencrypt.org/directory","headers":{"User-Agent":["Caddy/2.9.1 CertMagic acmez (linux; amd64)"]},"response_headers":{"Cache-Control":["public, max-age=0, no-cache"],"Content-Length":["974"],"Content-Type":["application/json"],"Date":["Thu, 30 Jan 2025 17:28:11 GMT"],"Server":["nginx"],"Strict-Transport-Security":["max-age=604800"],"X-Frame-Options":["DENY"]},"status_code":200} | |
site | [30-Jan-2025 17:28:11] NOTICE: fpm is running, pid 1 | |
site | [30-Jan-2025 17:28:11] NOTICE: ready to handle connections | |
caddy | {"level":"debug","ts":1738258091.8976934,"msg":"http request","method":"HEAD","url":"https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce","headers":{"User-Agent":["Caddy/2.9.1 CertMagic acmez (linux; amd64)"]},"response_headers":{"Cache-Control":["public, max-age=0, no-cache"],"Date":["Thu, 30 Jan 2025 17:28:11 GMT"],"Link":["<https://acme-staging-v02.api.letsencrypt.org/directory>;rel=\"index\""],"Replay-Nonce":["xMYr_xatWd9QToPafRuPWZVNb5WhTp_VkqoScwg9RxArLKsFO8k"],"Server":["nginx"],"Strict-Transport-Security":["max-age=604800"],"X-Frame-Options":["DENY"]},"status_code":200} | |
caddy | {"level":"debug","ts":1738258092.0576012,"msg":"http request","method":"POST","url":"https://acme-staging-v02.api.letsencrypt.org/acme/new-acct","headers":{"Content-Type":["application/jose+json"],"User-Agent":["Caddy/2.9.1 CertMagic acmez (linux; amd64)"]},"response_headers":{"Boulder-Requester":["182600414"],"Cache-Control":["public, max-age=0, no-cache"],"Content-Length":["236"],"Content-Type":["application/json"],"Date":["Thu, 30 Jan 2025 17:28:11 GMT"],"Link":["<https://acme-staging-v02.api.letsencrypt.org/directory>;rel=\"index\"","<https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf>;rel=\"terms-of-service\""],"Location":["https://acme-staging-v02.api.letsencrypt.org/acme/acct/182600414"],"Replay-Nonce":["N9Ep_yiTSjtJMZ1p6Ui7gkDOajp1n8MJP5Yim5fGP6DUPa1f_hA"],"Server":["nginx"],"Strict-Transport-Security":["max-age=604800"],"X-Frame-Options":["DENY"]},"status_code":201} | |
caddy | {"level":"info","ts":1738258092.0578,"logger":"tls.issuance.acme","msg":"new ACME account registered","contact":[],"status":"valid"} | |
caddy | {"level":"info","ts":1738258092.0629613,"logger":"tls.issuance.acme","msg":"waiting on internal rate limiter","identifiers":["*.wabisabi.com.es"],"ca":"https://acme-staging-v02.api.letsencrypt.org/directory","account":""} | |
caddy | {"level":"info","ts":1738258092.0630286,"logger":"tls.issuance.acme","msg":"done waiting on internal rate limiter","identifiers":["*.wabisabi.com.es"],"ca":"https://acme-staging-v02.api.letsencrypt.org/directory","account":""} | |
caddy | {"level":"info","ts":1738258092.0631645,"logger":"tls.issuance.acme","msg":"using ACME account","account_id":"https://acme-staging-v02.api.letsencrypt.org/acme/acct/182600414","account_contact":[]} | |
caddy | {"level":"debug","ts":1738258092.0632138,"msg":"creating order","account":"https://acme-staging-v02.api.letsencrypt.org/acme/acct/182600414","identifiers":["*.wabisabi.com.es"]} | |
caddy | {"level":"debug","ts":1738258092.2627614,"msg":"http request","method":"POST","url":"https://acme-staging-v02.api.letsencrypt.org/acme/new-order","headers":{"Content-Type":["application/jose+json"],"User-Agent":["Caddy/2.9.1 CertMagic acmez (linux; amd64)"]},"response_headers":{"Boulder-Requester":["182600414"],"Cache-Control":["public, max-age=0, no-cache"],"Content-Length":["363"],"Content-Type":["application/json"],"Date":["Thu, 30 Jan 2025 17:28:12 GMT"],"Link":["<https://acme-staging-v02.api.letsencrypt.org/directory>;rel=\"index\""],"Location":["https://acme-staging-v02.api.letsencrypt.org/acme/order/182600414/22311336874"],"Replay-Nonce":["N9Ep_yiTEOUlUsUJjf_fWuRT_zzxmXsn3xwtg9yMg12BPsDEjOk"],"Server":["nginx"],"Strict-Transport-Security":["max-age=604800"],"X-Frame-Options":["DENY"]},"status_code":201} | |
caddy | {"level":"debug","ts":1738258092.4154868,"msg":"http request","method":"POST","url":"https://acme-staging-v02.api.letsencrypt.org/acme/authz/182600414/15888855104","headers":{"Content-Type":["application/jose+json"],"User-Agent":["Caddy/2.9.1 CertMagic acmez (linux; amd64)"]},"response_headers":{"Boulder-Requester":["182600414"],"Cache-Control":["public, max-age=0, no-cache"],"Content-Length":["403"],"Content-Type":["application/json"],"Date":["Thu, 30 Jan 2025 17:28:12 GMT"],"Link":["<https://acme-staging-v02.api.letsencrypt.org/directory>;rel=\"index\""],"Replay-Nonce":["N9Ep_yiTMCOA38m5xFuweb-ig4DV9PmlpXKCVG4HJDMNHDXGz0U"],"Server":["nginx"],"Strict-Transport-Security":["max-age=604800"],"X-Frame-Options":["DENY"]},"status_code":200} | |
caddy | {"level":"info","ts":1738258092.4158723,"msg":"trying to solve challenge","identifier":"*.wabisabi.com.es","challenge_type":"dns-01","ca":"https://acme-staging-v02.api.letsencrypt.org/directory"} | |
caddy | {"level":"debug","ts":1738258092.4434712,"logger":"dns.providers.bunny","msg":"creating TXT record in zone _acme-challenge.wabisabi.com.es","record":{"ID":"","Type":"TXT","Name":"","Value":"3WdRK8oZS3WPAhwbNSNJppkB2shlEtdXiJzlOEjg9Tw","TTL":0,"Priority":0,"Weight":0}} | |
caddy | {"level":"debug","ts":1738258092.4435754,"logger":"dns.providers.bunny","msg":"fetching zone ID for _acme-challenge.wabisabi.com.es"} | |
caddy | {"level":"error","ts":1738258092.563002,"msg":"cleaning up solver","identifier":"*.wabisabi.com.es","challenge_type":"dns-01","error":"no memory of presenting a DNS record for \"_acme-challenge.wabisabi.com.es\" (usually OK if presenting also failed)","stacktrace":"github.com/mholt/acmez/v3.(*Client).solveChallenges.func1\n\tgithub.com/mholt/acmez/[email protected]/client.go:318\ngithub.com/mholt/acmez/v3.(*Client).solveChallenges\n\tgithub.com/mholt/acmez/[email protected]/client.go:363\ngithub.com/mholt/acmez/v3.(*Client).ObtainCertificate\n\tgithub.com/mholt/acmez/[email protected]/client.go:136\ngithub.com/caddyserver/certmagic.(*ACMEIssuer).doIssue\n\tgithub.com/caddyserver/[email protected]/acmeissuer.go:477\ngithub.com/caddyserver/certmagic.(*ACMEIssuer).Issue\n\tgithub.com/caddyserver/[email protected]/acmeissuer.go:371\ngithub.com/caddyserver/caddy/v2/modules/caddytls.(*ACMEIssuer).Issue\n\tgithub.com/caddyserver/caddy/[email protected]/modules/caddytls/acmeissuer.go:249\ngithub.com/caddyserver/certmagic.(*Config).obtainCert.func2\n\tgithub.com/caddyserver/[email protected]/config.go:626\ngithub.com/caddyserver/certmagic.doWithRetry\n\tgithub.com/caddyserver/[email protected]/async.go:104\ngithub.com/caddyserver/certmagic.(*Config).obtainCert\n\tgithub.com/caddyserver/[email protected]/config.go:700\ngithub.com/caddyserver/certmagic.(*Config).ObtainCertAsync\n\tgithub.com/caddyserver/[email protected]/config.go:505\ngithub.com/caddyserver/certmagic.(*Config).manageOne.func1\n\tgithub.com/caddyserver/[email protected]/config.go:415\ngithub.com/caddyserver/certmagic.(*jobManager).worker\n\tgithub.com/caddyserver/[email protected]/async.go:73"} | |
caddy | {"level":"debug","ts":1738258092.7227368,"msg":"http request","method":"POST","url":"https://acme-staging-v02.api.letsencrypt.org/acme/authz/182600414/15888855104","headers":{"Content-Type":["application/jose+json"],"User-Agent":["Caddy/2.9.1 CertMagic acmez (linux; amd64)"]},"response_headers":{"Boulder-Requester":["182600414"],"Cache-Control":["public, max-age=0, no-cache"],"Content-Length":["407"],"Content-Type":["application/json"],"Date":["Thu, 30 Jan 2025 17:28:12 GMT"],"Link":["<https://acme-staging-v02.api.letsencrypt.org/directory>;rel=\"index\""],"Replay-Nonce":["N9Ep_yiTiaNsh6XGUnhtbax0Hwg6QAXisjXpTzk_SRav9_be4G8"],"Server":["nginx"],"Strict-Transport-Security":["max-age=604800"],"X-Frame-Options":["DENY"]},"status_code":200} | |
caddy | {"level":"error","ts":1738258092.722975,"logger":"tls.obtain","msg":"could not get certificate from issuer","identifier":"*.wabisabi.com.es","issuer":"acme-staging-v02.api.letsencrypt.org-directory","error":"[*.wabisabi.com.es] solving challenges: presenting for challenge: adding temporary record for zone \"_acme-challenge.wabisabi.com.es.\": zone not found: _acme-challenge.wabisabi.com.es (order=https://acme-staging-v02.api.letsencrypt.org/acme/order/182600414/22311336874) (ca=https://acme-staging-v02.api.letsencrypt.org/directory)"} | |
caddy | {"level":"debug","ts":1738258092.723024,"logger":"events","msg":"event","name":"cert_failed","id":"bbc94d87-0027-45ee-b8c5-38899fa59489","origin":"tls","data":{"error":{},"identifier":"*.wabisabi.com.es","issuers":["acme-staging-v02.api.letsencrypt.org-directory"],"renewal":false}} | |
caddy | {"level":"error","ts":1738258092.7230754,"logger":"tls.obtain","msg":"will retry","error":"[*.wabisabi.com.es] Obtain: [*.wabisabi.com.es] solving challenges: presenting for challenge: adding temporary record for zone \"_acme-challenge.wabisabi.com.es.\": zone not found: _acme-challenge.wabisabi.com.es (order=https://acme-staging-v02.api.letsencrypt.org/acme/order/182600414/22311336874) (ca=https://acme-staging-v02.api.letsencrypt.org/directory)","attempt":1,"retrying_in":60,"elapsed":1.426106991,"max_duration":2592000} | |
caddy | {"level":"debug","ts":1738258107.103638,"logger":"events","msg":"event","name":"tls_get_certificate","id":"005c95ca-f30c-47a7-b5c3-0bc64ad5c124","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,159,52393,52392,52394,49195,49199,158,49188,49192,107,49187,49191,103,49162,49172,57,49161,49171,51,157,156,61,60,53,47,255],"ServerName":"wabisabi.com.es","SupportedCurves":[29,23,30,25,24],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,515,769,513,770,514,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771,770,769],"RemoteAddr":{"IP":"37.19.207.34","Port":19351,"Zone":""},"LocalAddr":{"IP":"172.19.0.2","Port":443,"Zone":""}}}} | |
caddy | {"level":"debug","ts":1738258107.1042676,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"wabisabi.com.es"} | |
caddy | {"level":"debug","ts":1738258107.104281,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"*.com.es"} | |
caddy | {"level":"debug","ts":1738258107.104286,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"*.*.es"} | |
caddy | {"level":"debug","ts":1738258107.1042905,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"*.*.*"} | |
caddy | {"level":"debug","ts":1738258107.104342,"logger":"tls.handshake","msg":"no certificate matching TLS ClientHello","remote_ip":"37.19.207.34","remote_port":"19351","server_name":"wabisabi.com.es","remote":"37.19.207.34:19351","identifier":"wabisabi.com.es","cipher_suites":[4866,4867,4865,49196,49200,159,52393,52392,52394,49195,49199,158,49188,49192,107,49187,49191,103,49162,49172,57,49161,49171,51,157,156,61,60,53,47,255],"cert_cache_fill":0,"load_or_obtain_if_necessary":true,"on_demand":false} | |
caddy | {"level":"debug","ts":1738258107.104835,"logger":"http.stdlib","msg":"http: TLS handshake error from 37.19.207.34:19351: no certificate available for 'wabisabi.com.es'"} | |
caddy | {"level":"debug","ts":1738258120.5710616,"logger":"events","msg":"event","name":"tls_get_certificate","id":"70a66ad2-e996-48b6-9b38-34f25158d946","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,159,52393,52392,52394,49195,49199,158,49188,49192,107,49187,49191,103,49162,49172,57,49161,49171,51,157,156,61,60,53,47,255],"ServerName":"wabisabi.com.es","SupportedCurves":[29,23,30,25,24],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,515,769,513,770,514,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771,770,769],"RemoteAddr":{"IP":"143.244.56.52","Port":64079,"Zone":""},"LocalAddr":{"IP":"172.19.0.2","Port":443,"Zone":""}}}} | |
caddy | {"level":"debug","ts":1738258120.57156,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"wabisabi.com.es"} | |
caddy | {"level":"debug","ts":1738258120.5715728,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"*.com.es"} | |
caddy | {"level":"debug","ts":1738258120.5715792,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"*.*.es"} | |
caddy | {"level":"debug","ts":1738258120.5715852,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"*.*.*"} | |
caddy | {"level":"debug","ts":1738258120.5716362,"logger":"tls.handshake","msg":"no certificate matching TLS ClientHello","remote_ip":"143.244.56.52","remote_port":"64079","server_name":"wabisabi.com.es","remote":"143.244.56.52:64079","identifier":"wabisabi.com.es","cipher_suites":[4866,4867,4865,49196,49200,159,52393,52392,52394,49195,49199,158,49188,49192,107,49187,49191,103,49162,49172,57,49161,49171,51,157,156,61,60,53,47,255],"cert_cache_fill":0,"load_or_obtain_if_necessary":true,"on_demand":false} | |
caddy | {"level":"debug","ts":1738258120.571913,"logger":"http.stdlib","msg":"http: TLS handshake error from 143.244.56.52:64079: no certificate available for 'wabisabi.com.es'"} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment