Skip to content

Instantly share code, notes, and snippets.

@SirLouen
Created January 30, 2025 17:29
Show Gist options
  • Save SirLouen/5c6443068ac9d9935b5e3b5f74e77b19 to your computer and use it in GitHub Desktop.
Save SirLouen/5c6443068ac9d9935b5e3b5f74e77b19 to your computer and use it in GitHub Desktop.
caddy.log
caddy | {"level":"info","ts":1738258091.2478912,"msg":"using config from file","file":"/etc/caddy/Caddyfile"}
caddy | {"level":"info","ts":1738258091.2534478,"msg":"adapted config to JSON","adapter":"caddyfile"}
caddy | {"level":"warn","ts":1738258091.2534971,"msg":"Caddyfile input is not formatted; run 'caddy fmt --overwrite' to fix inconsistencies","adapter":"caddyfile","file":"/etc/caddy/Caddyfile","line":6}
caddy | {"level":"info","ts":1738258091.2715175,"logger":"admin","msg":"admin endpoint started","address":"localhost:2019","enforce_origin":false,"origins":["//[::1]:2019","//127.0.0.1:2019","//localhost:2019"]}
caddy | {"level":"info","ts":1738258091.2730436,"logger":"tls.cache.maintenance","msg":"started background certificate maintenance","cache":"0xc000760480"}
caddy | {"level":"info","ts":1738258091.2737021,"logger":"http.auto_https","msg":"server is listening only on the HTTPS port but has no TLS connection policies; adding one to enable TLS","server_name":"srv0","https_port":443}
caddy | {"level":"info","ts":1738258091.27378,"logger":"http.auto_https","msg":"enabling automatic HTTP->HTTPS redirects","server_name":"srv0"}
caddy | {"level":"debug","ts":1738258091.2739034,"logger":"http.auto_https","msg":"adjusted config","tls":{"automation":{"policies":[{"subjects":["*.wabisabi.com.es"]},{}]}},"http":{"servers":{"remaining_auto_https_redirects":{"listen":[":80"],"routes":[{},{}]},"srv0":{"listen":[":443"],"routes":[{"handle":[{"handler":"subroute","routes":[{"handle":[{"handler":"vars","root":"/srv/site"},{"encodings":{"gzip":{},"zstd":{}},"handler":"encode","prefer":["gzip","zstd"]}]},{"handle":[{"body":"Lets go","handler":"static_response","status_code":200}],"match":[{"path":["/health-check"]}]},{"handle":[{"handler":"static_response","headers":{"Location":["{http.request.orig_uri.path}/{http.request.orig_uri.prefixed_query}"]},"status_code":308}],"match":[{"file":{"try_files":["{http.request.uri.path}/index.php"]},"not":[{"path":["*/"]}]}]},{"handle":[{"handler":"rewrite","uri":"{http.matchers.file.relative}"}],"match":[{"file":{"split_path":[".php"],"try_files":["{http.request.uri.path}","{http.request.uri.path}/index.php","index.php"],"try_policy":"first_exist_fallback"}}]},{"handle":[{"handler":"reverse_proxy","transport":{"protocol":"fastcgi","root":"/var/www/html","split_path":[".php"]},"upstreams":[{"dial":"unix//run/php/php-fpm-site.sock"}]}],"match":[{"path":["*.php"]}]},{"handle":[{"handler":"file_server","hide":["/etc/caddy/Caddyfile"]}]}]}],"terminal":true}],"tls_connection_policies":[{}],"automatic_https":{}}}}}
caddy | {"level":"debug","ts":1738258091.27711,"logger":"http","msg":"starting server loop","address":"[::]:443","tls":true,"http3":false}
caddy | {"level":"info","ts":1738258091.27751,"logger":"http","msg":"enabling HTTP/3 listener","addr":":443"}
caddy | {"level":"info","ts":1738258091.2786086,"msg":"failed to sufficiently increase receive buffer size (was: 208 kiB, wanted: 7168 kiB, got: 416 kiB). See https://github.com/quic-go/quic-go/wiki/UDP-Buffer-Sizes for details."}
caddy | {"level":"info","ts":1738258091.2794173,"logger":"http.log","msg":"server running","name":"srv0","protocols":["h1","h2","h3"]}
caddy | {"level":"debug","ts":1738258091.2798302,"logger":"http","msg":"starting server loop","address":"[::]:80","tls":false,"http3":false}
caddy | {"level":"warn","ts":1738258091.2799094,"logger":"http","msg":"HTTP/2 skipped because it requires TLS","network":"tcp","addr":":80"}
caddy | {"level":"warn","ts":1738258091.2799323,"logger":"http","msg":"HTTP/3 skipped because it requires TLS","network":"tcp","addr":":80"}
caddy | {"level":"info","ts":1738258091.2799475,"logger":"http.log","msg":"server running","name":"remaining_auto_https_redirects","protocols":["h1","h2","h3"]}
caddy | {"level":"info","ts":1738258091.279952,"logger":"http","msg":"enabling automatic TLS certificate management","domains":["*.wabisabi.com.es"]}
caddy | {"level":"info","ts":1738258091.2815835,"msg":"autosaved config (load with --resume flag)","file":"/config/caddy/autosave.json"}
caddy | {"level":"info","ts":1738258091.281788,"msg":"serving initial configuration"}
caddy | {"level":"info","ts":1738258091.2952511,"logger":"tls","msg":"cleaning storage unit","storage":"FileStorage:/data/caddy"}
caddy | {"level":"info","ts":1738258091.2953222,"logger":"tls.obtain","msg":"acquiring lock","identifier":"*.wabisabi.com.es"}
caddy | {"level":"info","ts":1738258091.2969396,"logger":"tls.obtain","msg":"lock acquired","identifier":"*.wabisabi.com.es"}
caddy | {"level":"info","ts":1738258091.2975023,"logger":"tls.obtain","msg":"obtaining certificate","identifier":"*.wabisabi.com.es"}
caddy | {"level":"debug","ts":1738258091.2975914,"logger":"events","msg":"event","name":"cert_obtaining","id":"7552fb40-29b9-4f4d-b3af-fd306b3bcaac","origin":"tls","data":{"identifier":"*.wabisabi.com.es"}}
caddy | {"level":"debug","ts":1738258091.29799,"logger":"tls","msg":"created CSR","identifiers":["*.wabisabi.com.es"],"san_dns_names":["*.wabisabi.com.es"],"san_emails":[],"common_name":"","extra_extensions":0}
caddy | {"level":"debug","ts":1738258091.2985094,"logger":"tls.obtain","msg":"trying issuer 1/1","issuer":"acme-staging-v02.api.letsencrypt.org-directory"}
caddy | {"level":"info","ts":1738258091.2986977,"logger":"tls.issuance.acme","msg":"creating new account because no account for configured email is known to us","email":"","ca":"https://acme-staging-v02.api.letsencrypt.org/directory","error":"open /data/caddy/acme/acme-staging-v02.api.letsencrypt.org-directory/users/default/default.json: no such file or directory"}
caddy | {"level":"info","ts":1738258091.2988348,"logger":"tls.issuance.acme","msg":"ACME account has empty status; registering account with ACME server","contact":[],"location":""}
caddy | {"level":"info","ts":1738258091.3008323,"logger":"tls.issuance.acme","msg":"creating new account because no account for configured email is known to us","email":"","ca":"https://acme-staging-v02.api.letsencrypt.org/directory","error":"open /data/caddy/acme/acme-staging-v02.api.letsencrypt.org-directory/users/default/default.json: no such file or directory"}
caddy | {"level":"info","ts":1738258091.3015237,"logger":"tls","msg":"finished cleaning storage units"}
caddy | {"level":"debug","ts":1738258091.7502737,"msg":"http request","method":"GET","url":"https://acme-staging-v02.api.letsencrypt.org/directory","headers":{"User-Agent":["Caddy/2.9.1 CertMagic acmez (linux; amd64)"]},"response_headers":{"Cache-Control":["public, max-age=0, no-cache"],"Content-Length":["974"],"Content-Type":["application/json"],"Date":["Thu, 30 Jan 2025 17:28:11 GMT"],"Server":["nginx"],"Strict-Transport-Security":["max-age=604800"],"X-Frame-Options":["DENY"]},"status_code":200}
site | [30-Jan-2025 17:28:11] NOTICE: fpm is running, pid 1
site | [30-Jan-2025 17:28:11] NOTICE: ready to handle connections
caddy | {"level":"debug","ts":1738258091.8976934,"msg":"http request","method":"HEAD","url":"https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce","headers":{"User-Agent":["Caddy/2.9.1 CertMagic acmez (linux; amd64)"]},"response_headers":{"Cache-Control":["public, max-age=0, no-cache"],"Date":["Thu, 30 Jan 2025 17:28:11 GMT"],"Link":["<https://acme-staging-v02.api.letsencrypt.org/directory>;rel=\"index\""],"Replay-Nonce":["xMYr_xatWd9QToPafRuPWZVNb5WhTp_VkqoScwg9RxArLKsFO8k"],"Server":["nginx"],"Strict-Transport-Security":["max-age=604800"],"X-Frame-Options":["DENY"]},"status_code":200}
caddy | {"level":"debug","ts":1738258092.0576012,"msg":"http request","method":"POST","url":"https://acme-staging-v02.api.letsencrypt.org/acme/new-acct","headers":{"Content-Type":["application/jose+json"],"User-Agent":["Caddy/2.9.1 CertMagic acmez (linux; amd64)"]},"response_headers":{"Boulder-Requester":["182600414"],"Cache-Control":["public, max-age=0, no-cache"],"Content-Length":["236"],"Content-Type":["application/json"],"Date":["Thu, 30 Jan 2025 17:28:11 GMT"],"Link":["<https://acme-staging-v02.api.letsencrypt.org/directory>;rel=\"index\"","<https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf>;rel=\"terms-of-service\""],"Location":["https://acme-staging-v02.api.letsencrypt.org/acme/acct/182600414"],"Replay-Nonce":["N9Ep_yiTSjtJMZ1p6Ui7gkDOajp1n8MJP5Yim5fGP6DUPa1f_hA"],"Server":["nginx"],"Strict-Transport-Security":["max-age=604800"],"X-Frame-Options":["DENY"]},"status_code":201}
caddy | {"level":"info","ts":1738258092.0578,"logger":"tls.issuance.acme","msg":"new ACME account registered","contact":[],"status":"valid"}
caddy | {"level":"info","ts":1738258092.0629613,"logger":"tls.issuance.acme","msg":"waiting on internal rate limiter","identifiers":["*.wabisabi.com.es"],"ca":"https://acme-staging-v02.api.letsencrypt.org/directory","account":""}
caddy | {"level":"info","ts":1738258092.0630286,"logger":"tls.issuance.acme","msg":"done waiting on internal rate limiter","identifiers":["*.wabisabi.com.es"],"ca":"https://acme-staging-v02.api.letsencrypt.org/directory","account":""}
caddy | {"level":"info","ts":1738258092.0631645,"logger":"tls.issuance.acme","msg":"using ACME account","account_id":"https://acme-staging-v02.api.letsencrypt.org/acme/acct/182600414","account_contact":[]}
caddy | {"level":"debug","ts":1738258092.0632138,"msg":"creating order","account":"https://acme-staging-v02.api.letsencrypt.org/acme/acct/182600414","identifiers":["*.wabisabi.com.es"]}
caddy | {"level":"debug","ts":1738258092.2627614,"msg":"http request","method":"POST","url":"https://acme-staging-v02.api.letsencrypt.org/acme/new-order","headers":{"Content-Type":["application/jose+json"],"User-Agent":["Caddy/2.9.1 CertMagic acmez (linux; amd64)"]},"response_headers":{"Boulder-Requester":["182600414"],"Cache-Control":["public, max-age=0, no-cache"],"Content-Length":["363"],"Content-Type":["application/json"],"Date":["Thu, 30 Jan 2025 17:28:12 GMT"],"Link":["<https://acme-staging-v02.api.letsencrypt.org/directory>;rel=\"index\""],"Location":["https://acme-staging-v02.api.letsencrypt.org/acme/order/182600414/22311336874"],"Replay-Nonce":["N9Ep_yiTEOUlUsUJjf_fWuRT_zzxmXsn3xwtg9yMg12BPsDEjOk"],"Server":["nginx"],"Strict-Transport-Security":["max-age=604800"],"X-Frame-Options":["DENY"]},"status_code":201}
caddy | {"level":"debug","ts":1738258092.4154868,"msg":"http request","method":"POST","url":"https://acme-staging-v02.api.letsencrypt.org/acme/authz/182600414/15888855104","headers":{"Content-Type":["application/jose+json"],"User-Agent":["Caddy/2.9.1 CertMagic acmez (linux; amd64)"]},"response_headers":{"Boulder-Requester":["182600414"],"Cache-Control":["public, max-age=0, no-cache"],"Content-Length":["403"],"Content-Type":["application/json"],"Date":["Thu, 30 Jan 2025 17:28:12 GMT"],"Link":["<https://acme-staging-v02.api.letsencrypt.org/directory>;rel=\"index\""],"Replay-Nonce":["N9Ep_yiTMCOA38m5xFuweb-ig4DV9PmlpXKCVG4HJDMNHDXGz0U"],"Server":["nginx"],"Strict-Transport-Security":["max-age=604800"],"X-Frame-Options":["DENY"]},"status_code":200}
caddy | {"level":"info","ts":1738258092.4158723,"msg":"trying to solve challenge","identifier":"*.wabisabi.com.es","challenge_type":"dns-01","ca":"https://acme-staging-v02.api.letsencrypt.org/directory"}
caddy | {"level":"debug","ts":1738258092.4434712,"logger":"dns.providers.bunny","msg":"creating TXT record in zone _acme-challenge.wabisabi.com.es","record":{"ID":"","Type":"TXT","Name":"","Value":"3WdRK8oZS3WPAhwbNSNJppkB2shlEtdXiJzlOEjg9Tw","TTL":0,"Priority":0,"Weight":0}}
caddy | {"level":"debug","ts":1738258092.4435754,"logger":"dns.providers.bunny","msg":"fetching zone ID for _acme-challenge.wabisabi.com.es"}
caddy | {"level":"error","ts":1738258092.563002,"msg":"cleaning up solver","identifier":"*.wabisabi.com.es","challenge_type":"dns-01","error":"no memory of presenting a DNS record for \"_acme-challenge.wabisabi.com.es\" (usually OK if presenting also failed)","stacktrace":"github.com/mholt/acmez/v3.(*Client).solveChallenges.func1\n\tgithub.com/mholt/acmez/[email protected]/client.go:318\ngithub.com/mholt/acmez/v3.(*Client).solveChallenges\n\tgithub.com/mholt/acmez/[email protected]/client.go:363\ngithub.com/mholt/acmez/v3.(*Client).ObtainCertificate\n\tgithub.com/mholt/acmez/[email protected]/client.go:136\ngithub.com/caddyserver/certmagic.(*ACMEIssuer).doIssue\n\tgithub.com/caddyserver/[email protected]/acmeissuer.go:477\ngithub.com/caddyserver/certmagic.(*ACMEIssuer).Issue\n\tgithub.com/caddyserver/[email protected]/acmeissuer.go:371\ngithub.com/caddyserver/caddy/v2/modules/caddytls.(*ACMEIssuer).Issue\n\tgithub.com/caddyserver/caddy/[email protected]/modules/caddytls/acmeissuer.go:249\ngithub.com/caddyserver/certmagic.(*Config).obtainCert.func2\n\tgithub.com/caddyserver/[email protected]/config.go:626\ngithub.com/caddyserver/certmagic.doWithRetry\n\tgithub.com/caddyserver/[email protected]/async.go:104\ngithub.com/caddyserver/certmagic.(*Config).obtainCert\n\tgithub.com/caddyserver/[email protected]/config.go:700\ngithub.com/caddyserver/certmagic.(*Config).ObtainCertAsync\n\tgithub.com/caddyserver/[email protected]/config.go:505\ngithub.com/caddyserver/certmagic.(*Config).manageOne.func1\n\tgithub.com/caddyserver/[email protected]/config.go:415\ngithub.com/caddyserver/certmagic.(*jobManager).worker\n\tgithub.com/caddyserver/[email protected]/async.go:73"}
caddy | {"level":"debug","ts":1738258092.7227368,"msg":"http request","method":"POST","url":"https://acme-staging-v02.api.letsencrypt.org/acme/authz/182600414/15888855104","headers":{"Content-Type":["application/jose+json"],"User-Agent":["Caddy/2.9.1 CertMagic acmez (linux; amd64)"]},"response_headers":{"Boulder-Requester":["182600414"],"Cache-Control":["public, max-age=0, no-cache"],"Content-Length":["407"],"Content-Type":["application/json"],"Date":["Thu, 30 Jan 2025 17:28:12 GMT"],"Link":["<https://acme-staging-v02.api.letsencrypt.org/directory>;rel=\"index\""],"Replay-Nonce":["N9Ep_yiTiaNsh6XGUnhtbax0Hwg6QAXisjXpTzk_SRav9_be4G8"],"Server":["nginx"],"Strict-Transport-Security":["max-age=604800"],"X-Frame-Options":["DENY"]},"status_code":200}
caddy | {"level":"error","ts":1738258092.722975,"logger":"tls.obtain","msg":"could not get certificate from issuer","identifier":"*.wabisabi.com.es","issuer":"acme-staging-v02.api.letsencrypt.org-directory","error":"[*.wabisabi.com.es] solving challenges: presenting for challenge: adding temporary record for zone \"_acme-challenge.wabisabi.com.es.\": zone not found: _acme-challenge.wabisabi.com.es (order=https://acme-staging-v02.api.letsencrypt.org/acme/order/182600414/22311336874) (ca=https://acme-staging-v02.api.letsencrypt.org/directory)"}
caddy | {"level":"debug","ts":1738258092.723024,"logger":"events","msg":"event","name":"cert_failed","id":"bbc94d87-0027-45ee-b8c5-38899fa59489","origin":"tls","data":{"error":{},"identifier":"*.wabisabi.com.es","issuers":["acme-staging-v02.api.letsencrypt.org-directory"],"renewal":false}}
caddy | {"level":"error","ts":1738258092.7230754,"logger":"tls.obtain","msg":"will retry","error":"[*.wabisabi.com.es] Obtain: [*.wabisabi.com.es] solving challenges: presenting for challenge: adding temporary record for zone \"_acme-challenge.wabisabi.com.es.\": zone not found: _acme-challenge.wabisabi.com.es (order=https://acme-staging-v02.api.letsencrypt.org/acme/order/182600414/22311336874) (ca=https://acme-staging-v02.api.letsencrypt.org/directory)","attempt":1,"retrying_in":60,"elapsed":1.426106991,"max_duration":2592000}
caddy | {"level":"debug","ts":1738258107.103638,"logger":"events","msg":"event","name":"tls_get_certificate","id":"005c95ca-f30c-47a7-b5c3-0bc64ad5c124","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,159,52393,52392,52394,49195,49199,158,49188,49192,107,49187,49191,103,49162,49172,57,49161,49171,51,157,156,61,60,53,47,255],"ServerName":"wabisabi.com.es","SupportedCurves":[29,23,30,25,24],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,515,769,513,770,514,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771,770,769],"RemoteAddr":{"IP":"37.19.207.34","Port":19351,"Zone":""},"LocalAddr":{"IP":"172.19.0.2","Port":443,"Zone":""}}}}
caddy | {"level":"debug","ts":1738258107.1042676,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"wabisabi.com.es"}
caddy | {"level":"debug","ts":1738258107.104281,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"*.com.es"}
caddy | {"level":"debug","ts":1738258107.104286,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"*.*.es"}
caddy | {"level":"debug","ts":1738258107.1042905,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"*.*.*"}
caddy | {"level":"debug","ts":1738258107.104342,"logger":"tls.handshake","msg":"no certificate matching TLS ClientHello","remote_ip":"37.19.207.34","remote_port":"19351","server_name":"wabisabi.com.es","remote":"37.19.207.34:19351","identifier":"wabisabi.com.es","cipher_suites":[4866,4867,4865,49196,49200,159,52393,52392,52394,49195,49199,158,49188,49192,107,49187,49191,103,49162,49172,57,49161,49171,51,157,156,61,60,53,47,255],"cert_cache_fill":0,"load_or_obtain_if_necessary":true,"on_demand":false}
caddy | {"level":"debug","ts":1738258107.104835,"logger":"http.stdlib","msg":"http: TLS handshake error from 37.19.207.34:19351: no certificate available for 'wabisabi.com.es'"}
caddy | {"level":"debug","ts":1738258120.5710616,"logger":"events","msg":"event","name":"tls_get_certificate","id":"70a66ad2-e996-48b6-9b38-34f25158d946","origin":"tls","data":{"client_hello":{"CipherSuites":[4866,4867,4865,49196,49200,159,52393,52392,52394,49195,49199,158,49188,49192,107,49187,49191,103,49162,49172,57,49161,49171,51,157,156,61,60,53,47,255],"ServerName":"wabisabi.com.es","SupportedCurves":[29,23,30,25,24],"SupportedPoints":"AAEC","SignatureSchemes":[1027,1283,1539,2055,2056,2057,2058,2059,2052,2053,2054,1025,1281,1537,771,515,769,513,770,514,1026,1282,1538],"SupportedProtos":null,"SupportedVersions":[772,771,770,769],"RemoteAddr":{"IP":"143.244.56.52","Port":64079,"Zone":""},"LocalAddr":{"IP":"172.19.0.2","Port":443,"Zone":""}}}}
caddy | {"level":"debug","ts":1738258120.57156,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"wabisabi.com.es"}
caddy | {"level":"debug","ts":1738258120.5715728,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"*.com.es"}
caddy | {"level":"debug","ts":1738258120.5715792,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"*.*.es"}
caddy | {"level":"debug","ts":1738258120.5715852,"logger":"tls.handshake","msg":"no matching certificates and no custom selection logic","identifier":"*.*.*"}
caddy | {"level":"debug","ts":1738258120.5716362,"logger":"tls.handshake","msg":"no certificate matching TLS ClientHello","remote_ip":"143.244.56.52","remote_port":"64079","server_name":"wabisabi.com.es","remote":"143.244.56.52:64079","identifier":"wabisabi.com.es","cipher_suites":[4866,4867,4865,49196,49200,159,52393,52392,52394,49195,49199,158,49188,49192,107,49187,49191,103,49162,49172,57,49161,49171,51,157,156,61,60,53,47,255],"cert_cache_fill":0,"load_or_obtain_if_necessary":true,"on_demand":false}
caddy | {"level":"debug","ts":1738258120.571913,"logger":"http.stdlib","msg":"http: TLS handshake error from 143.244.56.52:64079: no certificate available for 'wabisabi.com.es'"}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment