mirror of
https://github.com/foxcpp/maddy.git
synced 2025-04-06 06:27:38 +03:00
config: Reload TLS server certificates once in a minute
Use of inotify and possibly other mechanisms poses portability risks. Notably, "cross-platform" abstractions such as fsnotify library remove access to certain features that are important to use it correctly in some cases e.g. it is preferable to listen only for IN_CLOSE_WRITE on Linux instead of IN_MODIFY to prevent races and unexpected failures. Pooling approach avoids such problems by either running reload code at a different time than actual renewal or retrying later if parse fails. With certificates being renewed before expiry (e.g. 1 week before) delay is not a signficiant problem. Closes #160.
This commit is contained in:
parent
a88a1a96b5
commit
14505f4de1
2 changed files with 21 additions and 16 deletions
|
@ -71,17 +71,9 @@ You still need to make keys readable for maddy, though:
|
|||
$ sudo setfacl -R -m u:maddy:rX /etc/letsencrypt/{live,archive}
|
||||
```
|
||||
|
||||
Additionally, it is a good idea to automatically restart
|
||||
maddy on certificate renewal.
|
||||
Put that into /etc/letsencrypt/renewal-hooks/post/restart:
|
||||
```shell
|
||||
#!/bin/bash
|
||||
systemctl restart maddy
|
||||
```
|
||||
And make it executable:
|
||||
```
|
||||
$ sudo chmod +x /etc/letsencrypt/renewal-hooks/post/restart
|
||||
```
|
||||
maddy reloads TLS certificates from disk once in a minute so it will notice
|
||||
renewal. It is possible to force reload via `systemctl reload maddy` (or just
|
||||
`killall -USR2 maddy`).
|
||||
|
||||
## First run
|
||||
|
||||
|
|
|
@ -33,7 +33,7 @@ func (cfg *TLSConfig) Get() *tls.Config {
|
|||
return cfg.cfg.Clone()
|
||||
}
|
||||
|
||||
func (cfg *TLSConfig) read(m *Map, node *Node) error {
|
||||
func (cfg *TLSConfig) read(m *Map, node *Node, generateSelfSig bool) error {
|
||||
cfg.l.Lock()
|
||||
defer cfg.l.Unlock()
|
||||
|
||||
|
@ -44,6 +44,10 @@ func (cfg *TLSConfig) read(m *Map, node *Node) error {
|
|||
cfg.cfg = nil
|
||||
return nil
|
||||
case "self_signed":
|
||||
if !generateSelfSig {
|
||||
return nil
|
||||
}
|
||||
|
||||
tlsCfg := &tls.Config{
|
||||
MinVersion: tls.VersionTLS10,
|
||||
MaxVersion: tls.VersionTLS13,
|
||||
|
@ -79,16 +83,25 @@ func TLSDirective(m *Map, node *Node) (interface{}, error) {
|
|||
cfg := TLSConfig{
|
||||
initCfg: node,
|
||||
}
|
||||
if err := cfg.read(m, node); err != nil {
|
||||
if err := cfg.read(m, node, true); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
hooks.AddHook(hooks.EventReload, func() {
|
||||
log.Debugln("reloading TLS configuration")
|
||||
if err := cfg.read(NewMap(nil, cfg.initCfg), cfg.initCfg); err != nil {
|
||||
log.DefaultLogger.Error("failed to reload TLS config", err)
|
||||
log.Debugln("tls: reloading certificates")
|
||||
if err := cfg.read(NewMap(nil, cfg.initCfg), cfg.initCfg, false); err != nil {
|
||||
log.DefaultLogger.Error("tls: failed to load new certs", err)
|
||||
}
|
||||
})
|
||||
go func() {
|
||||
t := time.NewTicker(1 * time.Minute)
|
||||
for range t.C {
|
||||
log.Debugln("tls: reloading certificates")
|
||||
if err := cfg.read(NewMap(nil, cfg.initCfg), cfg.initCfg, false); err != nil {
|
||||
log.DefaultLogger.Error("tls: failed to load new certs", err)
|
||||
}
|
||||
}
|
||||
}()
|
||||
|
||||
// Return nil so callers can check whether TLS is enabled easier.
|
||||
if cfg.cfg == nil {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue