@@ -449,7 +449,7 @@ const internalCertificate = {
449
449
*/
450
450
writeCustomCert : ( certificate ) => {
451
451
if ( debug_mode ) {
452
- logger . info ( 'Writing Custom Certificate:' , certificate ) ;
452
+ logger . debug ( 'Writing Custom Certificate:' , certificate ) ;
453
453
}
454
454
455
455
let dir = '/data/custom_ssl/npm-' + certificate . id ;
@@ -575,18 +575,14 @@ const internalCertificate = {
575
575
throw new error . ValidationError ( 'Cannot upload certificates for this type of provider' ) ;
576
576
}
577
577
578
- if ( debug_mode ) {
579
- logger . info ( 'certificate.upload data: ' + JSON . stringify ( data ) ) ;
580
- }
581
-
582
578
return internalCertificate . validate ( data )
583
579
. then ( ( validations ) => {
584
580
if ( typeof validations . certificate === 'undefined' ) {
585
581
throw new error . ValidationError ( 'Certificate file was not provided' ) ;
586
582
}
587
583
588
584
if ( debug_mode ) {
589
- logger . info ( 'certificate.upload validate result: ' + JSON . stringify ( validations ) ) ;
585
+ logger . debug ( 'certificate.upload validate result: ' + JSON . stringify ( validations ) ) ;
590
586
}
591
587
592
588
_ . map ( data . files , ( file , name ) => {
@@ -603,15 +599,15 @@ const internalCertificate = {
603
599
} )
604
600
. then ( ( certificate ) => {
605
601
if ( debug_mode ) {
606
- logger . info ( 'certificate.upload row.meta: ' + row . meta ) ;
602
+ logger . debug ( 'certificate.upload row.meta: ' + row . meta ) ;
607
603
}
608
604
certificate . meta = row . meta ;
609
605
return internalCertificate . writeCustomCert ( certificate ) ;
610
606
} ) ;
611
607
} )
612
608
. then ( ( ) => {
613
609
if ( debug_mode ) {
614
- logger . info ( 'certificate.upload completed' ) ;
610
+ logger . debug ( 'certificate.upload completed' ) ;
615
611
}
616
612
return _ . pick ( row . meta , internalCertificate . allowed_ssl_files ) ;
617
613
} ) ;
@@ -631,21 +627,21 @@ const internalCertificate = {
631
627
const cmd = 'openssl ' + key_type + ' -in ' + filepath + ' -check -noout 2>&1 ' ;
632
628
633
629
if ( debug_mode ) {
634
- logger . info ( 'checkPrivateKey type: ' + key_type + ' ...' ) ;
635
- logger . info ( 'checkPrivateKey command: ' + cmd ) ;
630
+ logger . debug ( 'checkPrivateKey type: ' + key_type + ' ...' ) ;
631
+ logger . debug ( 'checkPrivateKey command: ' + cmd ) ;
636
632
}
637
633
638
634
return utils . exec ( cmd )
639
635
. then ( ( result ) => {
640
636
if ( debug_mode ) {
641
- logger . info ( 'checkPrivateKey result: ' + result ) ;
637
+ logger . debug ( 'checkPrivateKey result: ' + result ) ;
642
638
}
643
639
if ( ! result . toLowerCase ( ) . includes ( 'key ok' ) && ! result . toLowerCase ( ) . includes ( 'key valid' ) ) {
644
640
throw new error . ValidationError ( 'Result Validation Error: ' + result ) ;
645
641
}
646
642
fs . unlinkSync ( filepath ) ;
647
643
if ( debug_mode ) {
648
- logger . info ( 'checkPrivateKey completed' ) ;
644
+ logger . debug ( 'checkPrivateKey completed' ) ;
649
645
}
650
646
return true ;
651
647
} ) . catch ( ( err ) => {
@@ -688,13 +684,13 @@ const internalCertificate = {
688
684
const cmd = 'openssl x509 -in ' + certificate_file + ' -subject -noout' ;
689
685
690
686
if ( debug_mode ) {
691
- logger . info ( 'getCertificateInfoFromFile command: ' + cmd ) ;
687
+ logger . debug ( 'getCertificateInfoFromFile command: ' + cmd ) ;
692
688
}
693
689
694
690
return utils . exec ( cmd )
695
691
. then ( ( result ) => {
696
692
if ( debug_mode ) {
697
- logger . info ( 'getCertificateInfoFromFile result: ' + result ) ;
693
+ logger . debug ( 'getCertificateInfoFromFile result: ' + result ) ;
698
694
}
699
695
// subject=CN = something.example.com
700
696
let regex = / (?: s u b j e c t = ) ? [ ^ = ] + = \s + ( \S + ) / gim;
@@ -709,13 +705,13 @@ const internalCertificate = {
709
705
. then ( ( ) => {
710
706
const cmd2 = 'openssl x509 -in ' + certificate_file + ' -issuer -noout' ;
711
707
if ( debug_mode ) {
712
- logger . info ( 'getCertificateInfoFromFile command: ' + cmd2 ) ;
708
+ logger . debug ( 'getCertificateInfoFromFile command: ' + cmd2 ) ;
713
709
}
714
710
return utils . exec ( cmd2 ) ;
715
711
} )
716
712
. then ( ( result ) => {
717
713
if ( debug_mode ) {
718
- logger . info ( 'getCertificateInfoFromFile result: ' + result ) ;
714
+ logger . debug ( 'getCertificateInfoFromFile result: ' + result ) ;
719
715
}
720
716
// issuer=C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
721
717
let regex = / ^ (?: i s s u e r = ) ? ( .* ) $ / gim;
@@ -730,13 +726,13 @@ const internalCertificate = {
730
726
. then ( ( ) => {
731
727
const cmd3 = 'openssl x509 -in ' + certificate_file + ' -dates -noout' ;
732
728
if ( debug_mode ) {
733
- logger . info ( 'getCertificateInfoFromFile command: ' + cmd3 ) ;
729
+ logger . debug ( 'getCertificateInfoFromFile command: ' + cmd3 ) ;
734
730
}
735
731
return utils . exec ( cmd3 ) ;
736
732
} )
737
733
. then ( ( result ) => {
738
734
if ( debug_mode ) {
739
- logger . info ( 'getCertificateInfoFromFile result: ' + result ) ;
735
+ logger . debug ( 'getCertificateInfoFromFile result: ' + result ) ;
740
736
}
741
737
// notBefore=Jul 14 04:04:29 2018 GMT
742
738
// notAfter=Oct 12 04:04:29 2018 GMT
@@ -773,7 +769,7 @@ const internalCertificate = {
773
769
} ;
774
770
775
771
if ( debug_mode ) {
776
- logger . info ( 'getCertificateInfoFromFile completed: ' + JSON . stringify ( cert_data ) ) ;
772
+ logger . debug ( 'getCertificateInfoFromFile completed: ' + JSON . stringify ( cert_data ) ) ;
777
773
}
778
774
779
775
return cert_data ;
@@ -820,7 +816,7 @@ const internalCertificate = {
820
816
( le_staging ? '--staging' : '' ) ;
821
817
822
818
if ( debug_mode ) {
823
- logger . info ( 'Command :', cmd ) ;
819
+ logger . debug ( 'requestLetsEncryptSsl command :', cmd ) ;
824
820
}
825
821
826
822
return utils . exec ( cmd )
@@ -878,7 +874,7 @@ const internalCertificate = {
878
874
}
879
875
880
876
if ( debug_mode ) {
881
- logger . info ( 'Command :', `${ credentials_cmd } && ${ prepare_cmd } && ${ main_cmd } ` ) ;
877
+ logger . debug ( 'requestLetsEncryptSslWithDnsChallenge command :', `${ credentials_cmd } && ${ prepare_cmd } && ${ main_cmd } ` ) ;
882
878
}
883
879
884
880
return utils . exec ( credentials_cmd )
@@ -959,7 +955,7 @@ const internalCertificate = {
959
955
( le_staging ? '--staging' : '' ) ;
960
956
961
957
if ( debug_mode ) {
962
- logger . info ( 'Command :', cmd ) ;
958
+ logger . debug_mode ( 'renewLetsEncryptSsl command :', cmd ) ;
963
959
}
964
960
965
961
return utils . exec ( cmd )
@@ -995,7 +991,7 @@ const internalCertificate = {
995
991
}
996
992
997
993
if ( debug_mode ) {
998
- logger . info ( 'Command :', main_cmd ) ;
994
+ logger . debug ( 'renewLetsEncryptSslWithDnsChallenge command :', main_cmd ) ;
999
995
}
1000
996
1001
997
return utils . exec ( main_cmd )
@@ -1022,7 +1018,7 @@ const internalCertificate = {
1022
1018
const delete_credentials_cmd = `rm -f '/etc/letsencrypt/credentials/credentials-${ certificate . id } ' || true` ;
1023
1019
1024
1020
if ( debug_mode ) {
1025
- logger . info ( 'Command :', main_cmd + '; ' + delete_credentials_cmd ) ;
1021
+ logger . debug ( 'revokeLetsEncryptSsl command :', main_cmd + '; ' + delete_credentials_cmd ) ;
1026
1022
}
1027
1023
1028
1024
return utils . exec ( main_cmd )
@@ -1033,7 +1029,7 @@ const internalCertificate = {
1033
1029
} )
1034
1030
. catch ( ( err ) => {
1035
1031
if ( debug_mode ) {
1036
- logger . error ( err . message ) ;
1032
+ logger . debug ( 'revokeLetsEncryptSsl error:' , err . message ) ;
1037
1033
}
1038
1034
1039
1035
if ( throw_errors ) {
0 commit comments