Run gofmt

This commit is contained in:
Moritz Marquardt 2021-12-01 22:59:52 +01:00
parent fedfa8def4
commit a48ba8ee49
No known key found for this signature in database
GPG key ID: D5788327BEE388B6

View file

@ -311,7 +311,7 @@ func obtainCert(acmeClient *lego.Client, domains []string, renew *certificate.Re
tlsCertificate, err := tls.X509KeyPair(renew.Certificate, renew.PrivateKey) tlsCertificate, err := tls.X509KeyPair(renew.Certificate, renew.PrivateKey)
if err == nil && tlsCertificate.Leaf.NotAfter.After(time.Now()) { if err == nil && tlsCertificate.Leaf.NotAfter.After(time.Now()) {
// avoid sending a mock cert instead of a still valid cert, instead abuse CSR field to store time to try again at // avoid sending a mock cert instead of a still valid cert, instead abuse CSR field to store time to try again at
renew.CSR = []byte(strconv.FormatInt(time.Now().Add(6 * time.Hour).Unix(), 10)) renew.CSR = []byte(strconv.FormatInt(time.Now().Add(6*time.Hour).Unix(), 10))
PogrebPut(keyDatabase, []byte(name), renew) PogrebPut(keyDatabase, []byte(name), renew)
return tlsCertificate, nil return tlsCertificate, nil
} }
@ -338,7 +338,7 @@ func mockCert(domain string, msg string) tls.Certificate {
template := x509.Certificate{ template := x509.Certificate{
SerialNumber: big.NewInt(1), SerialNumber: big.NewInt(1),
Subject: pkix.Name{ Subject: pkix.Name{
CommonName: domain, CommonName: domain,
Organization: []string{"Codeberg Pages Error Certificate (couldn't obtain ACME certificate)"}, Organization: []string{"Codeberg Pages Error Certificate (couldn't obtain ACME certificate)"},
OrganizationalUnit: []string{ OrganizationalUnit: []string{
"Will not try again for 6 hours to avoid hitting rate limits for your domain.", "Will not try again for 6 hours to avoid hitting rate limits for your domain.",
@ -349,7 +349,7 @@ func mockCert(domain string, msg string) tls.Certificate {
}, },
// certificates younger than 7 days are renewed, so this enforces the cert to not be renewed for a 6 hours // certificates younger than 7 days are renewed, so this enforces the cert to not be renewed for a 6 hours
NotAfter: time.Now().Add(time.Hour * 24 * 7 + time.Hour * 6), NotAfter: time.Now().Add(time.Hour*24*7 + time.Hour*6),
NotBefore: time.Now(), NotBefore: time.Now(),
KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature, KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,
@ -370,20 +370,20 @@ func mockCert(domain string, msg string) tls.Certificate {
out := &bytes.Buffer{} out := &bytes.Buffer{}
err = pem.Encode(out, &pem.Block{ err = pem.Encode(out, &pem.Block{
Bytes: certBytes, Bytes: certBytes,
Type: "CERTIFICATE", Type: "CERTIFICATE",
}) })
if err != nil { if err != nil {
panic(err) panic(err)
} }
outBytes := out.Bytes() outBytes := out.Bytes()
res := &certificate.Resource{ res := &certificate.Resource{
PrivateKey: certcrypto.PEMEncode(key), PrivateKey: certcrypto.PEMEncode(key),
Certificate: outBytes, Certificate: outBytes,
IssuerCertificate: outBytes, IssuerCertificate: outBytes,
Domain: domain, Domain: domain,
} }
databaseName := domain databaseName := domain
if domain == "*" + string(MainDomainSuffix) || domain == string(MainDomainSuffix[1:]) { if domain == "*"+string(MainDomainSuffix) || domain == string(MainDomainSuffix[1:]) {
databaseName = string(MainDomainSuffix) databaseName = string(MainDomainSuffix)
} }
PogrebPut(keyDatabase, []byte(databaseName), res) PogrebPut(keyDatabase, []byte(databaseName), res)