replace debug() with our custom logger
mostly we want trace() and log(). trace() can be enabled whenever we want by flipping a flag and restarting box
This commit is contained in:
@@ -1,19 +1,19 @@
|
||||
import assert from 'node:assert';
|
||||
import BoxError from './boxerror.js';
|
||||
import crypto from 'node:crypto';
|
||||
import debugModule from 'debug';
|
||||
import logger from './logger.js';
|
||||
import fs from 'node:fs';
|
||||
import os from 'node:os';
|
||||
import path from 'node:path';
|
||||
import safe from 'safetydance';
|
||||
import shellModule from './shell.js';
|
||||
|
||||
const debug = debugModule('box:openssl');
|
||||
const { log, trace } = logger('openssl');
|
||||
const shell = shellModule('openssl');
|
||||
|
||||
|
||||
async function generateKey(type) {
|
||||
debug(`generateKey: generating new key for${type}`);
|
||||
log(`generateKey: generating new key for${type}`);
|
||||
|
||||
if (type === 'rsa4096') {
|
||||
return await shell.spawn('openssl', ['genrsa', '4096'], { encoding: 'utf8' });
|
||||
@@ -63,7 +63,7 @@ async function createCsr(key, cn, altNames) {
|
||||
// while we pass the CN anyways, subjectAltName takes precedence
|
||||
const csrPem = await shell.spawn('openssl', ['req', '-new', '-key', keyFilePath, '-outform', 'PEM', '-subj', `/CN=${cn}`, '-config', opensslConfigFile], { encoding: 'utf8' });
|
||||
await safe(fs.promises.rm(tmpdir, { recursive: true, force: true }));
|
||||
debug(`createCsr: csr file created for ${cn}`);
|
||||
log(`createCsr: csr file created for ${cn}`);
|
||||
return csrPem; // inspect with openssl req -text -noout -in hostname.csr -inform pem
|
||||
};
|
||||
|
||||
@@ -81,7 +81,7 @@ async function getCertificateDates(cert) {
|
||||
const notAfterDate = new Date(notAfter);
|
||||
|
||||
const daysLeft = (notAfterDate - new Date())/(24 * 60 * 60 * 1000);
|
||||
debug(`expiryDate: ${lines[2]} notBefore=${notBefore} notAfter=${notAfter} daysLeft=${daysLeft}`);
|
||||
log(`expiryDate: ${lines[2]} notBefore=${notBefore} notAfter=${notAfter} daysLeft=${daysLeft}`);
|
||||
|
||||
return { startDate: notBeforeDate, endDate: notAfterDate };
|
||||
}
|
||||
@@ -106,7 +106,7 @@ async function generateCertificate(domain) {
|
||||
const opensslConf = safe.fs.readFileSync('/etc/ssl/openssl.cnf', 'utf8');
|
||||
const cn = domain;
|
||||
|
||||
debug(`generateCertificate: domain=${domain} cn=${cn}`);
|
||||
log(`generateCertificate: domain=${domain} cn=${cn}`);
|
||||
|
||||
// SAN must contain all the domains since CN check is based on implementation if SAN is found. -checkhost also checks only SAN if present!
|
||||
const opensslConfWithSan = `${opensslConf}\n[SAN]\nsubjectAltName=DNS:${domain},DNS:*.${cn}\n`;
|
||||
@@ -169,7 +169,7 @@ async function generateDkimKey() {
|
||||
}
|
||||
|
||||
async function generateDhparam() {
|
||||
debug('generateDhparam: generating dhparams');
|
||||
log('generateDhparam: generating dhparams');
|
||||
return await shell.spawn('openssl', ['dhparam', '-dsaparam', '2048'], { encoding: 'utf8' });
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user