@@ -301,7 +301,7 @@ func (p *prober) fulfill(ctx context.Context, z *acme.Authorization) error {
301
301
func (p * prober ) runTLSALPN01 (ctx context.Context , z * acme.Authorization , chal * acme.Challenge ) error {
302
302
tokenCert , err := p .client .TLSALPN01ChallengeCert (chal .Token , z .Identifier .Value )
303
303
if err != nil {
304
- return fmt .Errorf ("TLSALPN01ChallengeCert: %v " , err )
304
+ return fmt .Errorf ("TLSALPN01ChallengeCert: %w " , err )
305
305
}
306
306
s := & http.Server {
307
307
Addr : p .localAddr ,
@@ -321,7 +321,7 @@ func (p *prober) runTLSALPN01(ctx context.Context, z *acme.Authorization, chal *
321
321
defer s .Close ()
322
322
323
323
if _ , err := p .client .Accept (ctx , chal ); err != nil {
324
- return fmt .Errorf ("Accept(%q): %v " , chal .URI , err )
324
+ return fmt .Errorf ("Accept(%q): %w " , chal .URI , err )
325
325
}
326
326
_ , zerr := p .client .WaitAuthorization (ctx , z .URI )
327
327
return zerr
@@ -330,7 +330,7 @@ func (p *prober) runTLSALPN01(ctx context.Context, z *acme.Authorization, chal *
330
330
func (p * prober ) runHTTP01 (ctx context.Context , z * acme.Authorization , chal * acme.Challenge ) error {
331
331
body , err := p .client .HTTP01ChallengeResponse (chal .Token )
332
332
if err != nil {
333
- return fmt .Errorf ("HTTP01ChallengeResponse: %v " , err )
333
+ return fmt .Errorf ("HTTP01ChallengeResponse: %w " , err )
334
334
}
335
335
s := & http.Server {
336
336
Addr : p .localAddr ,
@@ -347,7 +347,7 @@ func (p *prober) runHTTP01(ctx context.Context, z *acme.Authorization, chal *acm
347
347
defer s .Close ()
348
348
349
349
if _ , err := p .client .Accept (ctx , chal ); err != nil {
350
- return fmt .Errorf ("Accept(%q): %v " , chal .URI , err )
350
+ return fmt .Errorf ("Accept(%q): %w " , chal .URI , err )
351
351
}
352
352
_ , zerr := p .client .WaitAuthorization (ctx , z .URI )
353
353
return zerr
@@ -356,7 +356,7 @@ func (p *prober) runHTTP01(ctx context.Context, z *acme.Authorization, chal *acm
356
356
func (p * prober ) runDNS01 (ctx context.Context , z * acme.Authorization , chal * acme.Challenge ) error {
357
357
token , err := p .client .DNS01ChallengeRecord (chal .Token )
358
358
if err != nil {
359
- return fmt .Errorf ("DNS01ChallengeRecord: %v " , err )
359
+ return fmt .Errorf ("DNS01ChallengeRecord: %w " , err )
360
360
}
361
361
362
362
name := fmt .Sprintf ("_acme-challenge.%s" , z .Identifier .Value )
@@ -365,11 +365,11 @@ func (p *prober) runDNS01(ctx context.Context, z *acme.Authorization, chal *acme
365
365
cmd .Stdout = os .Stdout
366
366
cmd .Stderr = os .Stderr
367
367
if err := cmd .Run (); err != nil {
368
- return fmt .Errorf ("%s: %v " , p .dnsScript , err )
368
+ return fmt .Errorf ("%s: %w " , p .dnsScript , err )
369
369
}
370
370
371
371
if _ , err := p .client .Accept (ctx , chal ); err != nil {
372
- return fmt .Errorf ("Accept(%q): %v " , chal .URI , err )
372
+ return fmt .Errorf ("Accept(%q): %w " , chal .URI , err )
373
373
}
374
374
_ , zerr := p .client .WaitAuthorization (ctx , z .URI )
375
375
return zerr
@@ -389,7 +389,7 @@ func checkCert(derChain [][]byte, id []acme.AuthzID) error {
389
389
for i , b := range derChain {
390
390
crt , err := x509 .ParseCertificate (b )
391
391
if err != nil {
392
- return fmt .Errorf ("%d: ParseCertificate: %v " , i , err )
392
+ return fmt .Errorf ("%d: ParseCertificate: %w " , i , err )
393
393
}
394
394
log .Printf ("%d: serial: 0x%s" , i , crt .SerialNumber )
395
395
log .Printf ("%d: subject: %s" , i , crt .Subject )
0 commit comments