diff options
author | Alan Pearce | 2024-11-28 15:12:00 +0100 |
---|---|---|
committer | Alan Pearce | 2024-11-28 15:12:00 +0100 |
commit | b94f66cfe5bf87ec6d2a32448ca5c55ba118c7aa (patch) | |
tree | eb6f951b3a0959c6ace7be6f111124791e90c54d /internal/server/tls.go | |
parent | 183b0c8b5edbcf4224d4dd3905ca483204522656 (diff) | |
download | website-b94f66cfe5bf87ec6d2a32448ca5c55ba118c7aa.tar.lz website-b94f66cfe5bf87ec6d2a32448ca5c55ba118c7aa.tar.zst website-b94f66cfe5bf87ec6d2a32448ca5c55ba118c7aa.zip |
Diffstat (limited to 'internal/server/tls.go')
-rw-r--r-- | internal/server/tls.go | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/internal/server/tls.go b/internal/server/tls.go index 2bb5ce4..716495c 100644 --- a/internal/server/tls.go +++ b/internal/server/tls.go @@ -73,13 +73,13 @@ func (s *Server) serveTLS() (err error) { rc := &redisConfig{} _, err = conf.Parse("REDIS", rc) if err != nil { - return errors.Wrap(err, "could not parse redis config") + return errors.WithMessage(err, "could not parse redis config") } pdns := &powerdns.Provider{} _, err = conf.Parse("POWERDNS", pdns) if err != nil { - return errors.Wrap(err, "could not parse PowerDNS ACME config") + return errors.WithMessage(err, "could not parse PowerDNS ACME config") } issuer = certmagic.NewACMEIssuer(cfg, certmagic.ACMEIssuer{ @@ -113,7 +113,7 @@ func (s *Server) serveTLS() (err error) { Context: context.Background(), }) if err != nil { - return errors.Wrap(err, "could not provision redis storage") + return errors.WithMessage(err, "could not provision redis storage") } } cfg.Issuers[0] = issuer @@ -124,7 +124,7 @@ func (s *Server) serveTLS() (err error) { log.Named("listenfd"), ) if err != nil { - return errors.Wrap(err, "could not bind plain socket") + return errors.WithMessage(err, "could not bind plain socket") } go func(ln net.Listener, srv *http.Server) { @@ -169,7 +169,7 @@ func (s *Server) serveTLS() (err error) { ) err = cfg.ManageAsync(context.TODO(), certificateDomains) if err != nil { - return errors.Wrap(err, "could not enable TLS") + return errors.WithMessage(err, "could not enable TLS") } tlsConfig := cfg.TLSConfig() tlsConfig.NextProtos = append([]string{"h2", "http/1.1"}, tlsConfig.NextProtos...) @@ -181,7 +181,7 @@ func (s *Server) serveTLS() (err error) { log.Named("listenfd"), ) if err != nil { - return errors.Wrap(err, "could not bind tls socket") + return errors.WithMessage(err, "could not bind tls socket") } return s.Serve(sln) |