@@ -301,7 +301,7 @@ func (p *prober) fulfill(ctx context.Context, z *acme.Authorization) error {
301301func (p * prober ) runTLSALPN01 (ctx context.Context , z * acme.Authorization , chal * acme.Challenge ) error {
302302 tokenCert , err := p .client .TLSALPN01ChallengeCert (chal .Token , z .Identifier .Value )
303303 if err != nil {
304- return fmt .Errorf ("TLSALPN01ChallengeCert: %v " , err )
304+ return fmt .Errorf ("TLSALPN01ChallengeCert: %w " , err )
305305 }
306306 s := & http.Server {
307307 Addr : p .localAddr ,
@@ -321,7 +321,7 @@ func (p *prober) runTLSALPN01(ctx context.Context, z *acme.Authorization, chal *
321321 defer s .Close ()
322322
323323 if _ , err := p .client .Accept (ctx , chal ); err != nil {
324- return fmt .Errorf ("Accept(%q): %v " , chal .URI , err )
324+ return fmt .Errorf ("Accept(%q): %w " , chal .URI , err )
325325 }
326326 _ , zerr := p .client .WaitAuthorization (ctx , z .URI )
327327 return zerr
@@ -330,7 +330,7 @@ func (p *prober) runTLSALPN01(ctx context.Context, z *acme.Authorization, chal *
330330func (p * prober ) runHTTP01 (ctx context.Context , z * acme.Authorization , chal * acme.Challenge ) error {
331331 body , err := p .client .HTTP01ChallengeResponse (chal .Token )
332332 if err != nil {
333- return fmt .Errorf ("HTTP01ChallengeResponse: %v " , err )
333+ return fmt .Errorf ("HTTP01ChallengeResponse: %w " , err )
334334 }
335335 s := & http.Server {
336336 Addr : p .localAddr ,
@@ -347,7 +347,7 @@ func (p *prober) runHTTP01(ctx context.Context, z *acme.Authorization, chal *acm
347347 defer s .Close ()
348348
349349 if _ , err := p .client .Accept (ctx , chal ); err != nil {
350- return fmt .Errorf ("Accept(%q): %v " , chal .URI , err )
350+ return fmt .Errorf ("Accept(%q): %w " , chal .URI , err )
351351 }
352352 _ , zerr := p .client .WaitAuthorization (ctx , z .URI )
353353 return zerr
@@ -356,7 +356,7 @@ func (p *prober) runHTTP01(ctx context.Context, z *acme.Authorization, chal *acm
356356func (p * prober ) runDNS01 (ctx context.Context , z * acme.Authorization , chal * acme.Challenge ) error {
357357 token , err := p .client .DNS01ChallengeRecord (chal .Token )
358358 if err != nil {
359- return fmt .Errorf ("DNS01ChallengeRecord: %v " , err )
359+ return fmt .Errorf ("DNS01ChallengeRecord: %w " , err )
360360 }
361361
362362 name := fmt .Sprintf ("_acme-challenge.%s" , z .Identifier .Value )
@@ -365,11 +365,11 @@ func (p *prober) runDNS01(ctx context.Context, z *acme.Authorization, chal *acme
365365 cmd .Stdout = os .Stdout
366366 cmd .Stderr = os .Stderr
367367 if err := cmd .Run (); err != nil {
368- return fmt .Errorf ("%s: %v " , p .dnsScript , err )
368+ return fmt .Errorf ("%s: %w " , p .dnsScript , err )
369369 }
370370
371371 if _ , err := p .client .Accept (ctx , chal ); err != nil {
372- return fmt .Errorf ("Accept(%q): %v " , chal .URI , err )
372+ return fmt .Errorf ("Accept(%q): %w " , chal .URI , err )
373373 }
374374 _ , zerr := p .client .WaitAuthorization (ctx , z .URI )
375375 return zerr
@@ -389,7 +389,7 @@ func checkCert(derChain [][]byte, id []acme.AuthzID) error {
389389 for i , b := range derChain {
390390 crt , err := x509 .ParseCertificate (b )
391391 if err != nil {
392- return fmt .Errorf ("%d: ParseCertificate: %v " , i , err )
392+ return fmt .Errorf ("%d: ParseCertificate: %w " , i , err )
393393 }
394394 log .Printf ("%d: serial: 0x%s" , i , crt .SerialNumber )
395395 log .Printf ("%d: subject: %s" , i , crt .Subject )
0 commit comments