Skip to content

Commit 858bb45

Browse files
authored
Merge branch 'master' into tcp-ipv6
2 parents 7ff28e1 + e96d7fc commit 858bb45

3 files changed

Lines changed: 14 additions & 16 deletions

File tree

libp2p/autotls/service.nim

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -197,10 +197,8 @@ when defined(libp2p_autotls_support):
197197
return false
198198

199199
# generate autotls domain string: "*.{peerID}.{dnsServerURL}"
200-
let baseDomain = api.Domain(
201-
encodePeerId(self.peerInfo.peerId) & "." & AutoTLSDNSServer &
202-
self.config.dnsServerURL
203-
)
200+
let baseDomain =
201+
api.Domain(encodePeerId(self.peerInfo.peerId) & "." & self.config.dnsServerURL)
204202
let domain = api.Domain("*." & baseDomain)
205203

206204
let acmeClient = self.acmeClient
@@ -260,7 +258,7 @@ when defined(libp2p_autotls_support):
260258
let derPrivKey = certKeyPair.seckey.rsakey.getBytes.valueOr:
261259
raise newException(AutoTLSError, "Unable to get TLS private key")
262260
let pemPrivKey: string = derPrivKey.pemEncode("PRIVATE KEY")
263-
debug "autotls cert", pemPrivKey = pemPrivKey, cert = certificate.rawCertificate
261+
debug "Autotls cert", pemPrivKey = pemPrivKey, cert = certificate.rawCertificate
264262

265263
trace "Installing certificate"
266264
let newCert =
@@ -311,7 +309,9 @@ when defined(libp2p_autotls_support):
311309
await self.tryIssueCertificate()
312310

313311
# AutotlsService will renew the cert 1h before it expires
314-
let cert = self.cert.get
312+
let cert = self.cert.valueOr:
313+
error "Could not issue certificate"
314+
return
315315
let waitTime = cert.expiry - Moment.now - self.config.renewBufferTime
316316
if waitTime <= self.config.renewBufferTime:
317317
await self.tryIssueCertificate()

libp2p/builders.nim

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -372,7 +372,7 @@ proc build*(b: SwitchBuilder): Switch {.raises: [LPError], public.} =
372372
muxedUpgrade = MuxedUpgrade.new(b.muxers, secureManagerInstances, ms)
373373

374374
b.autotls.withValue(autotlsService):
375-
b.services.insert(autotlsService, 0)
375+
b.services.add(autotlsService)
376376

377377
let transports = block:
378378
var transports: seq[Transport]
@@ -397,7 +397,7 @@ proc build*(b: SwitchBuilder): Switch {.raises: [LPError], public.} =
397397
PeerStore.new(identify)
398398

399399
if b.enableWildcardResolver:
400-
b.services.insert(WildcardAddressResolverService.new(), 0)
400+
b.services.add(WildcardAddressResolverService.new())
401401

402402
if not isNil(b.autonatV2Client):
403403
b.services.add(

tests/testautotls_integration.nim

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ when defined(linux) and defined(amd64):
7878
let ip =
7979
try:
8080
getPublicIPAddress()
81-
except:
81+
except CatchableError:
8282
skip() # host doesn't have public IPv4 address
8383
return
8484

@@ -100,20 +100,18 @@ when defined(linux) and defined(amd64):
100100
defer:
101101
await switch.stop()
102102

103-
# find autotls in list of services
103+
# find autotls service in switch
104104
var autotls: AutotlsService = nil
105105
for service in switch.services:
106-
try:
106+
if service of AutotlsService:
107107
autotls = AutotlsService(service)
108-
break
109-
except:
110-
continue
111-
112108
if autotls.isNil():
113-
raiseAssert "autotls service not found in switch"
109+
raiseAssert "No Autotls service in switch"
110+
return
114111

115112
# wait for cert to be ready
116113
await autotls.certReady.wait()
114+
117115
# clear since we'll use it again for renewal
118116
autotls.certReady.clear()
119117

0 commit comments

Comments
 (0)