Created
September 16, 2021 08:20
-
-
Save lwiechec/6f365119a491b793a17bbfcfd56fe19e to your computer and use it in GitHub Desktop.
acme2certfier - config files and log
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[DEFAULT] | |
#debug: False | |
debug: True | |
[Nonce] | |
# disable nonce check. THIS IS A SEVERE SECURTIY ISSUE! Please do only for testing/debugging purposes | |
nonce_check_disable: False | |
[CAhandler] | |
# CA specific options | |
handler_file: /var/www/acme2certifier/examples/ca_handler/mscertsrv_ca_handler.py | |
host: 10.7.31.136 | |
user: lukasz.wiechec | |
password: <my password> | |
auth_method: ntlm | |
template: WebServerV2 | |
ca_bundle: /var/www/acme2certifier/volume/ais-dc1-ca.cer | |
[DBhandler] | |
#dbfile: /var/lib/acme/db.sqlite3 | |
[Certificate] | |
revocation_reason_check_disable: False | |
[Challenge] | |
# when true disable challenge validation. Challenge will be set to 'valid' without further checking | |
# THIS IS A SEVERE SECURTIY ISSUE! Please do only for testing/debugging purposes | |
challenge_validation_disable: False | |
[Order] | |
tnauthlist_support: False |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Directory._config_load() | |
load_config(/var/www/acme2certifier/./acme_srv/acme_srv.cfg:Directory) | |
CAhandler._config_load() ended | |
10.7.31.40 / | |
Directory.directory_get() | |
[pid: 18|app: 0|req: 4/8] 10.7.31.40 () {32 vars in 391 bytes} [Thu Sep 16 08:19:59 2021] GET / => generated 610 bytes in 0 msecs (HTTP/1.1 200) 1 headers in 51 bytes (1 switches on core 0) | |
Nonce.nonce_generate_and_add() | |
Nonce.nonce__new() | |
got nonce: 992254901503491a96b0be78e266daa4 | |
DBStore.nonce_add(992254901503491a96b0be78e266daa4) | |
DBStore.nonce_add() ended | |
Nonce.generate_and_add() ended with:992254901503491a96b0be78e266daa4 | |
[pid: 20|app: 0|req: 4/9] 10.7.31.40 () {34 vars in 481 bytes} [Thu Sep 16 08:20:00 2021] HEAD /acme/newnonce => generated 0 bytes in 47 msecs (HTTP/1.1 200) 2 headers in 93 bytes (0 switches on core 0) | |
_config_load() | |
Order._config_load() | |
Order._config_load() ended. | |
Order.new() | |
Message.check() | |
decode_message() | |
Nonce.check_nonce() | |
Nonce.nonce._check_and_delete(992254901503491a96b0be78e266daa4) | |
DBStore.nonce_check(992254901503491a96b0be78e266daa4) | |
DBStore.nonce_check() ended | |
DBStore.nonce_delete(992254901503491a96b0be78e266daa4) | |
DBStore.nonce_delete() ended | |
Nonce._check_and_delete() ended with:200 | |
Nonce.check_nonce() ended with:200 | |
Message._name_get() | |
kid: http://acme.ais.foo.com/acme/acct/8GzXUPHPQk2j | |
Message._name_get() returns: 8GzXUPHPQk2j | |
Signature.check(8GzXUPHPQk2j) | |
check signature against account key | |
Signature._jwk_load(8GzXUPHPQk2j) | |
DBStore.jwk_load(8GzXUPHPQk2j) | |
DBStore._account_search(column:name, pattern:8GzXUPHPQk2j) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '2j1GmwO5g2JUpgKtQSv6VOslu431wDwTtkGm3WqHNLMplofoTGT6VIgRH887a9k3zGDgtvlTt-4yugfjfBqG0I5hWQ3iJINx28UNv8Cmi99y002KM1PaEDAUzR-sN-SqhG-hMMBk5Xi0tpsdFTgTAD9orSKq2xbs5_Ego1NkJcORo87U5ipTCokVf4mtzwDOqueA7yzH2NyQX6dA9C1M43-aryEPqY3PntkQwdbwbjU8Z0Gd6mSV3-Vhql9Yw_mLYI4JRIyoLZTixem9-yIohzm6arULnbQMwtNBq-WQ30N5_OOag6DPzihBNHxvkr1Nd5Je7A3Ficn1bWknEP3FJQ', 'alg': 'RS256'} | |
signature_check(False) | |
Signature.check() ended with: True:None | |
Message.check() ended with:200 | |
Order._add(8GzXUPHPQk2j) | |
generate_random_string() | |
Order._identifiers_check([{'type': 'dns', 'value': 'grafana.csd-monitor.ais.foo.com'}]) | |
Order._identifiers_check() done with None: | |
DBStore.order_add({'status': 2, 'expires': 1631866800, 'account': '8GzXUPHPQk2j', 'name': 'WCzOH8vQCMRz', 'identifiers': '[{"type": "dns", "value": "grafana.csd-monitor.ais.foo.com"}]'}) | |
DBStore.account_lookup(column:name, pattern:8GzXUPHPQk2j) | |
DBStore._account_search(column:name, pattern:8GzXUPHPQk2j) | |
DBStore._account_search() ended with: True | |
DBStore.account_lookup() ended | |
DBStore.order_add() ended | |
generate_random_string() | |
DBStore.authorization_add({'type': 'dns', 'value': 'grafana.csd-monitor.ais.foo.com', 'name': 'ONpIvkuyZWQl', 'order': 39, 'status': 'pending', 'expires': 1631866800}) | |
DBStore.authorization_add() ended with: 39 | |
Order._add() ended | |
Message.prepare_response() | |
Nonce.nonce_generate_and_add() | |
Nonce.nonce__new() | |
got nonce: ec06e72eeaee4eaa870101775a0a23be | |
DBStore.nonce_add(ec06e72eeaee4eaa870101775a0a23be) | |
DBStore.nonce_add() ended | |
Nonce.generate_and_add() ended with:ec06e72eeaee4eaa870101775a0a23be | |
Order.new() returns: {"header": {"Location": "http://acme.ais.foo.com/acme/order/WCzOH8vQCMRz", "Replay-Nonce": "ec06e72eeaee4eaa870101775a0a23be"}, "data": {"identifiers": [{"type": "dns", "value": "grafana.csd-monitor.ais.foo.com"}], "authorizations": ["http://acme.ais.foo.com/acme/authz/ONpIvkuyZWQl"], "status": "pending", "expires": "2021-09-17T08:20:00Z", "finalize": "http://acme.ais.foo.com/acme/order/WCzOH8vQCMRz/finalize"}, "code": 201} | |
10.7.31.40 /acme/neworders {'header': {'Location': 'http://acme.ais.foo.com/acme/order/WCzOH8vQCMRz', 'Replay-Nonce': '- modified -'}, 'data': {'identifiers': [{'type': 'dns', 'value': 'grafana.csd-monitor.ais.foo.com'}], 'authorizations': ['http://acme.ais.foo.com/acme/authz/ONpIvkuyZWQl'], 'status': 'pending', 'expires': '2021-09-17T08:20:00Z', 'finalize': 'http://acme.ais.foo.com/acme/order/WCzOH8vQCMRz/finalize'}, 'code': 201} | |
[pid: 19|app: 0|req: 2/10] 10.7.31.40 () {36 vars in 512 bytes} [Thu Sep 16 08:20:00 2021] POST /acme/neworders => generated 280 bytes in 134 msecs (HTTP/1.1 201) 3 headers in 159 bytes (1 switches on core 0) | |
_config_load() | |
Authorization._config_load() | |
Authorization._config_load() ended. | |
Authorization.new_post() | |
Authorization.invalidate(None) | |
Authorization.invalidate(): set timestamp to 1631780401 | |
DBStore.authorizations_expired_search(column:expires, pattern:1631780401) | |
DBStore.authorizations_expired_search-() ended | |
Authorization.invalidate() ended: 0 authorizations identified | |
Message.check() | |
decode_message() | |
Nonce.check_nonce() | |
Nonce.nonce._check_and_delete(ec06e72eeaee4eaa870101775a0a23be) | |
DBStore.nonce_check(ec06e72eeaee4eaa870101775a0a23be) | |
DBStore.nonce_check() ended | |
DBStore.nonce_delete(ec06e72eeaee4eaa870101775a0a23be) | |
DBStore.nonce_delete() ended | |
Nonce._check_and_delete() ended with:200 | |
Nonce.check_nonce() ended with:200 | |
Message._name_get() | |
kid: http://acme.ais.foo.com/acme/acct/8GzXUPHPQk2j | |
Message._name_get() returns: 8GzXUPHPQk2j | |
Signature.check(8GzXUPHPQk2j) | |
check signature against account key | |
Signature._jwk_load(8GzXUPHPQk2j) | |
DBStore.jwk_load(8GzXUPHPQk2j) | |
DBStore._account_search(column:name, pattern:8GzXUPHPQk2j) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '2j1GmwO5g2JUpgKtQSv6VOslu431wDwTtkGm3WqHNLMplofoTGT6VIgRH887a9k3zGDgtvlTt-4yugfjfBqG0I5hWQ3iJINx28UNv8Cmi99y002KM1PaEDAUzR-sN-SqhG-hMMBk5Xi0tpsdFTgTAD9orSKq2xbs5_Ego1NkJcORo87U5ipTCokVf4mtzwDOqueA7yzH2NyQX6dA9C1M43-aryEPqY3PntkQwdbwbjU8Z0Gd6mSV3-Vhql9Yw_mLYI4JRIyoLZTixem9-yIohzm6arULnbQMwtNBq-WQ30N5_OOag6DPzihBNHxvkr1Nd5Je7A3Ficn1bWknEP3FJQ', 'alg': 'RS256'} | |
signature_check(False) | |
Signature.check() ended with: True:None | |
Message.check() ended with:200 | |
Authorization._authz_info(http://acme.ais.foo.com/acme/authz/ONpIvkuyZWQl) | |
generate_random_string() | |
DBStore.authorization_lookup(column:name, pattern:ONpIvkuyZWQl) | |
DBStore._authorization_search(column:name, pattern:ONpIvkuyZWQl) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_lookup() ended | |
DBStore.authorization_update({'name': 'ONpIvkuyZWQl', 'token': 'fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs', 'expires': 1631866801}) | |
DBStore._authorization_search(column:name, pattern:ONpIvkuyZWQl) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_update() ended | |
DBStore.authorization_lookup(column:name, pattern:ONpIvkuyZWQl) | |
DBStore._authorization_search(column:name, pattern:ONpIvkuyZWQl) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_lookup() ended | |
_config_load() | |
Challenge._config_load() | |
Challenge._config_load() ended. | |
Challenge.challengeset_get() for auth: ONpIvkuyZWQl | |
Challenge._challengelist_search() | |
DBStore._challenge_search(column:authorization__name, pattern:ONpIvkuyZWQl) | |
DBStore._challenge_search() ended | |
Challenge._challengelist_search() ended with: [] | |
Challenges not found. Create a new set. | |
Challenge.new_set(ONpIvkuyZWQl, fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs) | |
Challenge._new(http-01) | |
generate_random_string() | |
DBStore.challenge_add({'name': 'KhzURkGvKk1l', 'expires': 1631866801, 'type': 'http-01', 'token': 'fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs', 'authorization': 'ONpIvkuyZWQl', 'status': 2}) | |
DBStore.authorization_lookup(column:name, pattern:ONpIvkuyZWQl) | |
DBStore._authorization_search(column:name, pattern:ONpIvkuyZWQl) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_lookup() ended | |
DBStore.challenge_add() ended | |
Challenge._new(dns-01) | |
generate_random_string() | |
DBStore.challenge_add({'name': 'RYWjJqO1M8d2', 'expires': 1631866801, 'type': 'dns-01', 'token': 'fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs', 'authorization': 'ONpIvkuyZWQl', 'status': 2}) | |
DBStore.authorization_lookup(column:name, pattern:ONpIvkuyZWQl) | |
DBStore._authorization_search(column:name, pattern:ONpIvkuyZWQl) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_lookup() ended | |
DBStore.challenge_add() ended | |
Challenge._new(tls-alpn-01) | |
generate_random_string() | |
DBStore.challenge_add({'name': 'q0MGBaHE1J4E', 'expires': 1631866801, 'type': 'tls-alpn-01', 'token': 'fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs', 'authorization': 'ONpIvkuyZWQl', 'status': 2}) | |
DBStore.authorization_lookup(column:name, pattern:ONpIvkuyZWQl) | |
DBStore._authorization_search(column:name, pattern:ONpIvkuyZWQl) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_lookup() ended | |
DBStore.challenge_add() ended | |
Challenge._new_set returned ([{'type': 'http-01', 'url': 'http://acme.ais.foo.com/acme/chall/KhzURkGvKk1l', 'token': 'fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs'}, {'type': 'dns-01', 'url': 'http://acme.ais.foo.com/acme/chall/RYWjJqO1M8d2', 'token': 'fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs'}, {'type': 'tls-alpn-01', 'url': 'http://acme.ais.foo.com/acme/chall/q0MGBaHE1J4E', 'token': 'fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs'}]) | |
Authorization._authz_info() returns: {"expires": "2021-09-17T08:20:01Z", "status": "pending", "identifier": {"type": "dns", "value": "grafana.csd-monitor.ais.foo.com"}, "challenges": [{"type": "http-01", "url": "http://acme.ais.foo.com/acme/chall/KhzURkGvKk1l", "token": "fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs"}, {"type": "dns-01", "url": "http://acme.ais.foo.com/acme/chall/RYWjJqO1M8d2", "token": "fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs"}, {"type": "tls-alpn-01", "url": "http://acme.ais.foo.com/acme/chall/q0MGBaHE1J4E", "token": "fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs"}]} | |
Message.prepare_response() | |
Nonce.nonce_generate_and_add() | |
Nonce.nonce__new() | |
got nonce: d13aa13f3824437bba930f2147feb89d | |
DBStore.nonce_add(d13aa13f3824437bba930f2147feb89d) | |
DBStore.nonce_add() ended | |
Nonce.generate_and_add() ended with:d13aa13f3824437bba930f2147feb89d | |
Authorization.new_post() returns: {"data": {"expires": "2021-09-17T08:20:01Z", "status": "pending", "identifier": {"type": "dns", "value": "grafana.csd-monitor.ais.foo.com"}, "challenges": [{"type": "http-01", "url": "http://acme.ais.foo.com/acme/chall/KhzURkGvKk1l", "token": "fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs"}, {"type": "dns-01", "url": "http://acme.ais.foo.com/acme/chall/RYWjJqO1M8d2", "token": "fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs"}, {"type": "tls-alpn-01", "url": "http://acme.ais.foo.com/acme/chall/q0MGBaHE1J4E", "token": "fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs"}]}, "code": 200, "header": {"Replay-Nonce": "d13aa13f3824437bba930f2147feb89d"}} | |
10.7.31.40 /acme/authz/ONpIvkuyZWQl {'data': {'expires': '2021-09-17T08:20:01Z', 'status': 'pending', 'identifier': {'type': 'dns', 'value': 'grafana.csd-monitor.ais.foo.com'}, 'challenges': [{'type': 'http-01', 'url': 'http://acme.ais.foo.com/acme/chall/KhzURkGvKk1l', 'token': '- modified - '}, {'type': 'dns-01', 'url': 'http://acme.ais.foo.com/acme/chall/RYWjJqO1M8d2', 'token': '- modified - '}, {'type': 'tls-alpn-01', 'url': 'http://acme.ais.foo.com/acme/chall/q0MGBaHE1J4E', 'token': '- modified - '}]}, 'code': 200, 'header': {'Replay-Nonce': '- modified -'}} | |
[pid: 18|app: 0|req: 5/11] 10.7.31.40 () {36 vars in 530 bytes} [Thu Sep 16 08:20:00 2021] POST /acme/authz/ONpIvkuyZWQl => generated 526 bytes in 208 msecs (HTTP/1.1 200) 2 headers in 104 bytes (2 switches on core 0) | |
_config_load() | |
Challenge._config_load() | |
Challenge._config_load() ended. | |
Challenge.parse() | |
Message.check() | |
decode_message() | |
Nonce.check_nonce() | |
Nonce.nonce._check_and_delete(d13aa13f3824437bba930f2147feb89d) | |
DBStore.nonce_check(d13aa13f3824437bba930f2147feb89d) | |
DBStore.nonce_check() ended | |
DBStore.nonce_delete(d13aa13f3824437bba930f2147feb89d) | |
DBStore.nonce_delete() ended | |
Nonce._check_and_delete() ended with:200 | |
Nonce.check_nonce() ended with:200 | |
Message._name_get() | |
kid: http://acme.ais.foo.com/acme/acct/8GzXUPHPQk2j | |
Message._name_get() returns: 8GzXUPHPQk2j | |
Signature.check(8GzXUPHPQk2j) | |
check signature against account key | |
Signature._jwk_load(8GzXUPHPQk2j) | |
DBStore.jwk_load(8GzXUPHPQk2j) | |
DBStore._account_search(column:name, pattern:8GzXUPHPQk2j) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '2j1GmwO5g2JUpgKtQSv6VOslu431wDwTtkGm3WqHNLMplofoTGT6VIgRH887a9k3zGDgtvlTt-4yugfjfBqG0I5hWQ3iJINx28UNv8Cmi99y002KM1PaEDAUzR-sN-SqhG-hMMBk5Xi0tpsdFTgTAD9orSKq2xbs5_Ego1NkJcORo87U5ipTCokVf4mtzwDOqueA7yzH2NyQX6dA9C1M43-aryEPqY3PntkQwdbwbjU8Z0Gd6mSV3-Vhql9Yw_mLYI4JRIyoLZTixem9-yIohzm6arULnbQMwtNBq-WQ30N5_OOag6DPzihBNHxvkr1Nd5Je7A3Ficn1bWknEP3FJQ', 'alg': 'RS256'} | |
signature_check(False) | |
Signature.check() ended with: True:None | |
Message.check() ended with:200 | |
Challenge.get_name(http://acme.ais.foo.com/acme/chall/KhzURkGvKk1l) | |
parse_url(http://acme.ais.foo.com/acme/chall/KhzURkGvKk1l) | |
Challenge._info(KhzURkGvKk1l) | |
DBStore.challenge_lookup(name:KhzURkGvKk1l) | |
DBStore._challenge_search(column:name, pattern:KhzURkGvKk1l) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'type': 'http-01', 'token': 'fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs', 'status': 'pending', 'validated': 0} | |
Challenge._info(KhzURkGvKk1l) ended | |
Challenge._validate(KhzURkGvKk1l: {}) | |
Challenge._check(KhzURkGvKk1l) | |
DBStore.challenge_lookup(name:KhzURkGvKk1l) | |
DBStore._challenge_search(column:name, pattern:KhzURkGvKk1l) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'type': 'http-01', 'status': 'pending', 'token': 'fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs', 'authorization': 'ONpIvkuyZWQl', 'authorization__type': 'dns', 'authorization__value': 'grafana.csd-monitor.ais.foo.com', 'authorization__token': 'fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs', 'authorization__order__account__name': '8GzXUPHPQk2j'} | |
DBStore.jwk_load(8GzXUPHPQk2j) | |
DBStore._account_search(column:name, pattern:8GzXUPHPQk2j) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '2j1GmwO5g2JUpgKtQSv6VOslu431wDwTtkGm3WqHNLMplofoTGT6VIgRH887a9k3zGDgtvlTt-4yugfjfBqG0I5hWQ3iJINx28UNv8Cmi99y002KM1PaEDAUzR-sN-SqhG-hMMBk5Xi0tpsdFTgTAD9orSKq2xbs5_Ego1NkJcORo87U5ipTCokVf4mtzwDOqueA7yzH2NyQX6dA9C1M43-aryEPqY3PntkQwdbwbjU8Z0Gd6mSV3-Vhql9Yw_mLYI4JRIyoLZTixem9-yIohzm6arULnbQMwtNBq-WQ30N5_OOag6DPzihBNHxvkr1Nd5Je7A3Ficn1bWknEP3FJQ', 'alg': 'RS256'} | |
jwk_thumbprint_get() | |
jwk_thumbprint_get() ended with: UsLKcSQATwugqfRwT-q1xYrvxETdNcnCfbB6HsYMOY0 | |
Challenge._validate_http_challenge(KhzURkGvKk1l:grafana.csd-monitor.ais.foo.com:fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs) | |
fqdn_resolve() ended with: 10.7.31.40/False | |
url_get(http://grafana.csd-monitor.ais.foo.com/.well-known/acme-challenge/fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs) | |
Starting new HTTP connection (1): grafana.csd-monitor.ais.foo.com:80 | |
http://grafana.csd-monitor.ais.foo.com:80 "GET /.well-known/acme-challenge/fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs HTTP/1.1" 200 76 | |
url_get() ended with: fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs.UsLKcSQATwugqfRwT-q1xYrvxETdNcnCfbB6HsYMOY0 | |
response_got: fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs.UsLKcSQATwugqfRwT-q1xYrvxETdNcnCfbB6HsYMOY0 response_expected: fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs.UsLKcSQATwugqfRwT-q1xYrvxETdNcnCfbB6HsYMOY0 | |
validation successful | |
Challenge._validate_http_challenge() ended with: True/False | |
challenge._check() ended with: True/False | |
Challenge._update({'name': 'KhzURkGvKk1l', 'status': 'valid', 'validated': 1631780401}) | |
DBStore.challenge_update({'name': 'KhzURkGvKk1l', 'status': 'valid', 'validated': 1631780401}) | |
DBStore._challenge_search(column:name, pattern:KhzURkGvKk1l) | |
DBStore._challenge_search() ended | |
DBStore._status_search(column:name, pattern:valid) | |
DBStore._status_search() ended | |
DBStore.challenge_update() ended | |
Challenge._update() ended | |
Challenge._update_authz(KhzURkGvKk1l) | |
DBStore.challenge_lookup(name:KhzURkGvKk1l) | |
DBStore._challenge_search(column:name, pattern:KhzURkGvKk1l) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'authorization': 'ONpIvkuyZWQl'} | |
DBStore.authorization_update({'status': 'valid', 'name': 'ONpIvkuyZWQl'}) | |
DBStore._authorization_search(column:name, pattern:ONpIvkuyZWQl) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore._status_search(column:name, pattern:valid) | |
DBStore._status_search() ended | |
DBStore.authorization_update() ended | |
Challenge._update_authz() ended | |
Challenge._validate() ended with:True | |
Challenge._info(KhzURkGvKk1l) | |
DBStore.challenge_lookup(name:KhzURkGvKk1l) | |
DBStore._challenge_search(column:name, pattern:KhzURkGvKk1l) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'type': 'http-01', 'token': 'fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs', 'status': 'valid', 'validated': 1631780401} | |
Challenge._info(KhzURkGvKk1l) ended | |
Message.prepare_response() | |
Nonce.nonce_generate_and_add() | |
Nonce.nonce__new() | |
got nonce: 0238e5290fa7474a8c1025d7247b78d9 | |
DBStore.nonce_add(0238e5290fa7474a8c1025d7247b78d9) | |
DBStore.nonce_add() ended | |
Nonce.generate_and_add() ended with:0238e5290fa7474a8c1025d7247b78d9 | |
challenge.parse() returns: {"data": {"type": "http-01", "token": "fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs", "status": "valid", "validated": "2021-09-16T08:20:01Z", "url": "http://acme.ais.foo.com/acme/chall/KhzURkGvKk1l"}, "header": {"Link": "<http://acme.ais.foo.com/acme/authz/>;rel=\"up\"", "Replay-Nonce": "0238e5290fa7474a8c1025d7247b78d9"}, "code": 200} | |
10.7.31.40 /acme/chall/KhzURkGvKk1l {'data': {'type': 'http-01', 'token': '- modified -', 'status': 'valid', 'validated': '2021-09-16T08:20:01Z', 'url': 'http://acme.ais.foo.com/acme/chall/KhzURkGvKk1l'}, 'header': {'Link': '<http://acme.ais.foo.com/acme/authz/>;rel="up"', 'Replay-Nonce': '- modified -'}, 'code': 200} | |
[pid: 20|app: 0|req: 5/12] 10.7.31.40 () {36 vars in 530 bytes} [Thu Sep 16 08:20:01 2021] POST /acme/chall/KhzURkGvKk1l => generated 179 bytes in 167 msecs (HTTP/1.1 200) 3 headers in 159 bytes (1 switches on core 0) | |
_config_load() | |
Challenge._config_load() | |
Challenge._config_load() ended. | |
Challenge.parse() | |
Message.check() | |
decode_message() | |
Nonce.check_nonce() | |
Nonce.nonce._check_and_delete(0238e5290fa7474a8c1025d7247b78d9) | |
DBStore.nonce_check(0238e5290fa7474a8c1025d7247b78d9) | |
DBStore.nonce_check() ended | |
DBStore.nonce_delete(0238e5290fa7474a8c1025d7247b78d9) | |
DBStore.nonce_delete() ended | |
Nonce._check_and_delete() ended with:200 | |
Nonce.check_nonce() ended with:200 | |
Message._name_get() | |
kid: http://acme.ais.foo.com/acme/acct/8GzXUPHPQk2j | |
Message._name_get() returns: 8GzXUPHPQk2j | |
Signature.check(8GzXUPHPQk2j) | |
check signature against account key | |
Signature._jwk_load(8GzXUPHPQk2j) | |
DBStore.jwk_load(8GzXUPHPQk2j) | |
DBStore._account_search(column:name, pattern:8GzXUPHPQk2j) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '2j1GmwO5g2JUpgKtQSv6VOslu431wDwTtkGm3WqHNLMplofoTGT6VIgRH887a9k3zGDgtvlTt-4yugfjfBqG0I5hWQ3iJINx28UNv8Cmi99y002KM1PaEDAUzR-sN-SqhG-hMMBk5Xi0tpsdFTgTAD9orSKq2xbs5_Ego1NkJcORo87U5ipTCokVf4mtzwDOqueA7yzH2NyQX6dA9C1M43-aryEPqY3PntkQwdbwbjU8Z0Gd6mSV3-Vhql9Yw_mLYI4JRIyoLZTixem9-yIohzm6arULnbQMwtNBq-WQ30N5_OOag6DPzihBNHxvkr1Nd5Je7A3Ficn1bWknEP3FJQ', 'alg': 'RS256'} | |
signature_check(False) | |
Signature.check() ended with: True:None | |
Message.check() ended with:200 | |
Challenge.get_name(http://acme.ais.foo.com/acme/chall/KhzURkGvKk1l) | |
parse_url(http://acme.ais.foo.com/acme/chall/KhzURkGvKk1l) | |
Challenge._info(KhzURkGvKk1l) | |
DBStore.challenge_lookup(name:KhzURkGvKk1l) | |
DBStore._challenge_search(column:name, pattern:KhzURkGvKk1l) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'type': 'http-01', 'token': 'fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs', 'status': 'valid', 'validated': 1631780401} | |
Challenge._info(KhzURkGvKk1l) ended | |
Message.prepare_response() | |
Nonce.nonce_generate_and_add() | |
Nonce.nonce__new() | |
got nonce: 5e0d9832a9be4848819637805558c593 | |
DBStore.nonce_add(5e0d9832a9be4848819637805558c593) | |
DBStore.nonce_add() ended | |
Nonce.generate_and_add() ended with:5e0d9832a9be4848819637805558c593 | |
challenge.parse() returns: {"data": {"type": "http-01", "token": "fi5KojhoiDHcDmcIIAjwE3ILuUnG1qFs", "status": "valid", "validated": "2021-09-16T08:20:01Z", "url": "http://acme.ais.foo.com/acme/chall/KhzURkGvKk1l"}, "header": {"Link": "<http://acme.ais.foo.com/acme/authz/>;rel=\"up\"", "Replay-Nonce": "5e0d9832a9be4848819637805558c593"}, "code": 200} | |
10.7.31.40 /acme/chall/KhzURkGvKk1l {'data': {'type': 'http-01', 'token': '- modified -', 'status': 'valid', 'validated': '2021-09-16T08:20:01Z', 'url': 'http://acme.ais.foo.com/acme/chall/KhzURkGvKk1l'}, 'header': {'Link': '<http://acme.ais.foo.com/acme/authz/>;rel="up"', 'Replay-Nonce': '- modified -'}, 'code': 200} | |
[pid: 18|app: 0|req: 6/13] 10.7.31.40 () {36 vars in 530 bytes} [Thu Sep 16 08:20:03 2021] POST /acme/chall/KhzURkGvKk1l => generated 179 bytes in 76 msecs (HTTP/1.1 200) 3 headers in 159 bytes (1 switches on core 0) | |
_config_load() | |
Order._config_load() | |
Order._config_load() ended. | |
Order.parse() | |
Order.invalidate(None) | |
Order.invalidate(): set timestamp to 1631780404 | |
DBStore.orders_search(column:expires, pattern:1631780404) | |
DBStore.orders_search() ended | |
Order.invalidate() ended: 0 orders identified | |
Message.check() | |
decode_message() | |
Nonce.check_nonce() | |
Nonce.nonce._check_and_delete(5e0d9832a9be4848819637805558c593) | |
DBStore.nonce_check(5e0d9832a9be4848819637805558c593) | |
DBStore.nonce_check() ended | |
DBStore.nonce_delete(5e0d9832a9be4848819637805558c593) | |
DBStore.nonce_delete() ended | |
Nonce._check_and_delete() ended with:200 | |
Nonce.check_nonce() ended with:200 | |
Message._name_get() | |
kid: http://acme.ais.foo.com/acme/acct/8GzXUPHPQk2j | |
Message._name_get() returns: 8GzXUPHPQk2j | |
Signature.check(8GzXUPHPQk2j) | |
check signature against account key | |
Signature._jwk_load(8GzXUPHPQk2j) | |
DBStore.jwk_load(8GzXUPHPQk2j) | |
DBStore._account_search(column:name, pattern:8GzXUPHPQk2j) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '2j1GmwO5g2JUpgKtQSv6VOslu431wDwTtkGm3WqHNLMplofoTGT6VIgRH887a9k3zGDgtvlTt-4yugfjfBqG0I5hWQ3iJINx28UNv8Cmi99y002KM1PaEDAUzR-sN-SqhG-hMMBk5Xi0tpsdFTgTAD9orSKq2xbs5_Ego1NkJcORo87U5ipTCokVf4mtzwDOqueA7yzH2NyQX6dA9C1M43-aryEPqY3PntkQwdbwbjU8Z0Gd6mSV3-Vhql9Yw_mLYI4JRIyoLZTixem9-yIohzm6arULnbQMwtNBq-WQ30N5_OOag6DPzihBNHxvkr1Nd5Je7A3Ficn1bWknEP3FJQ', 'alg': 'RS256'} | |
signature_check(False) | |
Signature.check() ended with: True:None | |
Message.check() ended with:200 | |
Order._name_get(http://acme.ais.foo.com/acme/order/WCzOH8vQCMRz/finalize) | |
parse_url(http://acme.ais.foo.com/acme/order/WCzOH8vQCMRz/finalize) | |
Order._name_get() ended | |
Order._lookup(WCzOH8vQCMRz) | |
Order._info(WCzOH8vQCMRz) | |
order_lookup(name:WCzOH8vQCMRz) | |
DBStore._order_search(column:name, pattern:WCzOH8vQCMRz) | |
DBStore._order_search() ended | |
DBStore.order_lookup() ended with: {'notbefore': 0, 'notafter': 0, 'identifiers': '[{"type": "dns", "value": "grafana.csd-monitor.ais.foo.com"}]', 'expires': 1631866800, 'status': 'pending'} | |
DBStore.authorization_lookup(column:order__name, pattern:WCzOH8vQCMRz) | |
DBStore._authorization_search(column:order__name, pattern:WCzOH8vQCMRz) | |
DBStore._authorization_search() ended | |
DBStore.authorization_lookup() ended | |
Order._update({'name': 'WCzOH8vQCMRz', 'status': 'ready'}) | |
order_update({'name': 'WCzOH8vQCMRz', 'status': 'ready'}) | |
DBStore._status_search(column:name, pattern:ready) | |
DBStore._status_search() ended | |
DBStore.order_update() ended | |
Order._lookup() ended | |
Order._process(WCzOH8vQCMRz) | |
finalize request() | |
Order._info(WCzOH8vQCMRz) | |
order_lookup(name:WCzOH8vQCMRz) | |
DBStore._order_search(column:name, pattern:WCzOH8vQCMRz) | |
DBStore._order_search() ended | |
DBStore.order_lookup() ended with: {'notbefore': 0, 'notafter': 0, 'identifiers': '[{"type": "dns", "value": "grafana.csd-monitor.ais.foo.com"}]', 'expires': 1631866800, 'status': 'ready'} | |
Order._update({'name': 'WCzOH8vQCMRz', 'status': 'processing'}) | |
order_update({'name': 'WCzOH8vQCMRz', 'status': 'processing'}) | |
DBStore._status_search(column:name, pattern:processing) | |
DBStore._status_search() ended | |
DBStore.order_update() ended | |
CSR found() | |
Order._csr_process(WCzOH8vQCMRz) | |
Order._info(WCzOH8vQCMRz) | |
order_lookup(name:WCzOH8vQCMRz) | |
DBStore._order_search(column:name, pattern:WCzOH8vQCMRz) | |
DBStore._order_search() ended | |
DBStore.order_lookup() ended with: {'notbefore': 0, 'notafter': 0, 'identifiers': '[{"type": "dns", "value": "grafana.csd-monitor.ais.foo.com"}]', 'expires': 1631866800, 'status': 'processing'} | |
b64_url_recode() | |
_config_load() | |
Certificate._config_load() | |
Certificate._ca_handler_get(/var/www/acme2certifier/examples/ca_handler/mscertsrv_ca_handler.py) | |
Certificate._ca_handler_get() ended with: .var.www.acme2certifier.examples.ca_handler.mscertsrv_ca_handler | |
Certificate._config_load(): loading CAhandler configured in cfg failed with err: the 'package' argument is required to perform a relative import for '.var.www.acme2certifier.examples.ca_handler.mscertsrv_ca_handler' | |
ca_handler: <module 'acme_srv.ca_handler' from '/var/www/acme2certifier/./acme_srv/ca_handler.py'> | |
Certificate._config_load() ended. | |
Certificate.store_csr(WCzOH8vQCMRz) | |
generate_random_string() | |
DBStore.certificate_add(dF2gZxWzg2kw) | |
DBStore._certificate_search(column:name, pattern:dF2gZxWzg2kw) | |
modified column to certificate.name | |
DBStore._certificate_search() ended | |
insert new entry for dF2gZxWzg2kw | |
DBStore._order_search(column:name, pattern:WCzOH8vQCMRz) | |
DBStore._order_search() ended | |
DBStore.certificate_add() ended with: 31 | |
Certificate.store_csr() ended | |
Certificate.enroll_and_store(dF2gZxWzg2kw,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) | |
Certificate._csr_check() | |
Certificate._info(dF2gZxWzg2kw) | |
DBstore.certificate_lookup(name:dF2gZxWzg2kw) | |
DBStore._certificate_search(column:name, pattern:dF2gZxWzg2kw) | |
modified column to certificate.name | |
DBStore._certificate_search() ended | |
DBStore.certificate_lookup() ended with: {'name': 'dF2gZxWzg2kw', 'csr': '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', 'cert': None, 'order__name': 'WCzOH8vQCMRz', 'order': 'WCzOH8vQCMRz'} | |
Certificate._info() ended with:{'name': 'dF2gZxWzg2kw', 'csr': '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', 'cert': None, 'order__name': 'WCzOH8vQCMRz', 'order': 'WCzOH8vQCMRz'} | |
order_lookup(name:WCzOH8vQCMRz) | |
DBStore._order_search(column:name, pattern:WCzOH8vQCMRz) | |
DBStore._order_search() ended | |
DBStore.order_lookup() ended with: {'identifiers': '[{"type": "dns", "value": "grafana.csd-monitor.ais.foo.com"}]'} | |
Certificate._tnauth_identifier_check() | |
Certificate._tnauth_identifier_check() ended with: False | |
cert_san_get() | |
b64_url_recode() | |
build_pem_file() | |
cert_san_get() ended with: ['DNS:grafana.csd-monitor.ais.foo.com'] | |
Certificate._identifer_status_list() | |
SAN check for dns:grafana.csd-monitor.ais.foo.com against identifiers returned True | |
Certificate._identifer_status_list() ended with [True] | |
Certificate._csr_check() ended with True | |
CAhandler._config_load() | |
load_config(/var/www/acme2certifier/./acme_srv/acme_srv.cfg:CAhandler) | |
CAhandler._config_load() ended | |
CAhandler.enroll() | |
CAhandler._stub_func(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) | |
CAhandler._stub_func() ended | |
Certificate.enroll() ended | |
acme2certifier enrollment error: None | |
Certificate._store_cert_error(dF2gZxWzg2kw) | |
DBStore.certificate_add(dF2gZxWzg2kw) | |
DBStore._certificate_search(column:name, pattern:dF2gZxWzg2kw) | |
modified column to certificate.name | |
DBStore._certificate_search() ended | |
update existing entry for dF2gZxWzg2kw id:31 | |
DBStore.certificate_add() ended with: 31 | |
Certificate._store_cert_error(31) ended | |
Certificate.enroll_and_store() ended with: None:urn:ietf:params:acme:error:serverInternal | |
Order._csr_process() ended with order:WCzOH8vQCMRz 500:urn:ietf:params:acme:error:serverInternal:None | |
Order._process() ended with order:WCzOH8vQCMRz 500:urn:ietf:params:acme:error:serverInternal:enrollment failed | |
Message.prepare_response() | |
Error.enrich_error() | |
Error.acme_errormessage(urn:ietf:params:acme:error:serverInternal) | |
Order.parse() returns: {"code": 500, "header": {}, "data": {"status": 500, "message": "urn:ietf:params:acme:error:serverInternal", "detail": "enrollment failed"}} | |
10.7.31.40 /acme/order/WCzOH8vQCMRz/finalize {'code': 500, 'header': {}, 'data': {'status': 500, 'message': 'urn:ietf:params:acme:error:serverInternal', 'detail': 'enrollment failed'}} | |
[pid: 20|app: 0|req: 6/14] 10.7.31.40 () {36 vars in 550 bytes} [Thu Sep 16 08:20:04 2021] POST /acme/order/WCzOH8vQCMRz/finalize => generated 102 bytes in 178 msecs (HTTP/1.1 500) 1 headers in 64 bytes (1 switches on core 0) | |
Directory._config_load() | |
load_config(/var/www/acme2certifier/./acme_srv/acme_srv.cfg:Directory) | |
CAhandler._config_load() ended | |
10.7.31.40 / | |
Directory.directory_get() | |
[pid: 18|app: 0|req: 7/15] 10.7.31.40 () {32 vars in 391 bytes} [Thu Sep 16 08:20:04 2021] GET / => generated 610 bytes in 1 msecs (HTTP/1.1 200) 1 headers in 51 bytes (1 switches on core 0) | |
Nonce.nonce_generate_and_add() | |
Nonce.nonce__new() | |
got nonce: a49edbd24ffe45e18eee93ba10c3fb92 | |
DBStore.nonce_add(a49edbd24ffe45e18eee93ba10c3fb92) | |
DBStore.nonce_add() ended | |
Nonce.generate_and_add() ended with:a49edbd24ffe45e18eee93ba10c3fb92 | |
[pid: 21|app: 0|req: 1/16] 10.7.31.40 () {34 vars in 481 bytes} [Thu Sep 16 08:20:05 2021] HEAD /acme/newnonce => generated 0 bytes in 39 msecs (HTTP/1.1 200) 2 headers in 93 bytes (0 switches on core 0) | |
_config_load() | |
Order._config_load() | |
Order._config_load() ended. | |
Order.new() | |
Message.check() | |
decode_message() | |
Nonce.check_nonce() | |
Nonce.nonce._check_and_delete(a49edbd24ffe45e18eee93ba10c3fb92) | |
DBStore.nonce_check(a49edbd24ffe45e18eee93ba10c3fb92) | |
DBStore.nonce_check() ended | |
DBStore.nonce_delete(a49edbd24ffe45e18eee93ba10c3fb92) | |
DBStore.nonce_delete() ended | |
Nonce._check_and_delete() ended with:200 | |
Nonce.check_nonce() ended with:200 | |
Message._name_get() | |
kid: http://acme.ais.foo.com/acme/acct/8GzXUPHPQk2j | |
Message._name_get() returns: 8GzXUPHPQk2j | |
Signature.check(8GzXUPHPQk2j) | |
check signature against account key | |
Signature._jwk_load(8GzXUPHPQk2j) | |
DBStore.jwk_load(8GzXUPHPQk2j) | |
DBStore._account_search(column:name, pattern:8GzXUPHPQk2j) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '2j1GmwO5g2JUpgKtQSv6VOslu431wDwTtkGm3WqHNLMplofoTGT6VIgRH887a9k3zGDgtvlTt-4yugfjfBqG0I5hWQ3iJINx28UNv8Cmi99y002KM1PaEDAUzR-sN-SqhG-hMMBk5Xi0tpsdFTgTAD9orSKq2xbs5_Ego1NkJcORo87U5ipTCokVf4mtzwDOqueA7yzH2NyQX6dA9C1M43-aryEPqY3PntkQwdbwbjU8Z0Gd6mSV3-Vhql9Yw_mLYI4JRIyoLZTixem9-yIohzm6arULnbQMwtNBq-WQ30N5_OOag6DPzihBNHxvkr1Nd5Je7A3Ficn1bWknEP3FJQ', 'alg': 'RS256'} | |
signature_check(False) | |
Signature.check() ended with: True:None | |
Message.check() ended with:200 | |
Order._add(8GzXUPHPQk2j) | |
generate_random_string() | |
Order._identifiers_check([{'type': 'dns', 'value': 'nginx.csd-monitor.ais.foo.com'}]) | |
Order._identifiers_check() done with None: | |
DBStore.order_add({'status': 2, 'expires': 1631866805, 'account': '8GzXUPHPQk2j', 'name': 'jZ4tUenaSnGf', 'identifiers': '[{"type": "dns", "value": "nginx.csd-monitor.ais.foo.com"}]'}) | |
DBStore.account_lookup(column:name, pattern:8GzXUPHPQk2j) | |
DBStore._account_search(column:name, pattern:8GzXUPHPQk2j) | |
DBStore._account_search() ended with: True | |
DBStore.account_lookup() ended | |
DBStore.order_add() ended | |
generate_random_string() | |
DBStore.authorization_add({'type': 'dns', 'value': 'nginx.csd-monitor.ais.foo.com', 'name': 'a2GiUJemOcob', 'order': 40, 'status': 'pending', 'expires': 1631866805}) | |
DBStore.authorization_add() ended with: 40 | |
Order._add() ended | |
Message.prepare_response() | |
Nonce.nonce_generate_and_add() | |
Nonce.nonce__new() | |
got nonce: 09c3eed48c9242f0a9440e940f3d97fa | |
DBStore.nonce_add(09c3eed48c9242f0a9440e940f3d97fa) | |
DBStore.nonce_add() ended | |
Nonce.generate_and_add() ended with:09c3eed48c9242f0a9440e940f3d97fa | |
Order.new() returns: {"header": {"Location": "http://acme.ais.foo.com/acme/order/jZ4tUenaSnGf", "Replay-Nonce": "09c3eed48c9242f0a9440e940f3d97fa"}, "data": {"identifiers": [{"type": "dns", "value": "nginx.csd-monitor.ais.foo.com"}], "authorizations": ["http://acme.ais.foo.com/acme/authz/a2GiUJemOcob"], "status": "pending", "expires": "2021-09-17T08:20:05Z", "finalize": "http://acme.ais.foo.com/acme/order/jZ4tUenaSnGf/finalize"}, "code": 201} | |
10.7.31.40 /acme/neworders {'header': {'Location': 'http://acme.ais.foo.com/acme/order/jZ4tUenaSnGf', 'Replay-Nonce': '- modified -'}, 'data': {'identifiers': [{'type': 'dns', 'value': 'nginx.csd-monitor.ais.foo.com'}], 'authorizations': ['http://acme.ais.foo.com/acme/authz/a2GiUJemOcob'], 'status': 'pending', 'expires': '2021-09-17T08:20:05Z', 'finalize': 'http://acme.ais.foo.com/acme/order/jZ4tUenaSnGf/finalize'}, 'code': 201} | |
[pid: 18|app: 0|req: 8/17] 10.7.31.40 () {36 vars in 512 bytes} [Thu Sep 16 08:20:05 2021] POST /acme/neworders => generated 278 bytes in 145 msecs (HTTP/1.1 201) 3 headers in 159 bytes (1 switches on core 0) | |
_config_load() | |
Authorization._config_load() | |
Authorization._config_load() ended. | |
Authorization.new_post() | |
Authorization.invalidate(None) | |
Authorization.invalidate(): set timestamp to 1631780406 | |
DBStore.authorizations_expired_search(column:expires, pattern:1631780406) | |
DBStore.authorizations_expired_search-() ended | |
Authorization.invalidate() ended: 0 authorizations identified | |
Message.check() | |
decode_message() | |
Nonce.check_nonce() | |
Nonce.nonce._check_and_delete(09c3eed48c9242f0a9440e940f3d97fa) | |
DBStore.nonce_check(09c3eed48c9242f0a9440e940f3d97fa) | |
DBStore.nonce_check() ended | |
DBStore.nonce_delete(09c3eed48c9242f0a9440e940f3d97fa) | |
DBStore.nonce_delete() ended | |
Nonce._check_and_delete() ended with:200 | |
Nonce.check_nonce() ended with:200 | |
Message._name_get() | |
kid: http://acme.ais.foo.com/acme/acct/8GzXUPHPQk2j | |
Message._name_get() returns: 8GzXUPHPQk2j | |
Signature.check(8GzXUPHPQk2j) | |
check signature against account key | |
Signature._jwk_load(8GzXUPHPQk2j) | |
DBStore.jwk_load(8GzXUPHPQk2j) | |
DBStore._account_search(column:name, pattern:8GzXUPHPQk2j) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '2j1GmwO5g2JUpgKtQSv6VOslu431wDwTtkGm3WqHNLMplofoTGT6VIgRH887a9k3zGDgtvlTt-4yugfjfBqG0I5hWQ3iJINx28UNv8Cmi99y002KM1PaEDAUzR-sN-SqhG-hMMBk5Xi0tpsdFTgTAD9orSKq2xbs5_Ego1NkJcORo87U5ipTCokVf4mtzwDOqueA7yzH2NyQX6dA9C1M43-aryEPqY3PntkQwdbwbjU8Z0Gd6mSV3-Vhql9Yw_mLYI4JRIyoLZTixem9-yIohzm6arULnbQMwtNBq-WQ30N5_OOag6DPzihBNHxvkr1Nd5Je7A3Ficn1bWknEP3FJQ', 'alg': 'RS256'} | |
signature_check(False) | |
Signature.check() ended with: True:None | |
Message.check() ended with:200 | |
Authorization._authz_info(http://acme.ais.foo.com/acme/authz/a2GiUJemOcob) | |
generate_random_string() | |
DBStore.authorization_lookup(column:name, pattern:a2GiUJemOcob) | |
DBStore._authorization_search(column:name, pattern:a2GiUJemOcob) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_lookup() ended | |
DBStore.authorization_update({'name': 'a2GiUJemOcob', 'token': '4reRHGIawEUtMpRamxkXHQWxFLin629s', 'expires': 1631866806}) | |
DBStore._authorization_search(column:name, pattern:a2GiUJemOcob) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_update() ended | |
DBStore.authorization_lookup(column:name, pattern:a2GiUJemOcob) | |
DBStore._authorization_search(column:name, pattern:a2GiUJemOcob) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_lookup() ended | |
_config_load() | |
Challenge._config_load() | |
Challenge._config_load() ended. | |
Challenge.challengeset_get() for auth: a2GiUJemOcob | |
Challenge._challengelist_search() | |
DBStore._challenge_search(column:authorization__name, pattern:a2GiUJemOcob) | |
DBStore._challenge_search() ended | |
Challenge._challengelist_search() ended with: [] | |
Challenges not found. Create a new set. | |
Challenge.new_set(a2GiUJemOcob, 4reRHGIawEUtMpRamxkXHQWxFLin629s) | |
Challenge._new(http-01) | |
generate_random_string() | |
DBStore.challenge_add({'name': 'KCXKdidxPMKi', 'expires': 1631866806, 'type': 'http-01', 'token': '4reRHGIawEUtMpRamxkXHQWxFLin629s', 'authorization': 'a2GiUJemOcob', 'status': 2}) | |
DBStore.authorization_lookup(column:name, pattern:a2GiUJemOcob) | |
DBStore._authorization_search(column:name, pattern:a2GiUJemOcob) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_lookup() ended | |
DBStore.challenge_add() ended | |
Challenge._new(dns-01) | |
generate_random_string() | |
DBStore.challenge_add({'name': 'or9nkiAS9Xfg', 'expires': 1631866806, 'type': 'dns-01', 'token': '4reRHGIawEUtMpRamxkXHQWxFLin629s', 'authorization': 'a2GiUJemOcob', 'status': 2}) | |
DBStore.authorization_lookup(column:name, pattern:a2GiUJemOcob) | |
DBStore._authorization_search(column:name, pattern:a2GiUJemOcob) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_lookup() ended | |
DBStore.challenge_add() ended | |
Challenge._new(tls-alpn-01) | |
generate_random_string() | |
DBStore.challenge_add({'name': 'eJ8PG5ydp6qV', 'expires': 1631866806, 'type': 'tls-alpn-01', 'token': '4reRHGIawEUtMpRamxkXHQWxFLin629s', 'authorization': 'a2GiUJemOcob', 'status': 2}) | |
DBStore.authorization_lookup(column:name, pattern:a2GiUJemOcob) | |
DBStore._authorization_search(column:name, pattern:a2GiUJemOcob) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_lookup() ended | |
DBStore.challenge_add() ended | |
Challenge._new_set returned ([{'type': 'http-01', 'url': 'http://acme.ais.foo.com/acme/chall/KCXKdidxPMKi', 'token': '4reRHGIawEUtMpRamxkXHQWxFLin629s'}, {'type': 'dns-01', 'url': 'http://acme.ais.foo.com/acme/chall/or9nkiAS9Xfg', 'token': '4reRHGIawEUtMpRamxkXHQWxFLin629s'}, {'type': 'tls-alpn-01', 'url': 'http://acme.ais.foo.com/acme/chall/eJ8PG5ydp6qV', 'token': '4reRHGIawEUtMpRamxkXHQWxFLin629s'}]) | |
Authorization._authz_info() returns: {"expires": "2021-09-17T08:20:06Z", "status": "pending", "identifier": {"type": "dns", "value": "nginx.csd-monitor.ais.foo.com"}, "challenges": [{"type": "http-01", "url": "http://acme.ais.foo.com/acme/chall/KCXKdidxPMKi", "token": "4reRHGIawEUtMpRamxkXHQWxFLin629s"}, {"type": "dns-01", "url": "http://acme.ais.foo.com/acme/chall/or9nkiAS9Xfg", "token": "4reRHGIawEUtMpRamxkXHQWxFLin629s"}, {"type": "tls-alpn-01", "url": "http://acme.ais.foo.com/acme/chall/eJ8PG5ydp6qV", "token": "4reRHGIawEUtMpRamxkXHQWxFLin629s"}]} | |
Message.prepare_response() | |
Nonce.nonce_generate_and_add() | |
Nonce.nonce__new() | |
got nonce: 7fc6aea7b76f4da1baa9389f419ba850 | |
DBStore.nonce_add(7fc6aea7b76f4da1baa9389f419ba850) | |
DBStore.nonce_add() ended | |
Nonce.generate_and_add() ended with:7fc6aea7b76f4da1baa9389f419ba850 | |
Authorization.new_post() returns: {"data": {"expires": "2021-09-17T08:20:06Z", "status": "pending", "identifier": {"type": "dns", "value": "nginx.csd-monitor.ais.foo.com"}, "challenges": [{"type": "http-01", "url": "http://acme.ais.foo.com/acme/chall/KCXKdidxPMKi", "token": "4reRHGIawEUtMpRamxkXHQWxFLin629s"}, {"type": "dns-01", "url": "http://acme.ais.foo.com/acme/chall/or9nkiAS9Xfg", "token": "4reRHGIawEUtMpRamxkXHQWxFLin629s"}, {"type": "tls-alpn-01", "url": "http://acme.ais.foo.com/acme/chall/eJ8PG5ydp6qV", "token": "4reRHGIawEUtMpRamxkXHQWxFLin629s"}]}, "code": 200, "header": {"Replay-Nonce": "7fc6aea7b76f4da1baa9389f419ba850"}} | |
10.7.31.40 /acme/authz/a2GiUJemOcob {'data': {'expires': '2021-09-17T08:20:06Z', 'status': 'pending', 'identifier': {'type': 'dns', 'value': 'nginx.csd-monitor.ais.foo.com'}, 'challenges': [{'type': 'http-01', 'url': 'http://acme.ais.foo.com/acme/chall/KCXKdidxPMKi', 'token': '- modified - '}, {'type': 'dns-01', 'url': 'http://acme.ais.foo.com/acme/chall/or9nkiAS9Xfg', 'token': '- modified - '}, {'type': 'tls-alpn-01', 'url': 'http://acme.ais.foo.com/acme/chall/eJ8PG5ydp6qV', 'token': '- modified - '}]}, 'code': 200, 'header': {'Replay-Nonce': '- modified -'}} | |
[pid: 20|app: 0|req: 7/18] 10.7.31.40 () {36 vars in 530 bytes} [Thu Sep 16 08:20:06 2021] POST /acme/authz/a2GiUJemOcob => generated 524 bytes in 245 msecs (HTTP/1.1 200) 2 headers in 104 bytes (1 switches on core 0) | |
_config_load() | |
Challenge._config_load() | |
Challenge._config_load() ended. | |
Challenge.parse() | |
Message.check() | |
decode_message() | |
Nonce.check_nonce() | |
Nonce.nonce._check_and_delete(7fc6aea7b76f4da1baa9389f419ba850) | |
DBStore.nonce_check(7fc6aea7b76f4da1baa9389f419ba850) | |
DBStore.nonce_check() ended | |
DBStore.nonce_delete(7fc6aea7b76f4da1baa9389f419ba850) | |
DBStore.nonce_delete() ended | |
Nonce._check_and_delete() ended with:200 | |
Nonce.check_nonce() ended with:200 | |
Message._name_get() | |
kid: http://acme.ais.foo.com/acme/acct/8GzXUPHPQk2j | |
Message._name_get() returns: 8GzXUPHPQk2j | |
Signature.check(8GzXUPHPQk2j) | |
check signature against account key | |
Signature._jwk_load(8GzXUPHPQk2j) | |
DBStore.jwk_load(8GzXUPHPQk2j) | |
DBStore._account_search(column:name, pattern:8GzXUPHPQk2j) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '2j1GmwO5g2JUpgKtQSv6VOslu431wDwTtkGm3WqHNLMplofoTGT6VIgRH887a9k3zGDgtvlTt-4yugfjfBqG0I5hWQ3iJINx28UNv8Cmi99y002KM1PaEDAUzR-sN-SqhG-hMMBk5Xi0tpsdFTgTAD9orSKq2xbs5_Ego1NkJcORo87U5ipTCokVf4mtzwDOqueA7yzH2NyQX6dA9C1M43-aryEPqY3PntkQwdbwbjU8Z0Gd6mSV3-Vhql9Yw_mLYI4JRIyoLZTixem9-yIohzm6arULnbQMwtNBq-WQ30N5_OOag6DPzihBNHxvkr1Nd5Je7A3Ficn1bWknEP3FJQ', 'alg': 'RS256'} | |
signature_check(False) | |
Signature.check() ended with: True:None | |
Message.check() ended with:200 | |
Challenge.get_name(http://acme.ais.foo.com/acme/chall/KCXKdidxPMKi) | |
parse_url(http://acme.ais.foo.com/acme/chall/KCXKdidxPMKi) | |
Challenge._info(KCXKdidxPMKi) | |
DBStore.challenge_lookup(name:KCXKdidxPMKi) | |
DBStore._challenge_search(column:name, pattern:KCXKdidxPMKi) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'type': 'http-01', 'token': '4reRHGIawEUtMpRamxkXHQWxFLin629s', 'status': 'pending', 'validated': 0} | |
Challenge._info(KCXKdidxPMKi) ended | |
Challenge._validate(KCXKdidxPMKi: {}) | |
Challenge._check(KCXKdidxPMKi) | |
DBStore.challenge_lookup(name:KCXKdidxPMKi) | |
DBStore._challenge_search(column:name, pattern:KCXKdidxPMKi) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'type': 'http-01', 'status': 'pending', 'token': '4reRHGIawEUtMpRamxkXHQWxFLin629s', 'authorization': 'a2GiUJemOcob', 'authorization__type': 'dns', 'authorization__value': 'nginx.csd-monitor.ais.foo.com', 'authorization__token': '4reRHGIawEUtMpRamxkXHQWxFLin629s', 'authorization__order__account__name': '8GzXUPHPQk2j'} | |
DBStore.jwk_load(8GzXUPHPQk2j) | |
DBStore._account_search(column:name, pattern:8GzXUPHPQk2j) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '2j1GmwO5g2JUpgKtQSv6VOslu431wDwTtkGm3WqHNLMplofoTGT6VIgRH887a9k3zGDgtvlTt-4yugfjfBqG0I5hWQ3iJINx28UNv8Cmi99y002KM1PaEDAUzR-sN-SqhG-hMMBk5Xi0tpsdFTgTAD9orSKq2xbs5_Ego1NkJcORo87U5ipTCokVf4mtzwDOqueA7yzH2NyQX6dA9C1M43-aryEPqY3PntkQwdbwbjU8Z0Gd6mSV3-Vhql9Yw_mLYI4JRIyoLZTixem9-yIohzm6arULnbQMwtNBq-WQ30N5_OOag6DPzihBNHxvkr1Nd5Je7A3Ficn1bWknEP3FJQ', 'alg': 'RS256'} | |
jwk_thumbprint_get() | |
jwk_thumbprint_get() ended with: UsLKcSQATwugqfRwT-q1xYrvxETdNcnCfbB6HsYMOY0 | |
Challenge._validate_http_challenge(KCXKdidxPMKi:nginx.csd-monitor.ais.foo.com:4reRHGIawEUtMpRamxkXHQWxFLin629s) | |
fqdn_resolve() ended with: 10.7.31.40/False | |
url_get(http://nginx.csd-monitor.ais.foo.com/.well-known/acme-challenge/4reRHGIawEUtMpRamxkXHQWxFLin629s) | |
Starting new HTTP connection (1): nginx.csd-monitor.ais.foo.com:80 | |
http://nginx.csd-monitor.ais.foo.com:80 "GET /.well-known/acme-challenge/4reRHGIawEUtMpRamxkXHQWxFLin629s HTTP/1.1" 200 76 | |
url_get() ended with: 4reRHGIawEUtMpRamxkXHQWxFLin629s.UsLKcSQATwugqfRwT-q1xYrvxETdNcnCfbB6HsYMOY0 | |
response_got: 4reRHGIawEUtMpRamxkXHQWxFLin629s.UsLKcSQATwugqfRwT-q1xYrvxETdNcnCfbB6HsYMOY0 response_expected: 4reRHGIawEUtMpRamxkXHQWxFLin629s.UsLKcSQATwugqfRwT-q1xYrvxETdNcnCfbB6HsYMOY0 | |
validation successful | |
Challenge._validate_http_challenge() ended with: True/False | |
challenge._check() ended with: True/False | |
Challenge._update({'name': 'KCXKdidxPMKi', 'status': 'valid', 'validated': 1631780406}) | |
DBStore.challenge_update({'name': 'KCXKdidxPMKi', 'status': 'valid', 'validated': 1631780406}) | |
DBStore._challenge_search(column:name, pattern:KCXKdidxPMKi) | |
DBStore._challenge_search() ended | |
DBStore._status_search(column:name, pattern:valid) | |
DBStore._status_search() ended | |
DBStore.challenge_update() ended | |
Challenge._update() ended | |
Challenge._update_authz(KCXKdidxPMKi) | |
DBStore.challenge_lookup(name:KCXKdidxPMKi) | |
DBStore._challenge_search(column:name, pattern:KCXKdidxPMKi) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'authorization': 'a2GiUJemOcob'} | |
DBStore.authorization_update({'status': 'valid', 'name': 'a2GiUJemOcob'}) | |
DBStore._authorization_search(column:name, pattern:a2GiUJemOcob) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore._status_search(column:name, pattern:valid) | |
DBStore._status_search() ended | |
DBStore.authorization_update() ended | |
Challenge._update_authz() ended | |
Challenge._validate() ended with:True | |
Challenge._info(KCXKdidxPMKi) | |
DBStore.challenge_lookup(name:KCXKdidxPMKi) | |
DBStore._challenge_search(column:name, pattern:KCXKdidxPMKi) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'type': 'http-01', 'token': '4reRHGIawEUtMpRamxkXHQWxFLin629s', 'status': 'valid', 'validated': 1631780406} | |
Challenge._info(KCXKdidxPMKi) ended | |
Message.prepare_response() | |
Nonce.nonce_generate_and_add() | |
Nonce.nonce__new() | |
got nonce: 5c4ab35237e1447ca53712f34fe7fc95 | |
DBStore.nonce_add(5c4ab35237e1447ca53712f34fe7fc95) | |
DBStore.nonce_add() ended | |
Nonce.generate_and_add() ended with:5c4ab35237e1447ca53712f34fe7fc95 | |
challenge.parse() returns: {"data": {"type": "http-01", "token": "4reRHGIawEUtMpRamxkXHQWxFLin629s", "status": "valid", "validated": "2021-09-16T08:20:06Z", "url": "http://acme.ais.foo.com/acme/chall/KCXKdidxPMKi"}, "header": {"Link": "<http://acme.ais.foo.com/acme/authz/>;rel=\"up\"", "Replay-Nonce": "5c4ab35237e1447ca53712f34fe7fc95"}, "code": 200} | |
10.7.31.40 /acme/chall/KCXKdidxPMKi {'data': {'type': 'http-01', 'token': '- modified -', 'status': 'valid', 'validated': '2021-09-16T08:20:06Z', 'url': 'http://acme.ais.foo.com/acme/chall/KCXKdidxPMKi'}, 'header': {'Link': '<http://acme.ais.foo.com/acme/authz/>;rel="up"', 'Replay-Nonce': '- modified -'}, 'code': 200} | |
[pid: 18|app: 0|req: 9/19] 10.7.31.40 () {36 vars in 530 bytes} [Thu Sep 16 08:20:06 2021] POST /acme/chall/KCXKdidxPMKi => generated 179 bytes in 233 msecs (HTTP/1.1 200) 3 headers in 159 bytes (1 switches on core 0) | |
_config_load() | |
Challenge._config_load() | |
Challenge._config_load() ended. | |
Challenge.parse() | |
Message.check() | |
decode_message() | |
Nonce.check_nonce() | |
Nonce.nonce._check_and_delete(5c4ab35237e1447ca53712f34fe7fc95) | |
DBStore.nonce_check(5c4ab35237e1447ca53712f34fe7fc95) | |
DBStore.nonce_check() ended | |
DBStore.nonce_delete(5c4ab35237e1447ca53712f34fe7fc95) | |
DBStore.nonce_delete() ended | |
Nonce._check_and_delete() ended with:200 | |
Nonce.check_nonce() ended with:200 | |
Message._name_get() | |
kid: http://acme.ais.foo.com/acme/acct/8GzXUPHPQk2j | |
Message._name_get() returns: 8GzXUPHPQk2j | |
Signature.check(8GzXUPHPQk2j) | |
check signature against account key | |
Signature._jwk_load(8GzXUPHPQk2j) | |
DBStore.jwk_load(8GzXUPHPQk2j) | |
DBStore._account_search(column:name, pattern:8GzXUPHPQk2j) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '2j1GmwO5g2JUpgKtQSv6VOslu431wDwTtkGm3WqHNLMplofoTGT6VIgRH887a9k3zGDgtvlTt-4yugfjfBqG0I5hWQ3iJINx28UNv8Cmi99y002KM1PaEDAUzR-sN-SqhG-hMMBk5Xi0tpsdFTgTAD9orSKq2xbs5_Ego1NkJcORo87U5ipTCokVf4mtzwDOqueA7yzH2NyQX6dA9C1M43-aryEPqY3PntkQwdbwbjU8Z0Gd6mSV3-Vhql9Yw_mLYI4JRIyoLZTixem9-yIohzm6arULnbQMwtNBq-WQ30N5_OOag6DPzihBNHxvkr1Nd5Je7A3Ficn1bWknEP3FJQ', 'alg': 'RS256'} | |
signature_check(False) | |
Signature.check() ended with: True:None | |
Message.check() ended with:200 | |
Challenge.get_name(http://acme.ais.foo.com/acme/chall/KCXKdidxPMKi) | |
parse_url(http://acme.ais.foo.com/acme/chall/KCXKdidxPMKi) | |
Challenge._info(KCXKdidxPMKi) | |
DBStore.challenge_lookup(name:KCXKdidxPMKi) | |
DBStore._challenge_search(column:name, pattern:KCXKdidxPMKi) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'type': 'http-01', 'token': '4reRHGIawEUtMpRamxkXHQWxFLin629s', 'status': 'valid', 'validated': 1631780406} | |
Challenge._info(KCXKdidxPMKi) ended | |
Message.prepare_response() | |
Nonce.nonce_generate_and_add() | |
Nonce.nonce__new() | |
got nonce: cfa8b854ab834249a2826d055bc80030 | |
DBStore.nonce_add(cfa8b854ab834249a2826d055bc80030) | |
DBStore.nonce_add() ended | |
Nonce.generate_and_add() ended with:cfa8b854ab834249a2826d055bc80030 | |
challenge.parse() returns: {"data": {"type": "http-01", "token": "4reRHGIawEUtMpRamxkXHQWxFLin629s", "status": "valid", "validated": "2021-09-16T08:20:06Z", "url": "http://acme.ais.foo.com/acme/chall/KCXKdidxPMKi"}, "header": {"Link": "<http://acme.ais.foo.com/acme/authz/>;rel=\"up\"", "Replay-Nonce": "cfa8b854ab834249a2826d055bc80030"}, "code": 200} | |
10.7.31.40 /acme/chall/KCXKdidxPMKi {'data': {'type': 'http-01', 'token': '- modified -', 'status': 'valid', 'validated': '2021-09-16T08:20:06Z', 'url': 'http://acme.ais.foo.com/acme/chall/KCXKdidxPMKi'}, 'header': {'Link': '<http://acme.ais.foo.com/acme/authz/>;rel="up"', 'Replay-Nonce': '- modified -'}, 'code': 200} | |
[pid: 20|app: 0|req: 8/20] 10.7.31.40 () {36 vars in 530 bytes} [Thu Sep 16 08:20:09 2021] POST /acme/chall/KCXKdidxPMKi => generated 179 bytes in 95 msecs (HTTP/1.1 200) 3 headers in 159 bytes (1 switches on core 0) | |
_config_load() | |
Order._config_load() | |
Order._config_load() ended. | |
Order.parse() | |
Order.invalidate(None) | |
Order.invalidate(): set timestamp to 1631780409 | |
DBStore.orders_search(column:expires, pattern:1631780409) | |
DBStore.orders_search() ended | |
Order.invalidate() ended: 0 orders identified | |
Message.check() | |
decode_message() | |
Nonce.check_nonce() | |
Nonce.nonce._check_and_delete(cfa8b854ab834249a2826d055bc80030) | |
DBStore.nonce_check(cfa8b854ab834249a2826d055bc80030) | |
DBStore.nonce_check() ended | |
DBStore.nonce_delete(cfa8b854ab834249a2826d055bc80030) | |
DBStore.nonce_delete() ended | |
Nonce._check_and_delete() ended with:200 | |
Nonce.check_nonce() ended with:200 | |
Message._name_get() | |
kid: http://acme.ais.foo.com/acme/acct/8GzXUPHPQk2j | |
Message._name_get() returns: 8GzXUPHPQk2j | |
Signature.check(8GzXUPHPQk2j) | |
check signature against account key | |
Signature._jwk_load(8GzXUPHPQk2j) | |
DBStore.jwk_load(8GzXUPHPQk2j) | |
DBStore._account_search(column:name, pattern:8GzXUPHPQk2j) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '2j1GmwO5g2JUpgKtQSv6VOslu431wDwTtkGm3WqHNLMplofoTGT6VIgRH887a9k3zGDgtvlTt-4yugfjfBqG0I5hWQ3iJINx28UNv8Cmi99y002KM1PaEDAUzR-sN-SqhG-hMMBk5Xi0tpsdFTgTAD9orSKq2xbs5_Ego1NkJcORo87U5ipTCokVf4mtzwDOqueA7yzH2NyQX6dA9C1M43-aryEPqY3PntkQwdbwbjU8Z0Gd6mSV3-Vhql9Yw_mLYI4JRIyoLZTixem9-yIohzm6arULnbQMwtNBq-WQ30N5_OOag6DPzihBNHxvkr1Nd5Je7A3Ficn1bWknEP3FJQ', 'alg': 'RS256'} | |
signature_check(False) | |
Signature.check() ended with: True:None | |
Message.check() ended with:200 | |
Order._name_get(http://acme.ais.foo.com/acme/order/jZ4tUenaSnGf/finalize) | |
parse_url(http://acme.ais.foo.com/acme/order/jZ4tUenaSnGf/finalize) | |
Order._name_get() ended | |
Order._lookup(jZ4tUenaSnGf) | |
Order._info(jZ4tUenaSnGf) | |
order_lookup(name:jZ4tUenaSnGf) | |
DBStore._order_search(column:name, pattern:jZ4tUenaSnGf) | |
DBStore._order_search() ended | |
DBStore.order_lookup() ended with: {'notbefore': 0, 'notafter': 0, 'identifiers': '[{"type": "dns", "value": "nginx.csd-monitor.ais.foo.com"}]', 'expires': 1631866805, 'status': 'pending'} | |
DBStore.authorization_lookup(column:order__name, pattern:jZ4tUenaSnGf) | |
DBStore._authorization_search(column:order__name, pattern:jZ4tUenaSnGf) | |
DBStore._authorization_search() ended | |
DBStore.authorization_lookup() ended | |
Order._update({'name': 'jZ4tUenaSnGf', 'status': 'ready'}) | |
order_update({'name': 'jZ4tUenaSnGf', 'status': 'ready'}) | |
DBStore._status_search(column:name, pattern:ready) | |
DBStore._status_search() ended | |
DBStore.order_update() ended | |
Order._lookup() ended | |
Order._process(jZ4tUenaSnGf) | |
finalize request() | |
Order._info(jZ4tUenaSnGf) | |
order_lookup(name:jZ4tUenaSnGf) | |
DBStore._order_search(column:name, pattern:jZ4tUenaSnGf) | |
DBStore._order_search() ended | |
DBStore.order_lookup() ended with: {'notbefore': 0, 'notafter': 0, 'identifiers': '[{"type": "dns", "value": "nginx.csd-monitor.ais.foo.com"}]', 'expires': 1631866805, 'status': 'ready'} | |
Order._update({'name': 'jZ4tUenaSnGf', 'status': 'processing'}) | |
order_update({'name': 'jZ4tUenaSnGf', 'status': 'processing'}) | |
DBStore._status_search(column:name, pattern:processing) | |
DBStore._status_search() ended | |
DBStore.order_update() ended | |
CSR found() | |
Order._csr_process(jZ4tUenaSnGf) | |
Order._info(jZ4tUenaSnGf) | |
order_lookup(name:jZ4tUenaSnGf) | |
DBStore._order_search(column:name, pattern:jZ4tUenaSnGf) | |
DBStore._order_search() ended | |
DBStore.order_lookup() ended with: {'notbefore': 0, 'notafter': 0, 'identifiers': '[{"type": "dns", "value": "nginx.csd-monitor.ais.foo.com"}]', 'expires': 1631866805, 'status': 'processing'} | |
b64_url_recode() | |
_config_load() | |
Certificate._config_load() | |
Certificate._ca_handler_get(/var/www/acme2certifier/examples/ca_handler/mscertsrv_ca_handler.py) | |
Certificate._ca_handler_get() ended with: .var.www.acme2certifier.examples.ca_handler.mscertsrv_ca_handler | |
Certificate._config_load(): loading CAhandler configured in cfg failed with err: the 'package' argument is required to perform a relative import for '.var.www.acme2certifier.examples.ca_handler.mscertsrv_ca_handler' | |
ca_handler: <module 'acme_srv.ca_handler' from '/var/www/acme2certifier/./acme_srv/ca_handler.py'> | |
Certificate._config_load() ended. | |
Certificate.store_csr(jZ4tUenaSnGf) | |
generate_random_string() | |
DBStore.certificate_add(R3RcM81I7hto) | |
DBStore._certificate_search(column:name, pattern:R3RcM81I7hto) | |
modified column to certificate.name | |
DBStore._certificate_search() ended | |
insert new entry for R3RcM81I7hto | |
DBStore._order_search(column:name, pattern:jZ4tUenaSnGf) | |
DBStore._order_search() ended | |
DBStore.certificate_add() ended with: 32 | |
Certificate.store_csr() ended | |
Certificate.enroll_and_store(R3RcM81I7hto,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) | |
Certificate._csr_check() | |
Certificate._info(R3RcM81I7hto) | |
DBstore.certificate_lookup(name:R3RcM81I7hto) | |
DBStore._certificate_search(column:name, pattern:R3RcM81I7hto) | |
modified column to certificate.name | |
DBStore._certificate_search() ended | |
DBStore.certificate_lookup() ended with: {'name': 'R3RcM81I7hto', 'csr': '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', 'cert': None, 'order__name': 'jZ4tUenaSnGf', 'order': 'jZ4tUenaSnGf'} | |
Certificate._info() ended with:{'name': 'R3RcM81I7hto', 'csr': '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', 'cert': None, 'order__name': 'jZ4tUenaSnGf', 'order': 'jZ4tUenaSnGf'} | |
order_lookup(name:jZ4tUenaSnGf) | |
DBStore._order_search(column:name, pattern:jZ4tUenaSnGf) | |
DBStore._order_search() ended | |
DBStore.order_lookup() ended with: {'identifiers': '[{"type": "dns", "value": "nginx.csd-monitor.ais.foo.com"}]'} | |
Certificate._tnauth_identifier_check() | |
Certificate._tnauth_identifier_check() ended with: False | |
cert_san_get() | |
b64_url_recode() | |
build_pem_file() | |
cert_san_get() ended with: ['DNS:nginx.csd-monitor.ais.foo.com'] | |
Certificate._identifer_status_list() | |
SAN check for dns:nginx.csd-monitor.ais.foo.com against identifiers returned True | |
Certificate._identifer_status_list() ended with [True] | |
Certificate._csr_check() ended with True | |
CAhandler._config_load() | |
load_config(/var/www/acme2certifier/./acme_srv/acme_srv.cfg:CAhandler) | |
CAhandler._config_load() ended | |
CAhandler.enroll() | |
CAhandler._stub_func(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) | |
CAhandler._stub_func() ended | |
Certificate.enroll() ended | |
acme2certifier enrollment error: None | |
Certificate._store_cert_error(R3RcM81I7hto) | |
DBStore.certificate_add(R3RcM81I7hto) | |
DBStore._certificate_search(column:name, pattern:R3RcM81I7hto) | |
modified column to certificate.name | |
DBStore._certificate_search() ended | |
update existing entry for R3RcM81I7hto id:32 | |
DBStore.certificate_add() ended with: 32 | |
Certificate._store_cert_error(32) ended | |
Certificate.enroll_and_store() ended with: None:urn:ietf:params:acme:error:serverInternal | |
Order._csr_process() ended with order:jZ4tUenaSnGf 500:urn:ietf:params:acme:error:serverInternal:None | |
Order._process() ended with order:jZ4tUenaSnGf 500:urn:ietf:params:acme:error:serverInternal:enrollment failed | |
Message.prepare_response() | |
Error.enrich_error() | |
Error.acme_errormessage(urn:ietf:params:acme:error:serverInternal) | |
Order.parse() returns: {"code": 500, "header": {}, "data": {"status": 500, "message": "urn:ietf:params:acme:error:serverInternal", "detail": "enrollment failed"}} | |
10.7.31.40 /acme/order/jZ4tUenaSnGf/finalize {'code': 500, 'header': {}, 'data': {'status': 500, 'message': 'urn:ietf:params:acme:error:serverInternal', 'detail': 'enrollment failed'}} | |
[pid: 18|app: 0|req: 10/21] 10.7.31.40 () {36 vars in 550 bytes} [Thu Sep 16 08:20:09 2021] POST /acme/order/jZ4tUenaSnGf/finalize => generated 102 bytes in 170 msecs (HTTP/1.1 500) 1 headers in 64 bytes (1 switches on core 0) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment