From 88ea90b6cbf74a5ac2c337f5710f072e19e18b83 Mon Sep 17 00:00:00 2001 From: youngifif Date: Mon, 6 May 2024 22:56:37 +0800 Subject: [PATCH] fix_misuse_of_logger_function --- teamserver/pkg/common/certs/https.go | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/teamserver/pkg/common/certs/https.go b/teamserver/pkg/common/certs/https.go index 2e90b21e..3b932458 100644 --- a/teamserver/pkg/common/certs/https.go +++ b/teamserver/pkg/common/certs/https.go @@ -283,7 +283,7 @@ func generateCertificate(caType string, subject pkix.Name, isCA bool, isClient b if certErr != nil { // We maybe don't want this to be fatal, but it should basically never happen afaik - logger.Fatal(fmt.Sprintf("Failed to create certificate: %s", certErr)) + logger.Fatal(fmt.Sprintf("Failed to create certificate: %s", certErr.Error())) } // Encode certificate and key @@ -306,7 +306,7 @@ func HTTPSGenerateRSACertificate(host string) ([]byte, []byte, error) { // Generate private key privateKey, err = rsa.GenerateKey(rand.Reader, RSAKeySize) if err != nil { - logger.Debug("Failed to generate private key %s", err) + logger.Debug("Failed to generate private key: " + err.Error()) return nil, nil, err } subject := randomSubject(host)