mirror of
https://github.com/gregtwallace/apc-p15-tool.git
synced 2025-01-22 00:04:09 +00:00
apcssh: remove logging
For sanity and consistency, centralize logging in the app with the app's loggers.
This commit is contained in:
parent
ce9958e422
commit
12c613f3b4
2 changed files with 6 additions and 7 deletions
|
@ -4,9 +4,7 @@ import (
|
|||
"crypto/sha256"
|
||||
"encoding/base64"
|
||||
"encoding/hex"
|
||||
"errors"
|
||||
"fmt"
|
||||
"log"
|
||||
"net"
|
||||
"runtime"
|
||||
"strings"
|
||||
|
@ -57,10 +55,7 @@ func New(cfg *Config) (*Client, error) {
|
|||
|
||||
// check for fingerprint match (b64 or hex)
|
||||
if actualHashB64 != cfg.ServerFingerprint && actualHashHex != cfg.ServerFingerprint {
|
||||
log.Printf("apcssh: remote server key fingerprint (b64): %s", actualHashB64)
|
||||
log.Printf("apcssh: remote server key fingerprint (hex): %s", actualHashHex)
|
||||
|
||||
return errors.New("apcssh: fingerprint didn't match")
|
||||
return fmt.Errorf("apcssh: server returned wrong fingerprint (b64: %s ; hex: %s)", actualHashB64, actualHashHex)
|
||||
}
|
||||
|
||||
return nil
|
||||
|
@ -86,7 +81,6 @@ func New(cfg *Config) (*Client, error) {
|
|||
|
||||
// insecure cipher options?
|
||||
if cfg.InsecureCipher {
|
||||
log.Println("WARNING: insecure ciphers are enabled (--insecurecipher). SSH with an insecure cipher is NOT secure and should NOT be used.")
|
||||
ciphers = append(ciphers, "aes128-cbc", "3des-cbc")
|
||||
}
|
||||
|
||||
|
|
|
@ -51,6 +51,11 @@ func (app *app) cmdInstall(cmdCtx context.Context, args []string) error {
|
|||
return err
|
||||
}
|
||||
|
||||
// log warning if insecure cipher
|
||||
if app.config.install.insecureCipher != nil && *app.config.install.insecureCipher {
|
||||
app.stdLogger.Println("WARNING: install: insecure ciphers are enabled (--insecurecipher). SSH with an insecure cipher is NOT secure and should NOT be used.")
|
||||
}
|
||||
|
||||
// make APC SSH client
|
||||
cfg := &apcssh.Config{
|
||||
Hostname: *app.config.install.hostAndPort,
|
||||
|
|
Loading…
Reference in a new issue