@@ -452,13 +452,18 @@ func (am *ACMEIssuer) doIssue(ctx context.Context, csr *x509.CertificateRequest,
452
452
// do this in a loop because there's an error case that may necessitate a retry, but not more than once
453
453
var certChains []acme.Certificate
454
454
for i := 0 ; i < 2 ; i ++ {
455
+ am .Logger .Info ("using ACME account" ,
456
+ zap .String ("account_id" , params .Account .Location ),
457
+ zap .Strings ("account_contact" , params .Account .Contact ))
458
+
455
459
certChains , err = client .acmeClient .ObtainCertificate (ctx , params )
456
460
if err != nil {
457
461
var prob acme.Problem
458
462
if errors .As (err , & prob ) && prob .Type == acme .ProblemTypeAccountDoesNotExist {
459
463
am .Logger .Warn ("ACME account does not exist on server; attempting to recreate" ,
464
+ zap .String ("account_id" , client .account .Location ),
460
465
zap .Strings ("account_contact" , client .account .Contact ),
461
- zap .String ("account_location " , client .account . Location ),
466
+ zap .String ("key_location " , am . storageKeyUserPrivateKey ( client .acmeClient . Directory , am . getEmail ()) ),
462
467
zap .Object ("problem" , prob ))
463
468
464
469
// the account we have no longer exists on the CA, so we need to create a new one;
@@ -492,6 +497,8 @@ func (am *ACMEIssuer) doIssue(ctx context.Context, csr *x509.CertificateRequest,
492
497
Metadata : preferredChain ,
493
498
}
494
499
500
+ am .Logger .Debug ("selected certificate chain" , zap .String ("url" , preferredChain .URL ))
501
+
495
502
return ic , usingTestCA , nil
496
503
}
497
504
0 commit comments