|
@@ -18,9 +18,9 @@ namespace TFABot
|
|
|
|
|
|
}
|
|
|
|
|
|
- internal static void HeartbeatCheck()
|
|
|
+ internal static void HeartbeatCheck(bool force = false)
|
|
|
{
|
|
|
- if (!LastTest.HasValue || (DateTime.UtcNow - LastTest.Value).Hours >= 24)
|
|
|
+ if (force || !LastTest.HasValue || (DateTime.UtcNow - LastTest.Value).Hours >= 24)
|
|
|
{
|
|
|
Console.WriteLine("clsSSLCertMonitor: HeartbeatCheck");
|
|
|
LastTest = DateTime.UtcNow;
|
|
@@ -29,13 +29,13 @@ namespace TFABot
|
|
|
{
|
|
|
foreach (var ssl in Program.SSLCertsList.Values)
|
|
|
{
|
|
|
- CheckSSL(ssl);
|
|
|
+ CheckSSL(ssl, force || DateTime.UtcNow.Hour==0);
|
|
|
}
|
|
|
});
|
|
|
}
|
|
|
}
|
|
|
|
|
|
- private static async void CheckSSL(clsSSLCerts ssl)
|
|
|
+ private static async void CheckSSL(clsSSLCerts ssl, bool report)
|
|
|
{
|
|
|
try
|
|
|
{
|
|
@@ -59,14 +59,16 @@ namespace TFABot
|
|
|
var cert2 = new X509Certificate2(cert);
|
|
|
|
|
|
ssl.CertExpiry = DateTime.Parse(cert2.GetExpirationDateString());
|
|
|
- var days = (ssl.CertExpiry - DateTime.UtcNow).Days;
|
|
|
+ var days = (ssl.CertExpiry - DateTime.UtcNow).Value.Days;
|
|
|
|
|
|
- if (days <= 7) SendMessage(ssl, $"{ssl.URL} certificate expires in {days} days");
|
|
|
+ if (report && days <= 7) SendMessage(ssl, $"{ssl.URL} certificate expires in {days} days");
|
|
|
|
|
|
}
|
|
|
catch (Exception ex)
|
|
|
{
|
|
|
- SendMessage(ssl, $"{ssl.URL} certificate read error");
|
|
|
+ var errorMsg = $"{ssl.URL} certificate read error: {ex.Message}";
|
|
|
+ if (report) SendMessage(ssl, errorMsg);
|
|
|
+ Console.WriteLine(errorMsg);
|
|
|
}
|
|
|
}
|
|
|
|