trust_anchors.keysets[owner] = keyset
-- Replace the TA store used for validation
- if keyset_publish(keyset) and verbose() then
+ if keyset_publish(keyset) then
log_info(ffi.C.LOG_GRP_TA, 'installed trust anchors for domain ' .. owner_str .. ' are:\n'
.. trust_anchors.summary(owner))
end
-- @function Configure module
function M.config()
if not http then
- if verbose() then
- log_error(ffi.C.LOG_GRP_DAF, 'HTTP API unavailable because HTTP module is not loaded, use modules.load("http")')
- end
+ log_warn(ffi.C.LOG_GRP_DAF,
+ 'HTTP API unavailable because HTTP module is not loaded, use modules.load("http")')
return
end
local endpoints = http.configs._builtin.webmgmt.endpoints
if qry.parent == nil then
state = refuse(req)
end
- if verbose() then
- log_qry(qry, ffi.C.LOG_GRP_REBIND,
- 'blocking blacklisted IP in RR \'%s\'\n', kres.rr2str(bad_rr))
- end
+ log_qry(qry, ffi.C.LOG_GRP_REBIND,
+ 'blocking blacklisted IP in RR \'%s\'\n', kres.rr2str(bad_rr))
return state
end
local now = ffi.C.kr_now()
local deadline = qry.creation_time_mono + M.timeout
if now > deadline or qry.flags.NO_NS_FOUND then
- log_info(ffi.C.LOG_GRP_SRVSTALE, ' => no reachable NS, using stale data')
+ log_debug(ffi.C.LOG_GRP_SRVSTALE, ' => no reachable NS, using stale data')
qry.stale_cb = M.callback
-- TODO: probably start the same request that doesn't stale-serve,
-- but first we need some detection of non-interactive / internal requests.
ta.state = key_state.Valid
ta.timer = nil
end
- if rr.state ~= key_state.Valid or verbose() then
+ if rr.state ~= key_state.Valid then
log_info(ffi.C.LOG_GRP_TAUPDATE, 'key: ' .. key_tag .. ' state: '..ta.state)
end
return true