void authfail_open(void)
{
if ((ReportType & REPORT_TYPE_AUTH_FAILURES) == 0) {
- if (debugz) debugaz(_("Authentication failure report not produced as it is not requested\n"));
+ if (debugz>=LogLevel_Process) debugaz(_("Authentication failure report not produced as it is not requested\n"));
return;
}
if (Privacy) {
- if (debugz) debugaz(_("Authentication failure report not produced because privacy option is active\n"));
+ if (debugz>=LogLevel_Process) debugaz(_("Authentication failure report not produced because privacy option is active\n"));
return;
}
debuga(_("Failed to delete \"%s\": %s\n"),authfail_unsort,strerror(errno));
authfail_unsort[0]='\0';
- if (debugz) debugaz(_("Authentication failures report not produced because it is empty\n"));
+ if (debugz>=LogLevel_Process) debugaz(_("Authentication failures report not produced because it is empty\n"));
return;
}
if(!dansguardian_count) {
if (!KeepTempLog && unlink(dansguardian_in))
debuga(_("Cannot delete \"%s\": %s\n"),dansguardian_in,strerror(errno));
- if (debugz) debugaz(_("Dansguardian report not generated because it is empty\n"));
+ if (debugz>=LogLevel_Process) debugaz(_("Dansguardian report not generated because it is empty\n"));
return;
}
void denied_open(void)
{
if ((ReportType & REPORT_TYPE_DENIED) == 0) {
- if (debugz) debugaz(_("Denied report not produced as it is not requested\n"));
+ if (debugz>=LogLevel_Process) debugaz(_("Denied report not produced as it is not requested\n"));
return;
}
if (Privacy) {
- if (debugz) debugaz(_("Denied report not produced because privacy option is active\n"));
+ if (debugz>=LogLevel_Process) debugaz(_("Denied report not produced because privacy option is active\n"));
return;
}
if (!KeepTempLog && denied_unsort[0]!='\0' && unlink(denied_unsort))
debuga(_("Cannot delete \"%s\": %s\n"),denied_unsort,strerror(errno));
denied_unsort[0]='\0';
- if (debugz) debugaz(_("Denied report not produced because it is empty\n"));
+ if (debugz>=LogLevel_Process) debugaz(_("Denied report not produced because it is empty\n"));
return;
}
void download_open(void)
{
if ((ReportType & REPORT_TYPE_DOWNLOADS) == 0) {
- if (debugz) debugaz(_("Download report not produced as it is not requested\n"));
+ if (debugz>=LogLevel_Process) debugaz(_("Download report not produced as it is not requested\n"));
return;
}
if (Privacy) {
- if (debugz) debugaz(_("Download report not produced because privacy option is active\n"));
+ if (debugz>=LogLevel_Process) debugaz(_("Download report not produced because privacy option is active\n"));
return;
}
if (!KeepTempLog && download_unsort[0]!='\0' && unlink(download_unsort))
debuga(_("Cannot delete \"%s\": %s\n"),download_unsort,strerror(errno));
download_unsort[0]='\0';
- if (debugz) debugaz(_("No downloaded files to report\n"));
+ if (debugz>=LogLevel_Process) debugaz(_("No downloaded files to report\n"));
return;
}
if(*buf == '#' || *buf == '\0')
return;
- if(debugz)
+ if(debugz>=LogLevel_Process)
printf(_("SARG: TAG: %s\n"),buf);
if (getparam_string("background_color",buf,BgColor,sizeof(BgColor))>0) return;
{
#ifdef HAVE_GD
if (!Graphs) {
- if (debugz)
+ if (debugz>=LogLevel_Process)
debugaz(_("Graphs disabled as requested in %s\n"),ConfigFile);
return;
}
if (GraphFont[0]=='\0') {
- if (debugz)
+ if (debugz>=LogLevel_Process)
debugaz(_("Graphs disabled as no font names were provided in %s\n"),ConfigFile);
return;
}
#define __attribute__(a)
#endif
+//! \brief Constants to compare the log level to display messages
+enum DebugLogLevel
+{
+ //! Process informational messages.
+ LogLevel_Process=1,
+ //! Debug level messages.
+ LogLevel_Debug,
+ //! Display the source file name and line number along with the message.
+ LogLevel_Source
+};
+
struct ReadLogStruct;//forward declaration
struct getwordstruct
}
}
if (!DnsModule) {
- if (debugz) debuga(_("No known module to resolve an IP address using the DNS\n"));
+ if (debugz>=LogLevel_Process) debuga(_("No known module to resolve an IP address using the DNS\n"));
exit(EXIT_FAILURE);
}
debuga(_(" User (-u) = %s\n"),us);
debuga(_(" Temporary dir (-w) = %s\n"),tmp);
debuga(_(" Debug messages (-x) = %s\n"),(debug) ? _("Yes") : _("No"));
- debuga(_(" Process messages (-z) = %s\n"),(debugz) ? _("Yes") : _("No"));
+ debuga(_(" Process messages (-z) = %d\n"),debugz);
debuga(_(" Previous reports to keep (--lastlog) = %d\n"),LastLog);
debuga("\n");
}
printf(_(" User (-u) = %s\n"),us);
printf(_(" Temporary dir (-w) = %s\n"),tmp);
printf(_(" Debug messages (-x) = %s\n"),(debug) ? _("Yes") : _("No"));
- printf(_(" Process messages (-z) = %s\n"),(debugz) ? _("Yes") : _("No"));
+ printf(_(" Process messages (-z) = %d\n"),debugz);
printf(_(" Previous reports to keep (--lastlog) = %d\n"),LastLog);
printf(_("sarg version: %s\n"),VERSION);
}
}
current_format=LogFormats[x];
current_format_idx=x;
- if (debugz) {
+ if (debugz>=LogLevel_Process) {
/* TRANSLATORS: The argument is the log format name as translated by you. */
debuga(_("Log format identified as \"%s\" for %s\n"),_(current_format->Name),arq);
}
if(strlen(log_entry.User) > MAX_USER_LEN) {
- if (debugm) printf(_("User ID too long: %s\n"),log_entry.User);
+ if (debugz>=LogLevel_Process) debuga(_("User ID too long: %s\n"),log_entry.User);
excluded_count[ER_UserNameTooLong]++;
totregsx++;
continue;
}
if(vercode(log_entry.HttpCode)) {
- if (debugm) printf(_("Excluded code: %s\n"),log_entry.HttpCode);
+ if (debugz>=LogLevel_Process) debuga(_("Excluded code: %s\n"),log_entry.HttpCode);
excluded_count[ER_HttpCode]++;
totregsx++;
continue;
}
if(Filter->HostFilter) {
if(!vhexclude(url)) {
- if (debugm) printf(_("Excluded site: %s\n"),url);
+ if (debugz>=LogLevel_Process) debuga(_("Excluded site: %s\n"),url);
excluded_count[ER_Url]++;
totregsx++;
continue;
if(Filter->UserFilter) {
if(!vuexclude(log_entry.User)) {
- if (debugm) printf(_("Excluded user: %s\n"),log_entry.User);
+ if (debugz>=LogLevel_Process) debuga(_("Excluded user: %s\n"),log_entry.User);
excluded_count[ER_IgnoredUser]++;
totregsx++;
continue;
str2 = user;
if(SquidGuardConf[0] == '\0' && NRedirectorLogs == 0) {
- if (debugz) debugaz(_("No redirector logs provided to produce that kind of report\n"));
+ if (debugz>=LogLevel_Process) debugaz(_("No redirector logs provided to produce that kind of report\n"));
return;
}
ouser2[0]='\0';
if(!redirector_count) {
- if (debugz) {
+ if (debugz>=LogLevel_Process) {
if (redirector_sorted[0])
debugaz(_("Redirector report not generated because it is empty\n"));
}
exit(EXIT_FAILURE);
}
- if(debugz){
+ if(debugz>=LogLevel_Process){
debugaz(_("outdirname=%s\n"),outdirname);
}
if (!indexonly) {
if(DansGuardianConf[0] != '\0')
dansguardian_log();
- else if (debugz)
+ else if (debugz>=LogLevel_Process)
debugaz(_("Dansguardian report not produced because no dansguardian configuration file was provided\n"));
redirector_log();
if (!indexonly) {
if((ReportType & REPORT_TYPE_DOWNLOADS) != 0)
download_report();
- else if (debugz)
+ else if (debugz>=LogLevel_Process)
debugaz(_("Downloaded files report not requested in report_type\n"));
if((ReportType & REPORT_TYPE_TOPSITES) != 0)
topsites();
- else if (debugz)
+ else if (debugz>=LogLevel_Process)
debugaz(_("Top sites report not requested in report_type\n"));
if((ReportType & REPORT_TYPE_SITES_USERS) != 0)
siteuser();
- else if (debugz)
+ else if (debugz>=LogLevel_Process)
debugaz(_("Sites & users report not requested in report_type\n"));
if ((ReportType & REPORT_TYPE_DENIED) != 0)
gen_denied_report();
- else if (debugz)
+ else if (debugz>=LogLevel_Process)
debugaz(_("Denied accesses report not requested in report_type\n"));
if ((ReportType & REPORT_TYPE_AUTH_FAILURES) != 0)
authfail_report();
- else if (debugz)
+ else if (debugz>=LogLevel_Process)
debugaz(_("Authentication failures report not requested in report_type\n"));
if(smartfilter) smartfilter_report();
if((ReportType & REPORT_TYPE_USERS_SITES) != 0)
htmlrel();
- else if (debugz)
+ else if (debugz>=LogLevel_Process)
debugaz(_("User's detailed report not requested in report_type\n"));
}
struct userinfostruct *uinfo;
if(Privacy) {
- if (debugz) debugaz(_("Sites and users report not generated because privacy option is on\n"));
+ if (debugz>=LogLevel_Process) debugaz(_("Sites and users report not generated because privacy option is on\n"));
return;
}
struct generalitemstruct item;
if(Privacy) {
- if (debugz) debugaz(_("Top sites report not produced because privacy option is on\n"));
+ if (debugz>=LogLevel_Process) debugaz(_("Top sites report not produced because privacy option is on\n"));
return;
}
debuga(_("Write error in %s: %s\n"),top3,strerror(errno));
exit(EXIT_FAILURE);
}
- if (debugz) debugaz(_("No top users report because it is not configured in report_type\n"));
+ if (debugz>=LogLevel_Process) debugaz(_("No top users report because it is not configured in report_type\n"));
return;
}