local message_fd = rspamd_util.create_file(fname)
if not message_fd then
- rspamd_logger.errx('cannot store file for avast scan: %s', fname)
+ rspamd_logger.errx(task, 'cannot store file for avast scan: %s', fname)
return
end
local clamav_compat_cmd = string.format("nSCAN %s\n", fname)
if not message_fd then
- rspamd_logger.errx('cannot store file for kaspersky scan: %s', fname)
+ rspamd_logger.errx(task, 'cannot store file for kaspersky scan: %s', fname)
return
end
local message_fd = rspamd_util.create_file(fname)
if not message_fd then
- rspamd_logger.errx('cannot store file for kaspersky_se scan: %s', fname)
+ rspamd_logger.errx(task, 'cannot store file for kaspersky_se scan: %s', fname)
return
end
local message_fd = rspamd_util.create_file(fname)
if not message_fd then
- rspamd_logger.errx('cannot store file for savapi scan: %s', fname)
+ rspamd_logger.errx(task, 'cannot store file for savapi scan: %s', fname)
return
end
1 - params.rule.roc_misclassification_cost)
roc_thresholds = { spam_threshold, ham_threshold }
- rspamd_logger.messagex("ROC thresholds: (spam_threshold: %s, ham_threshold: %s)",
+ rspamd_logger.messagex(rspamd_config, "ROC thresholds: (spam_threshold: %s, ham_threshold: %s)",
roc_thresholds[1], roc_thresholds[2])
end
if options['provider_type'] == 'rspamd' then
if not options['provider_info'] and options['provider_info']['ip4'] and
options['provider_info']['ip6'] then
- rspamd_logger.errx("Missing required provider_info for rspamd")
+ rspamd_logger.errx(rspamd_config, "Missing required provider_info for rspamd")
return false
end
else
- rspamd_logger.errx("Unknown provider_type: %s", options['provider_type'])
+ rspamd_logger.errx(rspamd_config, "Unknown provider_type: %s", options['provider_type'])
return false
end
})
else
lua_util.disable_module(N, "config")
- rspamd_logger.infox('DCC module not configured');
+ rspamd_logger.infox(rspamd_config, 'DCC module not configured');
end
if data then
normalise_results(data, task)
else
- rspamd_logger.errx('cannot get protocol reply, skip saving in history')
+ rspamd_logger.errx(task, 'cannot get protocol reply, skip saving in history')
return
end
rspamd_logger.infox(rspamd_config,
'loaded ROC thresholds for %s:%s; version=%s',
rule.prefix, set.name, profile.version)
- rspamd_logger.debugx("ROC thresholds: %s", roc_thresholds)
+ rspamd_logger.debugx(rspamd_config, "ROC thresholds: %s", roc_thresholds)
end
end
end
if rule_elt.max_inputs and not has_blas then
- rspamd_logger.errx('cannot set max inputs to %s as BLAS is not compiled in',
+ rspamd_logger.errx(rspamd_config, 'cannot set max inputs to %s as BLAS is not compiled in',
rule_elt.name, rule_elt.max_inputs)
rule_elt.max_inputs = nil
end
end
else
lua_util.disable_module(N, 'config')
- rspamd_logger.infox('p0f module not configured');
+ rspamd_logger.infox(rspamd_config, 'p0f module not configured');
end
local function gen_check_cb(prefix, bucket, lim_name, lim_key)
return function(err, data)
if err then
- rspamd_logger.errx('cannot check limit %s: %s', prefix, err)
+ rspamd_logger.errx(task, 'cannot check limit %s: %s', prefix, err)
elseif type(data) == 'table' and data[1] then
lua_util.debugm(N, task,
"got reply for limit %s (%s / %s); %s burst, %s:%s dyn, %s leaked",
local bucket = v.bucket
local function cleanup_cb(err, data)
if err then
- rspamd_logger.errx('cannot cleanup limit %s: %s', k, err)
+ rspamd_logger.errx(task, 'cannot cleanup limit %s: %s', k, err)
else
lua_util.debugm(N, task, 'cleaned pending bucked for %s: %s', k, data)
end
-- No more selection logic
return
else
- rspamd_logger.infox("cannot query selector to make external map request")
+ rspamd_logger.infox(task, "cannot query selector to make external map request")
end
end
-- No more selection logic
return
else
- rspamd_logger.infox("cannot query selector to make external map request")
+ rspamd_logger.infox(task, "cannot query selector to make external map request")
end
end
if s.rule['symbols'] then