From 19ff1fb35c3d6031e368f5588269af6d66223d3a Mon Sep 17 00:00:00 2001 From: Matthias Seitz Date: Thu, 29 Feb 2024 15:08:32 +0100 Subject: [PATCH] chore: downgrade discv4 debug! to trace! (#6879) --- crates/net/discv4/src/lib.rs | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/crates/net/discv4/src/lib.rs b/crates/net/discv4/src/lib.rs index 8aef5337de..bdb0119876 100644 --- a/crates/net/discv4/src/lib.rs +++ b/crates/net/discv4/src/lib.rs @@ -820,7 +820,7 @@ impl Discv4Service { let key = kad_key(node_id); let removed = self.kbuckets.remove(&key); if removed { - debug!(target: "discv4", ?node_id, "removed node"); + trace!(target: "discv4", ?node_id, "removed node"); self.notify(DiscoveryUpdate::Removed(node_id)); } removed @@ -903,7 +903,7 @@ impl Discv4Service { if !old_status.is_connected() { let _ = entry.update(ConnectionState::Connected, Some(old_status.direction)); - debug!(target: "discv4", ?record, "added after successful endpoint proof"); + trace!(target: "discv4", ?record, "added after successful endpoint proof"); self.notify(DiscoveryUpdate::Added(record)); if has_enr_seq { @@ -920,7 +920,7 @@ impl Discv4Service { if !status.is_connected() { status.state = ConnectionState::Connected; let _ = entry.update(status); - debug!(target: "discv4", ?record, "added after successful endpoint proof"); + trace!(target: "discv4", ?record, "added after successful endpoint proof"); self.notify(DiscoveryUpdate::Added(record)); if has_enr_seq { @@ -960,7 +960,7 @@ impl Discv4Service { }, ) { BucketInsertResult::Inserted | BucketInsertResult::Pending { .. } => { - debug!(target: "discv4", ?record, "inserted new record"); + trace!(target: "discv4", ?record, "inserted new record"); } _ => return false, } @@ -1405,7 +1405,7 @@ impl Discv4Service { true }); - debug!(target: "discv4", num=%failed_pings.len(), "evicting nodes due to failed pong"); + trace!(target: "discv4", num=%failed_pings.len(), "evicting nodes due to failed pong"); // remove nodes that failed to pong for node_id in failed_pings { @@ -1420,7 +1420,7 @@ impl Discv4Service { } true }); - debug!(target: "discv4", num=%failed_lookups.len(), "evicting nodes due to failed lookup"); + trace!(target: "discv4", num=%failed_lookups.len(), "evicting nodes due to failed lookup"); // remove nodes that failed the e2e lookup process, so we can restart it for node_id in failed_lookups { @@ -1445,7 +1445,7 @@ impl Discv4Service { true }); - debug!(target: "discv4", num=%failed_neighbours.len(), "processing failed neighbours"); + trace!(target: "discv4", num=%failed_neighbours.len(), "processing failed neighbours"); for node_id in failed_neighbours { let key = kad_key(node_id); @@ -1514,7 +1514,7 @@ impl Discv4Service { let now = SystemTime::now().duration_since(UNIX_EPOCH).unwrap_or_default().as_secs(); if self.config.enforce_expiration_timestamps && timestamp < now { - debug!(target: "discv4", "Expired packet"); + trace!(target: "discv4", "Expired packet"); return Err(()) } Ok(()) @@ -1642,7 +1642,7 @@ impl Discv4Service { debug!(target: "discv4", %err, "failed to read datagram"); } IngressEvent::BadPacket(from, err, data) => { - debug!(target: "discv4", ?from, %err, packet=?hex::encode(&data), "bad packet"); + trace!(target: "discv4", ?from, %err, packet=?hex::encode(&data), "bad packet"); } IngressEvent::Packet(remote_addr, Packet { msg, node_id, hash }) => { trace!(target: "discv4", r#type=?msg.msg_type(), from=?remote_addr,"received packet"); @@ -1806,7 +1806,7 @@ pub(crate) async fn receive_loop(udp: Arc, tx: IngressSender, local_i send(IngressEvent::Packet(remote_addr, packet)).await; } Err(err) => { - debug!(target: "discv4", %err,"Failed to decode packet"); + trace!(target: "discv4", %err,"Failed to decode packet"); send(IngressEvent::BadPacket(remote_addr, err, packet.to_vec())).await } }