@@ -51,7 +51,7 @@ use tokio::{
51
51
net:: { TcpListener , UdpSocket } ,
52
52
runtime,
53
53
} ;
54
- use tracing:: { debug, error , info, warn , Event , Subscriber } ;
54
+ use tracing:: { debug, info, Event , Subscriber } ;
55
55
use tracing_subscriber:: {
56
56
fmt:: { format, FmtContext , FormatEvent , FormatFields , FormattedFields } ,
57
57
layer:: SubscriberExt ,
@@ -157,15 +157,15 @@ async fn load_zone(
157
157
let is_dnssec_enabled = zone_config. is_dnssec_enabled ( ) ;
158
158
159
159
if zone_config. is_update_allowed ( ) {
160
- warn ! ( "allow_update is deprecated in [[zones]] section, it belongs in [[zones.stores]]" ) ;
160
+ debug ! ( "allow_update is deprecated in [[zones]] section, it belongs in [[zones.stores]]" ) ;
161
161
}
162
162
163
163
// load the zone
164
164
let authority: Box < dyn AuthorityObject > = match zone_config. stores {
165
165
#[ cfg( feature = "sqlite" ) ]
166
166
Some ( StoreConfig :: Sqlite ( ref config) ) => {
167
167
if zone_path. is_some ( ) {
168
- warn ! ( "ignoring [[zones.file]] instead using [[zones.stores.zone_file_path]]" ) ;
168
+ debug ! ( "ignoring [[zones.file]] instead using [[zones.stores.zone_file_path]]" ) ;
169
169
}
170
170
171
171
let mut authority = SqliteAuthority :: try_from_config (
@@ -184,7 +184,7 @@ async fn load_zone(
184
184
}
185
185
Some ( StoreConfig :: File ( ref config) ) => {
186
186
if zone_path. is_some ( ) {
187
- warn ! ( "ignoring [[zones.file]] instead using [[zones.stores.zone_file_path]]" ) ;
187
+ debug ! ( "ignoring [[zones.file]] instead using [[zones.stores.zone_file_path]]" ) ;
188
188
}
189
189
190
190
let mut authority = FileAuthority :: try_from_config (
@@ -215,7 +215,7 @@ async fn load_zone(
215
215
}
216
216
#[ cfg( feature = "sqlite" ) ]
217
217
None if zone_config. is_update_allowed ( ) => {
218
- warn ! (
218
+ debug ! (
219
219
"using deprecated SQLite load configuration, please move to [[zones.stores]] form"
220
220
) ;
221
221
let zone_file_path = zone_path. ok_or ( "file is a necessary parameter of zone_config" ) ?;
@@ -559,7 +559,7 @@ fn main() {
559
559
e
560
560
) ;
561
561
562
- error ! ( "{}" , error_msg) ;
562
+ debug ! ( "{}" , error_msg) ;
563
563
panic ! ( "{}" , error_msg) ;
564
564
}
565
565
} ;
@@ -586,7 +586,7 @@ fn config_tls(
586
586
. collect ( ) ;
587
587
588
588
if tls_sockaddrs. is_empty ( ) {
589
- warn ! ( "a tls certificate was specified, but no TLS addresses configured to listen on" ) ;
589
+ debug ! ( "a tls certificate was specified, but no TLS addresses configured to listen on" ) ;
590
590
}
591
591
592
592
for tls_listener in & tls_sockaddrs {
@@ -639,7 +639,7 @@ fn config_https(
639
639
. collect ( ) ;
640
640
641
641
if https_sockaddrs. is_empty ( ) {
642
- warn ! ( "a tls certificate was specified, but no HTTPS addresses configured to listen on" ) ;
642
+ debug ! ( "a tls certificate was specified, but no HTTPS addresses configured to listen on" ) ;
643
643
}
644
644
645
645
for https_listener in & https_sockaddrs {
@@ -698,7 +698,7 @@ fn config_quic(
698
698
. collect ( ) ;
699
699
700
700
if quic_sockaddrs. is_empty ( ) {
701
- warn ! ( "a tls certificate was specified, but no QUIC addresses configured to listen on" ) ;
701
+ debug ! ( "a tls certificate was specified, but no QUIC addresses configured to listen on" ) ;
702
702
}
703
703
704
704
for quic_listener in & quic_sockaddrs {
0 commit comments