diff --git a/modules/consensus/esbocs/dap_chain_cs_esbocs.c b/modules/consensus/esbocs/dap_chain_cs_esbocs.c index 6e3fd2fb1d7481b1d0558b9823ea309e101faa63..fa0f643fe09a33ed1acadf0469cf6e23ccc00dbc 100644 --- a/modules/consensus/esbocs/dap_chain_cs_esbocs.c +++ b/modules/consensus/esbocs/dap_chain_cs_esbocs.c @@ -2819,14 +2819,14 @@ static int s_callback_block_verify(dap_chain_cs_blocks_t *a_blocks, dap_chain_bl if (!l_esbocs_pvt->poa_mode) { // Compare signature with delegated keys if (!dap_chain_net_srv_stake_key_delegated(&l_signing_addr)) { - log_it(L_ATT, "Unknown PoS signer %s", + debug_if(l_esbocs_pvt->debug, L_ATT, "Unknown PoS signer %s", dap_chain_hash_fast_to_str_static(&l_signing_addr.data.hash_fast)); continue; } } else { // Compare signature with auth_certs if (!s_validator_check(&l_signing_addr, l_esbocs_pvt->poa_validators)) { - log_it(L_ATT, "Unknown PoA signer %s", + debug_if(l_esbocs_pvt->debug, L_ATT, "Unknown PoA signer %s", dap_chain_hash_fast_to_str_static(&l_signing_addr.data.hash_fast)); continue; } @@ -2872,7 +2872,7 @@ static int s_callback_block_verify(dap_chain_cs_blocks_t *a_blocks, dap_chain_bl dap_hash_fast(a_block, a_block_size, &l_block_hash); char l_block_hash_str[DAP_CHAIN_HASH_FAST_STR_SIZE]; dap_hash_fast_to_str(&l_block_hash, l_block_hash_str, DAP_CHAIN_HASH_FAST_STR_SIZE); - log_it(L_ERROR, "Corrupted block %s: not enough authorized signs: %u of %u", + debug_if(l_esbocs_pvt->debug, L_ERROR, "Corrupted block %s: not enough authorized signs: %u of %u", l_block_hash_str, l_signs_verified_count, l_esbocs_pvt->min_validators_count); return l_ret ? l_ret : -4; } diff --git a/modules/net/dap_chain_net_decree.c b/modules/net/dap_chain_net_decree.c index 4cc2826b8218f4d4f3a634c6f227c04629aaa62b..616e9558aadd0334dd93347c079ea3752bd3c8c8 100644 --- a/modules/net/dap_chain_net_decree.c +++ b/modules/net/dap_chain_net_decree.c @@ -265,7 +265,7 @@ int dap_chain_net_decree_apply(dap_hash_fast_t *a_decree_hash, dap_chain_datum_d return -110; } if (l_new_decree->is_applied) { - log_it(L_WARNING, "Decree already applied"); + debug_if(s_debug_more, L_WARNING, "Decree already applied"); return -111; } } else { // Process decree itself diff --git a/modules/type/blocks/dap_chain_block.c b/modules/type/blocks/dap_chain_block.c index 2f64b416a6c5dd7bcdedabc3704b8c77a2623e13..f1c6c7e8dc191cba147f4a8941bbf184e2125020 100644 --- a/modules/type/blocks/dap_chain_block.c +++ b/modules/type/blocks/dap_chain_block.c @@ -325,7 +325,7 @@ dap_sign_t *dap_chain_block_sign_get(const dap_chain_block_t *a_block, size_t a_ while (l_sign_cur < a_sign_num) { size_t l_sign_size = dap_sign_get_size(l_sign); if (!l_sign_size){ - log_it(L_ERROR, "Empty sign #%u", l_sign_cur ); + debug_if(s_dap_block_debug_more, L_ERROR, "Empty sign #%u", l_sign_cur ); return NULL; } if (l_sign_size > a_block_size- l_offset - sizeof (a_block->hdr) ){ @@ -349,7 +349,7 @@ size_t dap_chain_block_get_signs_count(const dap_chain_block_t * a_block, size_t dap_sign_t *l_sign = (dap_sign_t *)(a_block->meta_n_datum_n_sign + l_offset); size_t l_sign_size = dap_sign_get_size(l_sign); if (!l_sign_size){ - log_it(L_WARNING, "Empty sign #%hu", l_sign_count); + debug_if(s_dap_block_debug_more, L_WARNING, "Empty sign #%hu", l_sign_count); return l_sign_count; } if (l_sign_size > a_block_size - l_offset - sizeof(a_block->hdr)) { diff --git a/modules/type/blocks/dap_chain_cs_blocks.c b/modules/type/blocks/dap_chain_cs_blocks.c index a1724ab32dd66191eff196ad072763c2895d864d..3acac0e63e5478d71c843492e56b9df01bfd9965 100644 --- a/modules/type/blocks/dap_chain_cs_blocks.c +++ b/modules/type/blocks/dap_chain_cs_blocks.c @@ -1822,7 +1822,7 @@ static dap_chain_atom_verify_res_t s_callback_atom_verify(dap_chain_t * a_chain, // 2nd level consensus if(l_blocks->callback_block_verify) if (l_blocks->callback_block_verify(l_blocks, l_block, a_atom_size)){ - log_it(L_WARNING, "Block rejected by block verificator."); + debug_if(s_debug_more, L_WARNING, "Block rejected by block verificator."); return ATOM_REJECT; }