Skip to content
This repository has been archived by the owner on Oct 31, 2024. It is now read-only.

fix: change error to debug #378

Merged
merged 2 commits into from
Nov 20, 2023
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 5 additions & 5 deletions crates/topos-tce-broadcast/src/double_echo/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ use topos_core::{
use topos_crypto::messages::{MessageSigner, Signature};
use topos_tce_storage::types::CertificateDeliveredWithPositions;
use topos_tce_storage::validator::ValidatorStore;
use tracing::{error, info, warn};
use tracing::{debug, error, info, warn};

pub mod broadcast_state;

Expand Down Expand Up @@ -156,31 +156,31 @@ impl DoubleEcho {
DoubleEchoCommand::Echo { certificate_id, validator_id, signature } => {
// Check if source is part of known_validators
if !self.validators.contains(&validator_id) {
return error!("ECHO message comes from non-validator: {}", validator_id);
return debug!("ECHO message comes from non-validator: {}", validator_id);
}

let mut payload = Vec::new();
payload.extend_from_slice(certificate_id.as_array());
payload.extend_from_slice(validator_id.as_bytes());

if let Err(e) = self.message_signer.verify_signature(signature, &payload, validator_id.address()) {
return error!("ECHO messag signature cannot be verified from: {}", e);
return debug!("ECHO messag signature cannot be verified from: {}", e);
}

self.handle_echo(certificate_id, validator_id, signature).await
},
DoubleEchoCommand::Ready { certificate_id, validator_id, signature } => {
// Check if source is part of known_validators
if !self.validators.contains(&validator_id) {
return error!("READY message comes from non-validator: {}", validator_id);
return debug!("READY message comes from non-validator: {}", validator_id);
}

let mut payload = Vec::new();
payload.extend_from_slice(certificate_id.as_array());
payload.extend_from_slice(validator_id.as_bytes());

if let Err(e) = self.message_signer.verify_signature(signature, &payload, validator_id.address()) {
return error!("READY message signature cannot be verified from: {}", e);
return debug!("READY message signature cannot be verified from: {}", e);
}

self.handle_ready(certificate_id, validator_id, signature).await
Expand Down