Skip to content

Commit

Permalink
fix: change error to debug (#378)
Browse files Browse the repository at this point in the history
  • Loading branch information
gruberb authored Nov 20, 2023
1 parent 38cc514 commit 7aea72c
Showing 1 changed file with 5 additions and 5 deletions.
10 changes: 5 additions & 5 deletions crates/topos-tce-broadcast/src/double_echo/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ use topos_core::{
use topos_crypto::messages::{MessageSigner, Signature};
use topos_tce_storage::types::CertificateDeliveredWithPositions;
use topos_tce_storage::validator::ValidatorStore;
use tracing::{error, info, warn};
use tracing::{debug, error, info, warn};

pub mod broadcast_state;

Expand Down Expand Up @@ -156,31 +156,31 @@ impl DoubleEcho {
DoubleEchoCommand::Echo { certificate_id, validator_id, signature } => {
// Check if source is part of known_validators
if !self.validators.contains(&validator_id) {
return error!("ECHO message comes from non-validator: {}", validator_id);
return debug!("ECHO message comes from non-validator: {}", validator_id);
}

let mut payload = Vec::new();
payload.extend_from_slice(certificate_id.as_array());
payload.extend_from_slice(validator_id.as_bytes());

if let Err(e) = self.message_signer.verify_signature(signature, &payload, validator_id.address()) {
return error!("ECHO messag signature cannot be verified from: {}", e);
return debug!("ECHO messag signature cannot be verified from: {}", e);
}

self.handle_echo(certificate_id, validator_id, signature).await
},
DoubleEchoCommand::Ready { certificate_id, validator_id, signature } => {
// Check if source is part of known_validators
if !self.validators.contains(&validator_id) {
return error!("READY message comes from non-validator: {}", validator_id);
return debug!("READY message comes from non-validator: {}", validator_id);
}

let mut payload = Vec::new();
payload.extend_from_slice(certificate_id.as_array());
payload.extend_from_slice(validator_id.as_bytes());

if let Err(e) = self.message_signer.verify_signature(signature, &payload, validator_id.address()) {
return error!("READY message signature cannot be verified from: {}", e);
return debug!("READY message signature cannot be verified from: {}", e);
}

self.handle_ready(certificate_id, validator_id, signature).await
Expand Down

0 comments on commit 7aea72c

Please sign in to comment.