diff --git a/src/api.rs b/src/api.rs index 8f32a31..49c4962 100644 --- a/src/api.rs +++ b/src/api.rs @@ -115,7 +115,7 @@ pub async fn exec_with_empty( where E: Endpoint + FeaturedEndpoint, { - info!("Executing {} and expecting no response", endpoint.path()); + debug!("Executing {} and expecting no response", endpoint.path()); let features = endpoint.features(); endpoint .with_middleware(&client.middle(features)) @@ -136,7 +136,7 @@ pub async fn exec_with_raw( where E: Endpoint + FeaturedEndpoint, { - info!("Executing {} and expecting a response", endpoint.path()); + debug!("Executing {} and expecting a response", endpoint.path()); let features = endpoint.features(); endpoint .with_middleware(&client.middle(features)) @@ -161,7 +161,7 @@ pub async fn exec_with_result( where E: Endpoint + FeaturedEndpoint, { - info!("Executing {} and expecting a response", endpoint.path()); + debug!("Executing {} and expecting a response", endpoint.path()); let features = endpoint.features(); endpoint .with_middleware(&client.middle(features)) diff --git a/src/api/features.rs b/src/api/features.rs index 78f0c41..28f5a48 100644 --- a/src/api/features.rs +++ b/src/api/features.rs @@ -47,7 +47,7 @@ impl Features { pub fn process(&self, request: &mut Request>) { let mut query = HashMap::::new(); let mut keys = Vec::::new(); - info!("Adding features to request"); + debug!("Adding features to request"); // Blocking Queries if let Some(b) = &self.blocking { @@ -97,7 +97,7 @@ impl Features { *request.uri_mut() = http::Uri::from_str(url.as_str()).unwrap(); - info!("Final url with features: {}", request.uri()); + debug!("Final url with features: {}", request.uri()); } /// Returns a default instance of [FeaturesBuilder] for configuring features. diff --git a/src/client.rs b/src/client.rs index 1dc6053..abd3242 100644 --- a/src/client.rs +++ b/src/client.rs @@ -76,7 +76,7 @@ impl ConsulClient { } })?; - info!("Importing CA certificate from {}", path); + debug!("Importing CA certificate from {}", path); http_client = http_client.add_root_certificate(cert); } @@ -100,7 +100,7 @@ impl ConsulClient { } })?; - info!("Importing client certificate from {}", cert); + debug!("Importing client certificate from {}", cert); http_client = http_client.identity(id); } @@ -152,11 +152,11 @@ impl ConsulClientSettingsBuilder { fn default_address(&self) -> String { match env::var("CONSUL_HTTP_ADDR") { Ok(s) => { - info!("Using consul address from $CONSUL_HTTP_ADDR"); + debug!("Using consul address from $CONSUL_HTTP_ADDR"); s } Err(_) => { - info!("Using default consul address http://127.0.0.1:8500"); + debug!("Using default consul address http://127.0.0.1:8500"); String::from("http://127.0.0.1:8500") } } @@ -166,12 +166,12 @@ impl ConsulClientSettingsBuilder { let mut paths: Vec = Vec::new(); if let Ok(s) = env::var("CONSUL_CACERT") { - info!("Found CA certificate in $CONSUL_CACERT"); + debug!("Found CA certificate in $CONSUL_CACERT"); paths.push(s); } if let Ok(s) = env::var("CONSUL_CAPATH") { - info!("Found CA certificate path in $CONSUL_CAPATH"); + debug!("Found CA certificate path in $CONSUL_CAPATH"); if let Ok(p) = fs::read_dir(s) { for path in p { paths.push(path.unwrap().path().to_str().unwrap().to_string()) @@ -185,7 +185,7 @@ impl ConsulClientSettingsBuilder { fn default_client_cert(&self) -> Option { match env::var("CONSUL_CLIENT_CERT") { Ok(s) => { - info!("Using TLS client certificate from $CONSUL_CLIENT_CERT"); + debug!("Using TLS client certificate from $CONSUL_CLIENT_CERT"); Some(s) } Err(_) => { @@ -198,7 +198,7 @@ impl ConsulClientSettingsBuilder { fn default_client_key(&self) -> Option { match env::var("CONSUL_CLIENT_KEY") { Ok(s) => { - info!("Using TLS client key from $CONSUL_CLIENT_KEY"); + debug!("Using TLS client key from $CONSUL_CLIENT_KEY"); Some(s) } Err(_) => { @@ -211,18 +211,18 @@ impl ConsulClientSettingsBuilder { fn default_token(&self) -> Option { match env::var("CONSUL_HTTP_TOKEN") { Ok(s) => { - info!("Using consul ACL token from $CONSUL_HTTP_TOKEN"); + debug!("Using consul ACL token from $CONSUL_HTTP_TOKEN"); Some(s) } Err(_) => { - info!("Using default empty consul ACL token"); + debug!("Using default empty consul ACL token"); None } } } fn default_verify(&self) -> bool { - info!("Checking TLS verification using $CONSUL_HTTP_SSL_VERIFY"); + debug!("Checking TLS verification using $CONSUL_HTTP_SSL_VERIFY"); let verify = env::var("CONSUL_HTTP_SSL_VERIFY").unwrap_or_else(|_| "true".into()); match verify.as_str() { "true" => true,