From: Bert Hubert Date: Sat, 2 Apr 2011 09:57:55 +0000 (+0000) Subject: silence a lot of debugging X-Git-Tag: auth-3.0~132 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=6affea246107d83615c4ef6dbcd851eb24603980;p=pdns silence a lot of debugging git-svn-id: svn://svn.powerdns.com/pdns/trunk/pdns@2117 d19b8d6e-7fed-0310-83ef-9ca221ded41b --- diff --git a/pdns/packethandler.cc b/pdns/packethandler.cc index 472c97c5c..163cf38cd 100644 --- a/pdns/packethandler.cc +++ b/pdns/packethandler.cc @@ -453,7 +453,7 @@ int PacketHandler::doAdditionalProcessingAndDropAA(DNSPacket *p, DNSPacket *r, c void PacketHandler::emitNSEC(const std::string& begin, const std::string& end, const std::string& toNSEC, const SOAData& sd, DNSPacket *r, int mode) { - cerr<<"We should emit '"<qdomain<<"|"<qtype.getName()<<": "; + // cerr<<"Doing NSEC3PARAM lookup for '"<qdomain<<"|"<qtype.getName()<<": "; bool narrow; if(d_dk.getNSEC3PARAM(auth, &ns3rc, &narrow)) { - cerr<<"Present, narrow="<qdomain; hashed=hashQNameWithSalt(ns3rc.d_iterations, ns3rc.d_salt, unhashed); getNSEC3Hashes(narrow, sd.db,sd.domain_id, hashed, true, unhashed, before, after); - cerr<<"Done calling for main, before='"<d_dnssecOk) return; - cerr<<"Should add NSEC covering '"<getBeforeAndAfterNames(sd.domain_id, auth, target, before, after); - cerr<<"Done calling, before='"< crrs; for(vector::const_iterator i=arrs.begin(); @@ -756,7 +756,7 @@ int PacketHandler::makeCanonic(DNSPacket *p, DNSPacket *r, string &target) } if(crossedZoneCut) { - cerr<<"Should return NS records, and this A/AAAA record in the additional section.."<qtype.getCode() == QType::NS && p->d_dnssecOk && rfound) { @@ -902,7 +902,7 @@ DNSPacket *PacketHandler::question(DNSPacket *p) void PacketHandler::synthesiseRRSIGs(DNSPacket* p, DNSPacket* r) { - cerr<<"Need to fake up the RRSIGs if someone asked for them explicitly"< > > records_t; records_t records; @@ -942,7 +942,7 @@ void PacketHandler::synthesiseRRSIGs(DNSPacket* p, DNSPacket* r) NSEC3PARAMRecordContent ns3pr; bool doNSEC3= d_dk.getNSEC3PARAM(sd.qname, &ns3pr, &narrow); if(doNSEC3) { - cerr<<"We don't yet add NSEC3 to explicit RRSIG queries correctly yet! (narrow="<qdomain; // again, rr.ttl is already set @@ -1037,9 +1037,9 @@ bool PacketHandler::tryReferral(DNSPacket *p, DNSPacket*r, SOAData& sd, const st if(rrset.empty()) return false; - cerr<<"The best NS is: "<qname<qname<addRecord(rr); } @@ -1054,7 +1054,7 @@ bool PacketHandler::tryReferral(DNSPacket *p, DNSPacket*r, SOAData& sd, const st void PacketHandler::completeANYRecords(DNSPacket *p, DNSPacket*r, SOAData& sd, const string &target) { if(!p->d_dnssecOk) - cerr<<"Need to add all the RRSIGs too for '"<qname<qname<qdomain; - cerr<<"\tadding '"<addRecord(rr); } @@ -1297,7 +1297,7 @@ DNSPacket *PacketHandler::questionOrRecurse(DNSPacket *p, bool *shouldRecurse) makeNOError(p, r, target, sd); goto sendit; } - cerr<<"Found nothing in the ANY and wildcards, let's try NS referral"<