From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by lists.proxmox.com (Postfix) with ESMTPS id 057B76940E for ; Fri, 11 Mar 2022 16:08:45 +0100 (CET) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id F02E926853 for ; Fri, 11 Mar 2022 16:08:14 +0100 (CET) Received: from proxmox-new.maurer-it.com (proxmox-new.maurer-it.com [94.136.29.106]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by firstgate.proxmox.com (Proxmox) with ESMTPS id F21272677D for ; Fri, 11 Mar 2022 16:08:08 +0100 (CET) Received: from proxmox-new.maurer-it.com (localhost.localdomain [127.0.0.1]) by proxmox-new.maurer-it.com (Proxmox) with ESMTP id C107642739 for ; Fri, 11 Mar 2022 16:08:08 +0100 (CET) From: Hannes Laimer To: pbs-devel@lists.proxmox.com Date: Fri, 11 Mar 2022 15:07:48 +0000 Message-Id: <20220311150755.73338-4-h.laimer@proxmox.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20220311150755.73338-1-h.laimer@proxmox.com> References: <20220311150755.73338-1-h.laimer@proxmox.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SPAM-LEVEL: Spam detection results: 0 AWL 0.040 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record T_SCC_BODY_TEXT_LINE -0.01 - Subject: [pbs-devel] [PATCH proxmox-backup 03/10] pbs-client: replace print with log macro X-BeenThere: pbs-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox Backup Server development discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 11 Mar 2022 15:08:45 -0000 Signed-off-by: Hannes Laimer --- pbs-client/Cargo.toml | 1 + pbs-client/src/backup_writer.rs | 93 +++++++++++----------------- pbs-client/src/catalog_shell.rs | 4 +- pbs-client/src/http_client.rs | 14 ++--- pbs-client/src/pxar/create.rs | 2 - pbs-client/src/pxar/extract.rs | 44 +++++-------- pbs-client/src/pxar/fuse.rs | 18 +++--- pbs-client/src/pxar/metadata.rs | 4 +- pbs-client/src/pxar_backup_stream.rs | 6 +- pbs-client/src/task_log.rs | 8 +-- pbs-client/src/tools/key_source.rs | 2 +- 11 files changed, 75 insertions(+), 121 deletions(-) diff --git a/pbs-client/Cargo.toml b/pbs-client/Cargo.toml index d713a3ca..c0245657 100644 --- a/pbs-client/Cargo.toml +++ b/pbs-client/Cargo.toml @@ -16,6 +16,7 @@ http = "0.2" hyper = { version = "0.14", features = [ "full" ] } lazy_static = "1.4" libc = "0.2" +log = "0.4" nix = "0.19.1" openssl = "0.10" percent-encoding = "2.1" diff --git a/pbs-client/src/backup_writer.rs b/pbs-client/src/backup_writer.rs index b02798bd..b9678246 100644 --- a/pbs-client/src/backup_writer.rs +++ b/pbs-client/src/backup_writer.rs @@ -28,7 +28,6 @@ use super::{H2Client, HttpClient}; pub struct BackupWriter { h2: H2Client, abort: AbortHandle, - verbose: bool, crypt_config: Option>, } @@ -70,13 +69,11 @@ impl BackupWriter { h2: H2Client, abort: AbortHandle, crypt_config: Option>, - verbose: bool, ) -> Arc { Arc::new(Self { h2, abort, crypt_config, - verbose, }) } @@ -114,7 +111,7 @@ impl BackupWriter { .start_h2_connection(req, String::from(PROXMOX_BACKUP_PROTOCOL_ID_V1!())) .await?; - Ok(BackupWriter::new(h2, abort, crypt_config, debug)) + Ok(BackupWriter::new(h2, abort, crypt_config)) } pub async fn get(&self, path: &str, param: Option) -> Result { @@ -329,23 +326,19 @@ impl BackupWriter { None }, options.compress, - self.verbose, ) .await?; let size_dirty = upload_stats.size - upload_stats.size_reused; let size: HumanByte = upload_stats.size.into(); - let archive = if self.verbose { - archive_name - } else { - pbs_tools::format::strip_server_file_extension(archive_name) - }; + let archive = pbs_tools::format::strip_server_file_extension(archive_name); if archive_name != CATALOG_NAME { let speed: HumanByte = ((size_dirty * 1_000_000) / (upload_stats.duration.as_micros() as usize)).into(); let size_dirty: HumanByte = size_dirty.into(); let size_compressed: HumanByte = upload_stats.size_compressed.into(); - println!( + log::debug!("{}", archive_name); + log::info!( "{}: had to backup {} of {} (compressed {}) in {:.2}s", archive, size_dirty, @@ -353,32 +346,32 @@ impl BackupWriter { size_compressed, upload_stats.duration.as_secs_f64() ); - println!("{}: average backup speed: {}/s", archive, speed); + log::info!("{}: average backup speed: {}/s", archive, speed); } else { - println!("Uploaded backup catalog ({})", size); + log::info!("Uploaded backup catalog ({})", size); } if upload_stats.size_reused > 0 && upload_stats.size > 1024 * 1024 { let reused_percent = upload_stats.size_reused as f64 * 100. / upload_stats.size as f64; let reused: HumanByte = upload_stats.size_reused.into(); - println!( + log::info!( "{}: backup was done incrementally, reused {} ({:.1}%)", archive, reused, reused_percent ); } - if self.verbose && upload_stats.chunk_count > 0 { - println!( + if upload_stats.chunk_count > 0 { + log::debug!( "{}: Reused {} from {} chunks.", - archive, upload_stats.chunk_reused, upload_stats.chunk_count + archive_name, upload_stats.chunk_reused, upload_stats.chunk_count ); - println!( + log::debug!( "{}: Average chunk size was {}.", - archive, + archive_name, HumanByte::from(upload_stats.size / upload_stats.chunk_count) ); - println!( + log::debug!( "{}: Average time per request: {} microseconds.", - archive, + archive_name, (upload_stats.duration.as_micros()) / (upload_stats.chunk_count as u128) ); } @@ -396,9 +389,7 @@ impl BackupWriter { }) } - fn response_queue( - verbose: bool, - ) -> ( + fn response_queue() -> ( mpsc::Sender, oneshot::Receiver>, ) { @@ -427,9 +418,7 @@ impl BackupWriter { .map_err(Error::from) .and_then(H2Client::h2api_response) .map_ok(move |result| { - if verbose { - println!("RESPONSE: {:?}", result) - } + log::debug!("RESPONSE: {:?}", result) }) .map_err(|err| format_err!("pipelined request failed: {}", err)) }) @@ -445,7 +434,6 @@ impl BackupWriter { h2: H2Client, wid: u64, path: String, - verbose: bool, ) -> (UploadQueueSender, UploadResultReceiver) { let (verify_queue_tx, verify_queue_rx) = mpsc::channel(64); let (verify_result_tx, verify_result_rx) = oneshot::channel(); @@ -482,7 +470,7 @@ impl BackupWriter { digest_list.push(hex::encode(&digest)); offset_list.push(offset); } - if verbose { println!("append chunks list len ({})", digest_list.len()); } + log::debug!("append chunks list len ({})", digest_list.len()); let param = json!({ "wid": wid, "digest-list": digest_list, "offset-list": offset_list }); let request = H2Client::request_builder("localhost", "PUT", &path, None, Some("application/json")).unwrap(); let param_data = bytes::Bytes::from(param.to_string().into_bytes()); @@ -538,13 +526,11 @@ impl BackupWriter { known_chunks.insert(*index.index_digest(i).unwrap()); } - if self.verbose { - println!( - "{}: known chunks list length is {}", - archive_name, - index.index_count() - ); - } + log::debug!( + "{}: known chunks list length is {}", + archive_name, + index.index_count() + ); Ok(index) } @@ -579,13 +565,11 @@ impl BackupWriter { known_chunks.insert(*index.index_digest(i).unwrap()); } - if self.verbose { - println!( - "{}: known chunks list length is {}", - archive_name, - index.index_count() - ); - } + log::debug!( + "{}: known chunks list length is {}", + archive_name, + index.index_count() + ); Ok(index) } @@ -632,7 +616,6 @@ impl BackupWriter { known_chunks: Arc>>, crypt_config: Option>, compress: bool, - verbose: bool, ) -> impl Future> { let total_chunks = Arc::new(AtomicUsize::new(0)); let total_chunks2 = total_chunks.clone(); @@ -651,7 +634,7 @@ impl BackupWriter { let is_fixed_chunk_size = prefix == "fixed"; let (upload_queue, upload_result) = - Self::append_chunk_queue(h2.clone(), wid, append_chunk_path, verbose); + Self::append_chunk_queue(h2.clone(), wid, append_chunk_path); let start_time = std::time::Instant::now(); @@ -712,12 +695,8 @@ impl BackupWriter { let digest = chunk_info.digest; let digest_str = hex::encode(&digest); - /* too verbose, needs finer verbosity setting granularity - if verbose { - println!("upload new chunk {} ({} bytes, offset {})", digest_str, - chunk_info.chunk_len, offset); - } - */ + log::trace!("upload new chunk {} ({} bytes, offset {})", digest_str, + chunk_info.chunk_len, offset); let chunk_data = chunk_info.chunk.into_inner(); let param = json!({ @@ -784,7 +763,7 @@ impl BackupWriter { } /// Upload speed test - prints result to stderr - pub async fn upload_speedtest(&self, verbose: bool) -> Result { + pub async fn upload_speedtest(&self) -> Result { let mut data = vec![]; // generate pseudo random byte sequence for i in 0..1024 * 1024 { @@ -798,7 +777,7 @@ impl BackupWriter { let mut repeat = 0; - let (upload_queue, upload_result) = Self::response_queue(verbose); + let (upload_queue, upload_result) = Self::response_queue(); let start_time = std::time::Instant::now(); @@ -808,9 +787,7 @@ impl BackupWriter { break; } - if verbose { - eprintln!("send test data ({} bytes)", data.len()); - } + log::debug!("send test data ({} bytes)", data.len()); let request = H2Client::request_builder("localhost", "POST", "speedtest", None, None).unwrap(); let request_future = self @@ -825,13 +802,13 @@ impl BackupWriter { let _ = upload_result.await?; - eprintln!( + log::info!( "Uploaded {} chunks in {} seconds.", repeat, start_time.elapsed().as_secs() ); let speed = ((item_len * (repeat as usize)) as f64) / start_time.elapsed().as_secs_f64(); - eprintln!( + log::info!( "Time per request: {} microseconds.", (start_time.elapsed().as_micros()) / (repeat as u128) ); diff --git a/pbs-client/src/catalog_shell.rs b/pbs-client/src/catalog_shell.rs index c9c9da67..2ea6d32b 100644 --- a/pbs-client/src/catalog_shell.rs +++ b/pbs-client/src/catalog_shell.rs @@ -104,7 +104,7 @@ fn complete_path(complete_me: &str, _map: &HashMap) -> Vec list, Err(err) => { - eprintln!("error during completion: {}", err); + log::error!("error during completion: {}", err); Vec::new() } } @@ -459,7 +459,7 @@ impl Shell { let args = match cli::shellword_split(&line) { Ok(args) => args, Err(err) => { - println!("Error: {}", err); + log::error!("Error: {}", err); continue; } }; diff --git a/pbs-client/src/http_client.rs b/pbs-client/src/http_client.rs index fedbee57..009e3292 100644 --- a/pbs-client/src/http_client.rs +++ b/pbs-client/src/http_client.rs @@ -327,14 +327,14 @@ impl HttpClient { if fingerprint_cache && prefix.is_some() { if let Err(err) = store_fingerprint( prefix.as_ref().unwrap(), &server, &fingerprint) { - eprintln!("{}", err); + log::error!("{}", err); } } *verified_fingerprint.lock().unwrap() = Some(fingerprint); true }, Err(err) => { - eprintln!("certificate validation failed - {}", err); + log::error!("certificate validation failed - {}", err); false }, } @@ -417,7 +417,7 @@ impl HttpClient { *auth2.write().unwrap() = auth; }, Err(err) => { - eprintln!("re-authentication failed: {}", err); + log::error!("re-authentication failed: {}", err); return; } } @@ -528,14 +528,14 @@ impl HttpClient { if expected_fingerprint == fp_string { return Ok(Some(fp_string)); } else { - eprintln!("WARNING: certificate fingerprint does not match expected fingerprint!"); - eprintln!("expected: {}", expected_fingerprint); + log::warn!("WARNING: certificate fingerprint does not match expected fingerprint!"); + log::warn!("expected: {}", expected_fingerprint); } } // If we're on a TTY, query the user if interactive && tty::stdin_isatty() { - eprintln!("fingerprint: {}", fp_string); + log::info!("fingerprint: {}", fp_string); loop { eprint!("Are you sure you want to continue connecting? (y/n): "); let _ = std::io::stdout().flush(); @@ -719,7 +719,7 @@ impl HttpClient { .await?; let connection = connection - .map_err(|_| eprintln!("HTTP/2.0 connection failed")); + .map_err(|_| log::error!("HTTP/2.0 connection failed")); let (connection, abort) = futures::future::abortable(connection); // A cancellable future returns an Option which is None when cancelled and diff --git a/pbs-client/src/pxar/create.rs b/pbs-client/src/pxar/create.rs index 9f3b0576..27a50b50 100644 --- a/pbs-client/src/pxar/create.rs +++ b/pbs-client/src/pxar/create.rs @@ -43,8 +43,6 @@ pub struct PxarCreateOptions { pub entries_max: usize, /// Skip lost+found directory pub skip_lost_and_found: bool, - /// Verbose output - pub verbose: bool, } diff --git a/pbs-client/src/pxar/extract.rs b/pbs-client/src/pxar/extract.rs index b1f8718e..3a4f8f9e 100644 --- a/pbs-client/src/pxar/extract.rs +++ b/pbs-client/src/pxar/extract.rs @@ -505,7 +505,6 @@ pub async fn create_zip( output: W, decoder: Accessor, path: P, - verbose: bool, ) -> Result<(), Error> where T: Clone + pxar::accessor::ReadAt + Unpin + Send + Sync + 'static, @@ -526,10 +525,10 @@ where let mut zipencoder = ZipEncoder::new(output); let mut decoder = decoder; - recurse_files_zip(&mut zipencoder, &mut decoder, &prefix, file, verbose) + recurse_files_zip(&mut zipencoder, &mut decoder, &prefix, file) .await .map_err(|err| { - eprintln!("error during creating of zip: {}", err); + log::error!("error during creating of zip: {}", err); err })?; @@ -537,7 +536,7 @@ where .finish() .await .map_err(|err| { - eprintln!("error during finishing of zip: {}", err); + log::error!("error during finishing of zip: {}", err); err }) } @@ -547,7 +546,6 @@ fn recurse_files_zip<'a, T, W>( decoder: &'a mut Accessor, prefix: &'a Path, file: FileEntry, - verbose: bool, ) -> Pin> + Send + 'a>> where T: Clone + pxar::accessor::ReadAt + Unpin + Send + Sync + 'static, @@ -559,9 +557,7 @@ where match file.kind() { EntryKind::File { .. } => { - if verbose { - eprintln!("adding '{}' to zip", path.display()); - } + log::debug!("adding '{}' to zip", path.display()); let entry = ZipEntry::new( path, metadata.stat.mtime.secs, @@ -574,9 +570,7 @@ where } EntryKind::Hardlink(_) => { let realfile = decoder.follow_hardlink(&file).await?; - if verbose { - eprintln!("adding '{}' to zip", path.display()); - } + log::debug!("adding '{}' to zip", path.display()); let entry = ZipEntry::new( path, metadata.stat.mtime.secs, @@ -590,9 +584,7 @@ where EntryKind::Directory => { let dir = file.enter_directory().await?; let mut readdir = dir.read_dir(); - if verbose { - eprintln!("adding '{}' to zip", path.display()); - } + log::debug!("adding '{}' to zip", path.display()); let entry = ZipEntry::new( path, metadata.stat.mtime.secs, @@ -602,7 +594,7 @@ where zip.add_entry::>(entry, None).await?; while let Some(entry) = readdir.next().await { let entry = entry?.decode_entry().await?; - recurse_files_zip(zip, decoder, prefix, entry, verbose).await?; + recurse_files_zip(zip, decoder, prefix, entry).await?; } } _ => {} // ignore all else @@ -649,7 +641,6 @@ pub async fn extract_sub_dir( destination: DEST, decoder: Accessor, path: PATH, - verbose: bool, ) -> Result<(), Error> where T: Clone + pxar::accessor::ReadAt + Unpin + Send + Sync + 'static, @@ -668,13 +659,12 @@ where .await? .ok_or(format_err!("error opening '{:?}'", path.as_ref()))?; - recurse_files_extractor(&mut extractor, file, verbose).await + recurse_files_extractor(&mut extractor, file).await } pub async fn extract_sub_dir_seq( destination: DEST, mut decoder: Decoder, - verbose: bool, ) -> Result<(), Error> where S: pxar::decoder::SeqRead + Unpin + Send + 'static, @@ -689,8 +679,8 @@ where let mut extractor = get_extractor(destination, root.metadata().clone())?; - if let Err(err) = seq_files_extractor(&mut extractor, decoder, verbose).await { - eprintln!("error extracting pxar archive: {}", err); + if let Err(err) = seq_files_extractor(&mut extractor, decoder).await { + log::error!("error extracting pxar archive: {}", err); } Ok(()) @@ -746,7 +736,6 @@ fn get_filename(entry: &Entry) -> Result<(OsString, CString), Error> { async fn recurse_files_extractor<'a, T>( extractor: &'a mut Extractor, file: FileEntry, - verbose: bool, ) -> Result<(), Error> where T: Clone + pxar::accessor::ReadAt + Unpin + Send + Sync + 'static, @@ -755,9 +744,7 @@ where let metadata = entry.metadata(); let (file_name_os, file_name) = get_filename(entry)?; - if verbose { - eprintln!("extracting: {}", file.path().display()); - } + log::debug!("extracting: {}", file.path().display()); match file.kind() { EntryKind::Directory => { @@ -768,7 +755,7 @@ where let dir = file.enter_directory().await?; let mut seq_decoder = dir.decode_full().await?; seq_decoder.enable_goodbye_entries(true); - seq_files_extractor(extractor, seq_decoder, verbose).await?; + seq_files_extractor(extractor, seq_decoder).await?; extractor.leave_directory()?; } EntryKind::File { size, .. } => { @@ -792,7 +779,6 @@ where async fn seq_files_extractor<'a, T>( extractor: &'a mut Extractor, mut decoder: pxar::decoder::aio::Decoder, - verbose: bool, ) -> Result<(), Error> where T: pxar::decoder::SeqRead, @@ -807,8 +793,8 @@ where let metadata = entry.metadata(); let (file_name_os, file_name) = get_filename(&entry)?; - if verbose && !matches!(entry.kind(), EntryKind::GoodbyeTable) { - eprintln!("extracting: {}", entry.path().display()); + if !matches!(entry.kind(), EntryKind::GoodbyeTable) { + log::debug!("extracting: {}", entry.path().display()); } if let Err(err) = async { @@ -842,7 +828,7 @@ where .await { let display = entry.path().display().to_string(); - eprintln!( + log::error!( "error extracting {}: {}", if matches!(entry.kind(), EntryKind::GoodbyeTable) { "" diff --git a/pbs-client/src/pxar/fuse.rs b/pbs-client/src/pxar/fuse.rs index 0b90ff2c..303cd991 100644 --- a/pbs-client/src/pxar/fuse.rs +++ b/pbs-client/src/pxar/fuse.rs @@ -240,8 +240,8 @@ impl SessionImpl { /// Here's how we deal with errors: /// - /// Any error will be printed if the verbose flag was set, otherwise the message will be - /// silently dropped. + /// Any error will be logged if a log level of at least 'debug' was set, otherwise the + /// message will be silently dropped. /// /// Opaque errors will cause the fuse main loop to bail out with that error. /// @@ -255,8 +255,8 @@ impl SessionImpl { ) { let final_result = match err.downcast::() { Ok(err) => { - if err.kind() == io::ErrorKind::Other && self.verbose { - eprintln!("an IO error occurred: {}", err); + if err.kind() == io::ErrorKind::Other { + log::debug!("an IO error occurred: {}", err); } // fail the request @@ -264,9 +264,7 @@ impl SessionImpl { } Err(err) => { // `bail` (non-`io::Error`) is used for fatal errors which should actually cancel: - if self.verbose { - eprintln!("internal error: {}, bailing out", err); - } + log::debug!("internal error: {}, bailing out", err); Err(err) } }; @@ -297,7 +295,7 @@ impl SessionImpl { }, err = err_recv.next() => match err { Some(err) => if self.verbose { - eprintln!("cancelling fuse main loop due to error: {}", err); + log::error!("cancelling fuse main loop due to error: {}", err); return Err(err); }, None => panic!("error channel was closed unexpectedly"), @@ -385,9 +383,7 @@ impl SessionImpl { } } other => { - if self.verbose { - eprintln!("Received unexpected fuse request"); - } + log::debug!("Received unexpected fuse request"); other.fail(libc::ENOSYS).map_err(Error::from) } }; diff --git a/pbs-client/src/pxar/metadata.rs b/pbs-client/src/pxar/metadata.rs index e402a362..da31b014 100644 --- a/pbs-client/src/pxar/metadata.rs +++ b/pbs-client/src/pxar/metadata.rs @@ -208,7 +208,7 @@ fn apply_xattrs( } if !xattr::is_valid_xattr_name(xattr.name()) { - eprintln!("skipping invalid xattr named {:?}", xattr.name()); + log::info!("skipping invalid xattr named {:?}", xattr.name()); continue; } @@ -269,7 +269,7 @@ fn apply_acls( acl.add_entry_full(acl::ACL_GROUP_OBJ, None, mode)?; if !metadata.acl.users.is_empty() || !metadata.acl.groups.is_empty() { - eprintln!( + log::warn!( "Warning: {:?}: Missing GROUP_OBJ entry in ACL, resetting to value of MASK", path_info, ); diff --git a/pbs-client/src/pxar_backup_stream.rs b/pbs-client/src/pxar_backup_stream.rs index 28e569a7..42ce0f89 100644 --- a/pbs-client/src/pxar_backup_stream.rs +++ b/pbs-client/src/pxar_backup_stream.rs @@ -53,17 +53,13 @@ impl PxarBackupStream { StdChannelWriter::new(tx), )); - let verbose = options.verbose; - let writer = pxar::encoder::sync::StandardWriter::new(writer); if let Err(err) = crate::pxar::create_archive( dir, writer, crate::pxar::Flags::DEFAULT, move |path| { - if verbose { - println!("{:?}", path); - } + log::debug!("{:?}", path); Ok(()) }, Some(catalog), diff --git a/pbs-client/src/task_log.rs b/pbs-client/src/task_log.rs index 0e55a34a..d8716592 100644 --- a/pbs-client/src/task_log.rs +++ b/pbs-client/src/task_log.rs @@ -29,10 +29,10 @@ pub async fn display_task_log( let abort_future = async move { while signal_stream.recv().await.is_some() { - println!("got shutdown request (SIGINT)"); + log::info!("got shutdown request (SIGINT)"); let prev_count = abort_count2.fetch_add(1, Ordering::SeqCst); if prev_count >= 1 { - println!("forced exit (task still running)"); + log::info!("forced exit (task still running)"); break; } } @@ -69,9 +69,9 @@ pub async fn display_task_log( if n != start { bail!("got wrong line number in response data ({} != {}", n, start); } if strip_date && t.len() > 27 && &t[25..27] == ": " { let line = &t[27..]; - println!("{}", line); + log::info!("{}", line); } else { - println!("{}", t); + log::info!("{}", t); } start += 1; } diff --git a/pbs-client/src/tools/key_source.rs b/pbs-client/src/tools/key_source.rs index f68b1e41..7dd39ef2 100644 --- a/pbs-client/src/tools/key_source.rs +++ b/pbs-client/src/tools/key_source.rs @@ -227,7 +227,7 @@ fn do_crypto_parameters(param: &Value, keep_keyfd_open: bool) -> Result match read_optional_default_encryption_key()? { None => bail!("--crypt-mode without --keyfile and no default key file available"), enc_key => { - eprintln!("Encrypting with default encryption key!"); + log::info!("Encrypting with default encryption key!"); let master_pubkey = match master_pubkey { None => read_optional_default_master_pubkey()?, master_pubkey => master_pubkey, -- 2.30.2