Db::RowShPtr jWorse;
auto &riskiest = cache.riskiest;
- INFO("start to judge scan stage on pkg[" << pkgPath << "]");
+ DEBUG("start to judge scan stage on pkg[" << pkgPath << "]");
switch (this->judgeScanStage(riskiest, history, isHistoryDeleted, since, jWorse)) {
case CsLogic::ScanStage::NEW_RISKIEST :
this->m_db->transactionBegin();
break;
}
- DEBUG("Malware detected!!!");
+ INFO("Malware detected!!!");
conn->send(BinaryQueue::Serialize(ASYNC_EVENT_MALWARE_DETECTED).pop());
conn->send(BinaryQueue::Serialize(malware).pop());
} else if (context.isScannedCbRegistered) {
auto fullpath = (parent_dirpath.back() == '/') ?
(parent_dirpath + name) : (parent_dirpath + "/" + name);
- INFO("start to traverse file: " << fullpath);
+ DEBUG("start to traverse file: " << fullpath);
if (result->d_type == DT_LNK) {
if (!currentdir->isInApp())
namespace {
+#if !defined(NDEBUG)
#define CID_TOSTRING(name) case CommandId::name: return #name
std::string cidToString(const CommandId &cid)
{
}
}
#undef CID_TOSTRING
+#endif
inline CommandId extractCommandId(BinaryQueue &q)
{
auto cid = extractCommandId(q);
- INFO("Content scanning request process. command id: " << cidToString(cid));
+ DEBUG("Content scanning request process. command id: " << cidToString(cid));
switch (cid) {
case CommandId::SCAN_DATA: {
auto cid = extractCommandId(q);
- INFO("Web protection request process. command id: " << cidToString(cid));
+ DEBUG("Web protection request process. command id: " << cidToString(cid));
switch (cid) {
case CommandId::CHECK_URL: {
hasPermission(conn);
- INFO("Admin request process. command id: " << cidToString(cid));
+ DEBUG("Admin request process. command id: " << cidToString(cid));
switch (cid) {
case CommandId::EM_GET_NAME: {