/* The TSIG record needs to be the last additional record */
if (found_tsig && i + 1 != packet->arcount) {
- DEBUG(0, ("TSIG record not the last additional record!\n"));
+ DEBUG(1, ("TSIG record not the last additional record!\n"));
return DNS_ERR(FORMAT_ERROR);
}
}
if (!NT_STATUS_IS_OK(status)) {
- DEBUG(0, ("Verifying tsig failed: %s\n", nt_errstr(status)));
+ DEBUG(1, ("Verifying tsig failed: %s\n", nt_errstr(status)));
return ntstatus_to_werror(status);
}
tkey->session_info->security_token,
access_mask, NULL);
if (ldb_ret != LDB_SUCCESS) {
- DEBUG(0, ("Disallowing update: %s\n", ldb_strerror(ldb_ret)));
+ DEBUG(5, ("Disallowing update: %s\n", ldb_strerror(ldb_ret)));
return DNS_ERR(REFUSED);
}
- DEBUG(0, ("Allowing signed update\n"));
+ DEBUG(5, ("Allowing signed update\n"));
}
if (update->rr_class == zone->question_class) {
*/
for (i = 0; i < rcount; i++) {
if (recs[i].wType != DNS_TYPE_CNAME) {
- DEBUG(0, ("Skipping update\n"));
+ DEBUG(5, ("Skipping update\n"));
return WERR_OK;
}
break;
*/
for (i = 0; i < rcount; i++) {
if (recs[i].wType == DNS_TYPE_CNAME) {
- DEBUG(0, ("Skipping update\n"));
+ DEBUG(5, ("Skipping update\n"));
return WERR_OK;
}
}
* logic for RFC2136
*/
if (n <= o) {
- DEBUG(0, ("Skipping update\n"));
+ DEBUG(5, ("Skipping update\n"));
return WERR_OK;
}
found = true;
}
}
if (!found) {
- DEBUG(0, ("Skipping update\n"));
+ DEBUG(5, ("Skipping update\n"));
return WERR_OK;
}
werror = check_prerequisites(dns, tmp_ctx, zone, prereqs, pcount);
W_ERROR_NOT_OK_GOTO(werror, failed);
- DEBUG(0, ("update count is %u\n", upd_count));
+ DEBUG(1, ("update count is %u\n", upd_count));
for (ri = 0; ri < upd_count; ri++) {
werror = handle_one_update(dns, tmp_ctx, zone,
struct dns_server_tkey **tkey)
{
if (lpcfg_allow_dns_updates(dns->task->lp_ctx) == DNS_UPDATE_ON) {
- DEBUG(0, ("All updates allowed.\n"));
+ DEBUG(2, ("All updates allowed.\n"));
return WERR_OK;
}
if (lpcfg_allow_dns_updates(dns->task->lp_ctx) == DNS_UPDATE_OFF) {
- DEBUG(0, ("Updates disabled.\n"));
+ DEBUG(2, ("Updates disabled.\n"));
return DNS_ERR(REFUSED);
}
if (state->authenticated == false ) {
- DEBUG(0, ("Update not allowed for unsigned packet.\n"));
+ DEBUG(2, ("Update not allowed for unsigned packet.\n"));
return DNS_ERR(REFUSED);
}
}
if (z == NULL) {
- DEBUG(0, ("We're not authoritative for this zone\n"));
+ DEBUG(1, ("We're not authoritative for this zone\n"));
return DNS_ERR(NOTAUTH);
}
if (host_part_len != 0) {
/* TODO: We need to delegate this one */
- DEBUG(0, ("Would have to delegate zones.\n"));
+ DEBUG(1, ("Would have to delegate zones.\n"));
return DNS_ERR(NOT_IMPLEMENTED);
}