@@ -471,13 +471,13 @@ func keyfileRenewalRequired(ctx context.Context,
471471 case * url.Error :
472472 switch v .Err .(type ) {
473473 case x509.UnknownAuthorityError , x509.CertificateInvalidError :
474- log .Warn ().Err (v .Err ).Str ("type" , reflect .TypeOf (v .Err ).String ()).Msg ("Validation of server cert failed" )
474+ log .Debug ().Err (v .Err ).Str ("type" , reflect .TypeOf (v .Err ).String ()).Msg ("Validation of server cert failed" )
475475 return true , true
476476 default :
477- log .Warn ().Err (v .Err ).Str ("type" , reflect .TypeOf (v .Err ).String ()).Msg ("Validation of server cert failed" )
477+ log .Debug ().Err (v .Err ).Str ("type" , reflect .TypeOf (v .Err ).String ()).Msg ("Validation of server cert failed" )
478478 }
479479 default :
480- log .Warn ().Err (err ).Str ("type" , reflect .TypeOf (err ).String ()).Msg ("Validation of server cert failed" )
480+ log .Debug ().Err (err ).Str ("type" , reflect .TypeOf (err ).String ()).Msg ("Validation of server cert failed" )
481481 }
482482 return false , false
483483 }
@@ -493,7 +493,7 @@ func keyfileRenewalRequired(ctx context.Context,
493493 }
494494
495495 if time .Now ().Add (CertificateRenewalMargin ).After (cert .NotAfter ) {
496- log .Warn ().Msg ("Renewal margin exceeded" )
496+ log .Info ().Msg ("Renewal margin exceeded" )
497497 return true , true
498498 }
499499 }
@@ -528,7 +528,7 @@ func keyfileRenewalRequired(ctx context.Context,
528528 keyfileSha := util .SHA256 (keyfile )
529529
530530 if tls .Result .KeyFile .GetSHA ().Checksum () != keyfileSha {
531- log .Warn ().Str ("current" , tls .Result .KeyFile .GetSHA ().Checksum ()).Str ("desired" , keyfileSha ).Msg ("Unable to get tls details" )
531+ log .Debug ().Str ("current" , tls .Result .KeyFile .GetSHA ().Checksum ()).Str ("desired" , keyfileSha ).Msg ("Unable to get tls details" )
532532 return true , false
533533 }
534534 }
0 commit comments