summary refs log tree commit diff
path: root/synapse/handlers/e2e_keys.py
diff options
context:
space:
mode:
authorHubert Chathi <hubert@uhoreg.ca>2019-09-24 15:26:45 -0400
committerHubert Chathi <hubert@uhoreg.ca>2019-09-24 15:26:45 -0400
commit39864f45ec1a5c2c65d4cb03744d4d9452505c0d (patch)
tree76832db8d5faabecaeafe54c61c403b66bf38239 /synapse/handlers/e2e_keys.py
parentmake changes based on PR feedback (diff)
downloadsynapse-39864f45ec1a5c2c65d4cb03744d4d9452505c0d.tar.xz
drop some logger lines to debug
Diffstat (limited to 'synapse/handlers/e2e_keys.py')
-rw-r--r--synapse/handlers/e2e_keys.py6
1 files changed, 3 insertions, 3 deletions
diff --git a/synapse/handlers/e2e_keys.py b/synapse/handlers/e2e_keys.py
index 352c8ee93b..ff32fdaccc 100644
--- a/synapse/handlers/e2e_keys.py
+++ b/synapse/handlers/e2e_keys.py
@@ -928,7 +928,7 @@ class E2eKeysHandler(object):
             user_id, key_type, from_user_id
         )
         if key is None:
-            logger.error("no %s key found for %s", key_type, user_id)
+            logger.debug("no %s key found for %s", key_type, user_id)
             raise NotFoundError("No %s key found for %s" % (key_type, user_id))
         key_id, verify_key = get_verify_key_from_cross_signing_key(key)
         return key, key_id, verify_key
@@ -986,7 +986,7 @@ def _check_device_signature(user_id, verify_key, signed_device, stored_device):
         k: v for k, v in stored_device.items() if k not in ["signatures", "unsigned"]
     }
     if stripped_signed_device != stripped_stored_device:
-        logger.error(
+        logger.debug(
             "upload signatures: key does not match %s vs %s",
             signed_device,
             stored_device,
@@ -996,7 +996,7 @@ def _check_device_signature(user_id, verify_key, signed_device, stored_device):
     try:
         verify_signed_json(signed_device, user_id, verify_key)
     except SignatureVerifyException:
-        logger.error("invalid signature on key")
+        logger.debug("invalid signature on key")
         raise SynapseError(400, "Invalid signature", Codes.INVALID_SIGNATURE)