diff --git a/src/modes/server.rs b/src/modes/server.rs index 40f290a..8938446 100644 --- a/src/modes/server.rs +++ b/src/modes/server.rs @@ -103,7 +103,7 @@ async fn run_server( _conn: &mut rusqlite::Connection, data_dir: PathBuf, ) -> Result<()> { - info!("Starting REST HTTP server on {}", config.address); + debug!("Starting REST HTTP server on {}", config.address); // Create a new database connection for the server // Note: This is a simplified approach. In production, you'd want a connection pool @@ -141,7 +141,7 @@ async fn run_server( config.address.parse()? }; - info!("Server listening on {}", addr); + info!("SERVER: HTTP server listening on {}", addr); let listener = tokio::net::TcpListener::bind(addr).await?; axum::serve( @@ -170,7 +170,7 @@ async fn handle_status( headers: HeaderMap, ConnectInfo(addr): ConnectInfo, ) -> Result>, StatusCode> { - debug!("GET /status from {}", addr); + info!("SERVER: GET /status from {}", addr); if !check_auth(&headers, &state.password) { warn!("Unauthorized request from {}", addr); return Err(StatusCode::UNAUTHORIZED); @@ -208,7 +208,7 @@ async fn handle_list_items( headers: HeaderMap, ConnectInfo(addr): ConnectInfo, ) -> Result>>, StatusCode> { - debug!("GET /item/ from {} with params: {:?}", addr, params); + info!("SERVER: GET /item/ from {} with params: {:?}", addr, params); if !check_auth(&headers, &state.password) { warn!("Unauthorized request to /item/ from {}", addr); return Err(StatusCode::UNAUTHORIZED); @@ -286,7 +286,7 @@ async fn handle_get_item( headers: HeaderMap, ConnectInfo(addr): ConnectInfo, ) -> Result>, StatusCode> { - debug!("GET /item/{} from {} with params: {:?}", item_id, addr, params); + info!("SERVER: GET /item/{} from {} with params: {:?}", item_id, addr, params); if !check_auth(&headers, &state.password) { warn!("Unauthorized request to /item/{} from {}", item_id, addr); return Err(StatusCode::UNAUTHORIZED); @@ -358,7 +358,7 @@ async fn handle_put_item( headers: HeaderMap, ConnectInfo(addr): ConnectInfo, ) -> Result>, StatusCode> { - debug!("PUT /item/ from {}", addr); + info!("SERVER: PUT /item/ from {}", addr); if !check_auth(&headers, &state.password) { warn!("Unauthorized request to PUT /item/ from {}", addr); return Err(StatusCode::UNAUTHORIZED); @@ -383,7 +383,7 @@ async fn handle_delete_item( headers: HeaderMap, ConnectInfo(addr): ConnectInfo, ) -> Result>, StatusCode> { - debug!("DELETE /item/{} from {}", item_id, addr); + info!("SERVER: DELETE /item/{} from {}", item_id, addr); if !check_auth(&headers, &state.password) { warn!("Unauthorized request to DELETE /item/{} from {}", item_id, addr); return Err(StatusCode::UNAUTHORIZED); @@ -421,7 +421,7 @@ async fn handle_get_content_latest( headers: HeaderMap, ConnectInfo(addr): ConnectInfo, ) -> Result>, StatusCode> { - debug!("GET /content from {} with params: {:?}", addr, params); + info!("SERVER: GET /content from {} with params: {:?}", addr, params); if !check_auth(&headers, &state.password) { warn!("Unauthorized request to /content from {}", addr); return Err(StatusCode::UNAUTHORIZED); @@ -474,7 +474,7 @@ async fn handle_get_content( headers: HeaderMap, ConnectInfo(addr): ConnectInfo, ) -> Result>, StatusCode> { - debug!("GET /content/{} from {}", item_id, addr); + info!("SERVER: GET /content/{} from {}", item_id, addr); if !check_auth(&headers, &state.password) { warn!("Unauthorized request to /content/{} from {}", item_id, addr); return Err(StatusCode::UNAUTHORIZED);