@@ -267,25 +267,28 @@ private struct PeerEventHandler<Handler: StreamHandler>: QuicEventHandler {
267267 }
268268
269269 // TODO: implement a peer and test this
270- func shouldOpen( _: QuicConnection , certificate: Data ? ) -> QuicStatus {
270+ func shouldOpen( _ connection : QuicConnection , certificate: Data ? ) -> QuicStatus {
271271 // TODO: enable certificate validation logic once parsing logic is fixed
272272 guard let certificate else {
273273 return . code( . requiredCert)
274274 }
275275 do {
276276 let ( publicKey, alternativeName) = try parseCertificate ( data: certificate, type: . x509)
277- logger. debug (
278- " Certificate parsed " ,
279- metadata: [ " publicKey " : " \( publicKey. toHexString ( ) ) " , " alternativeName " : " \( alternativeName) " ]
280- )
277+ logger. trace ( " Certificate parsed " , metadata: [
278+ " connectionId " : " \( connection. id) " ,
279+ " publicKey " : " \( publicKey. toHexString ( ) ) " ,
280+ " alternativeName " : " \( alternativeName) " ,
281+ ] )
281282 if alternativeName != generateSubjectAlternativeName ( pubkey: publicKey) {
282283 return . code( . badCert)
283284 }
284285 if impl. mode == PeerMode . validator {
285286 // TODO: verify if it is current or next validator
286287 }
287288 } catch {
288- logger. error ( " Failed to parse certificate " , metadata: [ " error " : " \( error) " ] )
289+ logger. warning ( " Failed to parse certificate " , metadata: [
290+ " connectionId " : " \( connection. id) " ,
291+ " error " : " \( error) " ] )
289292 return . code( . badCert)
290293 }
291294 return . code( . success)
0 commit comments