diff --git a/exec/binkit.js b/exec/binkit.js index 9c629068e978b6d0f57ca9480f1b91325a589ad2..94bdf808fa0e921ccd4440e2975b4269ab449e89 100644 --- a/exec/binkit.js +++ b/exec/binkit.js @@ -335,12 +335,12 @@ function rx_callback(fname, bp) } else { if (bp.authenticated === 'secure') { - log(LOG_DEBUG, "Moving '"+fname+"' to '"+bp.cb_data.binkit_scfg.secure_inbound+file_getname(fname)+"'."); + log(LOG_INFO, "Moving '"+fname+"' to '"+bp.cb_data.binkit_scfg.secure_inbound+file_getname(fname)+"'."); if (!file_rename(fname, bp.cb_data.binkit_scfg.secure_inbound+file_getname(fname))) return false; } else { - log(LOG_DEBUG, "Moving '"+fname+"' to '"+bp.cb_data.binkit_scfg.inbound+file_getname(fname)+"'."); + log(LOG_INFO, "Moving '"+fname+"' to '"+bp.cb_data.binkit_scfg.inbound+file_getname(fname)+"'."); if (!file_rename(fname, bp.cb_data.binkit_scfg.inbound+file_getname(fname))) return false; } @@ -599,7 +599,7 @@ function run_one_outbound_dir(dir, scfg, semaphores) } } if (i<flow_files.length) { - log(LOG_DEBUG, "Attempting callout for file "+flow_files[i]); + log(LOG_INFO, "Attempting callout for file "+flow_files[i]); locks.push(lock_files); // Use a try/catch to ensure we clean up the lock files. callout(addr, scfg, semaphores, locks); @@ -683,7 +683,7 @@ function inbound_auth_cb(pwd, bp) var nocrypt; function check_nocrypt(node) { - if (bp.cb_data.binkitcfg.node[addr].nocrypt) { + if (node) { if (nocrypt === undefined) nocrypt = true; }