diff --git a/checker/rule.go b/checker/rule.go index d42bfa9..3a83adb 100644 --- a/checker/rule.go +++ b/checker/rule.go @@ -108,7 +108,7 @@ func (r *preferredEndpointRule) Evaluate(ctx context.Context, obs sdk.Observatio // When nothing works, let the presence rule drive the verdict. if !anyOK { return single(sdk.CheckState{ - Status: sdk.StatusInfo, + Status: sdk.StatusUnknown, Message: "No autoconfig responded; primary endpoint not evaluated.", Code: "autoconfig_preferred_skip", }) @@ -192,7 +192,7 @@ func (r *tlsRule) Evaluate(ctx context.Context, obs sdk.ObservationGetter, opts if len(out) == 0 { return single(sdk.CheckState{ - Status: sdk.StatusInfo, + Status: sdk.StatusUnknown, Message: "No autoconfig probe reached an endpoint; TLS not assessed.", Code: "autoconfig_tls_skip", }) @@ -218,7 +218,7 @@ func (r *encryptionRule) Evaluate(ctx context.Context, obs sdk.ObservationGetter } if d.ClientConfig == nil { return single(sdk.CheckState{ - Status: sdk.StatusInfo, + Status: sdk.StatusUnknown, Message: "No clientConfig parsed; encryption check skipped.", Code: "autoconfig_encryption_skip", }) @@ -257,7 +257,7 @@ func (r *encryptionRule) Evaluate(ctx context.Context, obs sdk.ObservationGetter } if len(out) == 0 { return single(sdk.CheckState{ - Status: sdk.StatusInfo, + Status: sdk.StatusUnknown, Message: "clientConfig declares no server to evaluate.", Code: "autoconfig_encryption_skip", }) @@ -283,7 +283,7 @@ func (r *consistencyRule) Evaluate(ctx context.Context, obs sdk.ObservationGette } if d.ClientConfig == nil { return single(sdk.CheckState{ - Status: sdk.StatusInfo, + Status: sdk.StatusUnknown, Message: "No clientConfig to compare.", Code: "autoconfig_consistency_skip", })