internal/worker: remove excess logging

Change-Id: I50b462e2ca628b658d092b0818c7a397bb0f2789
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/393837
Trust: Jonathan Amsterdam <jba@google.com>
Run-TryBot: Jonathan Amsterdam <jba@google.com>
Reviewed-by: Julie Qiu <julie@golang.org>
Reviewed-by: Damien Neil <dneil@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
diff --git a/internal/worker/scan_modules.go b/internal/worker/scan_modules.go
index 8d0981c..bcf4a7c 100644
--- a/internal/worker/scan_modules.go
+++ b/internal/worker/scan_modules.go
@@ -95,7 +95,7 @@
 		}
 		if r != nil {
 			// Already done.
-			log.Debugf(ctx, "already scanned %s@%s at DB time %s", modulePath, version, dbTime)
+			log.Infof(ctx, "already scanned %s@%s at DB time %s", modulePath, version, dbTime)
 			return nil
 		}
 	}
@@ -106,7 +106,6 @@
 	if err != nil {
 		return scanError{err}
 	}
-	log.Infof(ctx, "%s@%s has %d vulns", modulePath, version, len(res.Vulns))
 	for _, v := range res.Vulns {
 		log.Warningf(ctx, "module %s@%s is vulnerable to %s: package %s, symbol %s",
 			modulePath, version, v.OSV.ID, v.PkgPath, v.Symbol)
@@ -147,7 +146,6 @@
 	defer derrors.Wrap(&err, "scanModule(%q, %q)", modulePath, version)
 
 	start := time.Now()
-	log.Infof(ctx, "scanning %s@%s", modulePath, version)
 	defer func() { log.Infof(ctx, "scanned %s@%s in %.1fs", modulePath, version, time.Since(start).Seconds()) }()
 
 	dir, err := os.MkdirTemp("", "scanModule")
@@ -169,7 +167,6 @@
 	if err := writeZip(zipr, dir, modulePath+"@"+version+"/"); err != nil {
 		return nil, err
 	}
-	log.Debugf(ctx, "fetched zip from proxy and unzipped")
 
 	cfg := &packages.Config{
 		Mode:  packages.NeedName | packages.NeedFiles | packages.NeedCompiledGoFiles | packages.NeedImports | packages.NeedTypes | packages.NeedTypesSizes | packages.NeedSyntax | packages.NeedTypesInfo | packages.NeedDeps | packages.NeedModule,
@@ -180,7 +177,6 @@
 	if err != nil {
 		return nil, err
 	}
-	log.Debugf(ctx, "loaded packages")
 	vcfg := &vulncheck.Config{Client: dbClient}
 	return vulncheck.Source(ctx, vulncheck.Convert(pkgs), vcfg)
 }