mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-10 21:23:58 +01:00
Use fmt_and_decorate_addr in log messages.
This commit is contained in:
parent
ec97319464
commit
34c6ee7e9b
@ -1956,7 +1956,7 @@ circuit_handle_first_hop(origin_circuit_t *circ)
|
|||||||
|
|
||||||
/* now see if we're already connected to the first OR in 'route' */
|
/* now see if we're already connected to the first OR in 'route' */
|
||||||
log_debug(LD_CIRC,"Looking for firsthop '%s:%u'",
|
log_debug(LD_CIRC,"Looking for firsthop '%s:%u'",
|
||||||
fmt_addr(&firsthop->extend_info->addr),
|
fmt_and_decorate_addr(&firsthop->extend_info->addr),
|
||||||
firsthop->extend_info->port);
|
firsthop->extend_info->port);
|
||||||
|
|
||||||
n_conn = connection_or_get_for_extend(firsthop->extend_info->identity_digest,
|
n_conn = connection_or_get_for_extend(firsthop->extend_info->identity_digest,
|
||||||
@ -2471,7 +2471,7 @@ circuit_extend(cell_t *cell, circuit_t *circ)
|
|||||||
|
|
||||||
if (!n_conn) {
|
if (!n_conn) {
|
||||||
log_debug(LD_CIRC|LD_OR,"Next router (%s:%d): %s",
|
log_debug(LD_CIRC|LD_OR,"Next router (%s:%d): %s",
|
||||||
fmt_addr(&n_addr), (int)n_port, msg?msg:"????");
|
fmt_and_decorate_addr(&n_addr), (int)n_port, msg?msg:"????");
|
||||||
|
|
||||||
circ->n_hop = extend_info_new(NULL /*nickname*/,
|
circ->n_hop = extend_info_new(NULL /*nickname*/,
|
||||||
id_digest,
|
id_digest,
|
||||||
@ -5319,7 +5319,7 @@ learned_router_identity(const tor_addr_t *addr, uint16_t port,
|
|||||||
if (bridge && tor_digest_is_zero(bridge->identity)) {
|
if (bridge && tor_digest_is_zero(bridge->identity)) {
|
||||||
memcpy(bridge->identity, digest, DIGEST_LEN);
|
memcpy(bridge->identity, digest, DIGEST_LEN);
|
||||||
log_notice(LD_DIR, "Learned fingerprint %s for bridge %s:%d",
|
log_notice(LD_DIR, "Learned fingerprint %s for bridge %s:%d",
|
||||||
hex_str(digest, DIGEST_LEN), fmt_addr(addr), port);
|
hex_str(digest, DIGEST_LEN), fmt_and_decorate_addr(addr), port);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -5365,11 +5365,11 @@ bridge_resolve_conflicts(const tor_addr_t *addr, uint16_t port,
|
|||||||
/* warn the user */
|
/* warn the user */
|
||||||
char *bridge_description_new, *bridge_description_old;
|
char *bridge_description_new, *bridge_description_old;
|
||||||
tor_asprintf(&bridge_description_new, "%s:%u:%s:%s",
|
tor_asprintf(&bridge_description_new, "%s:%u:%s:%s",
|
||||||
fmt_addr(addr), port,
|
fmt_and_decorate_addr(addr), port,
|
||||||
digest ? hex_str(digest, DIGEST_LEN) : "",
|
digest ? hex_str(digest, DIGEST_LEN) : "",
|
||||||
transport_name ? transport_name : "");
|
transport_name ? transport_name : "");
|
||||||
tor_asprintf(&bridge_description_old, "%s:%u:%s:%s",
|
tor_asprintf(&bridge_description_old, "%s:%u:%s:%s",
|
||||||
fmt_addr(&bridge->addr), bridge->port,
|
fmt_and_decorate_addr(&bridge->addr), bridge->port,
|
||||||
tor_digest_is_zero(bridge->identity) ?
|
tor_digest_is_zero(bridge->identity) ?
|
||||||
"" : hex_str(bridge->identity,DIGEST_LEN),
|
"" : hex_str(bridge->identity,DIGEST_LEN),
|
||||||
bridge->transport_name ? bridge->transport_name : "");
|
bridge->transport_name ? bridge->transport_name : "");
|
||||||
@ -5512,7 +5512,7 @@ launch_direct_bridge_descriptor_fetch(bridge_info_t *bridge)
|
|||||||
if (routerset_contains_bridge(options->ExcludeNodes, bridge)) {
|
if (routerset_contains_bridge(options->ExcludeNodes, bridge)) {
|
||||||
download_status_mark_impossible(&bridge->fetch_status);
|
download_status_mark_impossible(&bridge->fetch_status);
|
||||||
log_warn(LD_APP, "Not using bridge at %s: it is in ExcludeNodes.",
|
log_warn(LD_APP, "Not using bridge at %s: it is in ExcludeNodes.",
|
||||||
safe_str_client(fmt_addr(&bridge->addr)));
|
safe_str_client(fmt_and_decorate_addr(&bridge->addr)));
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -5565,7 +5565,7 @@ fetch_bridge_descriptors(const or_options_t *options, time_t now)
|
|||||||
if (routerset_contains_bridge(options->ExcludeNodes, bridge)) {
|
if (routerset_contains_bridge(options->ExcludeNodes, bridge)) {
|
||||||
download_status_mark_impossible(&bridge->fetch_status);
|
download_status_mark_impossible(&bridge->fetch_status);
|
||||||
log_warn(LD_APP, "Not using bridge at %s: it is in ExcludeNodes.",
|
log_warn(LD_APP, "Not using bridge at %s: it is in ExcludeNodes.",
|
||||||
safe_str_client(fmt_addr(&bridge->addr)));
|
safe_str_client(fmt_and_decorate_addr(&bridge->addr)));
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -5583,7 +5583,8 @@ fetch_bridge_descriptors(const or_options_t *options, time_t now)
|
|||||||
if (ask_bridge_directly &&
|
if (ask_bridge_directly &&
|
||||||
!fascist_firewall_allows_address_or(&bridge->addr, bridge->port)) {
|
!fascist_firewall_allows_address_or(&bridge->addr, bridge->port)) {
|
||||||
log_notice(LD_DIR, "Bridge at '%s:%d' isn't reachable by our "
|
log_notice(LD_DIR, "Bridge at '%s:%d' isn't reachable by our "
|
||||||
"firewall policy. %s.", fmt_addr(&bridge->addr),
|
"firewall policy. %s.",
|
||||||
|
fmt_and_decorate_addr(&bridge->addr),
|
||||||
bridge->port,
|
bridge->port,
|
||||||
can_use_bridge_authority ?
|
can_use_bridge_authority ?
|
||||||
"Asking bridge authority instead" : "Skipping");
|
"Asking bridge authority instead" : "Skipping");
|
||||||
@ -5655,7 +5656,8 @@ rewrite_node_address_for_bridge(const bridge_info_t *bridge, node_t *node)
|
|||||||
log_info(LD_DIR,
|
log_info(LD_DIR,
|
||||||
"Adjusted bridge routerinfo for '%s' to match configured "
|
"Adjusted bridge routerinfo for '%s' to match configured "
|
||||||
"address %s:%d.",
|
"address %s:%d.",
|
||||||
ri->nickname, fmt_addr(&ri->ipv6_addr), ri->ipv6_orport);
|
ri->nickname, fmt_and_decorate_addr(&ri->ipv6_addr),
|
||||||
|
ri->ipv6_orport);
|
||||||
} else {
|
} else {
|
||||||
log_err(LD_BUG, "Address family not supported: %d.",
|
log_err(LD_BUG, "Address family not supported: %d.",
|
||||||
tor_addr_family(&bridge->addr));
|
tor_addr_family(&bridge->addr));
|
||||||
@ -5677,7 +5679,7 @@ rewrite_node_address_for_bridge(const bridge_info_t *bridge, node_t *node)
|
|||||||
"Will prefer using its %s address (%s:%d).",
|
"Will prefer using its %s address (%s:%d).",
|
||||||
ri->nickname,
|
ri->nickname,
|
||||||
tor_addr_family(&ap.addr) == AF_INET6 ? "IPv6" : "IPv4",
|
tor_addr_family(&ap.addr) == AF_INET6 ? "IPv6" : "IPv4",
|
||||||
fmt_addr(&ap.addr), ap.port);
|
fmt_and_decorate_addr(&ap.addr), ap.port);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if (node->rs) {
|
if (node->rs) {
|
||||||
@ -5693,7 +5695,8 @@ rewrite_node_address_for_bridge(const bridge_info_t *bridge, node_t *node)
|
|||||||
log_info(LD_DIR,
|
log_info(LD_DIR,
|
||||||
"Adjusted bridge routerstatus for '%s' to match "
|
"Adjusted bridge routerstatus for '%s' to match "
|
||||||
"configured address %s:%d.",
|
"configured address %s:%d.",
|
||||||
rs->nickname, fmt_addr(&bridge->addr), rs->or_port);
|
rs->nickname, fmt_and_decorate_addr(&bridge->addr),
|
||||||
|
rs->or_port);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -3946,7 +3946,7 @@ parse_bridge_line(const char *line, int validate_only)
|
|||||||
|
|
||||||
if (!validate_only) {
|
if (!validate_only) {
|
||||||
log_debug(LD_DIR, "Bridge at %s:%d (transport: %s) (%s)",
|
log_debug(LD_DIR, "Bridge at %s:%d (transport: %s) (%s)",
|
||||||
fmt_addr(&addr), (int)port,
|
fmt_and_decorate_addr(&addr), (int)port,
|
||||||
transport_name ? transport_name : "no transport",
|
transport_name ? transport_name : "no transport",
|
||||||
fingerprint ? fingerprint : "no key listed");
|
fingerprint ? fingerprint : "no key listed");
|
||||||
bridge_add_from_config(&addr, port,
|
bridge_add_from_config(&addr, port,
|
||||||
@ -4080,7 +4080,7 @@ parse_client_transport_line(const char *line, int validate_only)
|
|||||||
socks_ver);
|
socks_ver);
|
||||||
|
|
||||||
log_info(LD_DIR, "Transport '%s' found at %s:%d",
|
log_info(LD_DIR, "Transport '%s' found at %s:%d",
|
||||||
transports, fmt_addr(&addr), (int)port);
|
transports, fmt_and_decorate_addr(&addr), (int)port);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -4200,7 +4200,7 @@ parse_server_transport_line(const char *line, int validate_only)
|
|||||||
|
|
||||||
if (!validate_only) {
|
if (!validate_only) {
|
||||||
log_info(LD_DIR, "Server transport '%s' at %s:%d.",
|
log_info(LD_DIR, "Server transport '%s' at %s:%d.",
|
||||||
transports, fmt_addr(&addr), (int)port);
|
transports, fmt_and_decorate_addr(&addr), (int)port);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -4376,13 +4376,13 @@ warn_nonlocal_client_ports(const smartlist_t *ports, const char *portname)
|
|||||||
"Other people on the Internet might find your computer and "
|
"Other people on the Internet might find your computer and "
|
||||||
"use it as an open proxy. Please don't allow this unless you "
|
"use it as an open proxy. Please don't allow this unless you "
|
||||||
"have a good reason.",
|
"have a good reason.",
|
||||||
fmt_addr(&port->addr), port->port, portname);
|
fmt_and_decorate_addr(&port->addr), port->port, portname);
|
||||||
} else if (!tor_addr_is_loopback(&port->addr)) {
|
} else if (!tor_addr_is_loopback(&port->addr)) {
|
||||||
log_notice(LD_CONFIG, "You configured a non-loopback address '%s:%d' "
|
log_notice(LD_CONFIG, "You configured a non-loopback address '%s:%d' "
|
||||||
"for %sPort. This allows everybody on your local network to "
|
"for %sPort. This allows everybody on your local network to "
|
||||||
"use your machine as a proxy. Make sure this is what you "
|
"use your machine as a proxy. Make sure this is what you "
|
||||||
"wanted.",
|
"wanted.",
|
||||||
fmt_addr(&port->addr), port->port, portname);
|
fmt_and_decorate_addr(&port->addr), port->port, portname);
|
||||||
}
|
}
|
||||||
} SMARTLIST_FOREACH_END(port);
|
} SMARTLIST_FOREACH_END(port);
|
||||||
}
|
}
|
||||||
|
@ -905,7 +905,8 @@ connection_listener_new(const struct sockaddr *listensockaddr,
|
|||||||
tor_addr_from_sockaddr(&addr, listensockaddr, &usePort);
|
tor_addr_from_sockaddr(&addr, listensockaddr, &usePort);
|
||||||
|
|
||||||
log_notice(LD_NET, "Opening %s on %s:%d",
|
log_notice(LD_NET, "Opening %s on %s:%d",
|
||||||
conn_type_to_string(type), fmt_addr(&addr), usePort);
|
conn_type_to_string(type), fmt_and_decorate_addr(&addr),
|
||||||
|
usePort);
|
||||||
|
|
||||||
s = tor_open_socket(tor_addr_family(&addr),
|
s = tor_open_socket(tor_addr_family(&addr),
|
||||||
is_tcp ? SOCK_STREAM : SOCK_DGRAM,
|
is_tcp ? SOCK_STREAM : SOCK_DGRAM,
|
||||||
@ -1220,7 +1221,7 @@ connection_handle_listener_read(connection_t *conn, int new_type)
|
|||||||
if (socks_policy_permits_address(&addr) == 0) {
|
if (socks_policy_permits_address(&addr) == 0) {
|
||||||
log_notice(LD_APP,
|
log_notice(LD_APP,
|
||||||
"Denying socks connection from untrusted address %s.",
|
"Denying socks connection from untrusted address %s.",
|
||||||
fmt_addr(&addr));
|
fmt_and_decorate_addr(&addr));
|
||||||
tor_close_socket(news);
|
tor_close_socket(news);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
@ -1229,7 +1230,7 @@ connection_handle_listener_read(connection_t *conn, int new_type)
|
|||||||
/* check dirpolicy to see if we should accept it */
|
/* check dirpolicy to see if we should accept it */
|
||||||
if (dir_policy_permits_address(&addr) == 0) {
|
if (dir_policy_permits_address(&addr) == 0) {
|
||||||
log_notice(LD_DIRSERV,"Denying dir connection from address %s.",
|
log_notice(LD_DIRSERV,"Denying dir connection from address %s.",
|
||||||
fmt_addr(&addr));
|
fmt_and_decorate_addr(&addr));
|
||||||
tor_close_socket(news);
|
tor_close_socket(news);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
@ -1395,12 +1396,12 @@ connection_connect(connection_t *conn, const char *address,
|
|||||||
if (ext_addr_len == 0) {
|
if (ext_addr_len == 0) {
|
||||||
log_warn(LD_NET,
|
log_warn(LD_NET,
|
||||||
"Error converting OutboundBindAddress %s into sockaddr. "
|
"Error converting OutboundBindAddress %s into sockaddr. "
|
||||||
"Ignoring.", fmt_addr(ext_addr));
|
"Ignoring.", fmt_and_decorate_addr(ext_addr));
|
||||||
} else {
|
} else {
|
||||||
if (bind(s, (struct sockaddr *) &ext_addr_sa, ext_addr_len) < 0) {
|
if (bind(s, (struct sockaddr *) &ext_addr_sa, ext_addr_len) < 0) {
|
||||||
*socket_error = tor_socket_errno(s);
|
*socket_error = tor_socket_errno(s);
|
||||||
log_warn(LD_NET,"Error binding network socket to %s: %s",
|
log_warn(LD_NET,"Error binding network socket to %s: %s",
|
||||||
fmt_addr(ext_addr),
|
fmt_and_decorate_addr(ext_addr),
|
||||||
tor_socket_strerror(*socket_error));
|
tor_socket_strerror(*socket_error));
|
||||||
tor_close_socket(s);
|
tor_close_socket(s);
|
||||||
return -1;
|
return -1;
|
||||||
@ -4236,7 +4237,8 @@ log_failed_proxy_connection(connection_t *conn)
|
|||||||
log_warn(LD_NET,
|
log_warn(LD_NET,
|
||||||
"The connection to the %s proxy server at %s:%u just failed. "
|
"The connection to the %s proxy server at %s:%u just failed. "
|
||||||
"Make sure that the proxy server is up and running.",
|
"Make sure that the proxy server is up and running.",
|
||||||
proxy_type_to_string(get_proxy_type()), fmt_addr(&proxy_addr),
|
proxy_type_to_string(get_proxy_type()),
|
||||||
|
fmt_and_decorate_addr(&proxy_addr),
|
||||||
proxy_port);
|
proxy_port);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -406,7 +406,7 @@ connection_edge_finished_connecting(edge_connection_t *edge_conn)
|
|||||||
|
|
||||||
log_info(LD_EXIT,"Exit connection to %s:%u (%s) established.",
|
log_info(LD_EXIT,"Exit connection to %s:%u (%s) established.",
|
||||||
escaped_safe_str(conn->address), conn->port,
|
escaped_safe_str(conn->address), conn->port,
|
||||||
safe_str(fmt_addr(&conn->addr)));
|
safe_str(fmt_and_decorate_addr(&conn->addr)));
|
||||||
|
|
||||||
rep_hist_note_exit_stream_opened(conn->port);
|
rep_hist_note_exit_stream_opened(conn->port);
|
||||||
|
|
||||||
|
@ -1089,12 +1089,14 @@ connection_or_connect(const tor_addr_t *_addr, uint16_t port,
|
|||||||
"transport proxy supporting '%s'. This can happen if you "
|
"transport proxy supporting '%s'. This can happen if you "
|
||||||
"haven't provided a ClientTransportPlugin line, or if "
|
"haven't provided a ClientTransportPlugin line, or if "
|
||||||
"your pluggable transport proxy stopped running.",
|
"your pluggable transport proxy stopped running.",
|
||||||
fmt_addr(&TO_CONN(conn)->addr), TO_CONN(conn)->port,
|
fmt_and_decorate_addr(&TO_CONN(conn)->addr),
|
||||||
|
TO_CONN(conn)->port,
|
||||||
transport_name, transport_name);
|
transport_name, transport_name);
|
||||||
} else {
|
} else {
|
||||||
log_warn(LD_GENERAL, "Tried to connect to '%s:%u' through a proxy, but "
|
log_warn(LD_GENERAL, "Tried to connect to '%s:%u' through a proxy, but "
|
||||||
"the proxy address could not be found.",
|
"the proxy address could not be found.",
|
||||||
fmt_addr(&TO_CONN(conn)->addr), TO_CONN(conn)->port);
|
fmt_and_decorate_addr(&TO_CONN(conn)->addr),
|
||||||
|
TO_CONN(conn)->port);
|
||||||
}
|
}
|
||||||
|
|
||||||
connection_free(TO_CONN(conn));
|
connection_free(TO_CONN(conn));
|
||||||
|
@ -273,7 +273,8 @@ rend_add_service(rend_service_t *service)
|
|||||||
for (i = 0; i < smartlist_len(service->ports); ++i) {
|
for (i = 0; i < smartlist_len(service->ports); ++i) {
|
||||||
p = smartlist_get(service->ports, i);
|
p = smartlist_get(service->ports, i);
|
||||||
log_debug(LD_REND,"Service maps port %d to %s:%d",
|
log_debug(LD_REND,"Service maps port %d to %s:%d",
|
||||||
p->virtual_port, fmt_addr(&p->real_addr), p->real_port);
|
p->virtual_port, fmt_and_decorate_addr(&p->real_addr),
|
||||||
|
p->real_port);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -270,13 +270,13 @@ transport_resolve_conflicts(const transport_t *t)
|
|||||||
t_tmp->marked_for_removal = 0;
|
t_tmp->marked_for_removal = 0;
|
||||||
return 1;
|
return 1;
|
||||||
} else { /* same name but different addrport */
|
} else { /* same name but different addrport */
|
||||||
char *new_transport_addr = tor_strdup(fmt_addr(&t->addr));
|
char *new_transport_addr = tor_strdup(fmt_and_decorate_addr(&t->addr));
|
||||||
if (t_tmp->marked_for_removal) { /* marked for removal */
|
if (t_tmp->marked_for_removal) { /* marked for removal */
|
||||||
log_notice(LD_GENERAL, "You tried to add transport '%s' at '%s:%u' "
|
log_notice(LD_GENERAL, "You tried to add transport '%s' at '%s:%u' "
|
||||||
"but there was already a transport marked for deletion at "
|
"but there was already a transport marked for deletion at "
|
||||||
"'%s:%u'. We deleted the old transport and registered the "
|
"'%s:%u'. We deleted the old transport and registered the "
|
||||||
"new one.", t->name, new_transport_addr, t->port,
|
"new one.", t->name, new_transport_addr, t->port,
|
||||||
fmt_addr(&t_tmp->addr), t_tmp->port);
|
fmt_and_decorate_addr(&t_tmp->addr), t_tmp->port);
|
||||||
smartlist_remove(transport_list, t_tmp);
|
smartlist_remove(transport_list, t_tmp);
|
||||||
transport_free(t_tmp);
|
transport_free(t_tmp);
|
||||||
tor_free(new_transport_addr);
|
tor_free(new_transport_addr);
|
||||||
@ -284,7 +284,7 @@ transport_resolve_conflicts(const transport_t *t)
|
|||||||
log_notice(LD_GENERAL, "You tried to add transport '%s' at '%s:%u' "
|
log_notice(LD_GENERAL, "You tried to add transport '%s' at '%s:%u' "
|
||||||
"but the same transport already exists at '%s:%u'. "
|
"but the same transport already exists at '%s:%u'. "
|
||||||
"Skipping.", t->name, new_transport_addr, t->port,
|
"Skipping.", t->name, new_transport_addr, t->port,
|
||||||
fmt_addr(&t_tmp->addr), t_tmp->port);
|
fmt_and_decorate_addr(&t_tmp->addr), t_tmp->port);
|
||||||
tor_free(new_transport_addr);
|
tor_free(new_transport_addr);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
@ -333,17 +333,17 @@ transport_add_from_config(const tor_addr_t *addr, uint16_t port,
|
|||||||
case -1:
|
case -1:
|
||||||
default:
|
default:
|
||||||
log_notice(LD_GENERAL, "Could not add transport %s at %s:%u. Skipping.",
|
log_notice(LD_GENERAL, "Could not add transport %s at %s:%u. Skipping.",
|
||||||
t->name, fmt_addr(&t->addr), t->port);
|
t->name, fmt_and_decorate_addr(&t->addr), t->port);
|
||||||
transport_free(t);
|
transport_free(t);
|
||||||
return -1;
|
return -1;
|
||||||
case 1:
|
case 1:
|
||||||
log_info(LD_GENERAL, "Succesfully registered transport %s at %s:%u.",
|
log_info(LD_GENERAL, "Succesfully registered transport %s at %s:%u.",
|
||||||
t->name, fmt_addr(&t->addr), t->port);
|
t->name, fmt_and_decorate_addr(&t->addr), t->port);
|
||||||
transport_free(t); /* falling */
|
transport_free(t); /* falling */
|
||||||
return 0;
|
return 0;
|
||||||
case 0:
|
case 0:
|
||||||
log_info(LD_GENERAL, "Succesfully registered transport %s at %s:%u.",
|
log_info(LD_GENERAL, "Succesfully registered transport %s at %s:%u.",
|
||||||
t->name, fmt_addr(&t->addr), t->port);
|
t->name, fmt_and_decorate_addr(&t->addr), t->port);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -645,7 +645,7 @@ register_server_proxy(const managed_proxy_t *mp)
|
|||||||
SMARTLIST_FOREACH_BEGIN(mp->transports, transport_t *, t) {
|
SMARTLIST_FOREACH_BEGIN(mp->transports, transport_t *, t) {
|
||||||
save_transport_to_state(t->name, &t->addr, t->port);
|
save_transport_to_state(t->name, &t->addr, t->port);
|
||||||
log_notice(LD_GENERAL, "Registered server transport '%s' at '%s:%d'",
|
log_notice(LD_GENERAL, "Registered server transport '%s' at '%s:%d'",
|
||||||
t->name, fmt_addr(&t->addr), (int)t->port);
|
t->name, fmt_and_decorate_addr(&t->addr), (int)t->port);
|
||||||
} SMARTLIST_FOREACH_END(t);
|
} SMARTLIST_FOREACH_END(t);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user