@@ -196,7 +196,7 @@ static std::vector<CAddress> ConvertSeeds(const std::vector<uint8_t> &vSeedsIn)
196
196
s >> endpoint;
197
197
CAddress addr{endpoint, GetDesirableServiceFlags (NODE_NONE)};
198
198
addr.nTime = rng.rand_uniform_delay (Now<NodeSeconds>() - one_week, -one_week);
199
- LogPrint (BCLog::NET, " Added hardcoded seed: %s\n " , addr.ToString ());
199
+ LogPrint (BCLog::NET, " Added hardcoded seed: %s\n " , addr.ToStringAddrPort ());
200
200
vSeedsOut.push_back (addr);
201
201
}
202
202
return vSeedsOut;
@@ -258,7 +258,7 @@ std::optional<CService> GetLocalAddrForPeer(CNode& node)
258
258
}
259
259
if (addrLocal.IsRoutable () || gArgs .GetBoolArg (" -addrmantest" , false ))
260
260
{
261
- LogPrint (BCLog::NET, " Advertising address %s to peer=%d\n " , addrLocal.ToString (), node.GetId ());
261
+ LogPrint (BCLog::NET, " Advertising address %s to peer=%d\n " , addrLocal.ToStringAddrPort (), node.GetId ());
262
262
return addrLocal;
263
263
}
264
264
// Address is unroutable. Don't advertise.
@@ -295,7 +295,7 @@ bool AddLocal(const CService& addr_, int nScore)
295
295
if (!IsReachable (addr))
296
296
return false ;
297
297
298
- LogPrintf (" AddLocal(%s,%i)\n " , addr.ToString (), nScore);
298
+ LogPrintf (" AddLocal(%s,%i)\n " , addr.ToStringAddrPort (), nScore);
299
299
300
300
{
301
301
LOCK (g_maplocalhost_mutex);
@@ -318,7 +318,7 @@ bool AddLocal(const CNetAddr &addr, int nScore)
318
318
void RemoveLocal (const CService& addr)
319
319
{
320
320
LOCK (g_maplocalhost_mutex);
321
- LogPrintf (" RemoveLocal(%s)\n " , addr.ToString ());
321
+ LogPrintf (" RemoveLocal(%s)\n " , addr.ToStringAddrPort ());
322
322
mapLocalHost.erase (addr);
323
323
}
324
324
@@ -452,7 +452,7 @@ CNode* CConnman::ConnectNode(CAddress addrConnect, const char *pszDest, bool fCo
452
452
}
453
453
454
454
LogPrintLevel (BCLog::NET, BCLog::Level::Debug, " trying connection %s lastseen=%.1fhrs\n " ,
455
- pszDest ? pszDest : addrConnect.ToString (),
455
+ pszDest ? pszDest : addrConnect.ToStringAddrPort (),
456
456
Ticks<HoursDouble>(pszDest ? 0h : Now<NodeSeconds>() - addrConnect.nTime ));
457
457
458
458
// Resolve
@@ -464,7 +464,7 @@ CNode* CConnman::ConnectNode(CAddress addrConnect, const char *pszDest, bool fCo
464
464
const CService rnd{resolved[GetRand (resolved.size ())]};
465
465
addrConnect = CAddress{MaybeFlipIPv6toCJDNS (rnd), NODE_NONE};
466
466
if (!addrConnect.IsValid ()) {
467
- LogPrint (BCLog::NET, " Resolver returned invalid address %s for %s\n " , addrConnect.ToString (), pszDest);
467
+ LogPrint (BCLog::NET, " Resolver returned invalid address %s for %s\n " , addrConnect.ToStringAddrPort (), pszDest);
468
468
return nullptr ;
469
469
}
470
470
// It is possible that we already have a connection to the IP/port pszDest resolved to.
@@ -593,7 +593,7 @@ void CNode::SetAddrLocal(const CService& addrLocalIn) {
593
593
AssertLockNotHeld (m_addr_local_mutex);
594
594
LOCK (m_addr_local_mutex);
595
595
if (addrLocal.IsValid ()) {
596
- error (" Addr local already set for node: %i. Refusing to change from %s to %s" , id, addrLocal.ToString (), addrLocalIn.ToString ());
596
+ error (" Addr local already set for node: %i. Refusing to change from %s to %s" , id, addrLocal.ToStringAddrPort (), addrLocalIn.ToStringAddrPort ());
597
597
} else {
598
598
addrLocal = addrLocalIn;
599
599
}
@@ -644,7 +644,7 @@ void CNode::CopyStats(CNodeStats& stats)
644
644
645
645
// Leave string empty if addrLocal invalid (not filled in yet)
646
646
CService addrLocalUnlocked = GetAddrLocal ();
647
- stats.addrLocal = addrLocalUnlocked.IsValid () ? addrLocalUnlocked.ToString () : " " ;
647
+ stats.addrLocal = addrLocalUnlocked.IsValid () ? addrLocalUnlocked.ToStringAddrPort () : " " ;
648
648
649
649
X (m_conn_type);
650
650
}
@@ -967,12 +967,12 @@ void CConnman::CreateNodeFromAcceptedSocket(std::unique_ptr<Sock>&& sock,
967
967
}
968
968
969
969
if (!fNetworkActive ) {
970
- LogPrint (BCLog::NET, " connection from %s dropped: not accepting new connections\n " , addr.ToString ());
970
+ LogPrint (BCLog::NET, " connection from %s dropped: not accepting new connections\n " , addr.ToStringAddrPort ());
971
971
return ;
972
972
}
973
973
974
974
if (!sock->IsSelectable ()) {
975
- LogPrintf (" connection from %s dropped: non-selectable socket\n " , addr.ToString ());
975
+ LogPrintf (" connection from %s dropped: non-selectable socket\n " , addr.ToStringAddrPort ());
976
976
return ;
977
977
}
978
978
@@ -981,22 +981,22 @@ void CConnman::CreateNodeFromAcceptedSocket(std::unique_ptr<Sock>&& sock,
981
981
const int on{1 };
982
982
if (sock->SetSockOpt (IPPROTO_TCP, TCP_NODELAY, &on, sizeof (on)) == SOCKET_ERROR) {
983
983
LogPrint (BCLog::NET, " connection from %s: unable to set TCP_NODELAY, continuing anyway\n " ,
984
- addr.ToString ());
984
+ addr.ToStringAddrPort ());
985
985
}
986
986
987
987
// Don't accept connections from banned peers.
988
988
bool banned = m_banman && m_banman->IsBanned (addr);
989
989
if (!NetPermissions::HasFlag (permission_flags, NetPermissionFlags::NoBan) && banned)
990
990
{
991
- LogPrint (BCLog::NET, " connection from %s dropped (banned)\n " , addr.ToString ());
991
+ LogPrint (BCLog::NET, " connection from %s dropped (banned)\n " , addr.ToStringAddrPort ());
992
992
return ;
993
993
}
994
994
995
995
// Only accept connections from discouraged peers if our inbound slots aren't (almost) full.
996
996
bool discouraged = m_banman && m_banman->IsDiscouraged (addr);
997
997
if (!NetPermissions::HasFlag (permission_flags, NetPermissionFlags::NoBan) && nInbound + 1 >= nMaxInbound && discouraged)
998
998
{
999
- LogPrint (BCLog::NET, " connection from %s dropped (discouraged)\n " , addr.ToString ());
999
+ LogPrint (BCLog::NET, " connection from %s dropped (discouraged)\n " , addr.ToStringAddrPort ());
1000
1000
return ;
1001
1001
}
1002
1002
@@ -1034,7 +1034,7 @@ void CConnman::CreateNodeFromAcceptedSocket(std::unique_ptr<Sock>&& sock,
1034
1034
pnode->AddRef ();
1035
1035
m_msgproc->InitializeNode (*pnode, nodeServices);
1036
1036
1037
- LogPrint (BCLog::NET, " connection from %s accepted\n " , addr.ToString ());
1037
+ LogPrint (BCLog::NET, " connection from %s accepted\n " , addr.ToStringAddrPort ());
1038
1038
1039
1039
{
1040
1040
LOCK (m_nodes_mutex);
@@ -1771,7 +1771,7 @@ void CConnman::ThreadOpenConnections(const std::vector<std::string> connect)
1771
1771
!HasAllDesirableServiceFlags (addr.nServices ) ||
1772
1772
setConnected.count (m_netgroupman.GetGroup (addr))) continue ;
1773
1773
addrConnect = addr;
1774
- LogPrint (BCLog::NET, " Trying to make an anchor connection to %s\n " , addrConnect.ToString ());
1774
+ LogPrint (BCLog::NET, " Trying to make an anchor connection to %s\n " , addrConnect.ToStringAddrPort ());
1775
1775
break ;
1776
1776
}
1777
1777
@@ -1851,7 +1851,7 @@ void CConnman::ThreadOpenConnections(const std::vector<std::string> connect)
1851
1851
if (!interruptNet.sleep_for (rng.rand_uniform_duration <CThreadInterrupt::Clock>(FEELER_SLEEP_WINDOW))) {
1852
1852
return ;
1853
1853
}
1854
- LogPrint (BCLog::NET, " Making feeler connection to %s\n " , addrConnect.ToString ());
1854
+ LogPrint (BCLog::NET, " Making feeler connection to %s\n " , addrConnect.ToStringAddrPort ());
1855
1855
}
1856
1856
1857
1857
OpenNetworkConnection (addrConnect, (int )setConnected.size () >= std::min (nMaxConnections - 1 , 2 ), &grant, nullptr , conn_type);
@@ -2080,7 +2080,7 @@ bool CConnman::BindListenPort(const CService& addrBind, bilingual_str& strError,
2080
2080
socklen_t len = sizeof (sockaddr);
2081
2081
if (!addrBind.GetSockAddr ((struct sockaddr *)&sockaddr, &len))
2082
2082
{
2083
- strError = strprintf (Untranslated (" Bind address family for %s not supported" ), addrBind.ToString ());
2083
+ strError = strprintf (Untranslated (" Bind address family for %s not supported" ), addrBind.ToStringAddrPort ());
2084
2084
LogPrintLevel (BCLog::NET, BCLog::Level::Error, " %s\n " , strError.original );
2085
2085
return false ;
2086
2086
}
@@ -2120,13 +2120,13 @@ bool CConnman::BindListenPort(const CService& addrBind, bilingual_str& strError,
2120
2120
if (sock->Bind (reinterpret_cast <struct sockaddr *>(&sockaddr), len) == SOCKET_ERROR) {
2121
2121
int nErr = WSAGetLastError ();
2122
2122
if (nErr == WSAEADDRINUSE)
2123
- strError = strprintf (_ (" Unable to bind to %s on this computer. %s is probably already running." ), addrBind.ToString (), PACKAGE_NAME);
2123
+ strError = strprintf (_ (" Unable to bind to %s on this computer. %s is probably already running." ), addrBind.ToStringAddrPort (), PACKAGE_NAME);
2124
2124
else
2125
- strError = strprintf (_ (" Unable to bind to %s on this computer (bind returned error %s)" ), addrBind.ToString (), NetworkErrorString (nErr));
2125
+ strError = strprintf (_ (" Unable to bind to %s on this computer (bind returned error %s)" ), addrBind.ToStringAddrPort (), NetworkErrorString (nErr));
2126
2126
LogPrintLevel (BCLog::NET, BCLog::Level::Error, " %s\n " , strError.original );
2127
2127
return false ;
2128
2128
}
2129
- LogPrintf (" Bound to %s\n " , addrBind.ToString ());
2129
+ LogPrintf (" Bound to %s\n " , addrBind.ToStringAddrPort ());
2130
2130
2131
2131
// Listen for incoming connections
2132
2132
if (sock->Listen (SOMAXCONN) == SOCKET_ERROR)
@@ -2848,7 +2848,7 @@ void CaptureMessageToFile(const CAddress& addr,
2848
2848
auto now = GetTime<std::chrono::microseconds>();
2849
2849
2850
2850
// Windows folder names cannot include a colon
2851
- std::string clean_addr = addr.ToString ();
2851
+ std::string clean_addr = addr.ToStringAddrPort ();
2852
2852
std::replace (clean_addr.begin (), clean_addr.end (), ' :' , ' _' );
2853
2853
2854
2854
fs::path base_path = gArgs .GetDataDirNet () / " message_capture" / fs::u8path (clean_addr);
0 commit comments