@@ -917,7 +917,7 @@ bool CConnman::AttemptToEvictConnection()
917
917
.m_is_local = node->addr .IsLocal (),
918
918
.m_network = node->ConnectedThroughNetwork (),
919
919
.m_noban = node->HasPermission (NetPermissionFlags::NoBan),
920
- .m_conn_type = node->m_conn_type ,
920
+ .m_conn_type = node->GetConnectionType () ,
921
921
};
922
922
vEvictionCandidates.push_back (candidate);
923
923
}
@@ -1092,7 +1092,7 @@ bool CConnman::AddConnection(const std::string& address, ConnectionType conn_typ
1092
1092
1093
1093
// Count existing connections
1094
1094
int existing_connections = WITH_LOCK (m_nodes_mutex,
1095
- return std::count_if (m_nodes.begin (), m_nodes.end (), [conn_type](CNode* node) { return node->m_conn_type == conn_type; }););
1095
+ return std::count_if (m_nodes.begin (), m_nodes.end (), [conn_type](CNode* node) { return node->GetConnectionType () == conn_type; }););
1096
1096
1097
1097
// Max connections of specified type already exist
1098
1098
if (max_connections != std::nullopt && existing_connections >= max_connections) return false ;
@@ -1722,7 +1722,7 @@ void CConnman::ThreadOpenConnections(const std::vector<std::string> connect)
1722
1722
if (pnode->IsBlockOnlyConn ()) nOutboundBlockRelay++;
1723
1723
1724
1724
// Make sure our persistent outbound slots belong to different netgroups.
1725
- switch (pnode->m_conn_type ) {
1725
+ switch (pnode->GetConnectionType () ) {
1726
1726
// We currently don't take inbound connections into account. Since they are
1727
1727
// free to make, an attacker could make them to prevent us from connecting to
1728
1728
// certain peers.
0 commit comments