From 9b0f144f6ee04d2cbbaca3cb9aa26c0806bff485 Mon Sep 17 00:00:00 2001 From: Kees Monshouwer Date: Fri, 1 Dec 2017 00:21:52 +0100 Subject: [PATCH] add toLogString() to ComboAddress and start using it --- pdns/dynhandler.cc | 2 +- pdns/iputils.hh | 6 +++++- pdns/logger.cc | 2 +- pdns/resolver.cc | 10 +++++----- pdns/rfc2136handler.cc | 2 +- pdns/slavecommunicator.cc | 10 +++++----- pdns/ws-auth.cc | 2 +- 7 files changed, 19 insertions(+), 15 deletions(-) diff --git a/pdns/dynhandler.cc b/pdns/dynhandler.cc index 90f01a913c..e71649ea68 100644 --- a/pdns/dynhandler.cc +++ b/pdns/dynhandler.cc @@ -252,7 +252,7 @@ string DLNotifyRetrieveHandler(const vector&parts, Utility::pid_t ppid) random_shuffle(di.masters.begin(), di.masters.end()); Communicator.addSuckRequest(domain, di.masters.front()); - return "Added retrieval request for '"+domain.toString()+"' from master "+di.masters.front().toStringWithPortExcept(53); + return "Added retrieval request for '"+domain.toString()+"' from master "+di.masters.front().toLogString(); } string DLNotifyHostHandler(const vector&parts, Utility::pid_t ppid) diff --git a/pdns/iputils.hh b/pdns/iputils.hh index aae4902a10..d0f24cf941 100644 --- a/pdns/iputils.hh +++ b/pdns/iputils.hh @@ -294,7 +294,11 @@ union ComboAddress { return "["+toString() + "]:" + std::to_string(ntohs(sin4.sin_port)); } - + string toLogString() const + { + return toStringWithPortExcept(53); + } + void truncate(unsigned int bits) noexcept; uint16_t getPort() const diff --git a/pdns/logger.cc b/pdns/logger.cc index 0e3c54c8b0..8bbf03307c 100644 --- a/pdns/logger.cc +++ b/pdns/logger.cc @@ -228,7 +228,7 @@ Logger& Logger::operator<<(const DNSName &d) Logger& Logger::operator<<(const ComboAddress &ca) { - *this<parts; stringtok(parts, res[0].content); if(parts.size()<3) - throw ResolverException("Query to '" + ipport.toStringWithPortExcept(53) + "' for SOA of '" + domain.toString() + "' produced an unparseable response"); + throw ResolverException("Query to '" + ipport.toLogString() + "' for SOA of '" + domain.toLogString() + "' produced an unparseable response"); try { *serial=pdns_stou(parts[2]); } catch(const std::out_of_range& oor) { - throw ResolverException("Query to '" + ipport.toStringWithPortExcept(53) + "' for SOA of '" + domain.toString() + "' produced an unparseable serial"); + throw ResolverException("Query to '" + ipport.toLogString() + "' for SOA of '" + domain.toLogString() + "' produced an unparseable serial"); } } diff --git a/pdns/rfc2136handler.cc b/pdns/rfc2136handler.cc index ca84451795..bfa0cb31b8 100644 --- a/pdns/rfc2136handler.cc +++ b/pdns/rfc2136handler.cc @@ -586,7 +586,7 @@ int PacketHandler::forwardPacket(const string &msgPrefix, DNSPacket *p, DomainIn } for(const auto& remote : di->masters) { - g_log< axfr; - g_log<setSuccessResult("Added retrieval request for '"+zonename.toString()+"' from master "+di.masters.front().toStringWithPortExcept(53)); + resp->setSuccessResult("Added retrieval request for '"+zonename.toString()+"' from master "+di.masters.front().toLogString()); } static void apiServerZoneNotify(HttpRequest* req, HttpResponse* resp) { -- 2.47.3