Remove LOG_J and LOG_JV, tweak p2p logs.
Bug: webrtc:9077
Change-Id: I54ecf10592add33692fc6e694c2f10a646e81345
Reviewed-on: https://webrtc-review.googlesource.com/56142
Reviewed-by: Fredrik Solenberg <solenberg@webrtc.org>
Reviewed-by: Taylor Brandstetter <deadbeef@webrtc.org>
Reviewed-by: Qingsi Wang <qingsi@webrtc.org>
Reviewed-by: Karl Wiberg <kwiberg@webrtc.org>
Commit-Queue: Jonas Olsson <jonasolsson@webrtc.org>
Cr-Commit-Position: refs/heads/master@{#22667}
diff --git a/p2p/BUILD.gn b/p2p/BUILD.gn
index c38f850..769bd4b 100644
--- a/p2p/BUILD.gn
+++ b/p2p/BUILD.gn
@@ -23,7 +23,6 @@
"base/basicpacketsocketfactory.cc",
"base/basicpacketsocketfactory.h",
"base/candidatepairinterface.h",
- "base/common.h",
"base/dtlstransport.cc",
"base/dtlstransport.h",
"base/dtlstransportinternal.cc",
diff --git a/p2p/base/common.h b/p2p/base/common.h
deleted file mode 100644
index aa5da42..0000000
--- a/p2p/base/common.h
+++ /dev/null
@@ -1,20 +0,0 @@
-/*
- * Copyright 2004 The WebRTC Project Authors. All rights reserved.
- *
- * Use of this source code is governed by a BSD-style license
- * that can be found in the LICENSE file in the root of the source
- * tree. An additional intellectual property rights grant can be found
- * in the file PATENTS. All contributing project authors may
- * be found in the AUTHORS file in the root of the source tree.
- */
-
-#ifndef P2P_BASE_COMMON_H_
-#define P2P_BASE_COMMON_H_
-
-#include "rtc_base/logging.h"
-
-// Common log description format for jingle messages
-#define LOG_J(sev, obj) RTC_LOG(sev) << "Jingle:" << obj->ToString() << ": "
-#define LOG_JV(sev, obj) RTC_LOG_V(sev) << "Jingle:" << obj->ToString() << ": "
-
-#endif // P2P_BASE_COMMON_H_
diff --git a/p2p/base/dtlstransport.cc b/p2p/base/dtlstransport.cc
index d1c3fec..e17d5c3 100644
--- a/p2p/base/dtlstransport.cc
+++ b/p2p/base/dtlstransport.cc
@@ -14,11 +14,11 @@
#include "p2p/base/dtlstransport.h"
-#include "p2p/base/common.h"
#include "p2p/base/packettransportinternal.h"
#include "rtc_base/buffer.h"
#include "rtc_base/checks.h"
#include "rtc_base/dscp.h"
+#include "rtc_base/logging.h"
#include "rtc_base/messagequeue.h"
#include "rtc_base/sslstreamadapter.h"
#include "rtc_base/stream.h"
@@ -170,10 +170,12 @@
if (dtls_active_) {
if (certificate == local_certificate_) {
// This may happen during renegotiation.
- LOG_J(LS_INFO, this) << "Ignoring identical DTLS identity";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Ignoring identical DTLS identity";
return true;
} else {
- LOG_J(LS_ERROR, this) << "Can't change DTLS local identity in this state";
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Can't change DTLS local identity in this state";
return false;
}
}
@@ -182,7 +184,8 @@
local_certificate_ = certificate;
dtls_active_ = true;
} else {
- LOG_J(LS_INFO, this) << "NULL DTLS identity supplied. Not doing DTLS";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": NULL DTLS identity supplied. Not doing DTLS";
}
return true;
@@ -196,7 +199,7 @@
bool DtlsTransport::SetSslMaxProtocolVersion(rtc::SSLProtocolVersion version) {
if (dtls_active_) {
RTC_LOG(LS_ERROR) << "Not changing max. protocol version "
- << "while DTLS is negotiating";
+ "while DTLS is negotiating";
return false;
}
@@ -245,7 +248,8 @@
if (dtls_active_ && remote_fingerprint_value_ == remote_fingerprint_value &&
!digest_alg.empty()) {
// This may happen during renegotiation.
- LOG_J(LS_INFO, this) << "Ignoring identical remote DTLS fingerprint";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Ignoring identical remote DTLS fingerprint";
return true;
}
@@ -256,7 +260,8 @@
// SetRemoteFingerprint shouldn't even be called though.
if (digest_alg.empty()) {
RTC_DCHECK(!digest_len);
- LOG_J(LS_INFO, this) << "Other side didn't support DTLS.";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Other side didn't support DTLS.";
dtls_active_ = false;
return true;
}
@@ -264,7 +269,8 @@
// Otherwise, we must have a local certificate before setting remote
// fingerprint.
if (!dtls_active_) {
- LOG_J(LS_ERROR, this) << "Can't set DTLS remote settings in this state.";
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Can't set DTLS remote settings in this state.";
return false;
}
@@ -282,7 +288,8 @@
remote_fingerprint_algorithm_,
reinterpret_cast<unsigned char*>(remote_fingerprint_value_.data()),
remote_fingerprint_value_.size(), &err)) {
- LOG_J(LS_ERROR, this) << "Couldn't set DTLS certificate digest.";
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Couldn't set DTLS certificate digest.";
set_dtls_state(DTLS_TRANSPORT_FAILED);
// If the error is "verification failed", don't return false, because
// this means the fingerprint was formatted correctly but didn't match
@@ -336,7 +343,8 @@
dtls_.reset(rtc::SSLStreamAdapter::Create(downward));
if (!dtls_) {
- LOG_J(LS_ERROR, this) << "Failed to create DTLS adapter.";
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Failed to create DTLS adapter.";
delete downward;
return false;
}
@@ -355,21 +363,24 @@
remote_fingerprint_algorithm_,
reinterpret_cast<unsigned char*>(remote_fingerprint_value_.data()),
remote_fingerprint_value_.size())) {
- LOG_J(LS_ERROR, this) << "Couldn't set DTLS certificate digest.";
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Couldn't set DTLS certificate digest.";
return false;
}
// Set up DTLS-SRTP, if it's been enabled.
if (!srtp_ciphers_.empty()) {
if (!dtls_->SetDtlsSrtpCryptoSuites(srtp_ciphers_)) {
- LOG_J(LS_ERROR, this) << "Couldn't set DTLS-SRTP ciphers.";
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Couldn't set DTLS-SRTP ciphers.";
return false;
}
} else {
- LOG_J(LS_INFO, this) << "Not using DTLS-SRTP.";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Not using DTLS-SRTP.";
}
- LOG_J(LS_INFO, this) << "DTLS setup complete.";
+ RTC_LOG(LS_INFO) << ToString() << ": DTLS setup complete.";
// If the underlying ice_transport is already writable at this point, we may
// be able to start DTLS right away.
@@ -485,8 +496,9 @@
void DtlsTransport::OnWritableState(rtc::PacketTransportInternal* transport) {
RTC_DCHECK(rtc::Thread::Current() == network_thread_);
RTC_DCHECK(transport == ice_transport_);
- LOG_J(LS_VERBOSE, this)
- << "DTLSTransportChannelWrapper: ice_transport writable state changed to "
+ RTC_LOG(LS_VERBOSE)
+ << ToString()
+ << ": ice_transport writable state changed to "
<< ice_transport_->writable();
if (!dtls_active_) {
@@ -517,9 +529,10 @@
void DtlsTransport::OnReceivingState(rtc::PacketTransportInternal* transport) {
RTC_DCHECK(rtc::Thread::Current() == network_thread_);
RTC_DCHECK(transport == ice_transport_);
- LOG_J(LS_VERBOSE, this) << "DTLSTransportChannelWrapper: ice_transport "
- "receiving state changed to "
- << ice_transport_->receiving();
+ RTC_LOG(LS_VERBOSE) << ToString()
+ << ": ice_transport "
+ "receiving state changed to "
+ << ice_transport_->receiving();
if (!dtls_active_ || dtls_state() == DTLS_TRANSPORT_CONNECTED) {
// Note: SignalReceivingState fired by set_receiving.
set_receiving(ice_transport_->receiving());
@@ -544,15 +557,18 @@
switch (dtls_state()) {
case DTLS_TRANSPORT_NEW:
if (dtls_) {
- LOG_J(LS_INFO, this) << "Packet received before DTLS started.";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Packet received before DTLS started.";
} else {
- LOG_J(LS_WARNING, this) << "Packet received before we know if we are "
- << "doing DTLS or not.";
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Packet received before we know if we are "
+ "doing DTLS or not.";
}
// Cache a client hello packet received before DTLS has actually started.
if (IsDtlsClientHelloPacket(data, size)) {
- LOG_J(LS_INFO, this) << "Caching DTLS ClientHello packet until DTLS is "
- << "started.";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Caching DTLS ClientHello packet until DTLS is "
+ "started.";
cached_client_hello_.SetData(data, size);
// If we haven't started setting up DTLS yet (because we don't have a
// remote fingerprint/role), we can use the client hello as a clue that
@@ -563,7 +579,8 @@
SetupDtls();
}
} else {
- LOG_J(LS_INFO, this) << "Not a DTLS ClientHello packet; dropping.";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Not a DTLS ClientHello packet; dropping.";
}
break;
@@ -573,20 +590,23 @@
// Is this potentially a DTLS packet?
if (IsDtlsPacket(data, size)) {
if (!HandleDtlsPacket(data, size)) {
- LOG_J(LS_ERROR, this) << "Failed to handle DTLS packet.";
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Failed to handle DTLS packet.";
return;
}
} else {
// Not a DTLS packet; our handshake should be complete by now.
if (dtls_state() != DTLS_TRANSPORT_CONNECTED) {
- LOG_J(LS_ERROR, this) << "Received non-DTLS packet before DTLS "
- << "complete.";
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Received non-DTLS packet before DTLS "
+ "complete.";
return;
}
// And it had better be a SRTP packet.
if (!IsRtpPacket(data, size)) {
- LOG_J(LS_ERROR, this) << "Received unexpected non-DTLS packet.";
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Received unexpected non-DTLS packet.";
return;
}
@@ -622,7 +642,8 @@
RTC_DCHECK(dtls == dtls_.get());
if (sig & rtc::SE_OPEN) {
// This is the first time.
- LOG_J(LS_INFO, this) << "DTLS handshake complete.";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": DTLS handshake complete.";
if (dtls_->GetState() == rtc::SS_OPEN) {
// The check for OPEN shouldn't be necessary but let's make
// sure we don't accidentally frob the state if it's closed.
@@ -643,12 +664,14 @@
SignalReadPacket(this, buf, read, rtc::CreatePacketTime(0), 0);
} else if (ret == rtc::SR_EOS) {
// Remote peer shut down the association with no error.
- LOG_J(LS_INFO, this) << "DTLS transport closed";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": DTLS transport closed";
set_writable(false);
set_dtls_state(DTLS_TRANSPORT_CLOSED);
} else if (ret == rtc::SR_ERROR) {
// Remote peer shut down the association with an error.
- LOG_J(LS_INFO, this) << "DTLS transport error, code=" << read_error;
+ RTC_LOG(LS_INFO) << ToString()
+ << ": DTLS transport error, code=" << read_error;
set_writable(false);
set_dtls_state(DTLS_TRANSPORT_FAILED);
}
@@ -658,10 +681,12 @@
RTC_DCHECK(sig == rtc::SE_CLOSE); // SE_CLOSE should be by itself.
set_writable(false);
if (!err) {
- LOG_J(LS_INFO, this) << "DTLS transport closed";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": DTLS transport closed";
set_dtls_state(DTLS_TRANSPORT_CLOSED);
} else {
- LOG_J(LS_INFO, this) << "DTLS transport error, code=" << err;
+ RTC_LOG(LS_INFO) << ToString()
+ << ": DTLS transport error, code=" << err;
set_dtls_state(DTLS_TRANSPORT_FAILED);
}
}
@@ -684,24 +709,29 @@
// ignore write errors, thus any errors must be because of
// configuration and therefore are our fault.
RTC_NOTREACHED() << "StartSSL failed.";
- LOG_J(LS_ERROR, this) << "Couldn't start DTLS handshake";
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Couldn't start DTLS handshake";
set_dtls_state(DTLS_TRANSPORT_FAILED);
return;
}
- LOG_J(LS_INFO, this) << "DtlsTransport: Started DTLS handshake";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": DtlsTransport: Started DTLS handshake";
set_dtls_state(DTLS_TRANSPORT_CONNECTING);
// Now that the handshake has started, we can process a cached ClientHello
// (if one exists).
if (cached_client_hello_.size()) {
if (*dtls_role_ == rtc::SSL_SERVER) {
- LOG_J(LS_INFO, this) << "Handling cached DTLS ClientHello packet.";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Handling cached DTLS ClientHello packet.";
if (!HandleDtlsPacket(cached_client_hello_.data<char>(),
cached_client_hello_.size())) {
- LOG_J(LS_ERROR, this) << "Failed to handle DTLS packet.";
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Failed to handle DTLS packet.";
}
} else {
- LOG_J(LS_WARNING, this) << "Discarding cached DTLS ClientHello packet "
- << "because we don't have the server role.";
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Discarding cached DTLS ClientHello packet "
+ "because we don't have the server role.";
}
cached_client_hello_.Clear();
}
@@ -743,8 +773,8 @@
if (writable_ == writable) {
return;
}
- LOG_J(LS_VERBOSE, this) << "set_writable from:" << writable_ << " to "
- << writable;
+ RTC_LOG(LS_VERBOSE) << ToString()
+ << ": set_writable to: " << writable;
writable_ = writable;
if (writable_) {
SignalReadyToSend(this);
@@ -756,8 +786,9 @@
if (dtls_state_ == state) {
return;
}
- LOG_J(LS_VERBOSE, this) << "set_dtls_state from:" << dtls_state_ << " to "
- << state;
+ RTC_LOG(LS_VERBOSE) << ToString()
+ << ": set_dtls_state from:" << dtls_state_ << " to "
+ << state;
dtls_state_ = state;
SignalDtlsState(this, state);
}
@@ -774,13 +805,15 @@
// extreme values.
int initial_timeout = std::max(kMinHandshakeTimeout,
std::min(kMaxHandshakeTimeout, 2 * (*rtt)));
- LOG_J(LS_INFO, this) << "configuring DTLS handshake timeout "
- << initial_timeout << " based on ICE RTT " << *rtt;
+ RTC_LOG(LS_INFO) << ToString()
+ << ": configuring DTLS handshake timeout "
+ << initial_timeout << " based on ICE RTT " << *rtt;
dtls_->SetInitialRetransmissionTimeout(initial_timeout);
} else {
- LOG_J(LS_INFO, this)
- << "no RTT estimate - using default DTLS handshake timeout";
+ RTC_LOG(LS_INFO)
+ << ToString()
+ << ": no RTT estimate - using default DTLS handshake timeout";
}
}
diff --git a/p2p/base/p2ptransportchannel.cc b/p2p/base/p2ptransportchannel.cc
index 088c405..804cab1 100644
--- a/p2p/base/p2ptransportchannel.cc
+++ b/p2p/base/p2ptransportchannel.cc
@@ -19,7 +19,6 @@
#include "api/umametrics.h"
#include "logging/rtc_event_log/icelogger.h"
#include "p2p/base/candidatepairinterface.h"
-#include "p2p/base/common.h"
#include "p2p/base/relayport.h" // For RELAY_PORT_TYPE.
#include "p2p/base/stunport.h" // For STUN_PORT_TYPE.
#include "rtc_base/checks.h"
@@ -362,9 +361,10 @@
if (networks.find(network) == networks.end()) {
networks.insert(network);
} else {
- LOG_J(LS_VERBOSE, this) << "Ice not completed yet for this channel as "
- << network->ToString()
- << " has more than 1 connection.";
+ RTC_LOG(LS_VERBOSE) << ToString()
+ << ": Ice not completed yet for this channel as "
+ << network->ToString()
+ << " has more than 1 connection.";
return IceTransportState::STATE_CONNECTING;
}
}
@@ -426,7 +426,7 @@
if (config_.continual_gathering_policy != config.continual_gathering_policy) {
if (!allocator_sessions_.empty()) {
RTC_LOG(LS_ERROR) << "Trying to change continual gathering policy "
- << "when gathering has already started!";
+ "when gathering has already started!";
} else {
config_.continual_gathering_policy = config.continual_gathering_policy;
RTC_LOG(LS_INFO) << "Set continual_gathering_policy to "
@@ -470,7 +470,7 @@
config.presume_writable_when_fully_relayed) {
if (!connections_.empty()) {
RTC_LOG(LS_ERROR) << "Trying to change 'presume writable' "
- << "while connections already exist!";
+ "while connections already exist!";
} else {
config_.presume_writable_when_fully_relayed =
config.presume_writable_when_fully_relayed;
@@ -645,7 +645,7 @@
if (ice_parameters_.ufrag.empty() || ice_parameters_.pwd.empty()) {
RTC_LOG(LS_ERROR)
<< "Cannot gather candidates because ICE parameters are empty"
- << " ufrag: " << ice_parameters_.ufrag
+ " ufrag: " << ice_parameters_.ufrag
<< " pwd: " << ice_parameters_.pwd;
return;
}
@@ -711,9 +711,9 @@
++it) {
int val = port->SetOption(it->first, it->second);
if (val < 0) {
- LOG_J(LS_WARNING, port) << "SetOption(" << it->first
- << ", " << it->second
- << ") failed: " << port->GetError();
+ RTC_LOG(LS_WARNING) << port->ToString() << ": SetOption("
+ << it->first << ", " << it->second
+ << ") failed: " << port->GetError();
}
}
@@ -761,7 +761,7 @@
RTC_LOG(LS_INFO) << "P2PTransportChannel: " << transport_name()
<< ", component " << component()
<< " gathering complete, but using continual "
- << "gathering so not changing gathering state.";
+ "gathering so not changing gathering state.";
return;
}
gathering_state_ = kIceGatheringComplete;
@@ -815,8 +815,8 @@
stun_msg->GetUInt32(STUN_ATTR_PRIORITY);
if (!priority_attr) {
RTC_LOG(LS_WARNING) << "P2PTransportChannel::OnUnknownAddress - "
- << "No STUN_ATTR_PRIORITY found in the "
- << "stun request message";
+ "No STUN_ATTR_PRIORITY found in the "
+ "stun request message";
port->SendBindingErrorResponse(stun_msg, address, STUN_ERROR_BAD_REQUEST,
STUN_ERROR_REASON_BAD_REQUEST);
return;
@@ -861,7 +861,7 @@
if (port->GetConnection(remote_candidate.address())) {
if (port_muxed) {
RTC_LOG(LS_INFO) << "Connection already exists for peer reflexive "
- << "candidate: " << remote_candidate.ToString();
+ "candidate: " << remote_candidate.ToString();
return;
} else {
RTC_NOTREACHED();
@@ -1069,8 +1069,9 @@
return false;
}
AddConnection(connection);
- LOG_J(LS_INFO, this) << "Created connection with origin=" << origin << ", ("
- << connections_.size() << " total)";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Created connection with origin: " << origin
+ << ", total: " << connections_.size();
return true;
}
@@ -1079,7 +1080,7 @@
// connection; however, the other side can send a duplicate candidate.
if (!remote_candidate.IsEquivalent(connection->remote_candidate())) {
RTC_LOG(INFO) << "Attempt to change a remote candidate."
- << " Existing remote candidate: "
+ " Existing remote candidate: "
<< connection->remote_candidate().ToString()
<< "New remote candidate: " << remote_candidate.ToString();
}
@@ -1275,8 +1276,9 @@
if (std::any_of(
connections_.begin(), connections_.end(),
[this, now](const Connection* c) { return IsPingable(c, now); })) {
- LOG_J(LS_INFO, this) << "Have a pingable connection for the first time; "
- << "starting to ping.";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Have a pingable connection for the first time; "
+ "starting to ping.";
thread()->Post(RTC_FROM_HERE, this, MSG_CHECK_AND_PING);
thread()->PostDelayed(
RTC_FROM_HERE,
@@ -1521,7 +1523,7 @@
});
RTC_LOG(LS_VERBOSE) << "Sorting " << connections_.size()
- << " available connections:";
+ << " available connections";
for (size_t i = 0; i < connections_.size(); ++i) {
RTC_LOG(LS_VERBOSE) << connections_[i]->ToString();
}
@@ -1648,11 +1650,13 @@
if (selected_connection_) {
++nomination_;
if (old_selected_connection) {
- LOG_J(LS_INFO, this) << "Previous selected connection: "
- << old_selected_connection->ToString();
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Previous selected connection: "
+ << old_selected_connection->ToString();
}
- LOG_J(LS_INFO, this) << "New selected connection: "
- << selected_connection_->ToString();
+ RTC_LOG(LS_INFO) << ToString()
+ << ": New selected connection: "
+ << selected_connection_->ToString();
SignalRouteChange(this, selected_connection_->remote_candidate());
// This is a temporary, but safe fix to webrtc issue 5705.
// TODO(honghaiz): Make all ENOTCONN error routed through the transport
@@ -1676,7 +1680,8 @@
selected_connection_->local_candidate().address().family()) +
GetProtocolOverhead(selected_connection_->local_candidate().protocol());
} else {
- LOG_J(LS_INFO, this) << "No selected connection";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": No selected connection";
}
SignalNetworkRouteChanged(network_route_);
@@ -1691,9 +1696,10 @@
void P2PTransportChannel::UpdateState() {
IceTransportState state = ComputeState();
if (state_ != state) {
- LOG_J(LS_INFO, this) << "Transport channel state changed from "
- << static_cast<int>(state_) << " to "
- << static_cast<int>(state);
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Transport channel state changed from "
+ << static_cast<int>(state_) << " to "
+ << static_cast<int>(state);
// Check that the requested transition is allowed. Note that
// P2PTransportChannel does not (yet) implement a direct mapping of the ICE
// states from the standard; the difference is covered by
@@ -2115,9 +2121,9 @@
unpinged_connections_.erase(*iter);
connections_.erase(iter);
- LOG_J(LS_INFO, this) << "Removed connection " << std::hex << connection
- << std::dec << " (" << connections_.size()
- << " remaining)";
+ RTC_LOG(LS_INFO) << ToString() << ": Removed connection "
+ << std::hex << connection << std::dec << " ("
+ << connections_.size() << " remaining)";
// If this is currently the selected connection, then we need to pick a new
// one. The call to SortConnectionsAndUpdateState will pick a new one. It
@@ -2340,7 +2346,8 @@
if (writable_ == writable) {
return;
}
- LOG_J(LS_VERBOSE, this) << "Changed writable_ to " << writable;
+ RTC_LOG(LS_VERBOSE) << ToString()
+ << ": Changed writable_ to " << writable;
writable_ = writable;
if (writable_) {
SignalReadyToSend(this);
diff --git a/p2p/base/p2ptransportchannel_unittest.cc b/p2p/base/p2ptransportchannel_unittest.cc
index 45662ae..2b0efac 100644
--- a/p2p/base/p2ptransportchannel_unittest.cc
+++ b/p2p/base/p2ptransportchannel_unittest.cc
@@ -560,8 +560,8 @@
if (connect_time < expected.connect_wait) {
RTC_LOG(LS_INFO) << "Connect time: " << connect_time << " ms";
} else {
- RTC_LOG(LS_INFO) << "Connect time: "
- << "TIMEOUT (" << expected.connect_wait << " ms)";
+ RTC_LOG(LS_INFO) << "Connect time: TIMEOUT ("
+ << expected.connect_wait << " ms)";
}
// Allow a few turns of the crank for the selected connections to emerge.
@@ -585,8 +585,8 @@
if (converge_time < converge_wait) {
RTC_LOG(LS_INFO) << "Converge time: " << converge_time << " ms";
} else {
- RTC_LOG(LS_INFO) << "Converge time: "
- << "TIMEOUT (" << converge_wait << " ms)";
+ RTC_LOG(LS_INFO) << "Converge time: TIMEOUT ("
+ << converge_wait << " ms)";
}
}
// Try sending some data to other end.
diff --git a/p2p/base/port.cc b/p2p/base/port.cc
index cfecf7f..7d3c719 100644
--- a/p2p/base/port.cc
+++ b/p2p/base/port.cc
@@ -16,7 +16,6 @@
#include <utility>
#include <vector>
-#include "p2p/base/common.h"
#include "p2p/base/portallocator.h"
#include "rtc_base/base64.h"
#include "rtc_base/checks.h"
@@ -310,7 +309,8 @@
thread_->PostDelayed(RTC_FROM_HERE, timeout_delay_, this,
MSG_DESTROY_IF_DEAD);
- LOG_J(LS_INFO, this) << "Port created with network cost " << network_cost_;
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Port created with network cost " << network_cost_;
}
Port::~Port() {
@@ -435,9 +435,11 @@
// If there is a different connection on the same remote address, replace
// it with the new one and destroy the old one.
if (ret.second == false && ret.first->second != conn) {
- LOG_J(LS_WARNING, this)
- << "A new connection was created on an existing remote address. "
- << "New remote candidate: " << conn->remote_candidate().ToString();
+ RTC_LOG(LS_WARNING)
+ << ToString()
+ << ": A new connection was created on an existing remote address. "
+ "New remote candidate: "
+ << conn->remote_candidate().ToString();
ret.first->second->SignalDestroyed.disconnect(this);
ret.first->second->Destroy();
ret.first->second = conn;
@@ -460,13 +462,14 @@
std::unique_ptr<IceMessage> msg;
std::string remote_username;
if (!GetStunMessage(data, size, addr, &msg, &remote_username)) {
- LOG_J(LS_ERROR, this) << "Received non-STUN packet from unknown address ("
- << addr.ToSensitiveString() << ")";
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Received non-STUN packet from unknown address: "
+ << addr.ToSensitiveString();
} else if (!msg) {
// STUN message handled already
} else if (msg->type() == STUN_BINDING_REQUEST) {
- RTC_LOG(LS_INFO) << "Received STUN ping "
- << " id=" << rtc::hex_encode(msg->transaction_id())
+ RTC_LOG(LS_INFO) << "Received STUN ping id="
+ << rtc::hex_encode(msg->transaction_id())
<< " from unknown address " << addr.ToSensitiveString();
// We need to signal an unknown address before we handle any role conflict
// below. Otherwise there would be no candidate pair and TURN entry created
@@ -483,9 +486,10 @@
// because we then get back responses for them, which this code correctly
// does not handle.
if (msg->type() != STUN_BINDING_RESPONSE) {
- LOG_J(LS_ERROR, this) << "Received unexpected STUN message type ("
- << msg->type() << ") from unknown address ("
- << addr.ToSensitiveString() << ")";
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Received unexpected STUN message type: "
+ << msg->type() << " from unknown address: "
+ << addr.ToSensitiveString();
}
}
}
@@ -533,8 +537,9 @@
// If not present, fail with a 400 Bad Request.
if (!stun_msg->GetByteString(STUN_ATTR_USERNAME) ||
!stun_msg->GetByteString(STUN_ATTR_MESSAGE_INTEGRITY)) {
- LOG_J(LS_ERROR, this) << "Received STUN request without username/M-I "
- << "from " << addr.ToSensitiveString();
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Received STUN request without username/M-I from: "
+ << addr.ToSensitiveString();
SendBindingErrorResponse(stun_msg.get(), addr, STUN_ERROR_BAD_REQUEST,
STUN_ERROR_REASON_BAD_REQUEST);
return true;
@@ -545,9 +550,9 @@
std::string remote_ufrag;
if (!ParseStunUsername(stun_msg.get(), &local_ufrag, &remote_ufrag) ||
local_ufrag != username_fragment()) {
- LOG_J(LS_ERROR, this) << "Received STUN request with bad local username "
- << local_ufrag << " from "
- << addr.ToSensitiveString();
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Received STUN request with bad local username "
+ << local_ufrag << " from " << addr.ToSensitiveString();
SendBindingErrorResponse(stun_msg.get(), addr, STUN_ERROR_UNAUTHORIZED,
STUN_ERROR_REASON_UNAUTHORIZED);
return true;
@@ -555,9 +560,10 @@
// If ICE, and the MESSAGE-INTEGRITY is bad, fail with a 401 Unauthorized
if (!stun_msg->ValidateMessageIntegrity(data, size, password_)) {
- LOG_J(LS_ERROR, this) << "Received STUN request with bad M-I "
- << "from " << addr.ToSensitiveString()
- << ", password_=" << password_;
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Received STUN request with bad M-I from "
+ << addr.ToSensitiveString()
+ << ", password_=" << password_;
SendBindingErrorResponse(stun_msg.get(), addr, STUN_ERROR_UNAUTHORIZED,
STUN_ERROR_REASON_UNAUTHORIZED);
return true;
@@ -567,30 +573,35 @@
(stun_msg->type() == STUN_BINDING_ERROR_RESPONSE)) {
if (stun_msg->type() == STUN_BINDING_ERROR_RESPONSE) {
if (const StunErrorCodeAttribute* error_code = stun_msg->GetErrorCode()) {
- LOG_J(LS_ERROR, this) << "Received STUN binding error:"
- << " class=" << error_code->eclass()
- << " number=" << error_code->number()
- << " reason='" << error_code->reason() << "'"
- << " from " << addr.ToSensitiveString();
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Received STUN binding error: class="
+ << error_code->eclass()
+ << " number=" << error_code->number() << " reason='"
+ << error_code->reason() << "' from "
+ << addr.ToSensitiveString();
// Return message to allow error-specific processing
} else {
- LOG_J(LS_ERROR, this) << "Received STUN binding error without a error "
- << "code from " << addr.ToSensitiveString();
+ RTC_LOG(LS_ERROR)
+ << ToString()
+ << ": Received STUN binding error without a error code from "
+ << addr.ToSensitiveString();
return true;
}
}
// NOTE: Username should not be used in verifying response messages.
out_username->clear();
} else if (stun_msg->type() == STUN_BINDING_INDICATION) {
- LOG_J(LS_VERBOSE, this) << "Received STUN binding indication:"
- << " from " << addr.ToSensitiveString();
+ RTC_LOG(LS_VERBOSE) << ToString()
+ << ": Received STUN binding indication: from "
+ << addr.ToSensitiveString();
out_username->clear();
// No stun attributes will be verified, if it's stun indication message.
// Returning from end of the this method.
} else {
- LOG_J(LS_ERROR, this) << "Received STUN packet with invalid type ("
- << stun_msg->type() << ") from "
- << addr.ToSensitiveString();
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Received STUN packet with invalid type ("
+ << stun_msg->type() << ") from "
+ << addr.ToSensitiveString();
return true;
}
@@ -747,8 +758,9 @@
STUN_ATTR_RETRANSMIT_COUNT, retransmit_attr->value()));
if (retransmit_attr->value() > CONNECTION_WRITE_CONNECT_FAILURES) {
- LOG_J(LS_INFO, this)
- << "Received a remote ping with high retransmit count: "
+ RTC_LOG(LS_INFO)
+ << ToString()
+ << ": Received a remote ping with high retransmit count: "
<< retransmit_attr->value();
}
}
@@ -764,21 +776,20 @@
rtc::PacketOptions options(DefaultDscpValue());
auto err = SendTo(buf.Data(), buf.Length(), addr, options, false);
if (err < 0) {
- LOG_J(LS_ERROR, this)
- << "Failed to send STUN ping response"
- << ", to=" << addr.ToSensitiveString()
- << ", err=" << err
- << ", id=" << rtc::hex_encode(response.transaction_id());
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Failed to send STUN ping response, to="
+ << addr.ToSensitiveString() << ", err=" << err
+ << ", id=" << rtc::hex_encode(response.transaction_id());
} else {
// Log at LS_INFO if we send a stun ping response on an unwritable
// connection.
Connection* conn = GetConnection(addr);
rtc::LoggingSeverity sev = (conn && !conn->writable()) ?
rtc::LS_INFO : rtc::LS_VERBOSE;
- LOG_JV(sev, this)
- << "Sent STUN ping response"
- << ", to=" << addr.ToSensitiveString()
- << ", id=" << rtc::hex_encode(response.transaction_id());
+ RTC_LOG_V(sev) << ToString()
+ << ": Sent STUN ping response, to="
+ << addr.ToSensitiveString()
+ << ", id=" << rtc::hex_encode(response.transaction_id());
conn->stats_.sent_ping_responses++;
conn->LogCandidatePairEvent(
@@ -815,8 +826,9 @@
response.Write(&buf);
rtc::PacketOptions options(DefaultDscpValue());
SendTo(buf.Data(), buf.Length(), addr, options, false);
- LOG_J(LS_INFO, this) << "Sending STUN binding error: reason=" << reason
- << " to " << addr.ToSensitiveString();
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Sending STUN binding error: reason=" << reason
+ << " to " << addr.ToSensitiveString();
}
void Port::KeepAliveUntilPruned() {
@@ -905,7 +917,7 @@
void Port::Destroy() {
RTC_DCHECK(connections_.empty());
- LOG_J(LS_INFO, this) << "Port deleted";
+ RTC_LOG(LS_INFO) << ToString() << ": Port deleted";
SignalDestroyed(this);
delete this;
}
@@ -1046,7 +1058,7 @@
// Wire up to send stun packets
requests_.SignalSendPacket.connect(this, &Connection::OnSendStunPacket);
hash_ = static_cast<uint32_t>(std::hash<std::string>{}(ToString()));
- LOG_J(LS_INFO, this) << "Connection created";
+ RTC_LOG(LS_INFO) << ToString() << ": Connection created";
}
Connection::~Connection() {
@@ -1090,8 +1102,9 @@
WriteState old_value = write_state_;
write_state_ = value;
if (value != old_value) {
- LOG_J(LS_VERBOSE, this) << "set_write_state from: " << old_value << " to "
- << value;
+ RTC_LOG(LS_VERBOSE) << ToString()
+ << ": set_write_state from: " << old_value << " to "
+ << value;
SignalStateChange(this);
}
}
@@ -1102,7 +1115,8 @@
if (receiving_ == receiving) {
return;
}
- LOG_J(LS_VERBOSE, this) << "set_receiving to " << receiving;
+ RTC_LOG(LS_VERBOSE) << ToString() << ": set_receiving to "
+ << receiving;
receiving_ = receiving;
receiving_unchanged_since_ = now;
SignalStateChange(this);
@@ -1112,7 +1126,7 @@
IceCandidatePairState old_state = state_;
state_ = state;
if (state != old_state) {
- LOG_J(LS_VERBOSE, this) << "set_state";
+ RTC_LOG(LS_VERBOSE) << ToString() << ": set_state";
}
}
@@ -1120,7 +1134,8 @@
bool old_value = connected_;
connected_ = value;
if (value != old_value) {
- LOG_J(LS_VERBOSE, this) << "Change connected_ to " << value;
+ RTC_LOG(LS_VERBOSE) << ToString()
+ << ": Change connected_ to " << value;
SignalStateChange(this);
}
}
@@ -1147,9 +1162,10 @@
auto err = port_->SendTo(
data, size, remote_candidate_.address(), options, false);
if (err < 0) {
- LOG_J(LS_WARNING, this) << "Failed to send STUN ping "
- << " err=" << err
- << " id=" << rtc::hex_encode(req->id());
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Failed to send STUN ping "
+ " err="
+ << err << " id=" << rtc::hex_encode(req->id());
}
}
@@ -1170,7 +1186,7 @@
if (!pruned_ && (write_state_ == STATE_WRITE_TIMEOUT)) {
RTC_LOG(LS_WARNING)
<< "Received a data packet on a timed-out Connection. "
- << "Resetting state to STATE_WRITE_INIT.";
+ "Resetting state to STATE_WRITE_INIT.";
set_write_state(STATE_WRITE_INIT);
}
} else if (!msg) {
@@ -1184,17 +1200,19 @@
rtc::LoggingSeverity sev = (!writable() ? rtc::LS_INFO : rtc::LS_VERBOSE);
switch (msg->type()) {
case STUN_BINDING_REQUEST:
- LOG_JV(sev, this) << "Received STUN ping"
- << ", id=" << rtc::hex_encode(msg->transaction_id());
+ RTC_LOG_V(sev) << ToString()
+ << ": Received STUN ping, id="
+ << rtc::hex_encode(msg->transaction_id());
if (remote_ufrag == remote_candidate_.username()) {
HandleBindingRequest(msg.get());
} else {
// The packet had the right local username, but the remote username
// was not the right one for the remote address.
- LOG_J(LS_ERROR, this)
- << "Received STUN request with bad remote username "
- << remote_ufrag;
+ RTC_LOG(LS_ERROR)
+ << ToString()
+ << ": Received STUN request with bad remote username "
+ << remote_ufrag;
port_->SendBindingErrorResponse(msg.get(), addr,
STUN_ERROR_UNAUTHORIZED,
STUN_ERROR_REASON_UNAUTHORIZED);
@@ -1296,7 +1314,7 @@
void Connection::Prune() {
if (!pruned_ || active()) {
- LOG_J(LS_INFO, this) << "Connection pruned";
+ RTC_LOG(LS_INFO) << ToString() << ": Connection pruned";
pruned_ = true;
requests_.Clear();
set_write_state(STATE_WRITE_TIMEOUT);
@@ -1309,7 +1327,8 @@
// with the networking thread on which this message is posted). Also affects
// tests, with a workaround in
// AutoSocketServerThread::~AutoSocketServerThread.
- LOG_J(LS_VERBOSE, this) << "Connection destroyed";
+ RTC_LOG(LS_VERBOSE) << ToString()
+ << ": Connection destroyed";
port_->thread()->Post(RTC_FROM_HERE, this, MSG_DELETE);
LogCandidatePairEvent(webrtc::IceCandidatePairEventType::kDestroyed);
}
@@ -1347,13 +1366,13 @@
if (RTC_LOG_CHECK_LEVEL(LS_VERBOSE)) {
std::string pings;
PrintPingsSinceLastResponse(&pings, 5);
- LOG_J(LS_VERBOSE, this) << "UpdateState()"
- << ", ms since last received response="
- << now - last_ping_response_received_
- << ", ms since last received data="
- << now - last_data_received_
- << ", rtt=" << rtt
- << ", pings_since_last_response=" << pings;
+ RTC_LOG(LS_VERBOSE) << ToString()
+ << ": UpdateState()"
+ ", ms since last received response="
+ << now - last_ping_response_received_
+ << ", ms since last received data="
+ << now - last_data_received_ << ", rtt=" << rtt
+ << ", pings_since_last_response=" << pings;
}
// Check the writable state. (The order of these checks is important.)
@@ -1371,15 +1390,14 @@
TooLongWithoutResponse(pings_since_last_response_, unwritable_timeout(),
now)) {
uint32_t max_pings = unwritable_min_checks();
- LOG_J(LS_INFO, this) << "Unwritable after " << max_pings
- << " ping failures and "
- << now - pings_since_last_response_[0].sent_time
- << " ms without a response,"
- << " ms since last received ping="
- << now - last_ping_received_
- << " ms since last received data="
- << now - last_data_received_
- << " rtt=" << rtt;
+ RTC_LOG(LS_INFO) << ToString() << ": Unwritable after "
+ << max_pings << " ping failures and "
+ << now - pings_since_last_response_[0].sent_time
+ << " ms without a response,"
+ " ms since last received ping="
+ << now - last_ping_received_
+ << " ms since last received data="
+ << now - last_data_received_ << " rtt=" << rtt;
set_write_state(STATE_WRITE_UNRELIABLE);
}
if ((write_state_ == STATE_WRITE_UNRELIABLE ||
@@ -1387,10 +1405,9 @@
TooLongWithoutResponse(pings_since_last_response_,
CONNECTION_WRITE_TIMEOUT,
now)) {
- LOG_J(LS_INFO, this) << "Timed out after "
- << now - pings_since_last_response_[0].sent_time
- << " ms without a response"
- << ", rtt=" << rtt;
+ RTC_LOG(LS_INFO) << ToString() << ": Timed out after "
+ << now - pings_since_last_response_[0].sent_time
+ << " ms without a response, rtt=" << rtt;
set_write_state(STATE_WRITE_TIMEOUT);
}
@@ -1413,9 +1430,10 @@
}
pings_since_last_response_.push_back(SentPing(req->id(), now, nomination));
packet_loss_estimator_.ExpectResponse(req->id(), now);
- LOG_J(LS_VERBOSE, this) << "Sending STUN ping "
- << ", id=" << rtc::hex_encode(req->id())
- << ", nomination=" << nomination_;
+ RTC_LOG(LS_VERBOSE) << ToString()
+ << ": Sending STUN ping, id="
+ << rtc::hex_encode(req->id())
+ << ", nomination=" << nomination_;
requests_.Send(req);
state_ = IceCandidatePairState::IN_PROGRESS;
num_pings_sent_++;
@@ -1589,11 +1607,12 @@
if (RTC_LOG_CHECK_LEVEL_V(sev)) {
std::string pings;
PrintPingsSinceLastResponse(&pings, 5);
- LOG_JV(sev, this) << "Received STUN ping response"
- << ", id=" << rtc::hex_encode(request->id())
- << ", code=0" // Makes logging easier to parse.
- << ", rtt=" << rtt
- << ", pings_since_last_response=" << pings;
+ RTC_LOG_V(sev) << ToString()
+ << ": Received STUN ping response, id="
+ << rtc::hex_encode(request->id())
+ << ", code=0" // Makes logging easier to parse.
+ ", rtt="
+ << rtt << ", pings_since_last_response=" << pings;
}
ReceivedPingResponse(rtt, request->id());
@@ -1610,10 +1629,11 @@
void Connection::OnConnectionRequestErrorResponse(ConnectionRequest* request,
StunMessage* response) {
int error_code = response->GetErrorCodeValue();
- LOG_J(LS_WARNING, this) << "Received STUN error response"
- << " id=" << rtc::hex_encode(request->id())
- << " code=" << error_code
- << " rtt=" << request->Elapsed();
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Received STUN error response id="
+ << rtc::hex_encode(request->id())
+ << " code=" << error_code
+ << " rtt=" << request->Elapsed();
if (error_code == STUN_ERROR_UNKNOWN_ATTRIBUTE ||
error_code == STUN_ERROR_SERVER_ERROR ||
@@ -1625,8 +1645,9 @@
HandleRoleConflictFromPeer();
} else {
// This is not a valid connection.
- LOG_J(LS_ERROR, this) << "Received STUN error response, code="
- << error_code << "; killing connection";
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Received STUN error response, code=" << error_code
+ << "; killing connection";
FailAndDestroy();
}
}
@@ -1634,18 +1655,18 @@
void Connection::OnConnectionRequestTimeout(ConnectionRequest* request) {
// Log at LS_INFO if we miss a ping on a writable connection.
rtc::LoggingSeverity sev = writable() ? rtc::LS_INFO : rtc::LS_VERBOSE;
- LOG_JV(sev, this) << "Timing-out STUN ping "
- << rtc::hex_encode(request->id())
- << " after " << request->Elapsed() << " ms";
+ RTC_LOG_V(sev) << ToString() << ": Timing-out STUN ping "
+ << rtc::hex_encode(request->id()) << " after "
+ << request->Elapsed() << " ms";
}
void Connection::OnConnectionRequestSent(ConnectionRequest* request) {
// Log at LS_INFO if we send a ping on an unwritable connection.
rtc::LoggingSeverity sev = !writable() ? rtc::LS_INFO : rtc::LS_VERBOSE;
- LOG_JV(sev, this) << "Sent STUN ping"
- << ", id=" << rtc::hex_encode(request->id())
- << ", use_candidate=" << use_candidate_attr()
- << ", nomination=" << nomination();
+ RTC_LOG_V(sev) << ToString()
+ << ": Sent STUN ping, id=" << rtc::hex_encode(request->id())
+ << ", use_candidate=" << use_candidate_attr()
+ << ", nomination=" << nomination();
stats_.sent_ping_requests_total++;
LogCandidatePairEvent(webrtc::IceCandidatePairEventType::kCheckSent);
if (stats_.recv_ping_responses == 0) {
@@ -1733,15 +1754,16 @@
if (!addr) {
RTC_LOG(LS_WARNING)
<< "Connection::OnConnectionRequestResponse - "
- << "No MAPPED-ADDRESS or XOR-MAPPED-ADDRESS found in the "
- << "stun response message";
+ "No MAPPED-ADDRESS or XOR-MAPPED-ADDRESS found in the "
+ "stun response message";
return;
}
for (size_t i = 0; i < port_->Candidates().size(); ++i) {
if (port_->Candidates()[i].address() == addr->GetAddress()) {
if (local_candidate_index_ != i) {
- LOG_J(LS_INFO, this) << "Updating local candidate type to srflx.";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Updating local candidate type to srflx.";
local_candidate_index_ = i;
// SignalStateChange to force a re-sort in P2PTransportChannel as this
// Connection's local candidate has changed.
@@ -1758,8 +1780,8 @@
request->msg()->GetUInt32(STUN_ATTR_PRIORITY);
if (!priority_attr) {
RTC_LOG(LS_WARNING) << "Connection::OnConnectionRequestResponse - "
- << "No STUN_ATTR_PRIORITY found in the "
- << "stun response message";
+ "No STUN_ATTR_PRIORITY found in the "
+ "stun response message";
return;
}
const uint32_t priority = priority_attr->value();
@@ -1785,7 +1807,8 @@
new_local_candidate.set_network_cost(local_candidate().network_cost());
// Change the local candidate of this Connection to the new prflx candidate.
- LOG_J(LS_INFO, this) << "Updating local candidate type to prflx.";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Updating local candidate type to prflx.";
local_candidate_index_ = port_->AddPrflxCandidate(new_local_candidate);
// SignalStateChange to force a re-sort in P2PTransportChannel as this
diff --git a/p2p/base/portallocator.cc b/p2p/base/portallocator.cc
index 2b9b183..e766fa7 100644
--- a/p2p/base/portallocator.cc
+++ b/p2p/base/portallocator.cc
@@ -127,8 +127,7 @@
if (candidate_pool_frozen_) {
if (candidate_pool_size != candidate_pool_size_) {
RTC_LOG(LS_ERROR)
- << "Trying to change candidate pool size after pool was "
- << "frozen.";
+ << "Trying to change candidate pool size after pool was frozen.";
return false;
}
return true;
diff --git a/p2p/base/pseudotcp_unittest.cc b/p2p/base/pseudotcp_unittest.cc
index fb9a503..f6b46cc 100644
--- a/p2p/base/pseudotcp_unittest.cc
+++ b/p2p/base/pseudotcp_unittest.cc
@@ -554,8 +554,8 @@
} else {
if (!remote_.isReceiveBufferFull()) {
RTC_LOG(LS_ERROR) << "This shouldn't happen - the send buffer is full, "
- << "the receive buffer is not, and there are no "
- << "remaining messages to process.";
+ "the receive buffer is not, and there are no "
+ "remaining messages to process.";
}
send_stream_.GetPosition(&position);
send_position_.push_back(position);
diff --git a/p2p/base/relayport.cc b/p2p/base/relayport.cc
index a789a1b..52416ca 100644
--- a/p2p/base/relayport.cc
+++ b/p2p/base/relayport.cc
@@ -508,7 +508,7 @@
rtc::SocketAddress(port_->Network()->GetBestIP(), 0), ra->address,
port_->proxy(), port_->user_agent(), opts);
} else {
- RTC_LOG(LS_WARNING) << "Unknown protocol (" << ra->proto << ")";
+ RTC_LOG(LS_WARNING) << "Unknown protocol: " << ra->proto;
}
// If we failed to get a socket, move on to the next protocol.
@@ -832,9 +832,8 @@
if (!attr) {
RTC_LOG(LS_ERROR) << "Missing allocate response error code.";
} else {
- RTC_LOG(INFO) << "Allocate error response:"
- << " code=" << attr->code() << " reason='" << attr->reason()
- << "'";
+ RTC_LOG(INFO) << "Allocate error response: code=" << attr->code()
+ << " reason=" << attr->reason();
}
if (rtc::TimeMillis() - start_time_ <= kRetryTimeout)
diff --git a/p2p/base/stun.cc b/p2p/base/stun.cc
index 50b6b44..2bedde0 100644
--- a/p2p/base/stun.cc
+++ b/p2p/base/stun.cc
@@ -268,7 +268,7 @@
RTC_DCHECK(ret == sizeof(hmac));
if (ret != sizeof(hmac)) {
RTC_LOG(LS_ERROR) << "HMAC computation failed. Message-Integrity "
- << "has dummy value.";
+ "has dummy value.";
return false;
}
diff --git a/p2p/base/stunport.cc b/p2p/base/stunport.cc
index 8deea1c..1a6db16 100644
--- a/p2p/base/stunport.cc
+++ b/p2p/base/stunport.cc
@@ -13,7 +13,6 @@
#include <utility>
#include <vector>
-#include "p2p/base/common.h"
#include "p2p/base/p2pconstants.h"
#include "p2p/base/portallocator.h"
#include "p2p/base/stun.h"
@@ -69,9 +68,9 @@
RTC_LOG(LS_ERROR) << "Missing binding response error code.";
} else {
RTC_LOG(LS_ERROR) << "Binding error response:"
- << " class=" << attr->eclass()
- << " number=" << attr->number() << " reason='"
- << attr->reason() << "'";
+ " class=" << attr->eclass()
+ << " number=" << attr->number() << " reason="
+ << attr->reason();
}
port_->OnStunBindingOrResolveRequestFailed(server_addr_);
@@ -209,7 +208,8 @@
socket_ = socket_factory()->CreateUdpSocket(
rtc::SocketAddress(Network()->GetBestIP(), 0), min_port(), max_port());
if (!socket_) {
- LOG_J(LS_WARNING, this) << "UDP socket creation failed";
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": UDP socket creation failed";
return false;
}
socket_->SignalReadPacket.connect(this, &UDPPort::OnReadPacket);
@@ -271,8 +271,8 @@
int sent = socket_->SendTo(data, size, addr, options);
if (sent < 0) {
error_ = socket_->GetError();
- LOG_J(LS_ERROR, this) << "UDP send of " << size
- << " bytes failed with error " << error_;
+ RTC_LOG(LS_ERROR) << ToString() << ": UDP send of "
+ << size << " bytes failed with error " << error_;
}
return sent;
}
@@ -387,8 +387,9 @@
resolver_->SignalDone.connect(this, &UDPPort::OnResolveResult);
}
- LOG_J(LS_INFO, this) << "Starting STUN host lookup for "
- << stun_addr.ToSensitiveString();
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Starting STUN host lookup for "
+ << stun_addr.ToSensitiveString();
resolver_->Resolve(stun_addr);
}
@@ -399,8 +400,9 @@
rtc::SocketAddress resolved;
if (error != 0 || !resolver_->GetResolvedAddress(
input, Network()->GetBestIP().family(), &resolved)) {
- LOG_J(LS_WARNING, this) << "StunPort: stun host lookup received error "
- << error;
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": StunPort: stun host lookup received error "
+ << error;
OnStunBindingOrResolveRequestFailed(input);
return;
}
diff --git a/p2p/base/tcpport.cc b/p2p/base/tcpport.cc
index a8bda95..45acfc7 100644
--- a/p2p/base/tcpport.cc
+++ b/p2p/base/tcpport.cc
@@ -68,7 +68,6 @@
#include <vector>
-#include "p2p/base/common.h"
#include "rtc_base/checks.h"
#include "rtc_base/logging.h"
@@ -175,7 +174,8 @@
TCPTYPE_PASSIVE_STR, LOCAL_PORT_TYPE,
ICE_TYPE_PREFERENCE_HOST_TCP, 0, "", true);
} else {
- LOG_J(LS_INFO, this) << "Not listening due to firewall restrictions.";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Not listening due to firewall restrictions.";
// Note: We still add the address, since otherwise the remote side won't
// recognize our incoming TCP connections. According to
// https://tools.ietf.org/html/rfc6544#section-4.5, for active candidate,
@@ -211,8 +211,9 @@
socket = GetIncoming(addr);
}
if (!socket) {
- LOG_J(LS_ERROR, this) << "Attempted to send to an unknown destination, "
- << addr.ToSensitiveString();
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Attempted to send to an unknown destination: "
+ << addr.ToSensitiveString();
return SOCKET_ERROR; // TODO(tbd): Set error_
}
@@ -222,8 +223,8 @@
// Error from this code path for a Connection (instead of from a bare
// socket) will not trigger reconnecting. In theory, this shouldn't matter
// as OnClose should always be called and set connected to false.
- LOG_J(LS_ERROR, this) << "TCP send of " << size
- << " bytes failed with error " << error_;
+ RTC_LOG(LS_ERROR) << ToString() << ": TCP send of "
+ << size << " bytes failed with error " << error_;
}
return sent;
}
@@ -267,8 +268,9 @@
incoming.socket->SignalReadyToSend.connect(this, &TCPPort::OnReadyToSend);
incoming.socket->SignalSentPacket.connect(this, &TCPPort::OnSentPacket);
- LOG_J(LS_VERBOSE, this) << "Accepted connection from "
- << incoming.addr.ToSensitiveString();
+ RTC_LOG(LS_VERBOSE) << ToString()
+ << ": Accepted connection from "
+ << incoming.addr.ToSensitiveString();
incoming_.push_back(incoming);
}
@@ -277,8 +279,9 @@
rtc::SocketAddress(Network()->GetBestIP(), 0), min_port(), max_port(),
false /* ssl */);
if (!socket_) {
- LOG_J(LS_WARNING, this)
- << "TCP server socket creation failed; continuing anyway.";
+ RTC_LOG(LS_WARNING)
+ << ToString()
+ << ": TCP server socket creation failed; continuing anyway.";
return;
}
socket_->SignalNewConnection.connect(this, &TCPPort::OnNewConnection);
@@ -342,9 +345,9 @@
} else {
// Incoming connections should match one of the network addresses. Same as
// what's being checked in OnConnect, but just DCHECKing here.
- LOG_J(LS_VERBOSE, this)
- << "socket ipaddr: " << socket_->GetLocalAddress().ToString()
- << ", port() Network:" << port->Network()->ToString();
+ RTC_LOG(LS_VERBOSE) << ToString() << ": socket ipaddr: "
+ << socket_->GetLocalAddress().ToString()
+ << ", port() Network:" << port->Network()->ToString();
const std::vector<rtc::InterfaceAddress>& desired_addresses =
port_->Network()->GetIPs();
RTC_DCHECK(std::find_if(desired_addresses.begin(), desired_addresses.end(),
@@ -435,8 +438,9 @@
[socket_address](const rtc::InterfaceAddress& addr) {
return socket_address.ipaddr() == addr;
}) != desired_addresses.end()) {
- LOG_J(LS_VERBOSE, this) << "Connection established to "
- << socket->GetRemoteAddress().ToSensitiveString();
+ RTC_LOG(LS_VERBOSE) << ToString()
+ << ": Connection established to "
+ << socket->GetRemoteAddress().ToSensitiveString();
} else {
if (socket->GetLocalAddress().IsLoopbackIP()) {
RTC_LOG(LS_WARNING) << "Socket is bound to the address:"
@@ -451,7 +455,7 @@
<< ", rather than an address associated with network:"
<< port_->Network()->ToString()
<< ". Still allowing it since it's the 'any' address"
- << ", possibly caused by multiple_routes being disabled.";
+ ", possibly caused by multiple_routes being disabled.";
} else {
RTC_LOG(LS_WARNING) << "Dropping connection as TCP socket bound to IP "
<< socket_address.ipaddr().ToString()
@@ -469,7 +473,8 @@
void TCPConnection::OnClose(rtc::AsyncPacketSocket* socket, int error) {
RTC_DCHECK(socket == socket_.get());
- LOG_J(LS_INFO, this) << "Connection closed with error " << error;
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Connection closed with error " << error;
// Guard against the condition where IPC socket will call OnClose for every
// packet it can't send.
@@ -516,8 +521,9 @@
return;
}
- LOG_J(LS_INFO, this) << "TCP Connection with remote is closed, "
- << "trying to reconnect";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": TCP Connection with remote is closed, "
+ "trying to reconnect";
CreateOutgoingTcpSocket();
error_ = EPIPE;
@@ -547,15 +553,18 @@
remote_candidate().address(), port()->proxy(), port()->user_agent(),
opts));
if (socket_) {
- LOG_J(LS_VERBOSE, this)
- << "Connecting from " << socket_->GetLocalAddress().ToSensitiveString()
- << " to " << remote_candidate().address().ToSensitiveString();
+ RTC_LOG(LS_VERBOSE) << ToString()
+ << ": Connecting from "
+ << socket_->GetLocalAddress().ToSensitiveString()
+ << " to "
+ << remote_candidate().address().ToSensitiveString();
set_connected(false);
connection_pending_ = true;
ConnectSocketSignals(socket_.get());
} else {
- LOG_J(LS_WARNING, this) << "Failed to create connection to "
- << remote_candidate().address().ToSensitiveString();
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Failed to create connection to "
+ << remote_candidate().address().ToSensitiveString();
}
}
diff --git a/p2p/base/transportdescriptionfactory.cc b/p2p/base/transportdescriptionfactory.cc
index d5f8561..5924a93 100644
--- a/p2p/base/transportdescriptionfactory.cc
+++ b/p2p/base/transportdescriptionfactory.cc
@@ -64,7 +64,7 @@
// TODO(juberti): Figure out why we get NULL offers, and fix this upstream.
if (!offer) {
RTC_LOG(LS_WARNING) << "Failed to create TransportDescription answer "
- << "because offer is NULL";
+ "because offer is NULL";
return NULL;
}
diff --git a/p2p/base/turnport.cc b/p2p/base/turnport.cc
index e718bb1..fa3bc17 100644
--- a/p2p/base/turnport.cc
+++ b/p2p/base/turnport.cc
@@ -16,7 +16,6 @@
#include <vector>
#include "api/optional.h"
-#include "p2p/base/common.h"
#include "p2p/base/stun.h"
#include "rtc_base/asyncpacketsocket.h"
#include "rtc_base/byteorder.h"
@@ -308,7 +307,7 @@
if (credentials_.username.empty() ||
credentials_.password.empty()) {
RTC_LOG(LS_ERROR) << "Allocation can't be started without setting the"
- << " TURN server credentials for the user.";
+ " TURN server credentials for the user.";
OnAllocateError();
return;
}
@@ -323,8 +322,8 @@
} else {
// If protocol family of server address doesn't match with local, return.
if (!IsCompatibleAddress(server_address_.address)) {
- RTC_LOG(LS_ERROR) << "IP address family does not match: "
- << "server: " << server_address_.address.family()
+ RTC_LOG(LS_ERROR) << "IP address family does not match. server: "
+ << server_address_.address.family()
<< " local: " << Network()->GetBestIP().family();
OnAllocateError();
return;
@@ -333,9 +332,10 @@
// Insert the current address to prevent redirection pingpong.
attempted_server_addresses_.insert(server_address_.address);
- LOG_J(LS_INFO, this) << "Trying to connect to TURN server via "
- << ProtoToString(server_address_.proto) << " @ "
- << server_address_.address.ToSensitiveString();
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Trying to connect to TURN server via "
+ << ProtoToString(server_address_.proto) << " @ "
+ << server_address_.address.ToSensitiveString();
if (!CreateTurnClientSocket()) {
RTC_LOG(LS_ERROR) << "Failed to create TURN client socket";
OnAllocateError();
@@ -451,7 +451,7 @@
<< ", rather than an address associated with network:"
<< Network()->ToString()
<< ". Still allowing it since it's the 'any' address"
- << ", possibly caused by multiple_routes being disabled.";
+ ", possibly caused by multiple_routes being disabled.";
} else {
RTC_LOG(LS_WARNING) << "Socket is bound to the address:"
<< socket_address.ipaddr().ToString()
@@ -473,23 +473,27 @@
}
void TurnPort::OnSocketClose(rtc::AsyncPacketSocket* socket, int error) {
- LOG_J(LS_WARNING, this) << "Connection with server failed, error=" << error;
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Connection with server failed with error: "
+ << error;
RTC_DCHECK(socket == socket_);
Close();
}
void TurnPort::OnAllocateMismatch() {
if (allocate_mismatch_retries_ >= MAX_ALLOCATE_MISMATCH_RETRIES) {
- LOG_J(LS_WARNING, this) << "Giving up on the port after "
- << allocate_mismatch_retries_
- << " retries for STUN_ERROR_ALLOCATION_MISMATCH";
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Giving up on the port after "
+ << allocate_mismatch_retries_
+ << " retries for STUN_ERROR_ALLOCATION_MISMATCH";
OnAllocateError();
return;
}
- LOG_J(LS_INFO, this) << "Allocating a new socket after "
- << "STUN_ERROR_ALLOCATION_MISMATCH, retry = "
- << allocate_mismatch_retries_ + 1;
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Allocating a new socket after "
+ "STUN_ERROR_ALLOCATION_MISMATCH, retry: "
+ << allocate_mismatch_retries_ + 1;
if (SharedSocket()) {
ResetSharedSocket();
} else {
@@ -580,7 +584,7 @@
// Try to find an entry for this specific address; we should have one.
TurnEntry* entry = FindEntry(addr);
if (!entry) {
- RTC_LOG(LS_ERROR) << "Did not find the TurnEntry for address " << addr;
+ RTC_LOG(LS_ERROR) << "Did not find the TurnEntry for address: " << addr;
return 0;
}
@@ -619,22 +623,24 @@
// alternative server redirection. TODO(guoweis): add a unit test for this
// race condition.
if (remote_addr != server_address_.address) {
- LOG_J(LS_WARNING, this) << "Discarding TURN message from unknown address:"
- << remote_addr.ToString()
- << ", server_address_:"
- << server_address_.address.ToString();
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Discarding TURN message from unknown address: "
+ << remote_addr.ToString() << " server_address_: "
+ << server_address_.address.ToString();
return false;
}
// The message must be at least the size of a channel header.
if (size < TURN_CHANNEL_HEADER_SIZE) {
- LOG_J(LS_WARNING, this) << "Received TURN message that was too short";
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Received TURN message that was too short";
return false;
}
if (state_ == STATE_DISCONNECTED) {
- LOG_J(LS_WARNING, this)
- << "Received TURN message while the TURN port is disconnected";
+ RTC_LOG(LS_WARNING)
+ << ToString()
+ << ": Received TURN message while the TURN port is disconnected";
return false;
}
@@ -654,8 +660,9 @@
if (SharedSocket() && (msg_type == STUN_BINDING_RESPONSE ||
msg_type == STUN_BINDING_ERROR_RESPONSE)) {
- LOG_J(LS_VERBOSE, this) <<
- "Ignoring STUN binding response message on shared socket.";
+ RTC_LOG(LS_VERBOSE)
+ << ToString()
+ << ": Ignoring STUN binding response message on shared socket.";
return false;
}
@@ -663,8 +670,10 @@
// Check success responses, but not errors, for MESSAGE-INTEGRITY.
if (IsStunSuccessResponseType(msg_type) &&
!StunMessage::ValidateMessageIntegrity(data, size, hash())) {
- LOG_J(LS_WARNING, this) << "Received TURN message with invalid "
- << "message integrity, msg_type=" << msg_type;
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Received TURN message with invalid "
+ "message integrity, msg_type: "
+ << msg_type;
return true;
}
request_manager_.CheckResponse(data, size);
@@ -701,32 +710,32 @@
// Check if we have seen this address before and reject if we did.
AttemptedServerSet::iterator iter = attempted_server_addresses_.find(address);
if (iter != attempted_server_addresses_.end()) {
- LOG_J(LS_WARNING, this) << "Redirection to ["
- << address.ToSensitiveString()
- << "] ignored, allocation failed.";
+ RTC_LOG(LS_WARNING) << ToString() << ": Redirection to ["
+ << address.ToSensitiveString()
+ << "] ignored, allocation failed.";
return false;
}
// If protocol family of server address doesn't match with local, return.
if (!IsCompatibleAddress(address)) {
RTC_LOG(LS_WARNING) << "Server IP address family does not match with "
- << "local host address family type";
+ "local host address family type";
return false;
}
// Block redirects to a loopback address.
// See: https://bugs.chromium.org/p/chromium/issues/detail?id=649118
if (address.IsLoopbackIP()) {
- LOG_J(LS_WARNING, this)
- << "Blocking attempted redirect to loopback address.";
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Blocking attempted redirect to loopback address.";
return false;
}
- LOG_J(LS_INFO, this) << "Redirecting from TURN server ["
- << server_address_.address.ToSensitiveString()
- << "] to TURN server ["
- << address.ToSensitiveString()
- << "]";
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Redirecting from TURN server ["
+ << server_address_.address.ToSensitiveString()
+ << "] to TURN server [" << address.ToSensitiveString()
+ << "]";
server_address_ = ProtocolAddress(address, server_address_.proto);
// Insert the current address to prevent redirection pingpong.
@@ -738,8 +747,9 @@
if (resolver_)
return;
- LOG_J(LS_INFO, this) << "Starting TURN host lookup for "
- << address.ToSensitiveString();
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Starting TURN host lookup for "
+ << address.ToSensitiveString();
resolver_ = socket_factory()->CreateAsyncResolver();
resolver_->SignalDone.connect(this, &TurnPort::OnResolveResult);
resolver_->Start(address);
@@ -765,8 +775,9 @@
if (resolver_->GetError() != 0 ||
!resolver_->GetResolvedAddress(Network()->GetBestIP().family(),
&resolved_address)) {
- LOG_J(LS_WARNING, this) << "TURN host lookup received error "
- << resolver_->GetError();
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": TURN host lookup received error "
+ << resolver_->GetError();
error_ = resolver_->GetError();
OnAllocateError();
return;
@@ -784,8 +795,9 @@
RTC_DCHECK(connected());
rtc::PacketOptions options(DefaultDscpValue());
if (Send(data, size, options) < 0) {
- LOG_J(LS_ERROR, this) << "Failed to send TURN message, err="
- << socket_->GetError();
+ RTC_LOG(LS_ERROR) << ToString()
+ << ": Failed to send TURN message, error: "
+ << socket_->GetError();
}
}
@@ -912,7 +924,8 @@
rtc::ByteBufferReader buf(data, size);
TurnMessage msg;
if (!msg.Read(&buf)) {
- LOG_J(LS_WARNING, this) << "Received invalid TURN data indication";
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Received invalid TURN data indication";
return;
}
@@ -920,16 +933,18 @@
const StunAddressAttribute* addr_attr =
msg.GetAddress(STUN_ATTR_XOR_PEER_ADDRESS);
if (!addr_attr) {
- LOG_J(LS_WARNING, this) << "Missing STUN_ATTR_XOR_PEER_ADDRESS attribute "
- << "in data indication.";
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Missing STUN_ATTR_XOR_PEER_ADDRESS attribute "
+ "in data indication.";
return;
}
const StunByteStringAttribute* data_attr =
msg.GetByteString(STUN_ATTR_DATA);
if (!data_attr) {
- LOG_J(LS_WARNING, this) << "Missing STUN_ATTR_DATA attribute in "
- << "data indication.";
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Missing STUN_ATTR_DATA attribute in "
+ "data indication.";
return;
}
@@ -937,9 +952,10 @@
// a permission for.
rtc::SocketAddress ext_addr(addr_attr->GetAddress());
if (!HasPermission(ext_addr.ipaddr())) {
- LOG_J(LS_WARNING, this)
- << "Received TURN data indication with unknown "
- << "peer address, addr=" << ext_addr.ToSensitiveString();
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Received TURN data indication with unknown "
+ "peer address, addr: "
+ << ext_addr.ToSensitiveString();
}
DispatchPacket(data_attr->bytes(), data_attr->length(), ext_addr,
@@ -966,16 +982,20 @@
// Extract header fields from the message.
uint16_t len = rtc::GetBE16(data + 2);
if (len > size - TURN_CHANNEL_HEADER_SIZE) {
- LOG_J(LS_WARNING, this) << "Received TURN channel data message with "
- << "incorrect length, len=" << len;
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Received TURN channel data message with "
+ "incorrect length, len: "
+ << len;
return;
}
// Allowing messages larger than |len|, as ChannelData can be padded.
TurnEntry* entry = FindEntry(channel_id);
if (!entry) {
- LOG_J(LS_WARNING, this) << "Received TURN channel data message for invalid "
- << "channel, channel_id=" << channel_id;
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Received TURN channel data message for invalid "
+ "channel, channel_id: "
+ << channel_id;
return;
}
@@ -1004,14 +1024,16 @@
// The RFC does not mention a lower limit on lifetime.
// So if server sends a value less than 2 minutes, we schedule a refresh
// for half lifetime.
- LOG_J(LS_WARNING, this) << "Received response with short lifetime="
- << lifetime << " seconds.";
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Received response with short lifetime: "
+ << lifetime << " seconds.";
delay = (lifetime * 1000) / 2;
} else if (lifetime > max_lifetime) {
// Make 1 hour largest delay, and then sce
// we schedule a refresh for one minute less than max lifetime.
- LOG_J(LS_WARNING, this) << "Received response with long lifetime="
- << lifetime << " seconds.";
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Received response with long lifetime: "
+ << lifetime << " seconds.";
delay = (max_lifetime - 60) * 1000;
} else {
// Normal case,
@@ -1020,7 +1042,8 @@
}
SendRequest(new TurnRefreshRequest(this), delay);
- LOG_J(LS_INFO, this) << "Scheduled refresh in " << delay << "ms.";
+ RTC_LOG(LS_INFO) << ToString() << ": Scheduled refresh in "
+ << delay << "ms.";
return true;
}
@@ -1060,7 +1083,7 @@
response->GetByteString(STUN_ATTR_REALM);
if (!realm_attr) {
RTC_LOG(LS_ERROR) << "Missing STUN_ATTR_REALM attribute in "
- << "stale nonce error response.";
+ "stale nonce error response.";
return false;
}
set_realm(realm_attr->GetString());
@@ -1069,7 +1092,7 @@
response->GetByteString(STUN_ATTR_NONCE);
if (!nonce_attr) {
RTC_LOG(LS_ERROR) << "Missing STUN_ATTR_NONCE attribute in "
- << "stale nonce error response.";
+ "stale nonce error response.";
return false;
}
set_nonce(nonce_attr->GetString());
@@ -1251,23 +1274,27 @@
}
void TurnAllocateRequest::OnSent() {
- LOG_J(LS_INFO, port_) << "TURN allocate request sent"
- << ", id=" << rtc::hex_encode(id());
+ RTC_LOG(LS_INFO) << port_->ToString()
+ << ": TURN allocate request sent, id="
+ << rtc::hex_encode(id());
StunRequest::OnSent();
}
void TurnAllocateRequest::OnResponse(StunMessage* response) {
- LOG_J(LS_INFO, port_) << "TURN allocate requested successfully"
- << ", id=" << rtc::hex_encode(id())
- << ", code=0" // Makes logging easier to parse.
- << ", rtt=" << Elapsed();
+ RTC_LOG(LS_INFO) << port_->ToString()
+ << ": TURN allocate requested successfully, id="
+ << rtc::hex_encode(id())
+ << ", code=0" // Makes logging easier to parse.
+ ", rtt="
+ << Elapsed();
// Check mandatory attributes as indicated in RFC5766, Section 6.3.
const StunAddressAttribute* mapped_attr =
response->GetAddress(STUN_ATTR_XOR_MAPPED_ADDRESS);
if (!mapped_attr) {
- LOG_J(LS_WARNING, port_) << "Missing STUN_ATTR_XOR_MAPPED_ADDRESS "
- << "attribute in allocate success response";
+ RTC_LOG(LS_WARNING) << port_->ToString()
+ << ": Missing STUN_ATTR_XOR_MAPPED_ADDRESS "
+ "attribute in allocate success response";
return;
}
// Using XOR-Mapped-Address for stun.
@@ -1276,16 +1303,18 @@
const StunAddressAttribute* relayed_attr =
response->GetAddress(STUN_ATTR_XOR_RELAYED_ADDRESS);
if (!relayed_attr) {
- LOG_J(LS_WARNING, port_) << "Missing STUN_ATTR_XOR_RELAYED_ADDRESS "
- << "attribute in allocate success response";
+ RTC_LOG(LS_WARNING) << port_->ToString()
+ << ": Missing STUN_ATTR_XOR_RELAYED_ADDRESS "
+ "attribute in allocate success response";
return;
}
const StunUInt32Attribute* lifetime_attr =
response->GetUInt32(STUN_ATTR_TURN_LIFETIME);
if (!lifetime_attr) {
- LOG_J(LS_WARNING, port_) << "Missing STUN_ATTR_TURN_LIFETIME attribute in "
- << "allocate success response";
+ RTC_LOG(LS_WARNING) << port_->ToString()
+ << ": Missing STUN_ATTR_TURN_LIFETIME attribute in "
+ "allocate success response";
return;
}
// Notify the port the allocate succeeded, and schedule a refresh request.
@@ -1298,9 +1327,10 @@
// Process error response according to RFC5766, Section 6.4.
int error_code = response->GetErrorCodeValue();
- LOG_J(LS_INFO, port_) << "Received TURN allocate error response"
- << ", id=" << rtc::hex_encode(id())
- << ", code=" << error_code << ", rtt=" << Elapsed();
+ RTC_LOG(LS_INFO) << port_->ToString()
+ << ": Received TURN allocate error response, id="
+ << rtc::hex_encode(id()) << ", code=" << error_code
+ << ", rtt=" << Elapsed();
switch (error_code) {
case STUN_ERROR_UNAUTHORIZED: // Unauthrorized.
@@ -1316,25 +1346,27 @@
TurnPort::MSG_ALLOCATE_MISMATCH);
break;
default:
- LOG_J(LS_WARNING, port_)
- << "Received TURN allocate error response"
- << ", id=" << rtc::hex_encode(id()) << ", code=" << error_code
- << ", rtt=" << Elapsed();
+ RTC_LOG(LS_WARNING) << port_->ToString()
+ << ": Received TURN allocate error response, id="
+ << rtc::hex_encode(id()) << ", code=" << error_code
+ << ", rtt=" << Elapsed();
port_->OnAllocateError();
}
}
void TurnAllocateRequest::OnTimeout() {
- LOG_J(LS_WARNING, port_) << "TURN allocate request "
- << rtc::hex_encode(id()) << " timeout";
+ RTC_LOG(LS_WARNING) << port_->ToString()
+ << ": TURN allocate request " << rtc::hex_encode(id())
+ << " timeout";
port_->OnAllocateRequestTimeout();
}
void TurnAllocateRequest::OnAuthChallenge(StunMessage* response, int code) {
// If we failed to authenticate even after we sent our credentials, fail hard.
if (code == STUN_ERROR_UNAUTHORIZED && !port_->hash().empty()) {
- LOG_J(LS_WARNING, port_) << "Failed to authenticate with the server "
- << "after challenge.";
+ RTC_LOG(LS_WARNING) << port_->ToString()
+ << ": Failed to authenticate with the server "
+ "after challenge.";
port_->OnAllocateError();
return;
}
@@ -1343,8 +1375,9 @@
const StunByteStringAttribute* realm_attr =
response->GetByteString(STUN_ATTR_REALM);
if (!realm_attr) {
- LOG_J(LS_WARNING, port_) << "Missing STUN_ATTR_REALM attribute in "
- << "allocate unauthorized response.";
+ RTC_LOG(LS_WARNING) << port_->ToString()
+ << ": Missing STUN_ATTR_REALM attribute in "
+ "allocate unauthorized response.";
return;
}
port_->set_realm(realm_attr->GetString());
@@ -1352,8 +1385,9 @@
const StunByteStringAttribute* nonce_attr =
response->GetByteString(STUN_ATTR_NONCE);
if (!nonce_attr) {
- LOG_J(LS_WARNING, port_) << "Missing STUN_ATTR_NONCE attribute in "
- << "allocate unauthorized response.";
+ RTC_LOG(LS_WARNING) << port_->ToString()
+ << ": Missing STUN_ATTR_NONCE attribute in "
+ "allocate unauthorized response.";
return;
}
port_->set_nonce(nonce_attr->GetString());
@@ -1371,8 +1405,9 @@
const StunAddressAttribute* alternate_server_attr =
response->GetAddress(STUN_ATTR_ALTERNATE_SERVER);
if (!alternate_server_attr) {
- LOG_J(LS_WARNING, port_) << "Missing STUN_ATTR_ALTERNATE_SERVER "
- << "attribute in try alternate error response";
+ RTC_LOG(LS_WARNING) << port_->ToString()
+ << ": Missing STUN_ATTR_ALTERNATE_SERVER "
+ "attribute in try alternate error response";
port_->OnAllocateError();
return;
}
@@ -1385,16 +1420,18 @@
const StunByteStringAttribute* realm_attr =
response->GetByteString(STUN_ATTR_REALM);
if (realm_attr) {
- LOG_J(LS_INFO, port_) << "Applying STUN_ATTR_REALM attribute in "
- << "try alternate error response.";
+ RTC_LOG(LS_INFO) << port_->ToString()
+ << ": Applying STUN_ATTR_REALM attribute in "
+ "try alternate error response.";
port_->set_realm(realm_attr->GetString());
}
const StunByteStringAttribute* nonce_attr =
response->GetByteString(STUN_ATTR_NONCE);
if (nonce_attr) {
- LOG_J(LS_INFO, port_) << "Applying STUN_ATTR_NONCE attribute in "
- << "try alternate error response.";
+ RTC_LOG(LS_INFO) << port_->ToString()
+ << ": Applying STUN_ATTR_NONCE attribute in "
+ "try alternate error response.";
port_->set_nonce(nonce_attr->GetString());
}
@@ -1425,23 +1462,27 @@
}
void TurnRefreshRequest::OnSent() {
- LOG_J(LS_INFO, port_) << "TURN refresh request sent"
- << ", id=" << rtc::hex_encode(id());
+ RTC_LOG(LS_INFO) << port_->ToString()
+ << ": TURN refresh request sent, id="
+ << rtc::hex_encode(id());
StunRequest::OnSent();
}
void TurnRefreshRequest::OnResponse(StunMessage* response) {
- LOG_J(LS_INFO, port_) << "TURN refresh requested successfully"
- << ", id=" << rtc::hex_encode(id())
- << ", code=0" // Makes logging easier to parse.
- << ", rtt=" << Elapsed();
+ RTC_LOG(LS_INFO) << port_->ToString()
+ << ": TURN refresh requested successfully, id="
+ << rtc::hex_encode(id())
+ << ", code=0" // Makes logging easier to parse.
+ ", rtt="
+ << Elapsed();
// Check mandatory attributes as indicated in RFC5766, Section 7.3.
const StunUInt32Attribute* lifetime_attr =
response->GetUInt32(STUN_ATTR_TURN_LIFETIME);
if (!lifetime_attr) {
- LOG_J(LS_WARNING, port_) << "Missing STUN_ATTR_TURN_LIFETIME attribute in "
- << "refresh success response.";
+ RTC_LOG(LS_WARNING) << port_->ToString()
+ << ": Missing STUN_ATTR_TURN_LIFETIME attribute in "
+ "refresh success response.";
return;
}
@@ -1467,17 +1508,18 @@
port_->SendRequest(new TurnRefreshRequest(port_), 0);
}
} else {
- LOG_J(LS_WARNING, port_)
- << "Received TURN refresh error response"
- << ", id=" << rtc::hex_encode(id()) << ", code=" << error_code
- << ", rtt=" << Elapsed();
+ RTC_LOG(LS_WARNING) << port_->ToString()
+ << ": Received TURN refresh error response, id="
+ << rtc::hex_encode(id()) << ", code=" << error_code
+ << ", rtt=" << Elapsed();
port_->OnRefreshError();
port_->SignalTurnRefreshResult(port_, error_code);
}
}
void TurnRefreshRequest::OnTimeout() {
- LOG_J(LS_WARNING, port_) << "TURN refresh timeout " << rtc::hex_encode(id());
+ RTC_LOG(LS_WARNING) << port_->ToString()
+ << ": TURN refresh timeout " << rtc::hex_encode(id());
port_->OnRefreshError();
}
@@ -1502,16 +1544,19 @@
}
void TurnCreatePermissionRequest::OnSent() {
- LOG_J(LS_INFO, port_) << "TURN create permission request sent"
- << ", id=" << rtc::hex_encode(id());
+ RTC_LOG(LS_INFO) << port_->ToString()
+ << ": TURN create permission request sent, id="
+ << rtc::hex_encode(id());
StunRequest::OnSent();
}
void TurnCreatePermissionRequest::OnResponse(StunMessage* response) {
- LOG_J(LS_INFO, port_) << "TURN permission requested successfully"
- << ", id=" << rtc::hex_encode(id())
- << ", code=0" // Makes logging easier to parse.
- << ", rtt=" << Elapsed();
+ RTC_LOG(LS_INFO) << port_->ToString()
+ << ": TURN permission requested successfully, id="
+ << rtc::hex_encode(id())
+ << ", code=0" // Makes logging easier to parse.
+ ", rtt="
+ << Elapsed();
if (entry_) {
entry_->OnCreatePermissionSuccess();
@@ -1520,17 +1565,19 @@
void TurnCreatePermissionRequest::OnErrorResponse(StunMessage* response) {
int error_code = response->GetErrorCodeValue();
- LOG_J(LS_WARNING, port_) << "Received TURN create permission error response"
- << ", id=" << rtc::hex_encode(id())
- << ", code=" << error_code << ", rtt=" << Elapsed();
+ RTC_LOG(LS_WARNING) << port_->ToString()
+ << ": Received TURN create permission error response, id="
+ << rtc::hex_encode(id()) << ", code=" << error_code
+ << ", rtt=" << Elapsed();
if (entry_) {
entry_->OnCreatePermissionError(response, error_code);
}
}
void TurnCreatePermissionRequest::OnTimeout() {
- LOG_J(LS_WARNING, port_) << "TURN create permission timeout "
- << rtc::hex_encode(id());
+ RTC_LOG(LS_WARNING) << port_->ToString()
+ << ": TURN create permission timeout "
+ << rtc::hex_encode(id());
if (entry_) {
entry_->OnCreatePermissionTimeout();
}
@@ -1565,16 +1612,19 @@
}
void TurnChannelBindRequest::OnSent() {
- LOG_J(LS_INFO, port_) << "TURN channel bind request sent"
- << ", id=" << rtc::hex_encode(id());
+ RTC_LOG(LS_INFO) << port_->ToString()
+ << ": TURN channel bind request sent, id="
+ << rtc::hex_encode(id());
StunRequest::OnSent();
}
void TurnChannelBindRequest::OnResponse(StunMessage* response) {
- LOG_J(LS_INFO, port_) << "TURN channel bind requested successfully"
- << ", id=" << rtc::hex_encode(id())
- << ", code=0" // Makes logging easier to parse.
- << ", rtt=" << Elapsed();
+ RTC_LOG(LS_INFO) << port_->ToString()
+ << ": TURN channel bind requested successfully, id="
+ << rtc::hex_encode(id())
+ << ", code=0" // Makes logging easier to parse.
+ ", rtt="
+ << Elapsed();
if (entry_) {
entry_->OnChannelBindSuccess();
@@ -1584,23 +1634,26 @@
// permission from expiring.
int delay = TURN_PERMISSION_TIMEOUT - 60000;
entry_->SendChannelBindRequest(delay);
- LOG_J(LS_INFO, port_) << "Scheduled channel bind in " << delay << "ms.";
+ RTC_LOG(LS_INFO) << port_->ToString()
+ << ": Scheduled channel bind in " << delay << "ms.";
}
}
void TurnChannelBindRequest::OnErrorResponse(StunMessage* response) {
int error_code = response->GetErrorCodeValue();
- LOG_J(LS_WARNING, port_) << "Received TURN channel bind error response"
- << ", id=" << rtc::hex_encode(id())
- << ", code=" << error_code << ", rtt=" << Elapsed();
+ RTC_LOG(LS_WARNING) << port_->ToString()
+ << ": Received TURN channel bind error response, id="
+ << rtc::hex_encode(id()) << ", code=" << error_code
+ << ", rtt=" << Elapsed();
if (entry_) {
entry_->OnChannelBindError(response, error_code);
}
}
void TurnChannelBindRequest::OnTimeout() {
- LOG_J(LS_WARNING, port_) << "TURN channel bind timeout "
- << rtc::hex_encode(id());
+ RTC_LOG(LS_WARNING) << port_->ToString()
+ << ": TURN channel bind timeout "
+ << rtc::hex_encode(id());
if (entry_) {
entry_->OnChannelBindTimeout();
}
@@ -1667,9 +1720,9 @@
}
void TurnEntry::OnCreatePermissionSuccess() {
- LOG_J(LS_INFO, port_) << "Create permission for "
- << ext_addr_.ToSensitiveString()
- << " succeeded";
+ RTC_LOG(LS_INFO) << port_->ToString()
+ << ": Create permission for "
+ << ext_addr_.ToSensitiveString() << " succeeded";
port_->SignalCreatePermissionResult(port_, ext_addr_,
TURN_SUCCESS_RESULT_CODE);
@@ -1680,8 +1733,9 @@
// times out.
int delay = TURN_PERMISSION_TIMEOUT - 60000;
SendCreatePermissionRequest(delay);
- LOG_J(LS_INFO, port_) << "Scheduled create-permission-request in "
- << delay << "ms.";
+ RTC_LOG(LS_INFO) << port_->ToString()
+ << ": Scheduled create-permission-request in " << delay
+ << "ms.";
}
}
@@ -1694,7 +1748,8 @@
bool found = port_->FailAndPruneConnection(ext_addr_);
if (found) {
RTC_LOG(LS_ERROR) << "Received TURN CreatePermission error response, "
- << "code=" << code << "; pruned connection.";
+ "code="
+ << code << "; pruned connection.";
}
// Send signal with error code.
port_->SignalCreatePermissionResult(port_, ext_addr_, code);
@@ -1706,8 +1761,9 @@
}
void TurnEntry::OnChannelBindSuccess() {
- LOG_J(LS_INFO, port_) << "Channel bind for " << ext_addr_.ToSensitiveString()
- << " succeeded";
+ RTC_LOG(LS_INFO) << port_->ToString()
+ << ": Successful channel bind for "
+ << ext_addr_.ToSensitiveString();
RTC_DCHECK(state_ == STATE_BINDING || state_ == STATE_BOUND);
state_ = STATE_BOUND;
}
diff --git a/p2p/base/turnserver.cc b/p2p/base/turnserver.cc
index 902e889..aa5b5ed 100644
--- a/p2p/base/turnserver.cc
+++ b/p2p/base/turnserver.cc
@@ -14,7 +14,6 @@
#include <utility>
#include "p2p/base/asyncstuntcpsocket.h"
-#include "p2p/base/common.h"
#include "p2p/base/packetsocketfactory.h"
#include "p2p/base/stun.h"
#include "rtc_base/bind.h"
@@ -601,7 +600,7 @@
delete *it;
}
thread_->Clear(this, MSG_ALLOCATION_TIMEOUT);
- LOG_J(LS_INFO, this) << "Allocation destroyed";
+ RTC_LOG(LS_INFO) << ToString() << ": Allocation destroyed";
}
std::string TurnServerAllocation::ToString() const {
@@ -630,8 +629,9 @@
break;
default:
// Not sure what to do with this, just eat it.
- LOG_J(LS_WARNING, this) << "Invalid TURN message type received: "
- << msg->type();
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Invalid TURN message type received: "
+ << msg->type();
}
}
@@ -653,7 +653,8 @@
thread_->PostDelayed(RTC_FROM_HERE, lifetime_secs * 1000, this,
MSG_ALLOCATION_TIMEOUT);
- LOG_J(LS_INFO, this) << "Created allocation, lifetime=" << lifetime_secs;
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Created allocation with lifetime=" << lifetime_secs;
// We've already validated all the important bits; just send a response here.
TurnMessage response;
@@ -681,7 +682,8 @@
thread_->PostDelayed(RTC_FROM_HERE, lifetime_secs * 1000, this,
MSG_ALLOCATION_TIMEOUT);
- LOG_J(LS_INFO, this) << "Refreshed allocation, lifetime=" << lifetime_secs;
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Refreshed allocation, lifetime=" << lifetime_secs;
// Send a success response with a LIFETIME attribute.
TurnMessage response;
@@ -700,7 +702,8 @@
const StunAddressAttribute* peer_attr =
msg->GetAddress(STUN_ATTR_XOR_PEER_ADDRESS);
if (!data_attr || !peer_attr) {
- LOG_J(LS_WARNING, this) << "Received invalid send indication";
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Received invalid send indication";
return;
}
@@ -709,8 +712,10 @@
SendExternal(data_attr->bytes(), data_attr->length(),
peer_attr->GetAddress());
} else {
- LOG_J(LS_WARNING, this) << "Received send indication without permission"
- << "peer=" << peer_attr->GetAddress();
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Received send indication without permission"
+ " peer="
+ << peer_attr->GetAddress();
}
}
@@ -733,8 +738,8 @@
// Add this permission.
AddPermission(peer_attr->GetAddress().ipaddr());
- LOG_J(LS_INFO, this) << "Created permission, peer="
- << peer_attr->GetAddress();
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Created permission, peer=" << peer_attr->GetAddress();
// Send a success response.
TurnMessage response;
@@ -782,8 +787,9 @@
// Channel binds also refresh permissions.
AddPermission(peer_attr->GetAddress().ipaddr());
- LOG_J(LS_INFO, this) << "Bound channel, id=" << channel_id
- << ", peer=" << peer_attr->GetAddress();
+ RTC_LOG(LS_INFO) << ToString()
+ << ": Bound channel, id=" << channel_id
+ << ", peer=" << peer_attr->GetAddress();
// Send a success response.
TurnMessage response;
@@ -800,8 +806,9 @@
SendExternal(data + TURN_CHANNEL_HEADER_SIZE,
size - TURN_CHANNEL_HEADER_SIZE, channel->peer());
} else {
- LOG_J(LS_WARNING, this) << "Received channel data for invalid channel, id="
- << channel_id;
+ RTC_LOG(LS_WARNING) << ToString()
+ << ": Received channel data for invalid channel, id="
+ << channel_id;
}
}
@@ -832,8 +839,9 @@
rtc::MakeUnique<StunByteStringAttribute>(STUN_ATTR_DATA, data, size));
server_->SendStun(&conn_, &msg);
} else {
- LOG_J(LS_WARNING, this) << "Received external packet without permission, "
- << "peer=" << addr;
+ RTC_LOG(LS_WARNING)
+ << ToString()
+ << ": Received external packet without permission, peer=" << addr;
}
}
diff --git a/p2p/client/basicportallocator.cc b/p2p/client/basicportallocator.cc
index 01acf42..1b3947b 100644
--- a/p2p/client/basicportallocator.cc
+++ b/p2p/client/basicportallocator.cc
@@ -17,7 +17,6 @@
#include "api/umametrics.h"
#include "p2p/base/basicpacketsocketfactory.h"
-#include "p2p/base/common.h"
#include "p2p/base/port.h"
#include "p2p/base/relayport.h"
#include "p2p/base/stunport.h"
@@ -843,7 +842,8 @@
&BasicPortAllocatorSession::OnPortDestroyed);
port->SignalPortError.connect(
this, &BasicPortAllocatorSession::OnPortError);
- LOG_J(LS_INFO, port) << "Added port to allocator";
+ RTC_LOG(LS_INFO) << port->ToString()
+ << ": Added port to allocator";
if (prepare_address)
port->PrepareAddress();
@@ -860,7 +860,8 @@
RTC_DCHECK(rtc::Thread::Current() == network_thread_);
PortData* data = FindPort(port);
RTC_DCHECK(data != NULL);
- LOG_J(LS_INFO, port) << "Gathered candidate: " << c.ToSensitiveString();
+ RTC_LOG(LS_INFO) << port->ToString()
+ << ": Gathered candidate: " << c.ToSensitiveString();
// Discarding any candidate signal if port allocation status is
// already done with gathering.
if (!data->inprogress()) {
@@ -887,7 +888,7 @@
}
// If the current port is not pruned yet, SignalPortReady.
if (!data->pruned()) {
- LOG_J(LS_INFO, port) << "Port ready.";
+ RTC_LOG(LS_INFO) << port->ToString() << ": Port ready.";
SignalPortReady(this, port);
port->KeepAliveUntilPruned();
}
@@ -961,7 +962,8 @@
void BasicPortAllocatorSession::OnPortComplete(Port* port) {
RTC_DCHECK(rtc::Thread::Current() == network_thread_);
- LOG_J(LS_INFO, port) << "Port completed gathering candidates.";
+ RTC_LOG(LS_INFO) << port->ToString()
+ << ": Port completed gathering candidates.";
PortData* data = FindPort(port);
RTC_DCHECK(data != NULL);
@@ -978,7 +980,8 @@
void BasicPortAllocatorSession::OnPortError(Port* port) {
RTC_DCHECK(rtc::Thread::Current() == network_thread_);
- LOG_J(LS_INFO, port) << "Port encountered error while gathering candidates.";
+ RTC_LOG(LS_INFO) << port->ToString()
+ << ": Port encountered error while gathering candidates.";
PortData* data = FindPort(port);
RTC_DCHECK(data != NULL);
// We might have already given up on this port and stopped it.
@@ -1069,8 +1072,9 @@
iter != ports_.end(); ++iter) {
if (port == iter->port()) {
ports_.erase(iter);
- LOG_J(LS_INFO, port) << "Removed port from allocator ("
- << static_cast<int>(ports_.size()) << " remaining)";
+ RTC_LOG(LS_INFO) << port->ToString()
+ << ": Removed port from allocator ("
+ << static_cast<int>(ports_.size()) << " remaining)";
return;
}
}
@@ -1251,8 +1255,8 @@
const char* const PHASE_NAMES[kNumPhases] = {"Udp", "Relay", "Tcp"};
// Perform all of the phases in the current step.
- LOG_J(LS_INFO, network_) << "Allocation Phase="
- << PHASE_NAMES[phase_];
+ RTC_LOG(LS_INFO) << network_->ToString()
+ << ": Allocation Phase=" << PHASE_NAMES[phase_];
switch (phase_) {
case PHASE_UDP:
@@ -1324,7 +1328,7 @@
if (config_ && !config_->StunServers().empty()) {
RTC_LOG(LS_INFO)
<< "AllocationSequence: UDPPort will be handling the "
- << "STUN candidate generation.";
+ "STUN candidate generation.";
port->set_server_addresses(config_->StunServers());
}
}
@@ -1455,7 +1459,7 @@
if (server_ip_family != AF_UNSPEC && server_ip_family != local_ip_family) {
RTC_LOG(LS_INFO)
<< "Server and local address families are not compatible. "
- << "Server address: " << relay_port->address.ipaddr().ToString()
+ "Server address: " << relay_port->address.ipaddr().ToString()
<< " Local address: " << network_->GetBestIP().ToString();
continue;
}