From: Remi Gacogne Date: Tue, 30 Jul 2019 17:44:33 +0000 (+0200) Subject: dnsdist: Always use DNSName::toLogString() instead of ::toString() X-Git-Tag: dnsdist-1.4.0-rc1~7^2~1 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=348ef1c677a80483dd08e96713180a788cfb9fe9;p=pdns dnsdist: Always use DNSName::toLogString() instead of ::toString() --- diff --git a/pdns/dnsdist-tcp.cc b/pdns/dnsdist-tcp.cc index b250004d3..ef0132875 100644 --- a/pdns/dnsdist-tcp.cc +++ b/pdns/dnsdist-tcp.cc @@ -785,7 +785,7 @@ static void sendQueryToBackend(std::shared_ptr& stat return; } - vinfolog("Got query for %s|%s from %s (%s), relayed to %s", state->d_ids.qname.toString(), QType(state->d_ids.qtype).getName(), state->d_ci.remote.toStringWithPort(), (state->d_ci.cs->tlsFrontend ? "DoT" : "TCP"), ds->getName()); + vinfolog("Got query for %s|%s from %s (%s), relayed to %s", state->d_ids.qname.toLogString(), QType(state->d_ids.qtype).getName(), state->d_ci.remote.toStringWithPort(), (state->d_ci.cs->tlsFrontend ? "DoT" : "TCP"), ds->getName()); handleDownstreamIO(state, now); return; diff --git a/pdns/dnsdist.cc b/pdns/dnsdist.cc index bbef60979..359988cfe 100644 --- a/pdns/dnsdist.cc +++ b/pdns/dnsdist.cc @@ -1040,7 +1040,7 @@ static bool applyRulesToQuery(LocalHolders& holders, DNSQuestion& dq, string& po g_rings.insertQuery(now, *dq.remote, *dq.qname, dq.qtype, dq.len, *dq.dh); if(g_qcount.enabled) { - string qname = (*dq.qname).toString("."); + string qname = (*dq.qname).toLogString(); bool countQuery{true}; if(g_qcount.filter) { std::lock_guard lock(g_luamutex); @@ -1097,7 +1097,7 @@ static bool applyRulesToQuery(LocalHolders& holders, DNSQuestion& dq, string& po return true; } else { - vinfolog("Query from %s for %s over TCP *not* truncated because of dynamic block", dq.remote->toStringWithPort(), dq.qname->toString()); + vinfolog("Query from %s for %s over TCP *not* truncated because of dynamic block", dq.remote->toStringWithPort(), dq.qname->toLogString()); } break; case DNSAction::Action::NoRecurse: @@ -1129,14 +1129,14 @@ static bool applyRulesToQuery(LocalHolders& holders, DNSQuestion& dq, string& po /* do nothing */ break; case DNSAction::Action::Nxdomain: - vinfolog("Query from %s for %s turned into NXDomain because of dynamic block", dq.remote->toStringWithPort(), dq.qname->toString()); + vinfolog("Query from %s for %s turned into NXDomain because of dynamic block", dq.remote->toStringWithPort(), dq.qname->toLogString()); updateBlockStats(); dq.dh->rcode = RCode::NXDomain; dq.dh->qr=true; return true; case DNSAction::Action::Refused: - vinfolog("Query from %s for %s refused because of dynamic block", dq.remote->toStringWithPort(), dq.qname->toString()); + vinfolog("Query from %s for %s refused because of dynamic block", dq.remote->toStringWithPort(), dq.qname->toLogString()); updateBlockStats(); dq.dh->rcode = RCode::Refused; @@ -1146,13 +1146,13 @@ static bool applyRulesToQuery(LocalHolders& holders, DNSQuestion& dq, string& po if(!dq.tcp) { updateBlockStats(); - vinfolog("Query from %s for %s truncated because of dynamic block", dq.remote->toStringWithPort(), dq.qname->toString()); + vinfolog("Query from %s for %s truncated because of dynamic block", dq.remote->toStringWithPort(), dq.qname->toLogString()); dq.dh->tc = true; dq.dh->qr = true; return true; } else { - vinfolog("Query from %s for %s over TCP *not* truncated because of dynamic block", dq.remote->toStringWithPort(), dq.qname->toString()); + vinfolog("Query from %s for %s over TCP *not* truncated because of dynamic block", dq.remote->toStringWithPort(), dq.qname->toLogString()); } break; case DNSAction::Action::NoRecurse: @@ -1162,7 +1162,7 @@ static bool applyRulesToQuery(LocalHolders& holders, DNSQuestion& dq, string& po return true; default: updateBlockStats(); - vinfolog("Query from %s for %s dropped because of dynamic block", dq.remote->toStringWithPort(), dq.qname->toString()); + vinfolog("Query from %s for %s dropped because of dynamic block", dq.remote->toStringWithPort(), dq.qname->toLogString()); return false; } } @@ -1494,7 +1494,7 @@ ProcessQueryResult processQuery(DNSQuestion& dq, ClientState& cs, LocalHolders& if(!selectedBackend) { ++g_stats.noPolicy; - vinfolog("%s query for %s|%s from %s, no policy applied", g_servFailOnNoPolicy ? "ServFailed" : "Dropped", dq.qname->toString(), QType(dq.qtype).getName(), dq.remote->toStringWithPort()); + vinfolog("%s query for %s|%s from %s, no policy applied", g_servFailOnNoPolicy ? "ServFailed" : "Dropped", dq.qname->toLogString(), QType(dq.qtype).getName(), dq.remote->toStringWithPort()); if (g_servFailOnNoPolicy) { restoreFlags(dq.dh, dq.origFlags); @@ -1643,7 +1643,7 @@ static void processUDPQuery(ClientState& cs, LocalHolders& holders, const struct ++g_stats.downstreamSendErrors; } - vinfolog("Got query for %s|%s from %s, relayed to %s", ids->qname.toString(), QType(ids->qtype).getName(), remote.toStringWithPort(), ss->getName()); + vinfolog("Got query for %s|%s from %s, relayed to %s", ids->qname.toLogString(), QType(ids->qtype).getName(), remote.toStringWithPort(), ss->getName()); } catch(const std::exception& e){ vinfolog("Got an error in UDP question thread while parsing a query from %s, id %d: %s", remote.toStringWithPort(), queryId, e.what()); @@ -2113,7 +2113,7 @@ static void healthChecksThread() ++g_stats.downstreamTimeouts; // this is an 'actively' discovered timeout vinfolog("Had a downstream timeout from %s (%s) for query for %s|%s from %s", dss->remote.toStringWithPort(), dss->name, - ids.qname.toString(), QType(ids.qtype).getName(), ids.origRemote.toStringWithPort()); + ids.qname.toLogString(), QType(ids.qtype).getName(), ids.origRemote.toStringWithPort()); struct timespec ts; gettime(&ts);