diff options
| author | Amiti Uttarwar <[email protected]> | 2020-08-10 18:30:04 -0700 |
|---|---|---|
| committer | Amiti Uttarwar <[email protected]> | 2020-09-21 19:01:29 -0700 |
| commit | 49c10a9ca40967d28ae16dfea9cccc6f3a6624a1 (patch) | |
| tree | 46b2eb17cde91c46c4d17c56ab6251fa46d9744f /src/net_processing.cpp | |
| parent | Merge #17785: p2p: Unify Send and Receive protocol versions (diff) | |
| download | discoin-49c10a9ca40967d28ae16dfea9cccc6f3a6624a1.tar.xz discoin-49c10a9ca40967d28ae16dfea9cccc6f3a6624a1.zip | |
[log] Add connection type to log statement
In addition to adding more specificity to the log statement about the type of
connection, this change also consolidates two statements into one. Previously,
the second one should have never been hit, since block-relay connections would
match the "!IsInboundConn()" condition and return early.
Diffstat (limited to 'src/net_processing.cpp')
| -rw-r--r-- | src/net_processing.cpp | 6 |
1 files changed, 1 insertions, 5 deletions
diff --git a/src/net_processing.cpp b/src/net_processing.cpp index 690b59476..859b67755 100644 --- a/src/net_processing.cpp +++ b/src/net_processing.cpp @@ -3521,11 +3521,7 @@ void PeerManager::ProcessMessage(CNode& pfrom, const std::string& msg_type, CDat // Making nodes which are behind NAT and can only make outgoing connections ignore // the getaddr message mitigates the attack. if (!pfrom.IsInboundConn()) { - LogPrint(BCLog::NET, "Ignoring \"getaddr\" from outbound connection. peer=%d\n", pfrom.GetId()); - return; - } - if (!pfrom.RelayAddrsWithConn()) { - LogPrint(BCLog::NET, "Ignoring \"getaddr\" from block-relay-only connection. peer=%d\n", pfrom.GetId()); + LogPrint(BCLog::NET, "Ignoring \"getaddr\" from %s connection. peer=%d\n", pfrom.ConnectionTypeAsString(), pfrom.GetId()); return; } |