Merge pull request #1 from sh4dak/master

Fixed Values
This commit is contained in:
Михаил Подивилов 2019-05-11 22:27:15 +03:00 committed by GitHub
commit 1548fedb82
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
7 changed files with 28 additions and 28 deletions

View file

@ -127,14 +127,14 @@ namespace client
for (auto& it: m_ClientTunnels)
{
LogPrint(eLogInfo, "Clients: stopping DOTNET client tunnel on port ", it.first);
LogPrint(eLogInfo, "Clients: stopping .NET client tunnel on port ", it.first);
it.second->Stop ();
}
m_ClientTunnels.clear ();
for (auto& it: m_ServerTunnels)
{
LogPrint(eLogInfo, "Clients: stopping DOTNET server tunnel");
LogPrint(eLogInfo, "Clients: stopping .NET server tunnel");
it.second->Stop ();
}
m_ServerTunnels.clear ();
@ -446,8 +446,8 @@ namespace client
}
}
LogPrint (eLogInfo, "Clients: ", numClientTunnels, " DOTNET client tunnels created");
LogPrint (eLogInfo, "Clients: ", numServerTunnels, " DOTNET server tunnels created");
LogPrint (eLogInfo, "Clients: ", numClientTunnels, " client tunnels created");
LogPrint (eLogInfo, "Clients: ", numServerTunnels, " server tunnels created");
}
@ -523,7 +523,7 @@ namespace client
clientTunnel->Start();
}
else
LogPrint(eLogError, "Clients: DOTNET Client forward for endpoint ", end, " already exists");
LogPrint(eLogError, "Clients: .NET Client forward for endpoint ", end, " already exists");
} else {
boost::asio::ip::tcp::endpoint clientEndpoint;
@ -563,7 +563,7 @@ namespace client
if(timeout)
{
clientTunnel->SetConnectTimeout(timeout);
LogPrint(eLogInfo, "Clients: DOTNET Client tunnel connect timeout set to ", timeout);
LogPrint(eLogInfo, "Clients: .NET Client tunnel connect timeout set to ", timeout);
}
auto ins = m_ClientTunnels.insert (std::make_pair (clientEndpoint, clientTunnel));
@ -577,11 +577,11 @@ namespace client
// TODO: update
if (ins.first->second->GetLocalDestination () != clientTunnel->GetLocalDestination ())
{
LogPrint (eLogInfo, "Clients: DOTNET client tunnel destination updated");
LogPrint (eLogInfo, "Clients: .NET client tunnel destination updated");
ins.first->second->SetLocalDestination (clientTunnel->GetLocalDestination ());
}
ins.first->second->isUpdated = true;
LogPrint (eLogInfo, "Clients: DOTNET client tunnel for endpoint ", clientEndpoint, " already exists");
LogPrint (eLogInfo, "Clients: .NET client tunnel for endpoint ", clientEndpoint, " already exists");
}
}
}
@ -637,10 +637,10 @@ namespace client
serverTunnel)).second)
{
serverTunnel->Start();
LogPrint(eLogInfo, "Clients: DOTNET Server Forward created for UDP Endpoint ", host, ":", port, " bound on ", address, " for ",localDestination->GetIdentHash().ToBase32());
LogPrint(eLogInfo, "Clients: .NET Server Forward created for UDP Endpoint ", host, ":", port, " bound on ", address, " for ",localDestination->GetIdentHash().ToBase32());
}
else
LogPrint(eLogError, "Clients: DOTNET Server Forward for destination/port ", m_AddressBook.ToAddress(localDestination->GetIdentHash()), "/", port, "already exists");
LogPrint(eLogError, "Clients: .NET Server Forward for destination/port ", m_AddressBook.ToAddress(localDestination->GetIdentHash()), "/", port, "already exists");
continue;
}
@ -687,11 +687,11 @@ namespace client
// TODO: update
if (ins.first->second->GetLocalDestination () != serverTunnel->GetLocalDestination ())
{
LogPrint (eLogInfo, "Clients: DOTNET server tunnel destination updated");
LogPrint (eLogInfo, "Clients: .NET server tunnel destination updated");
ins.first->second->SetLocalDestination (serverTunnel->GetLocalDestination ());
}
ins.first->second->isUpdated = true;
LogPrint (eLogInfo, "Clients: DOTNET server tunnel for destination/port ", m_AddressBook.ToAddress(localDestination->GetIdentHash ()), "/", inPort, " already exists");
LogPrint (eLogInfo, "Clients: .NET server tunnel for destination/port ", m_AddressBook.ToAddress(localDestination->GetIdentHash ()), "/", inPort, " already exists");
}
}

View file

@ -56,7 +56,7 @@ namespace client
virtual void Start () = 0;
virtual void Stop () = 0;
virtual const char* GetName() { return "Generic DOTNET Service"; }
virtual const char* GetName() { return "Generic .NET Service"; }
private:
void TriggerReadyCheckTimer();

View file

@ -338,7 +338,7 @@ namespace proxy {
}
}
}
/* check dest_host really exists and inside DOTNET network */
/* check dest_host really exists and inside .NET network */
if (str_rmatch(dest_host, ".dotnet")) {
if (!dotnet::client::context.GetAddressBook ().GetAddress (dest_host)) {
HostNotFound(dest_host);
@ -353,7 +353,7 @@ namespace proxy {
GenericProxyError("Outproxy failure", "bad outproxy settings");
} else {
LogPrint (eLogWarning, "HTTPProxy: outproxy failure for ", dest_host, ": no outproxy enabled");
std::string message = "Host " + dest_host + " not inside DOTNET network, but outproxy is not enabled";
std::string message = "Host " + dest_host + " not inside .NET network, but outproxy is not enabled";
GenericProxyError("Outproxy failure", message.c_str());
}
return true;

View file

@ -833,7 +833,7 @@ namespace client
{
LogPrint (eLogError, "SAM: socket write error: ", ecode.message ());
if (ecode != boost::asio::error::operation_aborted)
Terminate ("socket write error at HandleWriteDOTNETata");
Terminate ("socket write error at HandleWriteDotnetAta");
}
else
{
@ -845,7 +845,7 @@ namespace client
{
if (stream)
{
LogPrint (eLogDebug, "SAM: incoming DOTNET connection for session ", m_ID);
LogPrint (eLogDebug, "SAM: incoming .NET connection for session ", m_ID);
m_SocketType = eSAMSocketTypeStream;
m_IsAccepting = false;
m_Stream = stream;
@ -880,7 +880,7 @@ namespace client
DOTNETReceive ();
}
else
LogPrint (eLogWarning, "SAM: DOTNET acceptor has been reset");
LogPrint (eLogWarning, "SAM: .NET acceptor has been reset");
}
void SAMSocket::HandleDOTNETatagramReceive (const dotnet::data::IdentityEx& from, uint16_t fromPort, uint16_t toPort, const uint8_t * buf, size_t len)