summaryrefslogtreecommitdiff
path: root/src/components/protocol_handler
diff options
context:
space:
mode:
Diffstat (limited to 'src/components/protocol_handler')
-rw-r--r--src/components/protocol_handler/src/handshake_handler.cc32
-rw-r--r--src/components/protocol_handler/src/incoming_data_handler.cc66
-rw-r--r--src/components/protocol_handler/src/multiframe_builder.cc121
-rw-r--r--src/components/protocol_handler/src/protocol_handler_impl.cc635
-rw-r--r--src/components/protocol_handler/src/protocol_packet.cc99
-rw-r--r--src/components/protocol_handler/src/service_status_update_handler.cc9
6 files changed, 429 insertions, 533 deletions
diff --git a/src/components/protocol_handler/src/handshake_handler.cc b/src/components/protocol_handler/src/handshake_handler.cc
index 3b4ae6ef1f..e804fdaa08 100644
--- a/src/components/protocol_handler/src/handshake_handler.cc
+++ b/src/components/protocol_handler/src/handshake_handler.cc
@@ -42,7 +42,7 @@
namespace protocol_handler {
-CREATE_LOGGERPTR_GLOBAL(logger_, "ProtocolHandler")
+SDL_CREATE_LOG_VARIABLE("ProtocolHandler")
HandshakeHandler::HandshakeHandler(
ProtocolHandlerImpl& protocol_handler,
@@ -61,7 +61,7 @@ HandshakeHandler::HandshakeHandler(
, service_status_update_handler_(service_status_update_handler) {}
HandshakeHandler::~HandshakeHandler() {
- LOG4CXX_DEBUG(logger_, "Destroying of HandshakeHandler: " << this);
+ SDL_LOG_DEBUG("Destroying of HandshakeHandler: " << this);
}
uint32_t HandshakeHandler::connection_key() const {
@@ -79,12 +79,12 @@ bool HandshakeHandler::GetPolicyCertificateData(std::string& data) const {
}
void HandshakeHandler::OnCertificateUpdateRequired() {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
}
#if defined(EXTERNAL_PROPRIETARY_MODE) && defined(ENABLE_SECURITY)
bool HandshakeHandler::OnCertDecryptFailed() {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
if (payload_) {
ProcessFailedHandshake(*payload_, ServiceStatus::CERT_INVALID);
}
@@ -94,7 +94,7 @@ bool HandshakeHandler::OnCertDecryptFailed() {
#endif
bool HandshakeHandler::OnGetSystemTimeFailed() {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
if (payload_) {
ProcessFailedHandshake(*payload_, ServiceStatus::INVALID_TIME);
@@ -109,7 +109,7 @@ bool HandshakeHandler::OnGetSystemTimeFailed() {
}
bool HandshakeHandler::OnPTUFailed() {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
if (payload_) {
ProcessFailedHandshake(*payload_, ServiceStatus::PTU_FAILED);
}
@@ -120,14 +120,12 @@ bool HandshakeHandler::OnPTUFailed() {
bool HandshakeHandler::OnHandshakeDone(
uint32_t connection_key,
security_manager::SSLContext::HandshakeResult result) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
- LOG4CXX_DEBUG(logger_,
- "OnHandshakeDone for service : " << context_.service_type_);
+ SDL_LOG_DEBUG("OnHandshakeDone for service : " << context_.service_type_);
if (connection_key != this->primary_connection_key()) {
- LOG4CXX_DEBUG(logger_,
- "Listener " << this
+ SDL_LOG_DEBUG("Listener " << this
<< " expects notification for connection id: "
<< this->primary_connection_key()
<< ". Received notification for connection id "
@@ -172,14 +170,13 @@ bool HandshakeHandler::IsAlreadyProtected() const {
void HandshakeHandler::ProcessSuccessfulHandshake(const uint32_t connection_key,
BsonObject& params) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
const bool is_service_already_protected = IsAlreadyProtected();
const bool can_be_protected = CanBeProtected();
- LOG4CXX_DEBUG(logger_,
- "Service can be protected: " << can_be_protected
+ SDL_LOG_DEBUG("Service can be protected: " << can_be_protected
<< " and service was protected: "
<< is_service_already_protected);
@@ -211,8 +208,8 @@ void HandshakeHandler::ProcessSuccessfulHandshake(const uint32_t connection_key,
void HandshakeHandler::ProcessFailedHandshake(BsonObject& params,
ServiceStatus service_status) {
- LOG4CXX_AUTO_TRACE(logger_);
- LOG4CXX_DEBUG(logger_, "Handshake failed");
+ SDL_LOG_AUTO_TRACE();
+ SDL_LOG_DEBUG("Handshake failed");
const std::vector<int>& force_protected =
protocol_handler_.get_settings().force_protected_service();
@@ -221,8 +218,7 @@ void HandshakeHandler::ProcessFailedHandshake(BsonObject& params,
force_protected.end(),
context_.service_type_) == force_protected.end();
- LOG4CXX_DEBUG(logger_,
- "Service can be unprotected: " << can_be_unprotected
+ SDL_LOG_DEBUG("Service can be unprotected: " << can_be_unprotected
<< " and this is a new service: "
<< context_.is_new_service_);
diff --git a/src/components/protocol_handler/src/incoming_data_handler.cc b/src/components/protocol_handler/src/incoming_data_handler.cc
index 498618d6de..f0692b3304 100644
--- a/src/components/protocol_handler/src/incoming_data_handler.cc
+++ b/src/components/protocol_handler/src/incoming_data_handler.cc
@@ -35,7 +35,7 @@
namespace protocol_handler {
-CREATE_LOGGERPTR_GLOBAL(logger_, "ProtocolHandler")
+SDL_CREATE_LOG_VARIABLE("ProtocolHandler")
IncomingDataHandler::IncomingDataHandler()
: header_(), validator_(NULL), last_portion_of_data_was_malformed_(false) {}
@@ -52,48 +52,43 @@ ProtocolFramePtrList IncomingDataHandler::ProcessData(
const RawMessage& tm_message,
RESULT_CODE& out_result,
size_t* malformed_occurrence) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
DCHECK(malformed_occurrence);
const transport_manager::ConnectionUID connection_id =
tm_message.connection_key();
const uint8_t* data = tm_message.data();
const size_t tm_message_size = tm_message.data_size();
if (tm_message_size == 0 || data == NULL) {
- LOG4CXX_WARN(logger_, "Wrong raw message " << tm_message_size << " bytes");
+ SDL_LOG_WARN("Wrong raw message " << tm_message_size << " bytes");
out_result = RESULT_FAIL;
return ProtocolFramePtrList();
}
- LOG4CXX_INFO(logger_,
- "Processing incoming data of size "
- << tm_message_size << " for connection " << connection_id);
+ SDL_LOG_INFO("Processing incoming data of size "
+ << tm_message_size << " for connection " << connection_id);
ConnectionsDataMap::iterator it = connections_data_.find(connection_id);
if (connections_data_.end() == it) {
- LOG4CXX_WARN(logger_, "ProcessData requested for unknown connection");
+ SDL_LOG_WARN("ProcessData requested for unknown connection");
out_result = RESULT_FAIL;
return ProtocolFramePtrList();
}
std::vector<uint8_t>& connection_data = it->second;
connection_data.insert(connection_data.end(), data, data + tm_message_size);
- LOG4CXX_DEBUG(logger_,
- "Total data size for connection " << connection_id << " is "
+ SDL_LOG_DEBUG("Total data size for connection " << connection_id << " is "
<< connection_data.size());
ProtocolFramePtrList out_frames;
*malformed_occurrence = 0;
out_result = CreateFrame(
connection_data, out_frames, *malformed_occurrence, connection_id);
- LOG4CXX_DEBUG(logger_,
- "New data size for connection " << connection_id << " is "
+ SDL_LOG_DEBUG("New data size for connection " << connection_id << " is "
<< connection_data.size());
if (!out_frames.empty()) {
- LOG4CXX_INFO(logger_,
- "Created and passed " << out_frames.size() << " packets");
+ SDL_LOG_INFO("Created and passed " << out_frames.size() << " packets");
} else {
if (RESULT_DEFERRED == out_result) {
- LOG4CXX_DEBUG(
- logger_,
+ SDL_LOG_DEBUG(
"No packets have been created. Waiting next portion of data.");
} else {
- LOG4CXX_WARN(logger_, "No packets have been created.");
+ SDL_LOG_WARN("No packets have been created.");
}
}
if (*malformed_occurrence > 0u || last_portion_of_data_was_malformed_) {
@@ -106,14 +101,14 @@ ProtocolFramePtrList IncomingDataHandler::ProcessData(
void IncomingDataHandler::AddConnection(
const transport_manager::ConnectionUID connection_id) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
// Add empty list of session to new connection
connections_data_[connection_id] = ConnectionsDataMap::mapped_type();
}
void IncomingDataHandler::RemoveConnection(
const transport_manager::ConnectionUID connection_id) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
connections_data_.erase(connection_id);
}
@@ -128,8 +123,7 @@ uint32_t IncomingDataHandler::GetPacketSize(
case PROTOCOL_VERSION_5:
return header.dataSize + PROTOCOL_HEADER_V2_SIZE;
default:
- LOG4CXX_WARN(logger_,
- "Unknown version: " << static_cast<int>(header.version));
+ SDL_LOG_WARN("Unknown version: " << static_cast<int>(header.version));
break;
}
return 0u;
@@ -140,7 +134,7 @@ RESULT_CODE IncomingDataHandler::CreateFrame(
ProtocolFramePtrList& out_frames,
size_t& malformed_occurrence,
const transport_manager::ConnectionUID connection_id) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
std::vector<uint8_t>::iterator data_it = incoming_data.begin();
size_t data_size = incoming_data.size();
@@ -150,51 +144,47 @@ RESULT_CODE IncomingDataHandler::CreateFrame(
validator_ ? validator_->validate(header_) : RESULT_OK;
if (validate_result != RESULT_OK) {
- LOG4CXX_WARN(logger_, "Packet validation failed");
+ SDL_LOG_WARN("Packet validation failed");
if (!last_portion_of_data_was_malformed_) {
++malformed_occurrence;
- LOG4CXX_DEBUG(logger_,
- "Malformed message found " << malformed_occurrence);
+ SDL_LOG_DEBUG("Malformed message found " << malformed_occurrence);
}
last_portion_of_data_was_malformed_ = true;
++data_it;
--data_size;
- LOG4CXX_DEBUG(logger_,
- "Moved to the next byte "
- << std::hex << static_cast<const void*>(&*data_it));
+ SDL_LOG_DEBUG("Moved to the next byte "
+ << std::hex << static_cast<const void*>(&*data_it));
continue;
}
- LOG4CXX_DEBUG(logger_, "Payload size " << header_.dataSize);
+ SDL_LOG_DEBUG("Payload size " << header_.dataSize);
const uint32_t packet_size = GetPacketSize(header_);
if (packet_size <= 0) {
- LOG4CXX_WARN(logger_, "Null packet size");
+ SDL_LOG_WARN("Null packet size");
++data_it;
--data_size;
- LOG4CXX_DEBUG(logger_,
- "Moved to the next byte "
- << std::hex << static_cast<const void*>(&*data_it));
+ SDL_LOG_DEBUG("Moved to the next byte "
+ << std::hex << static_cast<const void*>(&*data_it));
continue;
}
if (data_size < packet_size) {
- LOG4CXX_DEBUG(logger_, "Packet data is not available yet");
+ SDL_LOG_DEBUG("Packet data is not available yet");
incoming_data.erase(incoming_data.begin(), data_it);
return RESULT_DEFERRED;
}
ProtocolFramePtr frame(new protocol_handler::ProtocolPacket(connection_id));
const RESULT_CODE deserialize_result =
frame->deserializePacket(&*data_it, packet_size);
- LOG4CXX_DEBUG(logger_, "Deserialized frame " << frame);
+ SDL_LOG_DEBUG("Deserialized frame " << frame);
if (deserialize_result != RESULT_OK) {
- LOG4CXX_WARN(logger_, "Packet deserialization failed");
+ SDL_LOG_WARN("Packet deserialization failed");
incoming_data.erase(incoming_data.begin(), data_it);
return RESULT_FAIL;
}
out_frames.push_back(frame);
last_portion_of_data_was_malformed_ = false;
- LOG4CXX_DEBUG(logger_,
- "Frame added. "
- << "Connection ID " << connection_id);
+ SDL_LOG_DEBUG("Frame added. "
+ << "Connection ID " << connection_id);
data_it += packet_size;
data_size -= packet_size;
diff --git a/src/components/protocol_handler/src/multiframe_builder.cc b/src/components/protocol_handler/src/multiframe_builder.cc
index fbfc061490..69e39beaa2 100644
--- a/src/components/protocol_handler/src/multiframe_builder.cc
+++ b/src/components/protocol_handler/src/multiframe_builder.cc
@@ -41,7 +41,7 @@
namespace protocol_handler {
-CREATE_LOGGERPTR_GLOBAL(logger_, "ProtocolHandler")
+SDL_CREATE_LOG_VARIABLE("ProtocolHandler")
MultiFrameBuilder::MultiFrameBuilder() : consecutive_frame_wait_msecs_(0u) {}
@@ -50,19 +50,18 @@ void MultiFrameBuilder::set_waiting_timeout(
consecutive_frame_wait_msecs_ =
static_cast<int64_t>(consecutive_frame_wait_msecs);
if (consecutive_frame_wait_msecs == 0) {
- LOG4CXX_WARN(logger_, "Waiting timout disabled");
+ SDL_LOG_WARN("Waiting timout disabled");
} else {
- LOG4CXX_DEBUG(logger_,
- "Waiting time in msec: " << consecutive_frame_wait_msecs_);
+ SDL_LOG_DEBUG("Waiting time in msec: " << consecutive_frame_wait_msecs_);
}
}
bool MultiFrameBuilder::AddConnection(const ConnectionID connection_id) {
- LOG4CXX_DEBUG(logger_, "Adding connection_id: " << connection_id);
- LOG4CXX_DEBUG(logger_, "Current state is: " << multiframes_map_);
+ SDL_LOG_DEBUG("Adding connection_id: " << connection_id);
+ SDL_LOG_DEBUG("Current state is: " << multiframes_map_);
const MultiFrameMap::const_iterator it = multiframes_map_.find(connection_id);
if (it != multiframes_map_.end()) {
- LOG4CXX_ERROR(logger_, "Exists connection_id: " << connection_id);
+ SDL_LOG_ERROR("Exists connection_id: " << connection_id);
return false;
}
multiframes_map_[connection_id] = SessionToFrameMap();
@@ -70,18 +69,17 @@ bool MultiFrameBuilder::AddConnection(const ConnectionID connection_id) {
}
bool MultiFrameBuilder::RemoveConnection(const ConnectionID connection_id) {
- LOG4CXX_DEBUG(logger_, "Removing connection_id: " << connection_id);
- LOG4CXX_DEBUG(logger_, "Current state is: " << multiframes_map_);
+ SDL_LOG_DEBUG("Removing connection_id: " << connection_id);
+ SDL_LOG_DEBUG("Current state is: " << multiframes_map_);
const MultiFrameMap::iterator it = multiframes_map_.find(connection_id);
if (it == multiframes_map_.end()) {
- LOG4CXX_ERROR(logger_, "Non-existent connection_id: " << connection_id);
+ SDL_LOG_ERROR("Non-existent connection_id: " << connection_id);
return false;
}
const SessionToFrameMap& session_to_frame_map = it->second;
if (!session_to_frame_map.empty()) {
// FIXME(EZamakhov): Ask ReqManager - do we need to send GenericError
- LOG4CXX_WARN(logger_,
- "For connection_id: " << connection_id
+ SDL_LOG_WARN("For connection_id: " << connection_id
<< " waiting: " << multiframes_map_);
}
multiframes_map_.erase(it);
@@ -89,45 +87,43 @@ bool MultiFrameBuilder::RemoveConnection(const ConnectionID connection_id) {
}
ProtocolFramePtrList MultiFrameBuilder::PopMultiframes() {
- LOG4CXX_AUTO_TRACE(logger_);
- LOG4CXX_DEBUG(logger_, "Current state is: " << multiframes_map_);
- LOG4CXX_DEBUG(logger_,
- "Current multiframe map size is: " << multiframes_map_.size());
+ SDL_LOG_AUTO_TRACE();
+ SDL_LOG_DEBUG("Current state is: " << multiframes_map_);
+ SDL_LOG_DEBUG("Current multiframe map size is: " << multiframes_map_.size());
ProtocolFramePtrList outpute_frame_list;
for (MultiFrameMap::iterator connection_it = multiframes_map_.begin();
connection_it != multiframes_map_.end();
++connection_it) {
- LOG4CXX_TRACE(logger_, "Step over connection: " << connection_it->first);
+ SDL_LOG_TRACE("Step over connection: " << connection_it->first);
SessionToFrameMap& session_map = connection_it->second;
for (SessionToFrameMap::iterator session_it = session_map.begin();
session_it != session_map.end();
++session_it) {
- LOG4CXX_TRACE(
- logger_,
+ SDL_LOG_TRACE(
"Step over session: " << static_cast<int>(session_it->first));
MessageIDToFrameMap& messageId_map = session_it->second;
MessageIDToFrameMap::iterator messageId_it = messageId_map.begin();
while (messageId_it != messageId_map.end()) {
- LOG4CXX_TRACE(logger_, "Step over messageId: " << messageId_it->first);
+ SDL_LOG_TRACE("Step over messageId: " << messageId_it->first);
ProtocolFrameData& frame_data = messageId_it->second;
ProtocolFramePtr frame = frame_data.frame;
if (frame && frame->frame_data() == FRAME_DATA_LAST_CONSECUTIVE &&
frame->payload_size() > 0u) {
- LOG4CXX_DEBUG(logger_, "Ready frame: " << frame);
+ SDL_LOG_DEBUG("Ready frame: " << frame);
outpute_frame_list.push_back(frame);
messageId_map.erase(messageId_it++);
continue;
}
if (consecutive_frame_wait_msecs_ != 0) {
- LOG4CXX_TRACE(logger_, "Expiration verification");
+ SDL_LOG_TRACE("Expiration verification");
const int64_t time_left =
date_time::calculateTimeSpan(frame_data.append_time);
- LOG4CXX_DEBUG(logger_, "mSecs left: " << time_left);
+ SDL_LOG_DEBUG("mSecs left: " << time_left);
if (time_left >= consecutive_frame_wait_msecs_) {
- LOG4CXX_WARN(logger_, "Expired frame: " << frame);
+ SDL_LOG_WARN("Expired frame: " << frame);
outpute_frame_list.push_back(frame);
messageId_map.erase(messageId_it++);
continue;
@@ -137,27 +133,27 @@ ProtocolFramePtrList MultiFrameBuilder::PopMultiframes() {
} // iteration over messageId_map
} // iteration over session_map
} // iteration over multiframes_map_
- LOG4CXX_DEBUG(logger_, "Result frames count: " << outpute_frame_list.size());
+ SDL_LOG_DEBUG("Result frames count: " << outpute_frame_list.size());
return outpute_frame_list;
}
RESULT_CODE MultiFrameBuilder::AddFrame(const ProtocolFramePtr packet) {
- LOG4CXX_AUTO_TRACE(logger_);
- LOG4CXX_DEBUG(logger_, "Handling frame: " << packet);
- LOG4CXX_DEBUG(logger_, "Current state is: " << multiframes_map_);
+ SDL_LOG_AUTO_TRACE();
+ SDL_LOG_DEBUG("Handling frame: " << packet);
+ SDL_LOG_DEBUG("Current state is: " << multiframes_map_);
if (!packet) {
- LOG4CXX_ERROR(logger_, "Skip empty frame");
+ SDL_LOG_ERROR("Skip empty frame");
return RESULT_FAIL;
}
switch (packet->frame_type()) {
case FRAME_TYPE_FIRST:
- LOG4CXX_TRACE(logger_, "FRAME_TYPE_FIRST");
+ SDL_LOG_TRACE("FRAME_TYPE_FIRST");
return HandleFirstFrame(packet);
case FRAME_TYPE_CONSECUTIVE:
- LOG4CXX_TRACE(logger_, "FRAME_TYPE_CONSECUTIVE");
+ SDL_LOG_TRACE("FRAME_TYPE_CONSECUTIVE");
return HandleConsecutiveFrame(packet);
default:
- LOG4CXX_ERROR(logger_, "Frame is not FIRST or CONSECUTIVE :" << packet);
+ SDL_LOG_ERROR("Frame is not FIRST or CONSECUTIVE :" << packet);
break;
}
return RESULT_FAIL;
@@ -165,17 +161,17 @@ RESULT_CODE MultiFrameBuilder::AddFrame(const ProtocolFramePtr packet) {
RESULT_CODE MultiFrameBuilder::HandleFirstFrame(const ProtocolFramePtr packet) {
DCHECK_OR_RETURN(packet->frame_type() == FRAME_TYPE_FIRST, RESULT_FAIL);
- LOG4CXX_DEBUG(logger_, "Waiting : " << multiframes_map_);
- LOG4CXX_DEBUG(logger_, "Handling FIRST frame: " << packet);
+ SDL_LOG_DEBUG("Waiting : " << multiframes_map_);
+ SDL_LOG_DEBUG("Handling FIRST frame: " << packet);
if (packet->payload_size() != 0u) {
- LOG4CXX_ERROR(logger_, "First frame shall have no data:" << packet);
+ SDL_LOG_ERROR("First frame shall have no data:" << packet);
return RESULT_FAIL;
}
const ConnectionID connection_id = packet->connection_id();
MultiFrameMap::iterator connection_it = multiframes_map_.find(connection_id);
if (connection_it == multiframes_map_.end()) {
- LOG4CXX_ERROR(logger_, "Unknown connection_id: " << connection_id);
+ SDL_LOG_ERROR("Unknown connection_id: " << connection_id);
return RESULT_FAIL;
}
SessionToFrameMap& session_map = connection_it->second;
@@ -187,19 +183,17 @@ RESULT_CODE MultiFrameBuilder::HandleFirstFrame(const ProtocolFramePtr packet) {
const MessageID message_id = packet->message_id();
MessageIDToFrameMap::iterator messageId_it = messageId_map.find(message_id);
if (messageId_it != messageId_map.end()) {
- LOG4CXX_ERROR(logger_,
- "Already waiting message for connection_id: "
- << connection_id
- << ", session_id: " << static_cast<int>(session_id)
- << ", message_id: " << message_id);
+ SDL_LOG_ERROR("Already waiting message for connection_id: "
+ << connection_id
+ << ", session_id: " << static_cast<int>(session_id)
+ << ", message_id: " << message_id);
return RESULT_FAIL;
}
- LOG4CXX_DEBUG(logger_,
- "Start waiting frames for connection_id: "
- << connection_id
- << ", session_id: " << static_cast<int>(session_id)
- << ", message_id: " << message_id);
+ SDL_LOG_DEBUG("Start waiting frames for connection_id: "
+ << connection_id
+ << ", session_id: " << static_cast<int>(session_id)
+ << ", message_id: " << message_id);
messageId_map[message_id] = {packet, date_time::getCurrentTime()};
return RESULT_OK;
}
@@ -207,12 +201,12 @@ RESULT_CODE MultiFrameBuilder::HandleFirstFrame(const ProtocolFramePtr packet) {
RESULT_CODE MultiFrameBuilder::HandleConsecutiveFrame(
const ProtocolFramePtr packet) {
DCHECK_OR_RETURN(packet->frame_type() == FRAME_TYPE_CONSECUTIVE, RESULT_FAIL);
- LOG4CXX_DEBUG(logger_, "Handling CONSECUTIVE frame: " << packet);
+ SDL_LOG_DEBUG("Handling CONSECUTIVE frame: " << packet);
const ConnectionID connection_id = packet->connection_id();
MultiFrameMap::iterator connection_it = multiframes_map_.find(connection_id);
if (connection_it == multiframes_map_.end()) {
- LOG4CXX_ERROR(logger_, "Unknown connection_id: " << connection_id);
+ SDL_LOG_ERROR("Unknown connection_id: " << connection_id);
return RESULT_FAIL;
}
SessionToFrameMap& session_map = connection_it->second;
@@ -224,11 +218,10 @@ RESULT_CODE MultiFrameBuilder::HandleConsecutiveFrame(
const MessageID message_id = packet->message_id();
MessageIDToFrameMap::iterator messageId_it = messageId_map.find(message_id);
if (messageId_it == messageId_map.end()) {
- LOG4CXX_ERROR(logger_,
- "No waiting message for connection_id: "
- << connection_id
- << ", session_id: " << static_cast<int>(session_id)
- << ", message_id: " << message_id);
+ SDL_LOG_ERROR("No waiting message for connection_id: "
+ << connection_id
+ << ", session_id: " << static_cast<int>(session_id)
+ << ", message_id: " << message_id);
return RESULT_FAIL;
}
@@ -243,7 +236,7 @@ RESULT_CODE MultiFrameBuilder::HandleConsecutiveFrame(
if (is_last_consecutive) {
// TODO(EZamakhov): implement count of frames and result size verification
- LOG4CXX_DEBUG(logger_, "Last CONSECUTIVE frame");
+ SDL_LOG_DEBUG("Last CONSECUTIVE frame");
} else {
uint8_t previous_frame_data = assembling_frame->frame_data();
if (previous_frame_data == std::numeric_limits<uint8_t>::max()) {
@@ -251,12 +244,10 @@ RESULT_CODE MultiFrameBuilder::HandleConsecutiveFrame(
}
// The next frame data is bigger at 1
if (new_frame_data != (previous_frame_data + 1)) {
- LOG4CXX_ERROR(logger_,
- "Unexpected CONSECUTIVE frame for connection_id: "
- << connection_id
- << ", session_id: " << static_cast<int>(session_id)
- << ", message_id: " << message_id
- << ", frame: " << packet);
+ SDL_LOG_ERROR("Unexpected CONSECUTIVE frame for connection_id: "
+ << connection_id
+ << ", session_id: " << static_cast<int>(session_id)
+ << ", message_id: " << message_id << ", frame: " << packet);
return RESULT_FAIL;
}
}
@@ -268,8 +259,7 @@ RESULT_CODE MultiFrameBuilder::HandleConsecutiveFrame(
assembling_frame->set_frame_data(new_frame_data);
- LOG4CXX_DEBUG(logger_,
- "Appending " << packet->data_size() << " bytes "
+ SDL_LOG_DEBUG("Appending " << packet->data_size() << " bytes "
<< "; frame_data "
<< static_cast<int>(new_frame_data)
<< "; for connection_id: " << connection_id
@@ -278,12 +268,11 @@ RESULT_CODE MultiFrameBuilder::HandleConsecutiveFrame(
if (assembling_frame->appendData(packet->data(), packet->data_size()) !=
RESULT_OK) {
- LOG4CXX_ERROR(logger_, "Failed to append frame for multiframe message.");
+ SDL_LOG_ERROR("Failed to append frame for multiframe message.");
return RESULT_FAIL;
}
- LOG4CXX_INFO(logger_,
- "Assembled frame with payload size: "
- << assembling_frame->payload_size());
+ SDL_LOG_INFO("Assembled frame with payload size: "
+ << assembling_frame->payload_size());
frame_data.append_time = date_time::getCurrentTime();
return RESULT_OK;
}
diff --git a/src/components/protocol_handler/src/protocol_handler_impl.cc b/src/components/protocol_handler/src/protocol_handler_impl.cc
index 9b7305d48a..1f41ab38a3 100644
--- a/src/components/protocol_handler/src/protocol_handler_impl.cc
+++ b/src/components/protocol_handler/src/protocol_handler_impl.cc
@@ -50,7 +50,7 @@
namespace protocol_handler {
-CREATE_LOGGERPTR_GLOBAL(logger_, "ProtocolHandler")
+SDL_CREATE_LOG_VARIABLE("ProtocolHandler")
/**
* Function return packet data as std::string.
@@ -93,7 +93,7 @@ ProtocolHandlerImpl::ProtocolHandlerImpl(
#endif // TELEMETRY_MONITOR
{
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
protocol_header_validator_.set_max_payload_size(
get_settings().maximum_payload_size());
protocol_header_validator_.set_max_control_payload_size(
@@ -115,12 +115,11 @@ ProtocolHandlerImpl::ProtocolHandlerImpl(
if (message_frequency_time > 0u && message_frequency_count > 0u) {
message_meter_.set_time_range(message_frequency_time);
- LOG4CXX_DEBUG(logger_,
- "Frequency meter is enabled ( "
- << message_frequency_count << " per "
- << message_frequency_time << " mSecond)");
+ SDL_LOG_DEBUG("Frequency meter is enabled ( "
+ << message_frequency_count << " per "
+ << message_frequency_time << " mSecond)");
} else {
- LOG4CXX_WARN(logger_, "Frequency meter is disabled");
+ SDL_LOG_WARN("Frequency meter is disabled");
}
const size_t& malformed_frequency_time =
@@ -131,18 +130,17 @@ ProtocolHandlerImpl::ProtocolHandlerImpl(
if (get_settings().malformed_message_filtering()) {
if (malformed_frequency_time > 0u && malformed_frequency_count > 0u) {
malformed_message_meter_.set_time_range(malformed_frequency_time);
- LOG4CXX_DEBUG(logger_,
- "Malformed frequency meter is enabled ( "
- << malformed_frequency_count << " per "
- << malformed_frequency_time << " mSecond)");
+ SDL_LOG_DEBUG("Malformed frequency meter is enabled ( "
+ << malformed_frequency_count << " per "
+ << malformed_frequency_time << " mSecond)");
} else {
- LOG4CXX_WARN(logger_, "Malformed frequency meter is disabled");
+ SDL_LOG_WARN("Malformed frequency meter is disabled");
}
} else {
- LOG4CXX_WARN(
- logger_,
+ SDL_LOG_WARN(
+
"Malformed message filtering is disabled."
- << "Connection will be close on first malformed message detection");
+ << "Connection will be close on first malformed message detection");
}
multiframe_builder_.set_waiting_timeout(
get_settings().multiframe_waiting_timeout());
@@ -151,15 +149,15 @@ ProtocolHandlerImpl::ProtocolHandlerImpl(
ProtocolHandlerImpl::~ProtocolHandlerImpl() {
sync_primitives::AutoLock lock(protocol_observers_lock_);
if (!protocol_observers_.empty()) {
- LOG4CXX_WARN(logger_,
- "Not all observers have unsubscribed"
- " from ProtocolHandlerImpl");
+ SDL_LOG_WARN(
+ "Not all observers have unsubscribed"
+ " from ProtocolHandlerImpl");
}
}
void ProtocolHandlerImpl::AddProtocolObserver(ProtocolObserver* observer) {
if (!observer) {
- LOG4CXX_ERROR(logger_, "Invalid (NULL) pointer to IProtocolObserver.");
+ SDL_LOG_ERROR("Invalid (NULL) pointer to IProtocolObserver.");
return;
}
sync_primitives::AutoLock lock(protocol_observers_lock_);
@@ -167,9 +165,9 @@ void ProtocolHandlerImpl::AddProtocolObserver(ProtocolObserver* observer) {
}
void ProtocolHandlerImpl::RemoveProtocolObserver(ProtocolObserver* observer) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
if (!observer) {
- LOG4CXX_ERROR(logger_, "Invalid (NULL) pointer to IProtocolObserver.");
+ SDL_LOG_ERROR("Invalid (NULL) pointer to IProtocolObserver.");
return;
}
sync_primitives::AutoLock lock(protocol_observers_lock_);
@@ -181,12 +179,10 @@ void set_hash_id(uint32_t hash_id, protocol_handler::ProtocolPacket& packet) {
return;
}
if (packet.protocol_version() < PROTOCOL_VERSION_2) {
- LOG4CXX_DEBUG(logger_,
- "Packet needs no hash data (protocol version less 2)");
+ SDL_LOG_DEBUG("Packet needs no hash data (protocol version less 2)");
return;
}
- LOG4CXX_DEBUG(logger_,
- "Set hash_id 0x" << std::hex << hash_id << " to the packet 0x"
+ SDL_LOG_DEBUG("Set hash_id 0x" << std::hex << hash_id << " to the packet 0x"
<< &packet);
// Hash id shall be 4 bytes according Ford Protocol v8
DCHECK(sizeof(hash_id) == 4);
@@ -201,7 +197,7 @@ void ProtocolHandlerImpl::SendStartSessionAck(ConnectionID connection_id,
uint32_t hash_id,
uint8_t service_type,
bool protection) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
utils::SemanticVersion fullVersion;
SendStartSessionAck(connection_id,
session_id,
@@ -220,7 +216,7 @@ void ProtocolHandlerImpl::SendStartSessionAck(
uint8_t service_type,
bool protection,
utils::SemanticVersion& full_version) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
BsonObject empty_param;
bson_object_initialize_default(&empty_param);
@@ -246,7 +242,7 @@ void ProtocolHandlerImpl::SendStartSessionAck(
bool protection,
utils::SemanticVersion& full_version,
BsonObject& params) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
bool send_transport_update_event = false;
@@ -294,22 +290,20 @@ void ProtocolHandlerImpl::SendStartSessionAck(
protocol_header_validator_.max_payload_size_by_service_type(
serviceTypeValue)));
UNUSED(mtu_written)
- LOG4CXX_DEBUG(logger_,
- "MTU parameter was written to bson params: "
- << mtu_written << "; Value: "
- << static_cast<int32_t>(
- bson_object_get_int64(&params, strings::mtu)));
+ SDL_LOG_DEBUG(
+ "MTU parameter was written to bson params: "
+ << mtu_written << "; Value: "
+ << static_cast<int32_t>(bson_object_get_int64(&params, strings::mtu)));
if (serviceTypeValue == kRpc) {
// Hash ID is only used in RPC case
const bool hash_written = bson_object_put_int32(
&params, strings::hash_id, static_cast<int32_t>(hash_id));
UNUSED(hash_written);
- LOG4CXX_DEBUG(logger_,
- "Hash parameter was written to bson params: "
- << hash_written << "; Value: "
- << static_cast<int32_t>(bson_object_get_int32(
- &params, strings::hash_id)));
+ SDL_LOG_DEBUG("Hash parameter was written to bson params: "
+ << hash_written << "; Value: "
+ << static_cast<int32_t>(
+ bson_object_get_int32(&params, strings::hash_id)));
// Minimum protocol version supported by both
utils::SemanticVersion* min_version =
@@ -323,14 +317,13 @@ void ProtocolHandlerImpl::SendStartSessionAck(
const bool protocol_ver_written = bson_object_put_string(
&params, strings::protocol_version, protocol_version_string);
UNUSED(protocol_ver_written);
- LOG4CXX_DEBUG(
- logger_,
+ SDL_LOG_DEBUG(
+
"Protocol version parameter was written to bson params: "
- << protocol_ver_written << "; Value: "
- << bson_object_get_string(&params, strings::protocol_version));
+ << protocol_ver_written << "; Value: "
+ << bson_object_get_string(&params, strings::protocol_version));
- LOG4CXX_INFO(logger_,
- "Protocol Version String " << protocol_version_string);
+ SDL_LOG_INFO("Protocol Version String " << protocol_version_string);
std::vector<std::string> secondaryTransports;
std::vector<int32_t> audioServiceTransports;
@@ -340,7 +333,7 @@ void ProtocolHandlerImpl::SendStartSessionAck(
secondaryTransports,
audioServiceTransports,
videoServiceTransports)) {
- LOG4CXX_DEBUG(logger_, "Multiple transports are enabled.");
+ SDL_LOG_DEBUG("Multiple transports are enabled.");
BsonArray secondaryTransportsArr;
bson_array_initialize(&secondaryTransportsArr,
secondaryTransports.size());
@@ -350,11 +343,11 @@ void ProtocolHandlerImpl::SendStartSessionAck(
secondaryTransports[i].c_str(),
sizeof(secondaryTransport));
secondaryTransport[sizeof(secondaryTransport) - 1] = '\0';
- LOG4CXX_DEBUG(
- logger_,
+ SDL_LOG_DEBUG(
+
"Adding "
- << secondaryTransport
- << " to secondaryTransports parameter of StartSessionAck");
+ << secondaryTransport
+ << " to secondaryTransports parameter of StartSessionAck");
bson_array_add_string(&secondaryTransportsArr, secondaryTransport);
}
bson_object_put_array(
@@ -364,8 +357,7 @@ void ProtocolHandlerImpl::SendStartSessionAck(
bson_array_initialize(&audioServiceTransportsArr,
audioServiceTransports.size());
for (unsigned int i = 0; i < audioServiceTransports.size(); i++) {
- LOG4CXX_DEBUG(logger_,
- "Adding " << audioServiceTransports[i]
+ SDL_LOG_DEBUG("Adding " << audioServiceTransports[i]
<< " to audioServiceTransports parameter "
"of StartSessionAck");
bson_array_add_int32(&audioServiceTransportsArr,
@@ -379,8 +371,7 @@ void ProtocolHandlerImpl::SendStartSessionAck(
bson_array_initialize(&videoServiceTransportsArr,
videoServiceTransports.size());
for (unsigned int i = 0; i < videoServiceTransports.size(); i++) {
- LOG4CXX_DEBUG(logger_,
- "Adding " << videoServiceTransports[i]
+ SDL_LOG_DEBUG("Adding " << videoServiceTransports[i]
<< " to videoServiceTransports parameter "
"of StartSessionAck");
bson_array_add_int32(&videoServiceTransportsArr,
@@ -393,8 +384,8 @@ void ProtocolHandlerImpl::SendStartSessionAck(
if (settings_.multiple_transports_enabled()) {
send_transport_update_event = true;
} else {
- LOG4CXX_DEBUG(
- logger_,
+ SDL_LOG_DEBUG(
+
"Multiple transports feature is disabled by configuration");
// In this case, we must remember that this session will never have
// a secondary transport.
@@ -402,14 +393,14 @@ void ProtocolHandlerImpl::SendStartSessionAck(
kDisabledSecondary);
}
} else {
- LOG4CXX_WARN(
- logger_,
+ SDL_LOG_WARN(
+
"Failed to set up secondary transport and service type params");
connection_handler_.SetSecondaryTransportID(session_id,
kDisabledSecondary);
}
} else {
- LOG4CXX_INFO(logger_, "Older protocol version. No multiple transports");
+ SDL_LOG_INFO("Older protocol version. No multiple transports");
connection_handler_.SetSecondaryTransportID(session_id,
kDisabledSecondary);
}
@@ -437,20 +428,19 @@ void ProtocolHandlerImpl::SendStartSessionAck(
raw_ford_messages_to_mobile_.PostMessage(
impl::RawFordMessageToMobile(ptr, false));
- LOG4CXX_DEBUG(logger_,
- "SendStartSessionAck() for connection "
- << connection_id << " for service_type "
- << static_cast<int32_t>(service_type) << " session_id "
- << static_cast<int32_t>(session_id) << " protection "
- << (protection ? "ON" : "OFF"));
+ SDL_LOG_DEBUG("SendStartSessionAck() for connection "
+ << connection_id << " for service_type "
+ << static_cast<int32_t>(service_type) << " session_id "
+ << static_cast<int32_t>(session_id) << " protection "
+ << (protection ? "ON" : "OFF"));
if (send_transport_update_event) {
// Wait until the StartService ACK has been processed for sending.
// The TransportUpdateEvent has a higher priority, being that it's
// a SERVICE_TYPE_CONTROL message. (The ACK is SERVICE_TYPE_RPC.)
- LOG4CXX_DEBUG(logger_, "Waiting for the MessageToMobile queue to be empty");
+ SDL_LOG_DEBUG("Waiting for the MessageToMobile queue to be empty");
raw_ford_messages_to_mobile_.WaitDumpQueue();
- LOG4CXX_DEBUG(logger_, "Sending the TransportUpdate event");
+ SDL_LOG_DEBUG("Sending the TransportUpdate event");
SendTransportUpdateEvent(connection_id, session_id);
}
}
@@ -473,7 +463,7 @@ void ProtocolHandlerImpl::SendStartSessionNAck(
uint8_t protocol_version,
uint8_t service_type,
std::vector<std::string>& rejectedParams) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
ProtocolFramePtr ptr(
new protocol_handler::ProtocolPacket(connection_id,
@@ -511,11 +501,10 @@ void ProtocolHandlerImpl::SendStartSessionNAck(
raw_ford_messages_to_mobile_.PostMessage(
impl::RawFordMessageToMobile(ptr, false));
- LOG4CXX_DEBUG(logger_,
- "SendStartSessionNAck() for connection "
- << connection_id << " for service_type "
- << static_cast<int32_t>(service_type) << " session_id "
- << static_cast<int32_t>(session_id));
+ SDL_LOG_DEBUG("SendStartSessionNAck() for connection "
+ << connection_id << " for service_type "
+ << static_cast<int32_t>(service_type) << " session_id "
+ << static_cast<int32_t>(session_id));
}
void ProtocolHandlerImpl::SendEndSessionNAck(ConnectionID connection_id,
@@ -536,7 +525,7 @@ void ProtocolHandlerImpl::SendEndSessionNAck(
uint8_t protocol_version,
uint8_t service_type,
std::vector<std::string>& rejectedParams) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
ProtocolFramePtr ptr(
new protocol_handler::ProtocolPacket(connection_id,
@@ -574,11 +563,10 @@ void ProtocolHandlerImpl::SendEndSessionNAck(
raw_ford_messages_to_mobile_.PostMessage(
impl::RawFordMessageToMobile(ptr, false));
- LOG4CXX_DEBUG(logger_,
- "SendEndSessionNAck() for connection "
- << connection_id << " for service_type "
- << static_cast<int32_t>(service_type) << " session_id "
- << static_cast<int32_t>(session_id));
+ SDL_LOG_DEBUG("SendEndSessionNAck() for connection "
+ << connection_id << " for service_type "
+ << static_cast<int32_t>(service_type) << " session_id "
+ << static_cast<int32_t>(session_id));
}
SessionObserver& ProtocolHandlerImpl::get_session_observer() {
@@ -589,7 +577,7 @@ void ProtocolHandlerImpl::SendEndSessionAck(ConnectionID connection_id,
uint8_t session_id,
uint8_t protocol_version,
uint8_t service_type) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
ProtocolFramePtr ptr(
new protocol_handler::ProtocolPacket(connection_id,
@@ -605,25 +593,23 @@ void ProtocolHandlerImpl::SendEndSessionAck(ConnectionID connection_id,
raw_ford_messages_to_mobile_.PostMessage(
impl::RawFordMessageToMobile(ptr, false));
- LOG4CXX_DEBUG(logger_,
- "SendEndSessionAck() for connection "
- << connection_id << " for service_type "
- << static_cast<int32_t>(service_type) << " session_id "
- << static_cast<int32_t>(session_id));
+ SDL_LOG_DEBUG("SendEndSessionAck() for connection "
+ << connection_id << " for service_type "
+ << static_cast<int32_t>(service_type) << " session_id "
+ << static_cast<int32_t>(session_id));
}
void ProtocolHandlerImpl::SendEndServicePrivate(int32_t primary_connection_id,
int32_t connection_id,
uint8_t session_id,
uint8_t service_type) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
uint8_t protocol_version;
if (session_observer_.ProtocolVersionUsed(
primary_connection_id, session_id, protocol_version)) {
- LOG4CXX_TRACE(logger_,
- "SendEndServicePrivate using protocol version "
- << static_cast<int32_t>(protocol_version));
+ SDL_LOG_TRACE("SendEndServicePrivate using protocol version "
+ << static_cast<int32_t>(protocol_version));
ProtocolFramePtr ptr(
new protocol_handler::ProtocolPacket(connection_id,
protocol_version,
@@ -637,22 +623,21 @@ void ProtocolHandlerImpl::SendEndServicePrivate(int32_t primary_connection_id,
raw_ford_messages_to_mobile_.PostMessage(
impl::RawFordMessageToMobile(ptr, false));
- LOG4CXX_DEBUG(logger_,
- "SendEndServicePrivate() for connection "
- << connection_id << " for service_type "
- << static_cast<int>(service_type)
- << " primary connection " << primary_connection_id
- << " session_id " << static_cast<int32_t>(session_id));
+ SDL_LOG_DEBUG("SendEndServicePrivate() for connection "
+ << connection_id << " for service_type "
+ << static_cast<int>(service_type) << " primary connection "
+ << primary_connection_id << " session_id "
+ << static_cast<int32_t>(session_id));
} else {
- LOG4CXX_WARN(
- logger_,
+ SDL_LOG_WARN(
+
"SendEndServicePrivate is failed connection or session does not exist");
}
}
void ProtocolHandlerImpl::SendEndSession(int32_t connection_id,
uint8_t session_id) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
// A session is always associated with a primary connection ID
SendEndServicePrivate(
connection_id, connection_id, session_id, SERVICE_TYPE_RPC);
@@ -662,7 +647,7 @@ void ProtocolHandlerImpl::SendEndService(int32_t primary_connection_id,
int32_t connection_id,
uint8_t session_id,
uint8_t service_type) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
SendEndServicePrivate(
primary_connection_id, connection_id, session_id, service_type);
}
@@ -670,7 +655,7 @@ void ProtocolHandlerImpl::SendEndService(int32_t primary_connection_id,
RESULT_CODE ProtocolHandlerImpl::SendHeartBeatAck(ConnectionID connection_id,
uint8_t session_id,
uint32_t message_id) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
uint8_t protocol_version;
if (session_observer_.ProtocolVersionUsed(
@@ -690,15 +675,14 @@ RESULT_CODE ProtocolHandlerImpl::SendHeartBeatAck(ConnectionID connection_id,
impl::RawFordMessageToMobile(ptr, false));
return RESULT_OK;
}
- LOG4CXX_WARN(
- logger_,
+ SDL_LOG_WARN(
"SendHeartBeatAck is failed connection or session does not exist");
return RESULT_FAIL;
}
void ProtocolHandlerImpl::SendTransportUpdateEvent(ConnectionID connection_id,
uint8_t session_id) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
uint8_t protocol_version;
if (session_observer_.ProtocolVersionUsed(
@@ -731,9 +715,8 @@ void ProtocolHandlerImpl::SendTransportUpdateEvent(ConnectionID connection_id,
&payload_obj, strings::tcp_ip_address, tcp_ip_address);
// omit TCP port number
}
- LOG4CXX_INFO(logger_,
- "SendTransportUpdateEvent IP address: "
- << tcp_ip_address << " Port: " << tcp_port);
+ SDL_LOG_INFO("SendTransportUpdateEvent IP address: "
+ << tcp_ip_address << " Port: " << tcp_port);
uint8_t* payloadBytes = bson_object_to_bytes(&payload_obj);
ptr->set_data(payloadBytes, bson_object_size(&payload_obj));
@@ -743,14 +726,13 @@ void ProtocolHandlerImpl::SendTransportUpdateEvent(ConnectionID connection_id,
raw_ford_messages_to_mobile_.PostMessage(
impl::RawFordMessageToMobile(ptr, false));
- LOG4CXX_DEBUG(logger_,
- "SendTransportUpdateEvent() for connection "
- << connection_id << " for session "
- << static_cast<int32_t>(session_id));
+ SDL_LOG_DEBUG("SendTransportUpdateEvent() for connection "
+ << connection_id << " for session "
+ << static_cast<int32_t>(session_id));
} else {
- LOG4CXX_WARN(logger_,
- "SendTransportUpdateEvent is failed connection or session "
- "does not exist");
+ SDL_LOG_WARN(
+ "SendTransportUpdateEvent is failed connection or session "
+ "does not exist");
}
}
@@ -758,7 +740,7 @@ RESULT_CODE ProtocolHandlerImpl::SendRegisterSecondaryTransportAck(
ConnectionID connection_id,
ConnectionID primary_transport_connection_id,
uint8_t session_id) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
// acquire the protocol version from primary transport
uint8_t protocol_version;
@@ -779,9 +761,9 @@ RESULT_CODE ProtocolHandlerImpl::SendRegisterSecondaryTransportAck(
impl::RawFordMessageToMobile(ptr, false));
return RESULT_OK;
}
- LOG4CXX_WARN(logger_,
- "RegisterSecondaryTransportAck is failed connection or session "
- "does not exist");
+ SDL_LOG_WARN(
+ "RegisterSecondaryTransportAck is failed connection or session "
+ "does not exist");
return RESULT_FAIL;
}
@@ -790,7 +772,7 @@ RESULT_CODE ProtocolHandlerImpl::SendRegisterSecondaryTransportNAck(
ConnectionID primary_transport_connection_id,
uint8_t session_id,
BsonObject* reason) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
// If mobile sends an invalid session ID and we cannot find out the Connection
// ID of primary transport, then we use version 5. (The multiple-transports
@@ -800,9 +782,9 @@ RESULT_CODE ProtocolHandlerImpl::SendRegisterSecondaryTransportNAck(
// acquire the protocol version from primary transport
if (!session_observer_.ProtocolVersionUsed(
primary_transport_connection_id, session_id, protocol_version)) {
- LOG4CXX_WARN(logger_,
- "Failed to acquire protocol version for "
- "RegisterSecondaryTransportNAck");
+ SDL_LOG_WARN(
+ "Failed to acquire protocol version for "
+ "RegisterSecondaryTransportNAck");
return RESULT_FAIL;
}
}
@@ -831,7 +813,7 @@ RESULT_CODE ProtocolHandlerImpl::SendRegisterSecondaryTransportNAck(
void ProtocolHandlerImpl::SendHeartBeat(int32_t connection_id,
uint8_t session_id) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
uint8_t protocol_version;
if (session_observer_.ProtocolVersionUsed(
connection_id, session_id, protocol_version)) {
@@ -847,10 +829,9 @@ void ProtocolHandlerImpl::SendHeartBeat(int32_t connection_id,
message_counters_[session_id]++));
raw_ford_messages_to_mobile_.PostMessage(
impl::RawFordMessageToMobile(ptr, false));
- LOG4CXX_DEBUG(logger_, "SendHeartBeat finished successfully");
+ SDL_LOG_DEBUG("SendHeartBeat finished successfully");
} else {
- LOG4CXX_WARN(
- logger_,
+ SDL_LOG_WARN(
"SendHeartBeat is failed connection or session does not exist");
}
}
@@ -861,10 +842,9 @@ void ProtocolHandlerImpl::SendMessageToMobileApp(const RawMessagePtr message,
#ifdef TELEMETRY_MONITOR
const date_time::TimeDuration start_time = date_time::getCurrentTime();
#endif // TELEMETRY_MONITOR
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
if (!message) {
- LOG4CXX_ERROR(logger_,
- "Invalid message for sending to mobile app is received.");
+ SDL_LOG_ERROR("Invalid message for sending to mobile app is received.");
return;
}
@@ -906,15 +886,13 @@ void ProtocolHandlerImpl::SendMessageToMobileApp(const RawMessagePtr message,
DCHECK(max_block_size > 0);
if (max_block_size > 0) {
frame_size = max_block_size;
- LOG4CXX_DEBUG(logger_,
- "Security set new optimal packet size " << frame_size);
+ SDL_LOG_DEBUG("Security set new optimal packet size " << frame_size);
} else {
- LOG4CXX_ERROR(
- logger_,
+ SDL_LOG_ERROR(
"Security could not return max block size, use the origin one");
}
}
- LOG4CXX_DEBUG(logger_, "Optimal packet size is " << frame_size);
+ SDL_LOG_DEBUG("Optimal packet size is " << frame_size);
#endif // ENABLE_SECURITY
if (message->data_size() <= frame_size) {
@@ -927,13 +905,11 @@ void ProtocolHandlerImpl::SendMessageToMobileApp(const RawMessagePtr message,
needs_encryption,
final_message);
if (result != RESULT_OK) {
- LOG4CXX_ERROR(logger_,
- "ProtocolHandler failed to send single frame message.");
+ SDL_LOG_ERROR("ProtocolHandler failed to send single frame message.");
}
} else {
- LOG4CXX_DEBUG(logger_,
- "Message will be sent in multiple frames; max frame size is "
- << frame_size);
+ SDL_LOG_DEBUG("Message will be sent in multiple frames; max frame size is "
+ << frame_size);
RESULT_CODE result = SendMultiFrameMessage(connection_handle,
sessionID,
@@ -945,8 +921,7 @@ void ProtocolHandlerImpl::SendMessageToMobileApp(const RawMessagePtr message,
needs_encryption,
final_message);
if (result != RESULT_OK) {
- LOG4CXX_ERROR(logger_,
- "ProtocolHandler failed to send multiframe messages.");
+ SDL_LOG_ERROR("ProtocolHandler failed to send multiframe messages.");
}
}
#ifdef TELEMETRY_MONITOR
@@ -961,34 +936,31 @@ void ProtocolHandlerImpl::SendMessageToMobileApp(const RawMessagePtr message,
}
void ProtocolHandlerImpl::OnTMMessageReceived(const RawMessagePtr tm_message) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
if (!tm_message) {
- LOG4CXX_ERROR(logger_,
- "Invalid incoming message received in"
- << " ProtocolHandler from Transport Manager.");
+ SDL_LOG_ERROR("Invalid incoming message received in"
+ << " ProtocolHandler from Transport Manager.");
return;
}
const uint32_t connection_key = tm_message->connection_key();
- LOG4CXX_DEBUG(logger_,
- "Received data from TM with connection id "
- << connection_key << " msg data_size "
- << tm_message->data_size());
+ SDL_LOG_DEBUG("Received data from TM with connection id "
+ << connection_key << " msg data_size "
+ << tm_message->data_size());
RESULT_CODE result;
size_t malformed_occurs = 0u;
const ProtocolFramePtrList protocol_frames =
incoming_data_handler_.ProcessData(
*tm_message, result, &malformed_occurs);
- LOG4CXX_DEBUG(logger_, "Processed " << protocol_frames.size() << " frames");
+ SDL_LOG_DEBUG("Processed " << protocol_frames.size() << " frames");
if (result != RESULT_OK) {
if (result == RESULT_MALFORMED_OCCURS) {
- LOG4CXX_WARN(
- logger_,
- "Malformed message occurs, connection id " << connection_key);
+ SDL_LOG_WARN("Malformed message occurs, connection id "
+ << connection_key);
if (!get_settings().malformed_message_filtering()) {
- LOG4CXX_DEBUG(logger_, "Malformed message filtering disabled");
+ SDL_LOG_DEBUG("Malformed message filtering disabled");
session_observer_.OnMalformedMessageCallback(connection_key);
// For tracking only malformed occurrence check output
} else {
@@ -997,7 +969,7 @@ void ProtocolHandlerImpl::OnTMMessageReceived(const RawMessagePtr tm_message) {
}
}
} else {
- LOG4CXX_ERROR(logger_, "Incoming data processing failed.");
+ SDL_LOG_ERROR("Incoming data processing failed.");
transport_manager_.DisconnectForce(connection_key);
}
}
@@ -1012,7 +984,7 @@ void ProtocolHandlerImpl::OnTMMessageReceived(const RawMessagePtr tm_message) {
#ifdef ENABLE_SECURITY
const RESULT_CODE result = DecryptFrame(frame);
if (result != RESULT_OK) {
- LOG4CXX_WARN(logger_, "Error frame decryption. Frame skipped.");
+ SDL_LOG_WARN("Error frame decryption. Frame skipped.");
continue;
}
#endif // ENABLE_SECURITY
@@ -1030,15 +1002,14 @@ void ProtocolHandlerImpl::OnTMMessageReceived(const RawMessagePtr tm_message) {
void ProtocolHandlerImpl::OnTMMessageReceiveFailed(
const transport_manager::DataReceiveError& error) {
// TODO(PV): implement
- LOG4CXX_ERROR(logger_, "Received error on attemping to recieve message.");
+ SDL_LOG_ERROR("Received error on attemping to recieve message.");
}
void ProtocolHandlerImpl::NotifySubscribers(const RawMessagePtr message) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
sync_primitives::AutoLock lock(protocol_observers_lock_);
if (protocol_observers_.empty()) {
- LOG4CXX_ERROR(
- logger_,
+ SDL_LOG_ERROR(
"Cannot handle multiframe message: no IProtocolObserver is set.");
}
for (ProtocolObservers::iterator it = protocol_observers_.begin();
@@ -1050,7 +1021,7 @@ void ProtocolHandlerImpl::NotifySubscribers(const RawMessagePtr message) {
}
void ProtocolHandlerImpl::OnTMMessageSend(const RawMessagePtr message) {
- LOG4CXX_DEBUG(logger_, "Sending message finished successfully.");
+ SDL_LOG_DEBUG("Sending message finished successfully.");
uint32_t connection_handle = 0;
uint8_t sessionID = 0;
@@ -1073,7 +1044,7 @@ void ProtocolHandlerImpl::OnTMMessageSend(const RawMessagePtr message) {
const RESULT_CODE result =
sent_message.deserializePacket(message->data(), message->data_size());
if (result != RESULT_OK) {
- LOG4CXX_ERROR(logger_, "Error while message deserialization.");
+ SDL_LOG_ERROR("Error while message deserialization.");
return;
}
std::map<uint8_t, uint32_t>::iterator it =
@@ -1103,11 +1074,10 @@ void ProtocolHandlerImpl::OnTMMessageSendFailed(
const RawMessagePtr message) {
DCHECK_OR_RETURN_VOID(message);
// TODO(PV): implement
- LOG4CXX_ERROR(logger_,
- "Sending message " << message->data_size()
- << "bytes failed, connection_key "
+ SDL_LOG_ERROR("Sending message " << message->data_size()
+ << " bytes failed, connection_key "
<< message->connection_key()
- << "Error_text: " << error.text());
+ << " Error_text: " << error.text());
uint32_t connection_handle = 0;
uint8_t session_id = 0;
@@ -1154,7 +1124,7 @@ void ProtocolHandlerImpl::OnUnexpectedDisconnect(
}
void ProtocolHandlerImpl::NotifyOnGetSystemTimeFailed() {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
#ifdef ENABLE_SECURITY
security_manager_->ResetPendingSystemTimeRequests();
security_manager_->NotifyListenersOnGetSystemTimeFailed();
@@ -1169,19 +1139,19 @@ void ProtocolHandlerImpl::ProcessFailedPTU() {
#ifdef EXTERNAL_PROPRIETARY_MODE
void ProtocolHandlerImpl::ProcessFailedCertDecrypt() {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
security_manager_->ProcessFailedCertDecrypt();
}
#endif
void ProtocolHandlerImpl::OnTransportConfigUpdated(
const transport_manager::transport_adapter::TransportConfig& configs) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
transport_manager::transport_adapter::TransportConfig::const_iterator it =
configs.find(transport_manager::transport_adapter::tc_enabled);
if (configs.end() == it) {
- LOG4CXX_WARN(logger_, "No enabled field in OnTransportConfigUpdated");
+ SDL_LOG_WARN("No enabled field in OnTransportConfigUpdated");
return;
}
@@ -1191,14 +1161,14 @@ void ProtocolHandlerImpl::OnTransportConfigUpdated(
if (tcp_enabled) {
it = configs.find(transport_manager::transport_adapter::tc_tcp_port);
if (configs.end() == it) {
- LOG4CXX_WARN(logger_, "No port field in OnTransportConfigUpdated");
+ SDL_LOG_WARN("No port field in OnTransportConfigUpdated");
return;
}
tcp_port = it->second;
it = configs.find(transport_manager::transport_adapter::tc_tcp_ip_address);
if (configs.end() == it) {
- LOG4CXX_WARN(logger_, "No IP address field in OnTransportConfigUpdated");
+ SDL_LOG_WARN("No IP address field in OnTransportConfigUpdated");
return;
}
tcp_enabled_ = true;
@@ -1210,10 +1180,9 @@ void ProtocolHandlerImpl::OnTransportConfigUpdated(
tcp_ip_address_.clear();
}
- LOG4CXX_INFO(logger_,
- "OnTransportConfigUpdated: new config enabled is "
- << tcp_enabled_ << ". Port is " << tcp_port_
- << ". IP Address is " << tcp_ip_address_);
+ SDL_LOG_INFO("OnTransportConfigUpdated: new config enabled is "
+ << tcp_enabled_ << ". Port is " << tcp_port_
+ << ". IP Address is " << tcp_ip_address_);
// Walk the SessionConnection map and find all sessions that need a
// TransportUpdate Event. Sessions flagged with kDisabledSecondary in their
@@ -1228,11 +1197,10 @@ void ProtocolHandlerImpl::OnTransportConfigUpdated(
session_connection_map.begin();
while (itr != session_connection_map.end()) {
const connection_handler::SessionTransports st = itr->second;
- LOG4CXX_INFO(logger_,
- "OnTransportConfigUpdated found session "
- << itr->first << " with primary connection "
- << st.primary_transport << " and secondary connection "
- << st.secondary_transport);
+ SDL_LOG_INFO("OnTransportConfigUpdated found session "
+ << itr->first << " with primary connection "
+ << st.primary_transport << " and secondary connection "
+ << st.secondary_transport);
if (st.secondary_transport != kDisabledSecondary) {
SendTransportUpdateEvent(st.primary_transport, itr->first);
}
@@ -1242,7 +1210,7 @@ void ProtocolHandlerImpl::OnTransportConfigUpdated(
void ProtocolHandlerImpl::OnAuthTokenUpdated(const std::string& policy_app_id,
const std::string& auth_token) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
sync_primitives::AutoLock lock(auth_token_map_lock_);
if (auth_token.empty()) {
auth_token_map_.erase(policy_app_id);
@@ -1253,7 +1221,7 @@ void ProtocolHandlerImpl::OnAuthTokenUpdated(const std::string& policy_app_id,
bool ProtocolHandlerImpl::IsRPCServiceSecure(
const uint32_t connection_key) const {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
#ifdef ENABLE_SECURITY
security_manager::SSLContext* context =
@@ -1265,37 +1233,35 @@ bool ProtocolHandlerImpl::IsRPCServiceSecure(
}
RESULT_CODE ProtocolHandlerImpl::SendFrame(const ProtocolFramePtr packet) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
if (!packet) {
- LOG4CXX_ERROR(logger_, "Failed to send empty packet.");
+ SDL_LOG_ERROR("Failed to send empty packet.");
return RESULT_FAIL;
}
#ifdef ENABLE_SECURITY
// and return protect flag to Packet constructor for makeing design by Policy
const RESULT_CODE result = EncryptFrame(packet);
if (result != RESULT_OK) {
- LOG4CXX_WARN(logger_, "Error frame encryption. Frame droped.");
+ SDL_LOG_WARN("Error frame encryption. Frame droped.");
return RESULT_FAIL;
}
#endif // ENABLE_SECURITY
- LOG4CXX_DEBUG(
- logger_,
+ SDL_LOG_DEBUG(
"Packet to be sent: "
- << ConvertPacketDataToString(packet->data(), packet->data_size())
- << " of size: " << packet->data_size());
+ << ConvertPacketDataToString(packet->data(), packet->data_size())
+ << " of size: " << packet->data_size());
const RawMessagePtr message_to_send = packet->serializePacket();
if (!message_to_send) {
- LOG4CXX_ERROR(logger_, "Serialization error");
+ SDL_LOG_ERROR("Serialization error");
return RESULT_FAIL;
}
- LOG4CXX_DEBUG(logger_,
- "Message to send with connection id "
- << static_cast<int>(packet->connection_id()));
+ SDL_LOG_DEBUG("Message to send with connection id "
+ << static_cast<int>(packet->connection_id()));
if (transport_manager::E_SUCCESS !=
transport_manager_.SendMessageToDevice(message_to_send)) {
- LOG4CXX_WARN(logger_, "Can't send message to device");
+ SDL_LOG_WARN("Can't send message to device");
return RESULT_FAIL;
}
return RESULT_OK;
@@ -1310,11 +1276,10 @@ RESULT_CODE ProtocolHandlerImpl::SendSingleFrameMessage(
const uint8_t* data,
const bool needs_encryption,
const bool is_final_message) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
- LOG4CXX_DEBUG(
- logger_,
- "Packet needs encryption: " << std::boolalpha << needs_encryption);
+ SDL_LOG_DEBUG("Packet needs encryption: " << std::boolalpha
+ << needs_encryption);
ProtocolFramePtr ptr(
new protocol_handler::ProtocolPacket(connection_id,
@@ -1343,11 +1308,10 @@ RESULT_CODE ProtocolHandlerImpl::SendMultiFrameMessage(
const size_t max_frame_size,
const bool needs_encryption,
const bool is_final_message) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
- LOG4CXX_DEBUG(
- logger_,
- " data size " << data_size << " max_frame_size " << max_frame_size);
+ SDL_LOG_DEBUG(" data size " << data_size << " max_frame_size "
+ << max_frame_size);
// remainder of last frame
const size_t lastframe_remainder = data_size % max_frame_size;
@@ -1359,8 +1323,7 @@ RESULT_CODE ProtocolHandlerImpl::SendMultiFrameMessage(
// add last frame if not empty
(lastframe_remainder > 0 ? 1 : 0);
- LOG4CXX_DEBUG(logger_,
- "Data " << data_size << " bytes in " << frames_count
+ SDL_LOG_DEBUG("Data " << data_size << " bytes in " << frames_count
<< " frames with last frame size " << lastframe_size);
DCHECK(max_frame_size >= FIRST_FRAME_DATA_SIZE);
@@ -1393,7 +1356,7 @@ RESULT_CODE ProtocolHandlerImpl::SendMultiFrameMessage(
raw_ford_messages_to_mobile_.PostMessage(
impl::RawFordMessageToMobile(firstPacket, false));
- LOG4CXX_DEBUG(logger_, "First frame is sent.");
+ SDL_LOG_DEBUG("First frame is sent.");
for (uint32_t i = 0; i < frames_count; ++i) {
const bool is_last_frame = (i == (frames_count - 1));
@@ -1417,27 +1380,27 @@ RESULT_CODE ProtocolHandlerImpl::SendMultiFrameMessage(
raw_ford_messages_to_mobile_.PostMessage(
impl::RawFordMessageToMobile(ptr, is_final_packet));
- LOG4CXX_DEBUG(logger_, '#' << i << " frame is sent.");
+ SDL_LOG_DEBUG('#' << i << " frame is sent.");
}
return RESULT_OK;
}
RESULT_CODE ProtocolHandlerImpl::HandleMessage(const ProtocolFramePtr packet) {
DCHECK_OR_RETURN(packet, RESULT_UNKNOWN);
- LOG4CXX_DEBUG(logger_, "Handling message " << packet);
+ SDL_LOG_DEBUG("Handling message " << packet);
switch (packet->frame_type()) {
case FRAME_TYPE_CONTROL:
- LOG4CXX_TRACE(logger_, "FRAME_TYPE_CONTROL");
+ SDL_LOG_TRACE("FRAME_TYPE_CONTROL");
return HandleControlMessage(packet);
case FRAME_TYPE_SINGLE:
- LOG4CXX_TRACE(logger_, "FRAME_TYPE_SINGLE");
+ SDL_LOG_TRACE("FRAME_TYPE_SINGLE");
return HandleSingleFrameMessage(packet);
case FRAME_TYPE_FIRST:
case FRAME_TYPE_CONSECUTIVE:
- LOG4CXX_TRACE(logger_, "FRAME_TYPE_FIRST or FRAME_TYPE_CONSECUTIVE");
+ SDL_LOG_TRACE("FRAME_TYPE_FIRST or FRAME_TYPE_CONSECUTIVE");
return HandleMultiFrameMessage(packet);
default: {
- LOG4CXX_WARN(logger_, "Unknown frame type" << packet->frame_type());
+ SDL_LOG_WARN("Unknown frame type" << packet->frame_type());
return RESULT_FAIL;
}
}
@@ -1446,13 +1409,13 @@ RESULT_CODE ProtocolHandlerImpl::HandleMessage(const ProtocolFramePtr packet) {
RESULT_CODE ProtocolHandlerImpl::HandleSingleFrameMessage(
const ProtocolFramePtr packet) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
+
+ SDL_LOG_DEBUG(
- LOG4CXX_DEBUG(
- logger_,
"FRAME_TYPE_SINGLE message of size "
- << packet->data_size() << "; message "
- << ConvertPacketDataToString(packet->data(), packet->data_size()));
+ << packet->data_size() << "; message "
+ << ConvertPacketDataToString(packet->data(), packet->data_size()));
// Replace a potential secondary transport ID in the packet with the primary
// transport ID
@@ -1491,7 +1454,7 @@ RESULT_CODE ProtocolHandlerImpl::HandleSingleFrameMessage(
RESULT_CODE ProtocolHandlerImpl::HandleMultiFrameMessage(
const ProtocolFramePtr packet) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
// Replace a potential secondary transport ID in the packet with the primary
// transport ID
@@ -1502,7 +1465,7 @@ RESULT_CODE ProtocolHandlerImpl::HandleMultiFrameMessage(
}
if (multiframe_builder_.AddFrame(packet) != RESULT_OK) {
- LOG4CXX_WARN(logger_, "Frame assembling issue");
+ SDL_LOG_WARN("Frame assembling issue");
}
return RESULT_OK;
@@ -1510,42 +1473,41 @@ RESULT_CODE ProtocolHandlerImpl::HandleMultiFrameMessage(
RESULT_CODE ProtocolHandlerImpl::HandleControlMessage(
const ProtocolFramePtr packet) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
// TODO{ALeshin}: Rename "Session" to "Service" on PH, CH, AM levels
switch (packet->frame_data()) {
case FRAME_DATA_START_SERVICE: {
- LOG4CXX_TRACE(logger_, "FrameData: StartService");
+ SDL_LOG_TRACE("FrameData: StartService");
return HandleControlMessageStartSession(packet);
}
case FRAME_DATA_END_SERVICE: {
- LOG4CXX_TRACE(logger_, "FrameData: StopService");
+ SDL_LOG_TRACE("FrameData: StopService");
return HandleControlMessageEndSession(*packet);
}
case FRAME_DATA_END_SERVICE_ACK: {
- LOG4CXX_TRACE(logger_, "FrameData: StopService ACK");
+ SDL_LOG_TRACE("FrameData: StopService ACK");
return HandleControlMessageEndServiceACK(*packet);
}
case FRAME_DATA_HEART_BEAT: {
- LOG4CXX_TRACE(logger_, "FrameData: Heartbeat");
+ SDL_LOG_TRACE("FrameData: Heartbeat");
return HandleControlMessageHeartBeat(*packet);
}
case FRAME_DATA_HEART_BEAT_ACK: {
- LOG4CXX_TRACE(logger_, "FrameData Heartbeat ACK");
- LOG4CXX_DEBUG(logger_,
- "Received Heartbeat ACK from mobile,"
- " connection: "
- << packet->connection_id());
+ SDL_LOG_TRACE("FrameData Heartbeat ACK");
+ SDL_LOG_DEBUG(
+ "Received Heartbeat ACK from mobile,"
+ " connection: "
+ << packet->connection_id());
return RESULT_OK;
}
case FRAME_DATA_REGISTER_SECONDARY_TRANSPORT: {
- LOG4CXX_TRACE(logger_, "FrameData: RegisterSecondaryTransport");
+ SDL_LOG_TRACE("FrameData: RegisterSecondaryTransport");
return HandleControlMessageRegisterSecondaryTransport(packet);
}
default:
- LOG4CXX_WARN(logger_,
- "Control message of type "
- << static_cast<int>(packet->frame_data()) << " ignored");
+ SDL_LOG_WARN("Control message of type "
+ << static_cast<int>(packet->frame_data()) << " ignored");
return RESULT_OK;
}
return RESULT_OK;
@@ -1553,12 +1515,11 @@ RESULT_CODE ProtocolHandlerImpl::HandleControlMessage(
uint32_t get_hash_id(const ProtocolPacket& packet) {
if (packet.protocol_version() < PROTOCOL_VERSION_2) {
- LOG4CXX_DEBUG(logger_,
- "Packet without hash data (protocol version less 2)");
+ SDL_LOG_DEBUG("Packet without hash data (protocol version less 2)");
return HASH_ID_NOT_SUPPORTED;
}
if (packet.data_size() < 4) {
- LOG4CXX_WARN(logger_, "Packet without hash data (data size less 4)");
+ SDL_LOG_WARN("Packet without hash data (data size less 4)");
return HASH_ID_WRONG;
}
if (packet.protocol_version() >= PROTOCOL_VERSION_5) {
@@ -1571,7 +1532,7 @@ uint32_t get_hash_id(const ProtocolPacket& packet) {
bson_object_deinitialize(&obj);
return hash_id;
} else {
- LOG4CXX_WARN(logger_, "Failed to parse BSON field for hash ID");
+ SDL_LOG_WARN("Failed to parse BSON field for hash ID");
return HASH_ID_WRONG;
}
} else {
@@ -1585,7 +1546,7 @@ uint32_t get_hash_id(const ProtocolPacket& packet) {
RESULT_CODE ProtocolHandlerImpl::HandleControlMessageEndSession(
const ProtocolPacket& packet) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
const uint8_t current_session_id = packet.session_id();
uint32_t hash_id = get_hash_id(packet);
@@ -1603,8 +1564,7 @@ RESULT_CODE ProtocolHandlerImpl::HandleControlMessageEndSession(
service_type);
message_counters_.erase(current_session_id);
} else {
- LOG4CXX_WARN(logger_,
- "Refused to end session " << static_cast<int>(service_type)
+ SDL_LOG_WARN("Refused to end session " << static_cast<int>(service_type)
<< " type.");
if (packet.protocol_version() >= PROTOCOL_VERSION_5) {
std::vector<std::string> rejectedParams;
@@ -1632,7 +1592,7 @@ const ServiceStatus ProtocolHandlerImpl::ServiceDisallowedBySettings(
const ConnectionID connection_id,
const uint8_t session_id,
const bool protection) const {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
const std::string& transport =
session_observer_.TransportTypeProfileStringFromConnHandle(connection_id);
@@ -1682,7 +1642,7 @@ const ServiceStatus ProtocolHandlerImpl::ServiceDisallowedBySettings(
RESULT_CODE ProtocolHandlerImpl::HandleControlMessageEndServiceACK(
const ProtocolPacket& packet) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
const uint8_t current_session_id = packet.session_id();
uint32_t hash_id = get_hash_id(packet);
@@ -1693,7 +1653,7 @@ RESULT_CODE ProtocolHandlerImpl::HandleControlMessageEndServiceACK(
connection_id, current_session_id, &hash_id, service_type);
if (0 == session_key) {
- LOG4CXX_WARN(logger_, "Refused to end service");
+ SDL_LOG_WARN("Refused to end service");
return RESULT_FAIL;
}
@@ -1702,9 +1662,9 @@ RESULT_CODE ProtocolHandlerImpl::HandleControlMessageEndServiceACK(
RESULT_CODE ProtocolHandlerImpl::HandleControlMessageStartSession(
const ProtocolFramePtr packet) {
- LOG4CXX_AUTO_TRACE(logger_);
- LOG4CXX_DEBUG(
- logger_,
+ SDL_LOG_AUTO_TRACE();
+ SDL_LOG_DEBUG(
+
"Protocol version:" << static_cast<int>(packet->protocol_version()));
const ServiceType service_type = ServiceTypeFromByte(packet->service_type());
@@ -1730,9 +1690,8 @@ RESULT_CODE ProtocolHandlerImpl::HandleControlMessageStartSession(
service_type, connection_id, session_id, protection);
if (ServiceStatus::INVALID_ENUM != settings_check) {
- LOG4CXX_DEBUG(logger_,
- "Rejecting StartService for service:"
- << service_type << ", disallowed by settings.");
+ SDL_LOG_DEBUG("Rejecting StartService for service:"
+ << service_type << ", disallowed by settings.");
service_status_update_handler_->OnServiceUpdate(
connection_key, service_type, settings_check);
SendStartSessionNAck(
@@ -1740,8 +1699,7 @@ RESULT_CODE ProtocolHandlerImpl::HandleControlMessageStartSession(
return RESULT_OK;
}
- LOG4CXX_INFO(logger_,
- "StartSession ID " << static_cast<int>(session_id)
+ SDL_LOG_INFO("StartSession ID " << static_cast<int>(session_id)
<< " and Connection ID "
<< static_cast<int>(connection_id));
@@ -1756,8 +1714,7 @@ RESULT_CODE ProtocolHandlerImpl::HandleControlMessageStartSession(
size_t bson_obj_size = bson_object_from_bytes_len(
&bson_obj, packet->data(), packet->total_data_bytes());
if (bson_obj_size == 0) {
- LOG4CXX_WARN(logger_,
- "Failed to parse BSON field of start service packet");
+ SDL_LOG_WARN("Failed to parse BSON field of start service packet");
bson_object_initialize_default(&bson_obj);
}
} else {
@@ -1773,15 +1730,14 @@ RESULT_CODE ProtocolHandlerImpl::HandleControlMessageStartSession(
RESULT_CODE ProtocolHandlerImpl::HandleControlMessageRegisterSecondaryTransport(
const ProtocolFramePtr packet) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
const uint8_t session_id = packet->session_id();
const ConnectionID connection_id = packet->connection_id();
ConnectionID primary_connection_id = 0;
- LOG4CXX_INFO(logger_,
- "RegisterSecondaryTransport ID "
- << static_cast<int>(session_id) << " and Connection ID "
- << static_cast<int>(connection_id));
+ SDL_LOG_INFO("RegisterSecondaryTransport ID "
+ << static_cast<int>(session_id) << " and Connection ID "
+ << static_cast<int>(connection_id));
if (connection_handler_.OnSecondaryTransportStarted(
primary_connection_id, connection_id, session_id)) {
@@ -1817,7 +1773,7 @@ RESULT_CODE ProtocolHandlerImpl::HandleControlMessageRegisterSecondaryTransport(
void ProtocolHandlerImpl::NotifySessionStarted(
const SessionContext& context, std::vector<std::string>& rejected_params) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
ProtocolFramePtr packet;
{
@@ -1825,7 +1781,7 @@ void ProtocolHandlerImpl::NotifySessionStarted(
StartSessionFrameMap::iterator it = start_session_frame_map_.find(
std::make_pair(context.connection_id_, context.initial_session_id_));
if (it == start_session_frame_map_.end()) {
- LOG4CXX_ERROR(logger_, "Cannot find Session Started packet");
+ SDL_LOG_ERROR("Cannot find Session Started packet");
return;
}
packet = it->second;
@@ -1836,9 +1792,8 @@ void ProtocolHandlerImpl::NotifySessionStarted(
const uint8_t protocol_version = packet->protocol_version();
if (0 == context.new_session_id_) {
- LOG4CXX_WARN(logger_,
- "Refused by session_observer to create service "
- << static_cast<int32_t>(service_type) << " type.");
+ SDL_LOG_WARN("Refused by session_observer to create service "
+ << static_cast<int32_t>(service_type) << " type.");
const auto session_id = packet->session_id();
const auto connection_key =
session_observer_.KeyFromPair(context.connection_id_, session_id);
@@ -1896,8 +1851,7 @@ void ProtocolHandlerImpl::NotifySessionStarted(
}
bson_object_deinitialize(&req_param);
} else {
- LOG4CXX_WARN(logger_,
- "Failed to parse BSON field of start service (video)");
+ SDL_LOG_WARN("Failed to parse BSON field of start service (video)");
}
}
@@ -1921,8 +1875,7 @@ void ProtocolHandlerImpl::NotifySessionStarted(
}
bson_object_deinitialize(&request_params);
} else {
- LOG4CXX_WARN(logger_,
- "Failed to parse start service packet for version string");
+ SDL_LOG_WARN("Failed to parse start service packet for version string");
fullVersion = std::make_shared<utils::SemanticVersion>();
}
} else {
@@ -1952,7 +1905,7 @@ void ProtocolHandlerImpl::NotifySessionStarted(
kUseExisting);
if (!ssl_context) {
const std::string error("CreateSSLContext failed");
- LOG4CXX_ERROR(logger_, error);
+ SDL_LOG_ERROR(error);
security_manager_->SendInternalError(
connection_key,
security_manager::SecurityManager::ERROR_INTERNAL,
@@ -1987,8 +1940,7 @@ void ProtocolHandlerImpl::NotifySessionStarted(
*fullVersion,
*start_session_ack_params);
} else {
- LOG4CXX_DEBUG(logger_,
- "Adding Handshake handler to listeners: " << handler.get());
+ SDL_LOG_DEBUG("Adding Handshake handler to listeners: " << handler.get());
security_manager::SecurityManagerListener* listener =
new HandshakeHandler(*handler);
security_manager_->AddListener(listener);
@@ -2008,9 +1960,8 @@ void ProtocolHandlerImpl::NotifySessionStarted(
}
}
- LOG4CXX_DEBUG(logger_,
- "Protection establishing for connection "
- << connection_key << " is in progress");
+ SDL_LOG_DEBUG("Protection establishing for connection "
+ << connection_key << " is in progress");
return;
}
#endif // ENABLE_SECURITY
@@ -2043,8 +1994,8 @@ void ProtocolHandlerImpl::NotifySessionStarted(
RESULT_CODE ProtocolHandlerImpl::HandleControlMessageHeartBeat(
const ProtocolPacket& packet) {
const ConnectionID connection_id = packet.connection_id();
- LOG4CXX_DEBUG(
- logger_,
+ SDL_LOG_DEBUG(
+
"Sending heart beat acknowledgment for connection " << connection_id);
uint8_t protocol_version;
if (session_observer_.ProtocolVersionUsed(
@@ -2055,20 +2006,19 @@ RESULT_CODE ProtocolHandlerImpl::HandleControlMessageHeartBeat(
return SendHeartBeatAck(
connection_id, packet.session_id(), packet.message_id());
} else {
- LOG4CXX_WARN(logger_, "HeartBeat is not supported");
+ SDL_LOG_WARN("HeartBeat is not supported");
return RESULT_HEARTBEAT_IS_NOT_SUPPORTED;
}
} else {
- LOG4CXX_WARN(
- logger_,
+ SDL_LOG_WARN(
"SendHeartBeatAck is failed connection or session does not exist");
return RESULT_FAIL;
}
}
void ProtocolHandlerImpl::PopValideAndExpirateMultiframes() {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
const ProtocolFramePtrList& frame_list = multiframe_builder_.PopMultiframes();
for (ProtocolFramePtrList::const_iterator it = frame_list.begin();
it != frame_list.end();
@@ -2081,9 +2031,8 @@ void ProtocolHandlerImpl::PopValideAndExpirateMultiframes() {
const uint32_t connection_key = session_observer_.KeyFromPair(
frame->connection_id(), frame->session_id());
- LOG4CXX_DEBUG(
- logger_,
- "Result frame" << frame << "for connection " << connection_key);
+ SDL_LOG_DEBUG("Result frame" << frame << "for connection "
+ << connection_key);
const RawMessagePtr rawMessage(new RawMessage(connection_key,
frame->protocol_version(),
frame->data(),
@@ -2105,18 +2054,16 @@ void ProtocolHandlerImpl::PopValideAndExpirateMultiframes() {
}
bool ProtocolHandlerImpl::TrackMessage(const uint32_t& connection_key) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
const size_t& frequency_time = get_settings().message_frequency_time();
const size_t& frequency_count = get_settings().message_frequency_count();
if (frequency_time > 0u && frequency_count > 0u) {
const size_t message_frequency =
message_meter_.TrackMessage(connection_key);
- LOG4CXX_DEBUG(
- logger_,
- "Frequency of " << connection_key << " is " << message_frequency);
+ SDL_LOG_DEBUG("Frequency of " << connection_key << " is "
+ << message_frequency);
if (message_frequency > frequency_count) {
- LOG4CXX_WARN(logger_,
- "Frequency of " << connection_key << " is marked as high.");
+ SDL_LOG_WARN("Frequency of " << connection_key << " is marked as high.");
session_observer_.OnApplicationFloodCallBack(connection_key);
message_meter_.RemoveIdentifier(connection_key);
return true;
@@ -2129,18 +2076,17 @@ bool ProtocolHandlerImpl::TrackMalformedMessage(const uint32_t& connection_key,
const size_t count) {
const size_t& malformed_frequency_count =
get_settings().malformed_frequency_count();
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
if (get_settings().malformed_frequency_time() > 0u &&
malformed_frequency_count > 0u) {
const size_t malformed_message_frequency =
malformed_message_meter_.TrackMessages(connection_key, count);
- LOG4CXX_DEBUG(logger_,
- "Malformed frequency of " << connection_key << " is "
+ SDL_LOG_DEBUG("Malformed frequency of " << connection_key << " is "
<< malformed_message_frequency);
if (!get_settings().malformed_message_filtering() ||
malformed_message_frequency > malformed_frequency_count) {
- LOG4CXX_WARN(
- logger_,
+ SDL_LOG_WARN(
+
"Malformed frequency of " << connection_key << " is marked as high.");
session_observer_.OnMalformedMessageCallback(connection_key);
malformed_message_meter_.RemoveIdentifier(connection_key);
@@ -2151,7 +2097,7 @@ bool ProtocolHandlerImpl::TrackMalformedMessage(const uint32_t& connection_key,
}
void ProtocolHandlerImpl::Handle(const impl::RawFordMessageFromMobile message) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
switch (message->service_type()) {
case kMobileNav:
@@ -2165,7 +2111,7 @@ void ProtocolHandlerImpl::Handle(const impl::RawFordMessageFromMobile message) {
}
} break;
}
- LOG4CXX_DEBUG(logger_, "Message : " << message.get());
+ SDL_LOG_DEBUG("Message : " << message.get());
const uint8_t c_id = message->connection_id();
const uint32_t m_id = message->session_id();
@@ -2177,25 +2123,23 @@ void ProtocolHandlerImpl::Handle(const impl::RawFordMessageFromMobile message) {
if (((0 != message->data()) && (0 != message->data_size())) ||
FRAME_TYPE_CONTROL == message->frame_type() ||
FRAME_TYPE_FIRST == message->frame_type()) {
- LOG4CXX_DEBUG(logger_, "Packet: dataSize " << message->data_size());
+ SDL_LOG_DEBUG("Packet: dataSize " << message->data_size());
HandleMessage(message);
PopValideAndExpirateMultiframes();
} else {
- LOG4CXX_WARN(logger_,
- "handleMessagesFromMobileApp() - incorrect or NULL data");
+ SDL_LOG_WARN("handleMessagesFromMobileApp() - incorrect or NULL data");
}
}
void ProtocolHandlerImpl::Handle(const impl::RawFordMessageToMobile message) {
- LOG4CXX_DEBUG(logger_,
- "Message to mobile app: connection id "
- << static_cast<int>(message->connection_id())
- << ";"
- " dataSize: "
- << message->data_size()
- << " ;"
- " protocolVersion "
- << static_cast<int>(message->protocol_version()));
+ SDL_LOG_DEBUG("Message to mobile app: connection id "
+ << static_cast<int>(message->connection_id())
+ << ";"
+ " dataSize: "
+ << message->data_size()
+ << " ;"
+ " protocolVersion "
+ << static_cast<int>(message->protocol_version()));
if (message.is_final) {
sessions_last_message_id_.insert(std::pair<uint8_t, uint32_t>(
@@ -2222,7 +2166,7 @@ void ProtocolHandlerImpl::set_service_status_update_handler(
void ProtocolHandlerImpl::set_security_manager(
security_manager::SecurityManager* security_manager) {
if (!security_manager) {
- LOG4CXX_ERROR(logger_, "Invalid (NULL) pointer to SecurityManager.");
+ SDL_LOG_ERROR("Invalid (NULL) pointer to SecurityManager.");
return;
}
security_manager_ = security_manager;
@@ -2238,7 +2182,7 @@ RESULT_CODE ProtocolHandlerImpl::EncryptFrame(ProtocolFramePtr packet) {
return RESULT_OK;
}
if (!security_manager_) {
- LOG4CXX_WARN(logger_, "No security_manager_ set.");
+ SDL_LOG_WARN("No security_manager_ set.");
return RESULT_FAIL;
}
const uint32_t connection_key = session_observer_.KeyFromPair(
@@ -2246,11 +2190,11 @@ RESULT_CODE ProtocolHandlerImpl::EncryptFrame(ProtocolFramePtr packet) {
security_manager::SSLContext* context = session_observer_.GetSSLContext(
connection_key, ServiceTypeFromByte(packet->service_type()));
- LOG4CXX_DEBUG(
- logger_,
+ SDL_LOG_DEBUG(
+
"Protection flag is: " << packet->protection_flag() << std::boolalpha);
if ((!context || !context->IsInitCompleted()) || !packet->protection_flag()) {
- LOG4CXX_DEBUG(logger_, "Ecryption is skipped!");
+ SDL_LOG_DEBUG("Ecryption is skipped!");
return RESULT_OK;
}
const uint8_t* out_data;
@@ -2258,7 +2202,7 @@ RESULT_CODE ProtocolHandlerImpl::EncryptFrame(ProtocolFramePtr packet) {
if (!context->Encrypt(
packet->data(), packet->data_size(), &out_data, &out_data_size)) {
const std::string error_text(context->LastError());
- LOG4CXX_ERROR(logger_, "Enryption failed: " << error_text);
+ SDL_LOG_ERROR("Enryption failed: " << error_text);
security_manager_->SendInternalError(
connection_key,
security_manager::SecurityManager::ERROR_ENCRYPTION_FAILED,
@@ -2270,8 +2214,7 @@ RESULT_CODE ProtocolHandlerImpl::EncryptFrame(ProtocolFramePtr packet) {
packet->connection_id(), packet->session_id(), &hash_id, kRpc);
return RESULT_OK;
}
- LOG4CXX_DEBUG(logger_,
- "Encrypted " << packet->data_size() << " bytes to "
+ SDL_LOG_DEBUG("Encrypted " << packet->data_size() << " bytes to "
<< out_data_size << " bytes");
DCHECK(out_data);
DCHECK(out_data_size);
@@ -2302,12 +2245,12 @@ RESULT_CODE ProtocolHandlerImpl::DecryptFrame(ProtocolFramePtr packet) {
}
if (shoud_not_decrypt) {
- LOG4CXX_DEBUG(logger_, "Frame will not be decrypted");
+ SDL_LOG_DEBUG("Frame will not be decrypted");
return RESULT_OK;
}
if (!security_manager_) {
- LOG4CXX_WARN(logger_, "No security_manager_ set.");
+ SDL_LOG_WARN("No security_manager_ set.");
return RESULT_FAIL;
}
const uint32_t connection_key = session_observer_.KeyFromPair(
@@ -2316,8 +2259,7 @@ RESULT_CODE ProtocolHandlerImpl::DecryptFrame(ProtocolFramePtr packet) {
connection_key, ServiceTypeFromByte(packet->service_type()));
if (!context || !context->IsInitCompleted()) {
const std::string error_text("Fail decryption for unprotected service ");
- LOG4CXX_ERROR(logger_,
- error_text << static_cast<int>(packet->service_type()));
+ SDL_LOG_ERROR(error_text << static_cast<int>(packet->service_type()));
security_manager_->SendInternalError(
connection_key,
security_manager::SecurityManager::ERROR_SERVICE_NOT_PROTECTED,
@@ -2329,7 +2271,7 @@ RESULT_CODE ProtocolHandlerImpl::DecryptFrame(ProtocolFramePtr packet) {
if (!context->Decrypt(
packet->data(), packet->data_size(), &out_data, &out_data_size)) {
const std::string error_text(context->LastError());
- LOG4CXX_ERROR(logger_, "Decryption failed: " << error_text);
+ SDL_LOG_ERROR("Decryption failed: " << error_text);
security_manager_->SendInternalError(
connection_key,
security_manager::SecurityManager::ERROR_DECRYPTION_FAILED,
@@ -2341,8 +2283,7 @@ RESULT_CODE ProtocolHandlerImpl::DecryptFrame(ProtocolFramePtr packet) {
packet->connection_id(), packet->session_id(), &hash_id, kRpc);
return RESULT_ENCRYPTION_FAILED;
}
- LOG4CXX_DEBUG(logger_,
- "Decrypted " << packet->data_size() << " bytes to "
+ SDL_LOG_DEBUG("Decrypted " << packet->data_size() << " bytes to "
<< out_data_size << " bytes");
DCHECK(out_data);
DCHECK(out_data_size);
@@ -2358,8 +2299,8 @@ RESULT_CODE ProtocolHandlerImpl::DecryptFrame(ProtocolFramePtr packet) {
void ProtocolHandlerImpl::SendFramesNumber(uint32_t connection_key,
int32_t number_of_frames) {
- LOG4CXX_DEBUG(
- logger_, "SendFramesNumber MobileNaviAck for session " << connection_key);
+ SDL_LOG_DEBUG("SendFramesNumber MobileNaviAck for session "
+ << connection_key);
transport_manager::ConnectionUID connection_id = 0;
uint8_t session_id = 0;
@@ -2387,11 +2328,10 @@ void ProtocolHandlerImpl::SendFramesNumber(uint32_t connection_key,
sizeof(number_of_frames));
raw_ford_messages_to_mobile_.PostMessage(
impl::RawFordMessageToMobile(ptr, false));
- LOG4CXX_DEBUG(logger_, "SendFramesNumber finished successfully");
+ SDL_LOG_DEBUG("SendFramesNumber finished successfully");
}
} else {
- LOG4CXX_WARN(
- logger_,
+ SDL_LOG_WARN(
"SendFramesNumber is failed connection or session does not exist");
}
}
@@ -2421,7 +2361,7 @@ std::string ConvertPacketDataToString(const uint8_t* data,
}
uint8_t ProtocolHandlerImpl::SupportedSDLProtocolVersion() const {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
return get_settings().max_supported_protocol_version();
}
@@ -2464,7 +2404,7 @@ ProtocolHandlerImpl::GetTransportTypeFromConnectionType(
if (it != transportTypes.end()) {
result = it->second;
} else {
- LOG4CXX_ERROR(logger_, "Unknown connection type " << connection_type);
+ SDL_LOG_ERROR("Unknown connection type " << connection_type);
}
return result;
@@ -2475,7 +2415,7 @@ const bool ProtocolHandlerImpl::ParseSecondaryTransportConfiguration(
std::vector<std::string>& secondaryTransports,
std::vector<int32_t>& audioServiceTransports,
std::vector<int32_t>& videoServiceTransports) const {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
std::vector<std::string> secondary_transport_types;
// First discover what the connection type of the primary transport is
@@ -2493,8 +2433,8 @@ const bool ProtocolHandlerImpl::ParseSecondaryTransportConfiguration(
} else if (td.transport_type_ == impl::TransportType::TT_WIFI) {
secondary_transport_types = settings_.secondary_transports_for_wifi();
} else {
- LOG4CXX_ERROR(
- logger_,
+ SDL_LOG_ERROR(
+
"Bad or unknown device type in ParseSecondaryTransportConfiguration");
return false;
}
@@ -2535,7 +2475,7 @@ void ProtocolHandlerImpl::GenerateSecondaryTransportsForStartSessionAck(
bool device_is_ios,
bool device_is_android,
std::vector<std::string>& secondaryTransports) const {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
// Parse the "secondary_transport_types" vector (which comes from
// smartDeviceLink.ini). For each entry in the vector, add an
@@ -2546,34 +2486,31 @@ void ProtocolHandlerImpl::GenerateSecondaryTransportsForStartSessionAck(
const utils::custom_string::CustomString transport_type(*it);
if (transport_type.CompareIgnoreCase("USB")) {
if (device_is_ios) {
- LOG4CXX_TRACE(
- logger_,
+ SDL_LOG_TRACE(
"Adding IAP_USB to secondaryTransports for StartSessionAck");
secondaryTransports.push_back("IAP_USB");
}
if (device_is_android) {
- LOG4CXX_TRACE(
- logger_,
+ SDL_LOG_TRACE(
"Adding AOA_USB to secondaryTransports for StartSessionAck");
secondaryTransports.push_back("AOA_USB");
}
} else if (transport_type.CompareIgnoreCase("Bluetooth")) {
if (device_is_ios) {
- LOG4CXX_TRACE(
- logger_,
+ SDL_LOG_TRACE(
+
"Adding IAP_BLUETOOTH to secondaryTransports for StartSessionAck");
secondaryTransports.push_back("IAP_BLUETOOTH");
}
if (device_is_android) {
- LOG4CXX_TRACE(
- logger_,
+ SDL_LOG_TRACE(
+
"Adding SPP_BLUETOOTH to secondaryTransports for StartSessionAck");
secondaryTransports.push_back("SPP_BLUETOOTH");
}
}
if (transport_type.CompareIgnoreCase("WiFi")) {
- LOG4CXX_TRACE(
- logger_,
+ SDL_LOG_TRACE(
"Adding TCP_WIFI to secondaryTransports for StartSessionAck");
secondaryTransports.push_back("TCP_WIFI");
}
@@ -2589,13 +2526,13 @@ void ProtocolHandlerImpl::GenerateServiceTransportsForStartSessionAck(
const impl::TransportType primary_transport_type,
const std::vector<std::string>& secondary_transport_types,
std::vector<int32_t>& serviceTransports) const {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
if (service_transports.size() == 0) {
if (secondary_enabled && !secondary_transport_types.empty()) {
- LOG4CXX_TRACE(logger_,
- "Empty Service Transports. Allowing service to run on both "
- "connections");
+ SDL_LOG_TRACE(
+ "Empty Service Transports. Allowing service to run on both "
+ "connections");
serviceTransports.push_back(1);
serviceTransports.push_back(2);
} else {
@@ -2607,15 +2544,15 @@ void ProtocolHandlerImpl::GenerateServiceTransportsForStartSessionAck(
std::vector<std::string>::const_iterator it = service_transports.begin();
for (; it != service_transports.end(); it++) {
const utils::custom_string::CustomString transport(*it);
- LOG4CXX_TRACE(
- logger_,
+ SDL_LOG_TRACE(
+
"Service Allowed to run on " << transport.c_str() << " transport");
if (!fPrimaryAdded &&
(transport.CompareIgnoreCase(primary_connection_type.c_str()) ||
(transport.CompareIgnoreCase("IAP_USB") &&
primary_transport_type == impl::TransportType::TT_USB))) {
- LOG4CXX_TRACE(logger_, "Service allowed on primary transport");
+ SDL_LOG_TRACE("Service allowed on primary transport");
serviceTransports.push_back(1);
fPrimaryAdded = true;
}
@@ -2631,7 +2568,7 @@ void ProtocolHandlerImpl::GenerateServiceTransportsForStartSessionAck(
secondary_transport_type.c_str());
});
if (found != secondary_transport_types.end()) {
- LOG4CXX_TRACE(logger_, "Service allowed on secondary transport");
+ SDL_LOG_TRACE("Service allowed on secondary transport");
serviceTransports.push_back(2);
fSecondaryAdded = true;
}
diff --git a/src/components/protocol_handler/src/protocol_packet.cc b/src/components/protocol_handler/src/protocol_packet.cc
index 5bee1c16b2..bd052c8660 100644
--- a/src/components/protocol_handler/src/protocol_packet.cc
+++ b/src/components/protocol_handler/src/protocol_packet.cc
@@ -46,7 +46,7 @@
namespace protocol_handler {
-CREATE_LOGGERPTR_GLOBAL(logger_, "ProtocolHandler")
+SDL_CREATE_LOG_VARIABLE("ProtocolHandler")
namespace {
std::string StringifyFrameType(uint8_t type) {
@@ -64,7 +64,7 @@ std::string StringifyFrameType(uint8_t type) {
return "FRAME_TYPE_FIRST";
default:
- LOG4CXX_ERROR(logger_, "Unknown frame type:" << static_cast<int>(type));
+ SDL_LOG_ERROR("Unknown frame type:" << static_cast<int>(type));
break;
}
@@ -117,11 +117,10 @@ inline uint32_t read_be_uint32(const uint8_t* const data) {
void ProtocolPacket::ProtocolHeader::deserialize(const uint8_t* message,
const size_t messageSize) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
DCHECK_OR_RETURN_VOID(message);
if (messageSize < PROTOCOL_HEADER_V1_SIZE) {
- LOG4CXX_DEBUG(logger_,
- "Message size less " << PROTOCOL_HEADER_V1_SIZE << " bytes");
+ SDL_LOG_DEBUG("Message size less " << PROTOCOL_HEADER_V1_SIZE << " bytes");
return;
}
// first 4 bits
@@ -143,15 +142,14 @@ void ProtocolPacket::ProtocolHeader::deserialize(const uint8_t* message,
case PROTOCOL_VERSION_4:
case PROTOCOL_VERSION_5: {
if (messageSize < PROTOCOL_HEADER_V2_SIZE) {
- LOG4CXX_DEBUG(
- logger_,
- "Message size less " << PROTOCOL_HEADER_V2_SIZE << " bytes");
+ SDL_LOG_DEBUG("Message size less " << PROTOCOL_HEADER_V2_SIZE
+ << " bytes");
return;
}
messageId = read_be_uint32(message + 8);
} break;
default:
- LOG4CXX_WARN(logger_, "Unknown version:" << static_cast<int>(version));
+ SDL_LOG_WARN("Unknown version:" << static_cast<int>(version));
messageId = 0;
break;
}
@@ -167,44 +165,39 @@ ProtocolPacket::ProtocolHeaderValidator::ProtocolHeaderValidator()
void ProtocolPacket::ProtocolHeaderValidator::set_max_payload_size(
const size_t max_payload_size) {
- LOG4CXX_DEBUG(logger_, "New maximum payload size is " << max_payload_size);
+ SDL_LOG_DEBUG("New maximum payload size is " << max_payload_size);
max_payload_size_ = max_payload_size;
}
void ProtocolPacket::ProtocolHeaderValidator::set_max_control_payload_size(
const size_t max_payload_size) {
- LOG4CXX_DEBUG(logger_,
- "New maximum Control payload size is " << max_payload_size);
+ SDL_LOG_DEBUG("New maximum Control payload size is " << max_payload_size);
max_control_payload_size_ = max_payload_size;
}
void ProtocolPacket::ProtocolHeaderValidator::set_max_rpc_payload_size(
const size_t max_payload_size) {
- LOG4CXX_DEBUG(logger_,
- "New maximum RPC payload size is " << max_payload_size);
+ SDL_LOG_DEBUG("New maximum RPC payload size is " << max_payload_size);
max_rpc_payload_size_ = max_payload_size;
}
void ProtocolPacket::ProtocolHeaderValidator::set_max_audio_payload_size(
const size_t max_payload_size) {
- LOG4CXX_DEBUG(logger_,
- "New maximum audio payload size is " << max_payload_size);
+ SDL_LOG_DEBUG("New maximum audio payload size is " << max_payload_size);
max_audio_payload_size_ = max_payload_size;
}
void ProtocolPacket::ProtocolHeaderValidator::set_max_video_payload_size(
const size_t max_payload_size) {
- LOG4CXX_DEBUG(logger_,
- "New maximum video payload size is " << max_payload_size);
+ SDL_LOG_DEBUG("New maximum video payload size is " << max_payload_size);
max_video_payload_size_ = max_payload_size;
}
void ProtocolPacket::ProtocolHeaderValidator::
set_max_protocol_version_supported(
const uint16_t max_protocol_version_supported) {
- LOG4CXX_DEBUG(logger_,
- "New maximum protocol version supported is "
- << max_protocol_version_supported);
+ SDL_LOG_DEBUG("New maximum protocol version supported is "
+ << max_protocol_version_supported);
max_protocol_version_supported_ = max_protocol_version_supported;
}
@@ -262,14 +255,14 @@ ProtocolPacket::ProtocolHeaderValidator::max_payload_size_by_service_type(
: max_video_payload_size_;
break;
case kInvalidServiceType:
- LOG4CXX_WARN(logger_, "Invalid service type: " << static_cast<int>(type));
+ SDL_LOG_WARN("Invalid service type: " << static_cast<int>(type));
}
return payload_size;
}
RESULT_CODE ProtocolPacket::ProtocolHeaderValidator::validate(
const ProtocolHeader& header) const {
- LOG4CXX_DEBUG(logger_, "Validating header - " << header);
+ SDL_LOG_DEBUG("Validating header - " << header);
// expected payload size will be calculated depending
// on used protocol version and service type
size_t payload_size = MAXIMUM_FRAME_DATA_V2_SIZE;
@@ -290,17 +283,15 @@ RESULT_CODE ProtocolPacket::ProtocolHeaderValidator::validate(
ServiceTypeFromByte(header.serviceType));
break;
default:
- LOG4CXX_WARN(logger_,
- "Unknown version:" << static_cast<int>(header.version));
+ SDL_LOG_WARN("Unknown version:" << static_cast<int>(header.version));
return RESULT_FAIL;
}
// ServiceType shall be equal 0x0 (Control), 0x07 (RPC), 0x0A (PCM), 0x0B
// (Video), 0x0F (Bulk)
if (ServiceTypeFromByte(header.serviceType) == kInvalidServiceType) {
- LOG4CXX_WARN(
- logger_,
- "Invalide service type" << static_cast<int>(header.serviceType));
+ SDL_LOG_WARN("Invalide service type"
+ << static_cast<int>(header.serviceType));
return RESULT_FAIL;
}
// Check frame info for each frame type
@@ -327,26 +318,23 @@ RESULT_CODE ProtocolPacket::ProtocolHeaderValidator::validate(
case FRAME_DATA_HEART_BEAT_ACK:
break;
default:
- LOG4CXX_WARN(logger_,
- "FRAME_TYPE_CONTROL - Invalide frame data "
- << static_cast<int>(header.frameData));
+ SDL_LOG_WARN("FRAME_TYPE_CONTROL - Invalide frame data "
+ << static_cast<int>(header.frameData));
return RESULT_FAIL;
}
break;
}
case FRAME_TYPE_SINGLE:
if (header.frameData != FRAME_DATA_SINGLE) {
- LOG4CXX_WARN(logger_,
- "FRAME_TYPE_SINGLE - Invalide frame data "
- << static_cast<int>(header.frameData));
+ SDL_LOG_WARN("FRAME_TYPE_SINGLE - Invalide frame data "
+ << static_cast<int>(header.frameData));
return RESULT_FAIL;
}
break;
case FRAME_TYPE_FIRST:
if (header.frameData != FRAME_DATA_FIRST) {
- LOG4CXX_WARN(logger_,
- "FRAME_TYPE_FIRST - Invalide frame data "
- << static_cast<int>(header.frameData));
+ SDL_LOG_WARN("FRAME_TYPE_FIRST - Invalide frame data "
+ << static_cast<int>(header.frameData));
return RESULT_FAIL;
}
break;
@@ -354,8 +342,7 @@ RESULT_CODE ProtocolPacket::ProtocolHeaderValidator::validate(
// Could have any FrameInfo value
break;
default:
- LOG4CXX_WARN(logger_,
- "Unknown frame type " << static_cast<int>(header.frameType));
+ SDL_LOG_WARN("Unknown frame type " << static_cast<int>(header.frameType));
// All other Frame type is invalid
return RESULT_FAIL;
}
@@ -372,29 +359,27 @@ RESULT_CODE ProtocolPacket::ProtocolHeaderValidator::validate(
if (header.dataSize > payload_size ||
(FRAME_TYPE_CONTROL != header.frameType && header.dataSize == 0u)) {
UNUSED(StringifyFrameType);
- LOG4CXX_WARN(
- logger_,
+ SDL_LOG_WARN(
+
"Packet data size of "
- << StringifyFrameType(header.frameType)
- << " frame must be in range (0, payload_size=" << payload_size
- << "], but actual value is " << header.dataSize);
+ << StringifyFrameType(header.frameType)
+ << " frame must be in range (0, payload_size=" << payload_size
+ << "], but actual value is " << header.dataSize);
return RESULT_FAIL;
}
} break;
case FRAME_TYPE_FIRST:
if (FIRST_FRAME_DATA_SIZE != header.dataSize) {
- LOG4CXX_WARN(logger_,
- "Packet data size of FRAME_TYPE_FIRST frame must equal "
- << static_cast<int>(FIRST_FRAME_DATA_SIZE)
- << ", but actual value is " << header.dataSize);
+ SDL_LOG_WARN("Packet data size of FRAME_TYPE_FIRST frame must equal "
+ << static_cast<int>(FIRST_FRAME_DATA_SIZE)
+ << ", but actual value is " << header.dataSize);
return RESULT_FAIL;
}
break;
default:
- LOG4CXX_WARN(logger_,
- "Unknown frame type " << static_cast<int>(header.frameType));
+ SDL_LOG_WARN("Unknown frame type " << static_cast<int>(header.frameType));
return RESULT_FAIL;
}
// Message ID be equal or greater than 0x01 (not actual for 1 protocol version
@@ -402,11 +387,11 @@ RESULT_CODE ProtocolPacket::ProtocolHeaderValidator::validate(
if (header.messageId <= 0) {
if (FRAME_TYPE_CONTROL != header.frameType &&
PROTOCOL_VERSION_1 != header.version) {
- LOG4CXX_WARN(logger_, "Message ID shall be greater than 0x00");
+ SDL_LOG_WARN("Message ID shall be greater than 0x00");
return RESULT_FAIL;
}
}
- LOG4CXX_DEBUG(logger_, "Message header is completely correct.");
+ SDL_LOG_DEBUG("Message header is completely correct.");
return RESULT_OK;
}
@@ -444,7 +429,7 @@ ProtocolPacket::ProtocolPacket(ConnectionID connection_id)
// Serialization
RawMessagePtr ProtocolPacket::serializePacket() const {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
// TODO(EZamakhov): Move header serialization to ProtocolHeader
// version is low byte
const uint8_t version_byte = packet_header_.version << 4;
@@ -541,7 +526,7 @@ bool ProtocolPacket::operator==(const ProtocolPacket& other) const {
}
void ProtocolPacket::HandleRawFirstFrameData(const uint8_t* message) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
payload_size_ = 0;
const uint8_t* data = message;
uint32_t total_data_bytes = data[0] << 24;
@@ -553,7 +538,7 @@ void ProtocolPacket::HandleRawFirstFrameData(const uint8_t* message) {
RESULT_CODE ProtocolPacket::deserializePacket(const uint8_t* message,
const size_t messageSize) {
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
DCHECK_OR_RETURN(message, RESULT_FAIL);
packet_header_.deserialize(message, messageSize);
const uint8_t offset = packet_header_.version == PROTOCOL_VERSION_1
@@ -630,8 +615,8 @@ uint8_t* ProtocolPacket::data() const {
}
void ProtocolPacket::set_total_data_bytes(size_t dataBytes) {
- LOG4CXX_AUTO_TRACE(logger_);
- LOG4CXX_DEBUG(logger_, "Data bytes : " << dataBytes);
+ SDL_LOG_AUTO_TRACE();
+ SDL_LOG_DEBUG("Data bytes : " << dataBytes);
if (dataBytes) {
delete[] packet_data_.data;
packet_data_.data = new (std::nothrow) uint8_t[dataBytes];
diff --git a/src/components/protocol_handler/src/service_status_update_handler.cc b/src/components/protocol_handler/src/service_status_update_handler.cc
index 7b2c67ea23..71d11bcf5b 100644
--- a/src/components/protocol_handler/src/service_status_update_handler.cc
+++ b/src/components/protocol_handler/src/service_status_update_handler.cc
@@ -3,7 +3,7 @@
namespace protocol_handler {
-CREATE_LOGGERPTR_GLOBAL(logger_, "ServiceStatusUpdateHandler")
+SDL_CREATE_LOG_VARIABLE("ServiceStatusUpdateHandler")
hmi_apis::Common_ServiceType::eType GetHMIServiceType(
protocol_handler::ServiceType service_type) {
@@ -30,7 +30,7 @@ void ServiceStatusUpdateHandler::OnServiceUpdate(
using namespace hmi_apis;
typedef utils::Optional<Common_ServiceStatusUpdateReason::eType>
UpdateReasonOptional;
- LOG4CXX_AUTO_TRACE(logger_);
+ SDL_LOG_AUTO_TRACE();
auto hmi_service_type = GetHMIServiceType(service_type);
switch (service_status) {
@@ -107,9 +107,8 @@ void ServiceStatusUpdateHandler::OnServiceUpdate(
update_reason);
}
default: {
- LOG4CXX_WARN(logger_,
- "Received unknown ServiceStatus: "
- << static_cast<int32_t>(service_status));
+ SDL_LOG_WARN("Received unknown ServiceStatus: "
+ << static_cast<int32_t>(service_status));
return;
}
}