mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-30 01:27:56 +00:00
Add emojis (#5420)
This commit is contained in:
@@ -293,7 +293,7 @@ impl NetworkBehaviour for DiscoveryBehaviour {
|
||||
fn inject_new_external_addr(&mut self, addr: &Multiaddr) {
|
||||
let new_addr = addr.clone()
|
||||
.with(Protocol::P2p(self.local_peer_id.clone().into()));
|
||||
info!(target: "sub-libp2p", "Discovered new external address for our node: {}", new_addr);
|
||||
info!(target: "sub-libp2p", "🔍 Discovered new external address for our node: {}", new_addr);
|
||||
NetworkBehaviour::inject_new_external_addr(&mut self.kademlia, addr)
|
||||
}
|
||||
|
||||
|
||||
@@ -270,7 +270,7 @@ impl<B: BlockT> LightDispatch<B> where
|
||||
let request = match self.remove(peer.clone(), request_id) {
|
||||
Some(request) => request,
|
||||
None => {
|
||||
info!("Invalid remote {} response from peer {}", rtype, peer);
|
||||
info!("💔 Invalid remote {} response from peer {}", rtype, peer);
|
||||
network.report_peer(&peer, ReputationChange::new_fatal("Invalid remote response"));
|
||||
network.disconnect_peer(&peer);
|
||||
self.remove_peer(&peer);
|
||||
@@ -282,7 +282,7 @@ impl<B: BlockT> LightDispatch<B> where
|
||||
let (retry_count, retry_request_data) = match try_accept(request, &self.checker) {
|
||||
Accept::Ok => (retry_count, None),
|
||||
Accept::CheckFailed(error, retry_request_data) => {
|
||||
info!("Failed to check remote {} response from peer {}: {}", rtype, peer, error);
|
||||
info!("💔 Failed to check remote {} response from peer {}: {}", rtype, peer, error);
|
||||
network.report_peer(&peer, ReputationChange::new_fatal("Failed remote response check"));
|
||||
network.disconnect_peer(&peer);
|
||||
self.remove_peer(&peer);
|
||||
@@ -296,7 +296,7 @@ impl<B: BlockT> LightDispatch<B> where
|
||||
}
|
||||
},
|
||||
Accept::Unexpected(retry_request_data) => {
|
||||
info!("Unexpected response to remote {} from peer", rtype);
|
||||
info!("💔 Unexpected response to remote {} from peer", rtype);
|
||||
network.report_peer(&peer, ReputationChange::new_fatal("Unexpected remote response"));
|
||||
network.disconnect_peer(&peer);
|
||||
self.remove_peer(&peer);
|
||||
|
||||
@@ -378,12 +378,12 @@ impl<B: BlockT> ChainSync<B> {
|
||||
Err(BadPeer(who, rep::BLOCKCHAIN_READ_ERROR))
|
||||
}
|
||||
Ok(BlockStatus::KnownBad) => {
|
||||
info!("New peer with known bad best block {} ({}).", best_hash, best_number);
|
||||
info!("💔 New peer with known bad best block {} ({}).", best_hash, best_number);
|
||||
Err(BadPeer(who, rep::BAD_BLOCK))
|
||||
}
|
||||
Ok(BlockStatus::Unknown) => {
|
||||
if best_number.is_zero() {
|
||||
info!("New peer with unknown genesis hash {} ({}).", best_hash, best_number);
|
||||
info!("💔 New peer with unknown genesis hash {} ({}).", best_hash, best_number);
|
||||
return Err(BadPeer(who, rep::GENESIS_MISMATCH));
|
||||
}
|
||||
// If there are more than `MAJOR_SYNC_BLOCKS` in the import queue then we have
|
||||
@@ -711,7 +711,7 @@ impl<B: BlockT> ChainSync<B> {
|
||||
return Err(BadPeer(who, rep::UNKNOWN_ANCESTOR))
|
||||
},
|
||||
(_, Err(e)) => {
|
||||
info!("Error answering legitimate blockchain query: {:?}", e);
|
||||
info!("❌ Error answering legitimate blockchain query: {:?}", e);
|
||||
return Err(BadPeer(who, rep::BLOCKCHAIN_READ_ERROR))
|
||||
}
|
||||
};
|
||||
@@ -943,7 +943,7 @@ impl<B: BlockT> ChainSync<B> {
|
||||
|
||||
if aux.bad_justification {
|
||||
if let Some(peer) = who {
|
||||
info!("Sent block with bad justification to import");
|
||||
info!("💔 Sent block with bad justification to import");
|
||||
output.push(Err(BadPeer(peer, rep::BAD_JUSTIFICATION)));
|
||||
}
|
||||
}
|
||||
@@ -973,7 +973,7 @@ impl<B: BlockT> ChainSync<B> {
|
||||
},
|
||||
Err(BlockImportError::BadBlock(who)) => {
|
||||
if let Some(peer) = who {
|
||||
info!("Block {:?} received from peer {} has been blacklisted", hash, peer);
|
||||
info!("💔 Block {:?} received from peer {} has been blacklisted", hash, peer);
|
||||
output.push(Err(BadPeer(peer, rep::BAD_BLOCK)));
|
||||
}
|
||||
},
|
||||
|
||||
@@ -221,7 +221,7 @@ impl<B: BlockT> ExtraRequests<B> {
|
||||
};
|
||||
|
||||
if self.tree.finalize_root(&finalized_hash).is_none() {
|
||||
warn!(target: "sync", "Imported {:?} {:?} which isn't a root in the tree: {:?}",
|
||||
warn!(target: "sync", "‼️ Imported {:?} {:?} which isn't a root in the tree: {:?}",
|
||||
finalized_hash,
|
||||
finalized_number,
|
||||
self.tree.roots().collect::<Vec<_>>()
|
||||
|
||||
@@ -1090,7 +1090,7 @@ impl<'a, B: BlockT, H: ExHashT> Link<B> for NetworkLink<'a, B, H> {
|
||||
fn justification_imported(&mut self, who: PeerId, hash: &B::Hash, number: NumberFor<B>, success: bool) {
|
||||
self.protocol.user_protocol_mut().justification_import_result(hash.clone(), number, success);
|
||||
if !success {
|
||||
info!("Invalid justification provided by {} for #{}", who, hash);
|
||||
info!("💔 Invalid justification provided by {} for #{}", who, hash);
|
||||
self.protocol.user_protocol_mut().disconnect_peer(&who);
|
||||
self.protocol.user_protocol_mut().report_peer(who, ReputationChange::new_fatal("Invalid justification"));
|
||||
}
|
||||
@@ -1110,7 +1110,7 @@ impl<'a, B: BlockT, H: ExHashT> Link<B> for NetworkLink<'a, B, H> {
|
||||
let success = finalization_result.is_ok();
|
||||
self.protocol.user_protocol_mut().finality_proof_import_result(request_block, finalization_result);
|
||||
if !success {
|
||||
info!("Invalid finality proof provided by {} for #{}", who, request_block.0);
|
||||
info!("💔 Invalid finality proof provided by {} for #{}", who, request_block.0);
|
||||
self.protocol.user_protocol_mut().disconnect_peer(&who);
|
||||
self.protocol.user_protocol_mut().report_peer(who, ReputationChange::new_fatal("Invalid finality proof"));
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user