switch all error logs to using *_err macros

This commit is contained in:
Olivia Lee 2024-12-14 01:42:59 -08:00
parent d28135f7ca
commit a3448b5c84
No known key found for this signature in database
GPG key ID: 54D568A15B9CD1F9
29 changed files with 145 additions and 153 deletions

View file

@ -62,8 +62,8 @@ where
.execute(reqwest_request)
.await
.inspect_err(|error| {
t::warn!(
%error,
warn_err!(
error,
appservice = registration.id,
%destination,
"Could not send request to appservice",
@ -83,7 +83,7 @@ where
// TODO: handle timeout
let body = response.bytes().await.unwrap_or_else(|error| {
t::warn!(%error, "Server error");
warn_err!(error, "Server error");
Vec::new().into()
});
@ -107,8 +107,8 @@ where
);
response.map(Some).map_err(|error| {
t::warn!(
%error,
warn_err!(
error,
appservice = %destination,
%url,
"Appservice returned invalid response bytes",

View file

@ -371,8 +371,8 @@ fn room_id_to_chunk(room_id: ruma::OwnedRoomId) -> Result<PublicRoomsChunk> {
_ => None,
})
.map_err(|error| {
t::error!(
%error,
error_err!(
error,
"Invalid room join rule event in database"
);
Error::BadDatabase(

View file

@ -505,7 +505,7 @@ async fn request_keys_from(
match &result {
Ok(_) => reset_key_request_back_off(server).await,
Err(error) => {
t::debug!(%server, %error, "remote device key query failed");
debug_err!(error, %server, "remote device key query failed");
back_off_key_requests(server.to_owned()).await;
}
}

View file

@ -212,7 +212,7 @@ async fn get_redirected_content(
location: String,
) -> Result<authenticated_media_fed::Content> {
let location = location.parse().map_err(|error| {
t::warn!(location, %error, "Invalid redirect location");
warn_err!(error, location, "Invalid redirect location");
Error::BadServerResponse("Invalid redirect location")
})?;
let response = services()
@ -226,11 +226,7 @@ async fn get_redirected_content(
.get(CONTENT_TYPE)
.map(|value| {
value.to_str().map_err(|error| {
t::error!(
?value,
%error,
"Invalid Content-Type header"
);
error_err!(error, ?value, "Invalid Content-Type header");
Error::BadServerResponse("Invalid Content-Type header")
})
})
@ -242,11 +238,7 @@ async fn get_redirected_content(
.get(CONTENT_DISPOSITION)
.map(|value| {
ContentDisposition::try_from(value.as_bytes()).map_err(|error| {
t::error!(
?value,
%error,
"Invalid Content-Disposition header"
);
error_err!(error, ?value, "Invalid Content-Disposition header");
Error::BadServerResponse("Invalid Content-Disposition header")
})
})
@ -895,8 +887,8 @@ async fn get_content_thumbnail_route_ruma(
resp.content.content_type,
));
}
Err(error) => t::warn!(
%error,
Err(error) => warn_err!(
error,
"Failed to fetch thumbnail via federation, trying to fetch \
original media and create thumbnail ourselves"
),

View file

@ -537,7 +537,7 @@ async fn join_room_by_id_helper(
.map(|join_rules_event| {
serde_json::from_str(join_rules_event.content.get())
.map_err(|error| {
t::warn!(%error, "Invalid join rules event");
warn_err!(error, "Invalid join rules event");
Error::bad_database(
"Invalid join rules event in db.",
)
@ -956,8 +956,8 @@ async fn join_room_by_id_helper(
.insert(remote_server.to_string(), signature.clone());
}
Err(error) => {
t::warn!(
%error,
warn_err!(
error,
server = %remote_server,
event = ?signed_value,
"Other server sent invalid signature in sendjoin \
@ -999,8 +999,8 @@ async fn join_room_by_id_helper(
let pdu = PduEvent::from_id_val(&event_id, value.clone()).map_err(
|error| {
t::warn!(
%error,
warn_err!(
error,
object = ?value,
"Invalid PDU in send_join response",
);
@ -1062,7 +1062,7 @@ async fn join_room_by_id_helper(
},
)
.map_err(|error| {
t::warn!(%error, "Auth check failed");
warn_err!(error, "Auth check failed");
Error::BadRequest(ErrorKind::InvalidParam, "Auth check failed")
})?;
@ -1164,8 +1164,8 @@ async fn make_join_request(
return Ok((r, remote_server.clone()));
}
Err(error) => {
t::warn!(
%error,
warn_err!(
error,
server = %remote_server,
"Remote join request failed",
);
@ -1184,7 +1184,7 @@ async fn validate_and_add_event_id(
) -> Result<(OwnedEventId, CanonicalJsonObject)> {
let mut value: CanonicalJsonObject = serde_json::from_str(pdu.get())
.map_err(|error| {
t::error!(%error, object = ?pdu, "Invalid PDU in server response");
error_err!(error, object = ?pdu, "Invalid PDU in server response");
Error::BadServerResponse("Invalid PDU in server response")
})?;
let event_id = EventId::parse(format!(
@ -1258,9 +1258,9 @@ async fn validate_and_add_event_id(
if let Err(error) =
ruma::signatures::verify_event(&keys, &value, room_version)
{
t::warn!(
warn_err!(
error,
%event_id,
%error,
?pdu,
"Event failed verification",
);
@ -1481,7 +1481,7 @@ pub(crate) async fn leave_all_rooms(user_id: &UserId) -> Result<()> {
};
if let Err(error) = leave_room(user_id, &room_id, None).await {
t::warn!(%user_id, %room_id, %error, "Failed to leave room");
warn_err!(error, %user_id, %room_id, "Failed to leave room");
}
}
@ -1557,7 +1557,7 @@ pub(crate) async fn leave_room(
.await?;
} else {
if let Err(error) = remote_leave_room(user_id, room_id).await {
t::warn!(%error, "Failed to leave room remotely");
warn_err!(error, "Failed to leave room remotely");
// Don't tell the client about this error
}

View file

@ -93,7 +93,7 @@ pub(crate) async fn set_displayname_route(
.build_and_append_pdu(pdu_builder, sender_user, &room_token)
.await
{
t::warn!(%error, "failed to add PDU");
warn_err!(error, "failed to add PDU");
}
}
@ -205,7 +205,7 @@ pub(crate) async fn set_avatar_url_route(
.build_and_append_pdu(pdu_builder, sender_user, &room_token)
.await
{
t::warn!(%error, "failed to add PDU");
warn_err!(error, "failed to add PDU");
};
}

View file

@ -400,7 +400,7 @@ pub(crate) async fn create_room_route(
for event in &body.initial_state {
let mut pdu_builder =
event.deserialize_as::<PduBuilder>().map_err(|error| {
t::warn!(%error, "Invalid initial state event");
warn_err!(error, "Invalid initial state event");
Error::BadRequest(
ErrorKind::InvalidParam,
"Invalid initial state event.",
@ -474,7 +474,7 @@ pub(crate) async fn create_room_route(
invite_helper(sender_user, user_id, &room_id, None, body.is_direct)
.await
{
t::warn!(%error, "Invite helper failed");
warn_err!(error, "Invite helper failed");
};
}

View file

@ -26,7 +26,7 @@ fn load_timeline(
.filter_map(|x| match x {
Ok(x) => Some(x),
Err(error) => {
t::error!(%error, "Bad PDU in pdus_since");
error_err!(error, "Bad PDU in pdus_since");
None
}
})

View file

@ -605,7 +605,7 @@ pub(crate) async fn sync_events_v4_route(
}
match tokio::time::timeout(duration, watcher).await {
Ok(x) => x.expect("watcher should succeed"),
Err(error) => t::debug!(%error, "Timed out"),
Err(error) => debug_err!(error, "Timed out"),
};
}

View file

@ -279,7 +279,7 @@ pub(crate) async fn sync_events_route(
}
match tokio::time::timeout(duration, watcher).await {
Ok(x) => x.expect("watcher should succeed"),
Err(error) => t::debug!(%error, "Timed out"),
Err(error) => debug_err!(error, "Timed out"),
};
}
Ok(Ra(response))
@ -748,9 +748,9 @@ async fn load_joined_room(
lazy_loaded.insert(state_key_userid);
}
Err(error) => {
t::error!(
error_err!(
error,
event_id = %pdu.event_id,
%error,
"Invalid state key for member event",
);
}

View file

@ -84,7 +84,7 @@ async fn ar_from_request_inner(
let query_params: QueryParams = match serde_html_form::from_str(query) {
Ok(params) => params,
Err(error) => {
t::error!(%error, %query, "Failed to deserialize query parameters");
error_err!(error, %query, "Failed to deserialize query parameters");
return Err(Error::BadRequest(
ErrorKind::Unknown,
"Failed to read query parameters",
@ -184,8 +184,8 @@ async fn ar_from_request_inner(
.extract::<TypedHeader<Authorization<XMatrix>>>()
.await
.map_err(|error| {
t::warn!(
%error,
warn_err!(
error,
"Missing or invalid Authorization header"
);
@ -283,7 +283,7 @@ async fn ar_from_request_inner(
let keys = match keys_result {
Ok(b) => b,
Err(error) => {
t::warn!(%error, "Failed to fetch signing keys");
warn_err!(error, "Failed to fetch signing keys");
return Err(Error::BadRequest(
ErrorKind::forbidden(),
"Failed to fetch signing keys.",
@ -309,8 +309,8 @@ async fn ar_from_request_inner(
{
Ok(()) => (None, None, Some(x_matrix.origin), None),
Err(error) => {
t::warn!(
%error,
warn_err!(
error,
origin = %x_matrix.origin,
object = ?request_map,
"Failed to verify JSON request"
@ -420,8 +420,8 @@ where
let body =
T::try_from_http_request(pieces.http_request, &pieces.path_params)
.map_err(|error| {
t::warn!(
%error,
warn_err!(
error,
body = ?pieces.json_body,
"Request body JSON structure is incorrect"
);

View file

@ -200,8 +200,8 @@ where
&[MatrixVersion::V1_11],
)
.map_err(|error| {
t::warn!(
%error,
warn_err!(
error,
actual_destination = actual_destination_str,
"Failed to find destination",
);
@ -289,7 +289,7 @@ where
let mut response = response.inspect_err(|error| {
if log_error == LogRequestError::Yes {
t::warn!(%error, "Could not send request");
warn_err!(error, "Could not send request");
}
})?;
@ -308,7 +308,7 @@ where
t::debug!("Getting response bytes");
// TODO: handle timeout
let body = response.bytes().await.unwrap_or_else(|error| {
t::warn!(%error, "Server error");
warn_err!(error, "Server error");
Vec::new().into()
});
t::debug!("Got response bytes");
@ -345,7 +345,7 @@ where
}
response.map_err(|e| {
t::warn!(error = %e, "Invalid 200 response");
warn_err!(e, "Invalid 200 response");
Error::BadServerResponse("Server returned bad 200 response.")
})
}
@ -566,7 +566,7 @@ async fn request_well_known(destination: &str) -> Option<String> {
.await;
t::debug!("Got well known response");
if let Err(error) = &response {
t::debug!(%error, "Failed to request .well-known");
debug_err!(error, "Failed to request .well-known");
return None;
}
let text = response.ok()?.text().await;
@ -704,7 +704,7 @@ pub(crate) fn parse_incoming_pdu(
) -> Result<(OwnedEventId, CanonicalJsonObject, OwnedRoomId)> {
let value: CanonicalJsonObject =
serde_json::from_str(pdu.get()).map_err(|error| {
t::warn!(%error, object = ?pdu, "Error parsing incoming event");
warn_err!(error, object = ?pdu, "Error parsing incoming event");
Error::BadServerResponse("Invalid PDU in server response")
})?;
@ -750,7 +750,7 @@ pub(crate) async fn send_transaction_message_route(
for pdu in &body.pdus {
let value: CanonicalJsonObject = serde_json::from_str(pdu.get())
.map_err(|error| {
t::warn!(%error, object = ?pdu, "Error parsing incoming event");
warn_err!(error, object = ?pdu, "Error parsing incoming event");
Error::BadServerResponse("Invalid PDU in server response")
})?;
let room_id: OwnedRoomId = value
@ -775,7 +775,7 @@ pub(crate) async fn send_transaction_message_route(
let (event_id, value, room_id) = match r {
Ok(t) => t,
Err(error) => {
t::warn!(%error, object = ?pdu, "Error parsing incoming event");
warn_err!(error, object = ?pdu, "Error parsing incoming event");
continue;
}
};
@ -816,7 +816,7 @@ pub(crate) async fn send_transaction_message_route(
for pdu in &resolved_map {
if let (event_id, Err(error)) = pdu {
if matches!(error, Error::BadRequest(ErrorKind::NotFound, _)) {
t::warn!(%error, %event_id, "Incoming PDU failed");
warn_err!(error, %event_id, "Incoming PDU failed");
}
}
}
@ -968,8 +968,8 @@ pub(crate) async fn send_transaction_message_route(
&ev_type.to_string(),
event.deserialize_as().map_err(
|error| {
t::warn!(
%error,
warn_err!(
error,
object = ?event.json(),
"To-Device event is invalid",
);
@ -1507,7 +1507,7 @@ pub(crate) async fn create_join_event_template_route(
.map(|join_rules_event| {
serde_json::from_str(join_rules_event.content.get()).map_err(
|error| {
t::warn!(%error, "Invalid join rules event");
warn_err!(error, "Invalid join rules event");
Error::bad_database("Invalid join rules event in db.")
},
)
@ -1604,7 +1604,7 @@ async fn create_join_event(
.map(|join_rules_event| {
serde_json::from_str(join_rules_event.content.get()).map_err(
|error| {
t::warn!(%error, "Invalid join rules event");
warn_err!(error, "Invalid join rules event");
Error::bad_database("Invalid join rules event in db.")
},
)
@ -1867,7 +1867,7 @@ pub(crate) async fn create_invite_route(
let pdu: PduEvent =
serde_json::from_value(event.into()).map_err(|error| {
t::warn!(%error, "Invalid invite event");
warn_err!(error, "Invalid invite event");
Error::BadRequest(ErrorKind::InvalidParam, "Invalid invite event.")
})?;
@ -2101,9 +2101,10 @@ pub(crate) async fn media_download_route(
};
let content_disposition = content_disposition.and_then(|s| {
s.parse().inspect_err(
|error| t::warn!(%error, "Invalid Content-Disposition in database"),
)
s.parse()
.inspect_err(|error| {
warn_err!(error, "Invalid Content-Disposition in database");
})
.ok()
});

View file

@ -848,8 +848,8 @@ impl KeyValueDatabase {
) {
Ok(u) => u,
Err(error) => {
t::warn!(
%error,
warn_err!(
error,
user_localpart = %username,
"Invalid username",
);
@ -950,8 +950,8 @@ impl KeyValueDatabase {
) {
Ok(u) => u,
Err(error) => {
t::warn!(
%error,
warn_err!(
error,
user_localpart = %username,
"Invalid username",
);
@ -1062,7 +1062,7 @@ impl KeyValueDatabase {
msg();
let start = Instant::now();
if let Err(error) = services().globals.cleanup() {
t::error!(%error, "cleanup: Error");
error_err!(error, "cleanup: Error");
} else {
t::debug!(
elapsed = ?start.elapsed(),

View file

@ -17,7 +17,6 @@ pub(crate) use tracing::Instrument;
///
/// The `parent:` and `target:` arguments from the original macro are not
/// supported.
#[allow(unused)]
macro_rules! event_err {
($level:expr, $error:expr, $($rest:tt)+) => {
::tracing::event!(

View file

@ -1068,9 +1068,9 @@ impl Service {
if leave_rooms {
for &user_id in &user_ids {
if let Err(error) = leave_all_rooms(user_id).await {
t::warn!(
warn_err!(
error,
%user_id,
%error,
"failed to leave one or more rooms"
);
}

View file

@ -502,8 +502,8 @@ impl Service {
}
}
Err(error) => {
t::error!(
%error,
error_err!(
error,
"Could not set the configured emergency password for the \
Grapevine user",
);

View file

@ -110,11 +110,10 @@ impl Service {
any_files = true;
self.delete_by_key(thumbnail_key.clone()).await.inspect_err(
|error| {
t::warn!(
thumbnail_key = utils::u8_slice_to_hex(
thumbnail_key.as_bytes()
),
%error,
warn_err!(
error,
thumbnail_key =
utils::u8_slice_to_hex(thumbnail_key.as_bytes()),
"Failed to delete thumbnail media"
);
},
@ -122,14 +121,14 @@ impl Service {
}
if let Some((_, key)) =
self.db.search_file_metadata(mxc, 0, 0).inspect_err(
|error| t::warn!(%error, "Failed to find original media key"),
)?
self.db.search_file_metadata(mxc, 0, 0).inspect_err(|error| {
warn_err!(error, "Failed to find original media key");
})?
{
any_files = true;
self.delete_by_key(key).await.inspect_err(
|error| t::warn!(%error, "Failed to delete original media"),
)?;
self.delete_by_key(key).await.inspect_err(|error| {
warn_err!(error, "Failed to delete original media");
})?;
}
if any_files {
@ -137,7 +136,7 @@ impl Service {
} else {
let error =
Error::BadRequest(ErrorKind::NotFound, "Media not found");
t::warn!(%error, "Failed to delete media");
warn_err!(error, "Failed to delete media");
Err(error)
}
}
@ -218,7 +217,7 @@ impl Service {
let image = match image::load_from_memory(file) {
Ok(image) => image,
Err(error) => {
t::warn!(%error, "Failed to parse source image");
warn_err!(error, "Failed to parse source image");
return Ok(None);
}
};

View file

@ -474,7 +474,7 @@ pub(crate) fn gen_event_id_canonical_json(
) -> crate::Result<(OwnedEventId, CanonicalJsonObject)> {
let value: CanonicalJsonObject =
serde_json::from_str(pdu.get()).map_err(|error| {
t::warn!(%error, object = ?pdu, "Error parsing incoming event");
warn_err!(error, object = ?pdu, "Error parsing incoming event");
Error::BadServerResponse("Invalid PDU in server response")
})?;

View file

@ -82,7 +82,7 @@ impl Service {
&[MatrixVersion::V1_0],
)
.map_err(|error| {
t::warn!(%error, %destination, "Failed to find destination");
warn_err!(error, %destination, "Failed to find destination");
Error::BadServerResponse("Invalid destination")
})?
.map(BytesMut::freeze);
@ -109,7 +109,7 @@ impl Service {
// TODO: handle timeout
let body = response.bytes().await.unwrap_or_else(|error| {
t::warn!(%error, "Server error");
warn_err!(error, "Server error");
Vec::new().into()
});
@ -132,8 +132,8 @@ impl Service {
.expect("reqwest body is valid http body"),
);
response.map_err(|error| {
t::warn!(
%error,
warn_err!(
error,
appservice = %destination,
%url,
"Push gateway returned invalid response bytes",
@ -144,8 +144,8 @@ impl Service {
})
}
Err(error) => {
t::warn!(
%error,
warn_err!(
error,
%destination,
"Could not send request to push gateway",
);

View file

@ -223,9 +223,9 @@ impl Service {
);
}
Err(error) => {
t::error!(
error_err!(
error,
?event_id,
?error,
"Could not load event in auth chain"
);
}

View file

@ -242,7 +242,7 @@ impl Service {
.await
{
errors += 1;
t::warn!(%error, event_id = %prev_id, "Prev event failed");
warn_err!(error, event_id = %prev_id, "Prev event failed");
match services()
.globals
.bad_event_ratelimiter
@ -380,7 +380,7 @@ impl Service {
) {
Err(error) => {
// Drop
t::warn!(%event_id, %error, "Dropping bad event");
warn_err!(error, %event_id, "Dropping bad event");
return Err(Error::BadRequest(
ErrorKind::InvalidParam,
"Signature verification failed",
@ -733,9 +733,10 @@ impl Service {
|event_id| {
let res = services().rooms.timeline.get_pdu(event_id);
if let Err(error) = &res {
t::error!(
%error,
%event_id, "Failed to fetch event"
error_err!(
error,
%event_id,
"Failed to fetch event"
);
}
res.ok().flatten()
@ -760,8 +761,8 @@ impl Service {
.collect::<Result<_>>()?,
),
Err(error) => {
t::warn!(
%error,
warn_err!(
error,
"State resolution on prev events failed, either \
an event could not be found or deserialization"
);
@ -872,7 +873,7 @@ impl Service {
state_at_incoming_event = Some(state);
}
Err(error) => {
t::warn!(%error, "Fetching state for event failed");
warn_err!(error, "Fetching state for event failed");
return Err(error);
}
};
@ -1169,7 +1170,7 @@ impl Service {
let fetch_event = |id: &_| {
let res = services().rooms.timeline.get_pdu(id);
if let Err(error) = &res {
t::error!(%error, "Failed to fetch event");
error_err!(error, "Failed to fetch event");
}
res.ok().flatten()
};
@ -1415,9 +1416,9 @@ impl Service {
}
}
Err(error) => {
t::warn!(
warn_err!(
error,
event_id = %next_id,
%error,
"Event failed auth checks",
);
back_off((**next_id).to_owned()).await;
@ -1598,7 +1599,7 @@ impl Service {
) -> Result<()> {
let value: CanonicalJsonObject = serde_json::from_str(pdu.get())
.map_err(|error| {
t::error!(%error, ?pdu, "Invalid PDU in server response");
error_err!(error, ?pdu, "Invalid PDU in server response");
Error::BadServerResponse("Invalid PDU in server response")
})?;
@ -1739,7 +1740,7 @@ impl Service {
)
.await
{
t::debug!(%error, "Failed to get server keys from cache");
debug_err!(error, "Failed to get server keys from cache");
};
}
@ -1769,8 +1770,8 @@ impl Service {
let k = match k.deserialize() {
Ok(key) => key,
Err(error) => {
t::warn!(
%error,
warn_err!(
error,
%server,
object = ?k.json(),
"Failed to fetch keys from trusted server",
@ -1861,7 +1862,7 @@ impl Service {
{
Ok(x) => x,
Err(error) => {
t::warn!(%error, "Invalid ACL event");
warn_err!(error, "Invalid ACL event");
return Ok(());
}
};

View file

@ -184,8 +184,8 @@ impl Service {
serde_json::from_str(s.content.get())
.map(|c: RoomJoinRulesEventContent| c.join_rule)
.map_err(|error| {
t::error!(
%error,
error_err!(
error,
"Invalid room join rule event"
);
Error::BadDatabase(
@ -352,8 +352,8 @@ impl Service {
serde_json::from_str(s.content.get())
.map(|c: RoomCanonicalAliasEventContent| c.alias)
.map_err(|error| {
t::error!(
%error,
error_err!(
error,
event_id = %s.event_id,
"Invalid room canonical alias event"
);
@ -382,8 +382,8 @@ impl Service {
serde_json::from_str(s.content.get())
.map(|c: RoomTopicEventContent| Some(c.topic))
.map_err(|error| {
t::error!(
%error,
error_err!(
error,
event_id = %s.event_id,
"Invalid room topic event"
);
@ -407,8 +407,8 @@ impl Service {
== HistoryVisibility::WorldReadable
})
.map_err(|error| {
t::error!(
%error,
error_err!(
error,
event_id = %s.event_id,
"Invalid room history visibility event"
);
@ -428,8 +428,8 @@ impl Service {
c.guest_access == GuestAccess::CanJoin
})
.map_err(|error| {
t::error!(
%error,
error_err!(
error,
event_id = %s.event_id,
"Invalid room guest access event"
);
@ -446,8 +446,8 @@ impl Service {
serde_json::from_str(s.content.get())
.map(|c: RoomAvatarEventContent| c.url)
.map_err(|error| {
t::error!(
%error,
error_err!(
error,
event_id = %s.event_id,
"Invalid room avatar event"
);
@ -471,8 +471,8 @@ impl Service {
serde_json::from_str(s.content.get())
.map(|c: RoomJoinRulesEventContent| c.join_rule)
.map_err(|error| {
t::error!(
%error,
error_err!(
error,
event_id = %s.event_id,
"Invalid room join rule event",
);

View file

@ -381,7 +381,7 @@ impl Service {
.map(|create_event| {
serde_json::from_str::<T>(create_event.content.get()).map_err(
|error| {
t::warn!(%error, "Invalid create event");
warn_err!(error, "Invalid create event");
Error::BadDatabase("Invalid create event in db.")
},
)

View file

@ -496,8 +496,8 @@ impl Service {
serde_json::from_str(s.content.get())
.map(|c: RoomNameEventContent| Some(c.name))
.map_err(|error| {
t::error!(
%error,
error_err!(
error,
"Invalid room name event in database"
);
Error::BadDatabase(

View file

@ -75,7 +75,7 @@ impl Service {
.state
.get_create_content::<ExtractPredecessor>(room_id)
.inspect_err(|error| {
t::warn!(%error, "Failed to get room predecessor");
warn_err!(error, "Failed to get room predecessor");
})
.ok()
.flatten()
@ -110,8 +110,8 @@ impl Service {
event.get(),
)
.map_err(|error| {
t::warn!(
%error,
warn_err!(
error,
%event_kind,
"Invalid account data event",
);
@ -215,8 +215,8 @@ impl Service {
RoomAccountDataEventType::Tag,
&event,
) {
t::warn!(
%error,
warn_err!(
error,
"error writing m.tag account data to upgraded room"
);
}
@ -293,9 +293,9 @@ impl Service {
event_kind.clone(),
&event,
) {
t::warn!(
warn_err!(
error,
%event_kind,
%error,
"error writing account data event after upgrading room"
);
}

View file

@ -161,7 +161,7 @@ impl Service {
.find_map(|x| match x {
Ok(x) => Some(x),
Err(error) => {
t::error!(%error, "Bad pdu in pdus_since");
error_err!(error, "Bad pdu in pdus_since");
None
}
})
@ -879,7 +879,7 @@ impl Service {
|k, s| auth_events.get(&(k.clone(), s.to_owned())),
)
.map_err(|error| {
t::error!(%error, "Auth check failed");
error_err!(error, "Auth check failed");
Error::BadDatabase("Auth check failed.")
})?;
@ -1340,15 +1340,15 @@ impl Service {
.backfill_pdu(backfill_server, pdu, &pub_key_map)
.await
{
t::warn!(%error, "Failed to add backfilled pdu");
warn_err!(error, "Failed to add backfilled pdu");
}
}
return Ok(());
}
Err(error) => {
t::warn!(
warn_err!(
error,
server = %backfill_server,
%error,
"Server could not provide backfill",
);
}

View file

@ -267,7 +267,7 @@ impl Service {
}
if let Err(error) = result {
t::warn!(%error, "Marking transaction as failed");
warn_err!(error, "Marking transaction as failed");
current_transaction_status.entry(destination).and_modify(|e| {
use TransactionStatus::{Failed, Retrying, Running};
@ -354,7 +354,7 @@ impl Service {
None
}
Err(error) => {
t::error!(%error, "Failed to select events to send");
error_err!(error, "Failed to select events to send");
None
}
}

View file

@ -199,7 +199,7 @@ impl<K> Drop for EntryDropGuard<K> {
if let Err(error) = cleanup_sender
.send(self.key.take().expect("drop should only be called once"))
{
t::warn!(%error, "Failed to send cleanup message");
warn_err!(error, "Failed to send cleanup message");
};
}
}

View file

@ -145,8 +145,8 @@ where
std::io::Error::new(ErrorKind::TimedOut, e)
})?
.inspect_err(|error| {
t::warn!(
%error,
warn_err!(
error,
"Failed to parse HAProxy protocol header"
);
})?;