logging: Replace LogError and LogWarning with LogAlert #30364

pull ryanofsky wants to merge 5 commits into bitcoin:master from ryanofsky:pr/alert changing 33 files +170 −183
  1. ryanofsky commented at 3:45 pm on June 30, 2024: contributor

    Replace LogError and LogWarning with LogAlert to make it easier to choose the correct logging levels to use and avoid log spam.

    This PR implements an idea ajtowns came up with in #30347 (comment) and it reduces the decision tree for chosing log levels to:

    0flowchart TD
    1    start-->|No|dbg
    2    start{{Is this critical information?}}-->|Yes|crit
    3
    4    dbg-->|No|logtrace(Trace + Category)
    5    dbg{{Is this moderate volume?}}-->|Yes|logdebug(Debug + Category)
    6
    7    crit{{Is there a problem?}}-->|No|loginfo(Info)
    8    crit-->|Yes|logfatal(Alert)
    
  2. DrahtBot commented at 3:45 pm on June 30, 2024: contributor

    The following sections might be updated with supplementary metadata relevant to reviewers and maintainers.

    Code Coverage

    For detailed information about the code coverage, see the test coverage report.

    Reviews

    See the guideline for information on the review process.

    Type Reviewers
    ACK maflcko

    If your review is incorrectly listed, please react with 👎 to this comment and the bot will ignore it on the next update.

    Conflicts

    Reviewers, this pull request conflicts with the following ones:

    • #30361 (doc: Drop description of LogError messages as fatal by ryanofsky)
    • #30214 (refactor: Improve assumeutxo state representation by ryanofsky)
    • #30155 (validation: Make ReplayBlocks interruptible by mzumsande)
    • #29656 (chainparams: Change nChainTx type to uint64_t by fjahr)
    • #29307 (util: explicitly close all AutoFiles that have been written by vasild)
    • #28676 ([WIP] Cluster mempool implementation by sdaftuar)
    • #28521 (net, net_processing: additional and consistent disconnect logging by Sjors)
    • #26022 (Add util::ResultPtr class by ryanofsky)
    • #25722 (refactor: Use util::Result class for wallet loading by ryanofsky)
    • #25665 (refactor: Add util::Result failure values, multiple error and warning messages by ryanofsky)
    • #24230 (indexes: Stop using node internal types and locking cs_main, improve sync logic by ryanofsky)

    If you consider this pull request important, please also help to review the conflicting pull requests. Ideally, start with the one that should be merged first.

  3. jonatack commented at 5:32 pm on June 30, 2024: member

    I think this makes the logging less useful, as it’s less clear if the alert is a warning, an error, or fatal (or possibly if action by the user is required), and this would affect non-developer users who don’t change the logging from default settings.

    I would suggest simplifying the logging code, rules/restrictions and logging API, and making the latter consistent along with the printed logs. Reducing end-user utility doesn’t seem the way to go in reducing the existing complexity.

  4. ryanofsky commented at 6:08 pm on June 30, 2024: contributor

    I think this makes the logging less useful, as it’s less clear if the alert is a warning, an error, or fatal

    I don’t have a strong opinion about this change, but one thing I like about it is that it reduces the potential for log spam. I think developers will be less likely to use a level called “alert” for minor errors and warnings, and will more appropriately use the debug log level instead.

    It is true that this PR gets rid of the ability to distinguish warnings and errors from informational messages and fatal errors at an API level. But this might not be a big problem if messages are clearly written and have “Error:” “Warning:” “Internal bug detected:” “Fatal error” and similar prefixes. Also practically speaking I think we are already logging most errors and warnings at the “info” and “debug” levels anyway so maybe this makes the API match current code better.

    Again, though I don’t have strong feeling about this change. It just seemed like it would be simple to implement and the results look pretty clean, IMO, so I think it’s worth looking at and considering.

  5. DrahtBot added the label CI failed on Jul 6, 2024
  6. DrahtBot commented at 9:42 pm on July 6, 2024: contributor

    🚧 At least one of the CI tasks failed. Make sure to run all tests locally, according to the documentation.

    Possibly this is due to a silent merge conflict (the changes in this pull request being incompatible with the current code in the target branch). If so, make sure to rebase on the latest commit of the target branch.

    Leave a comment here, if you need help tracking down a confusing failure.

    Debug: https://github.com/bitcoin/bitcoin/runs/26859756520

  7. ryanofsky force-pushed on Jul 9, 2024
  8. ryanofsky commented at 9:50 pm on July 9, 2024: contributor
    Rebased 179a0715cdcb3f20f71bf757c37046b0675dc8a5 -> d34b529ed104a3a7e11c7d264703e61d84b1aeb3 (pr/alert.1 -> pr/alert.2, compare) due to silent conflict with #29625
  9. DrahtBot removed the label CI failed on Jul 9, 2024
  10. maflcko commented at 12:38 pm on July 10, 2024: member

    Concept ACK, because errors and warnings should be extremely rare to occur. If anyone is interested in them, and looking for them in the debug log, they will be interested in warnings, if they are looking for errors (and vice-versa). So making a distinction here (and spending effort on it) seems possibly confusing without a clear upside.

    It should be clear that an alert is fatal, if the program is shutting down (or aborting) as a result of it. Similarly, it should be clear that an alert is a warning, if the program continues afterwards. Most log messages already state that something is a warning, or that the program will continue, or will abort, and doing so in the future will be useful to users and devs.

  11. in src/logging.h:1 in d34b529ed1


    maflcko commented at 7:43 am on July 12, 2024:
    nit in the scripted-diff: Personally I prefer a non-scripted diff, if the script is larger than the diff. So I think you can split out the 8 /d delete statements and three script lines for a simple last commit to just manually delete those lines. If you want to keep the scripted-diff my recommendation would be to split the /d parts into a separate one. Otherwise review is harder, because one has to jump back and forth during review because replacements and deletions are mixed with each other in the script and diff.

    ryanofsky commented at 6:09 pm on July 16, 2024:

    re: #30364 (review)

    I think you can split out the 8 /d delete statements and three script lines for a simple last commit to just manually delete those lines

    Good idea, done in latest push.

  12. DrahtBot added the label Needs rebase on Jul 15, 2024
  13. logging: Add level::Alert and LogAlert 392bbb4b1c
  14. logging: Add Warning: prefixes
    Add Warning: prefixes so message intent is not lost when warning level is
    removed next commit.
    fbdd8824d7
  15. ryanofsky force-pushed on Jul 16, 2024
  16. ryanofsky commented at 6:11 pm on July 16, 2024: contributor
    Rebased d34b529ed104a3a7e11c7d264703e61d84b1aeb3 -> 4e9ff3100ae79f3c3046a3358ff16daa7cd89627 (pr/alert.2 -> pr/alert.3, compare) due to conflict with #30428
  17. DrahtBot removed the label Needs rebase on Jul 16, 2024
  18. in src/noui.cpp:35 in 4e9ff3100a outdated
    32+        if (!fSecure) LogAlert("%s\n", message.original);
    33         break;
    34     case CClientUIInterface::MSG_WARNING:
    35         strCaption = "Warning: ";
    36-        if (!fSecure) LogWarning("%s\n", message.original);
    37+        if (!fSecure) LogAlert("%s\n", message.original);
    


    maflcko commented at 6:52 pm on July 16, 2024:
    nit in https://github.com/bitcoin/bitcoin/commit/fbdd8824d747c201eb01c8383d135ba08298c110: Forgot to add Warning: and Error: above? Can be achieved by just using strCaption. See also 824f47294a309ba8e58ba8d1da0af15d8d828f43

    ryanofsky commented at 7:43 pm on July 16, 2024:

    re: #30364 (review)

    nit in fbdd882: Forgot to add Warning: and Error: above? Can be achieved by just using strCaption. See also 824f472

    Good catch. Done in new commit

  19. maflcko approved
  20. maflcko commented at 7:12 pm on July 16, 2024: member

    For context: The majority of the changed log messages here stem from the error() removal in 31be1a47675e4449f856e61beb2b4bfc228ea219 which changed ERROR: to [error]. Many of them were not fatal error messages, but “warnings”, or stuff that would not abort the program, so changing to [alert], seems clearer either way.

    ACK 4e9ff3100ae79f3c3046a3358ff16daa7cd89627 🔗

    Signature:

    0untrusted comment: signature from minisign secret key on empty file; verify via: minisign -Vm "${path_to_any_empty_file}" -P RWTRmVTMeKV5noAMqVlsMugDDCyyTSbA3Re5AkUrhvLVln0tSaFWglOw -x "${path_to_this_whole_four_line_signature_blob}"
    1RUTRmVTMeKV5npGrKx1nqXCw5zeVHdtdYURB/KlyA/LMFgpNCs+SkW9a8N95d+U4AP1RJMi+krxU1A3Yux4bpwZNLvVBKy0wLgM=
    2trusted comment: ACK 4e9ff3100ae79f3c3046a3358ff16daa7cd89627 🔗
    3f70Ey8roKfaWqoDaKb+Ropa/pkhackB7NyvBkH2A2MhoJj72WTdgsblLayNSYOfU5ltNUpyN5rpogffZdGyCAQ==
    
  21. logging: Add noui.cpp Warning: and Error: prefixes
    Suggested by mflcko in https://github.com/bitcoin/bitcoin/pull/30364#discussion_r1679920839
    
    This should change log output in next commit from current:
    
      [error] Message
      [warning] Message
    
    to:
    
      [alert] Error: Message
      [alert] Warning: Message
    
    instead of:
    
      [alert] Message
      [alert] Message
    9acd89f118
  22. scripted-diff: Replace log error and warning with alert
    -BEGIN VERIFY SCRIPT-
    r() { git grep -l "$1" -- 'src' ':(exclude)src/logging.h' ':(exclude)src/logging.cpp' | xargs sed -i "s/$1/$2/"; }
    r LogWarning LogAlert
    r LogError LogAlert
    r Level::Warning Level::Alert
    r Level::Error Level::Alert
    sed -i -e 's/error\]/alert]/; s/warning\]/alert]/;' src/test/logging_tests.cpp
    -END VERIFY SCRIPT-
    43fd37a614
  23. logging: Drop unused Warning and Error levels 66d35a5c13
  24. ryanofsky force-pushed on Jul 16, 2024
  25. maflcko commented at 7:46 pm on July 16, 2024: member

    ACK 66d35a5c1384bf579e2da8e7054be7536e7a7101 🐛

    Signature:

    0untrusted comment: signature from minisign secret key on empty file; verify via: minisign -Vm "${path_to_any_empty_file}" -P RWTRmVTMeKV5noAMqVlsMugDDCyyTSbA3Re5AkUrhvLVln0tSaFWglOw -x "${path_to_this_whole_four_line_signature_blob}"
    1RUTRmVTMeKV5npGrKx1nqXCw5zeVHdtdYURB/KlyA/LMFgpNCs+SkW9a8N95d+U4AP1RJMi+krxU1A3Yux4bpwZNLvVBKy0wLgM=
    2trusted comment: ACK 66d35a5c1384bf579e2da8e7054be7536e7a7101 🐛
    3XCqA+EVm38sxDqIn+MpPqk+acajN0Gpd/LzJPhruNH5MzOAw9jH1tADYxjAQaMB4yxwQf5Xffo/lwC68Bh+bAg==
    
  26. ryanofsky commented at 7:48 pm on July 16, 2024: contributor
    Updated 4e9ff3100ae79f3c3046a3358ff16daa7cd89627 -> 66d35a5c1384bf579e2da8e7054be7536e7a7101 (pr/alert.3 -> pr/alert.4, compare) with suggested change adding noui.cpp warning and error prefixes @maflcko do you think you could review #30361 as well? #30361 is a documentation bugfix that I think would make this PR easier to understand, because right now the documentation that this PR is changing is not accurate.
  27. in src/net.cpp:381 in 66d35a5c13
    377@@ -378,7 +378,7 @@ static CAddress GetBindAddress(const Sock& sock)
    378     if (!sock.GetSockName((struct sockaddr*)&sockaddr_bind, &sockaddr_bind_len)) {
    379         addr_bind.SetSockAddr((const struct sockaddr*)&sockaddr_bind);
    380     } else {
    381-        LogPrintLevel(BCLog::NET, BCLog::Level::Warning, "getsockname failed\n");
    382+        LogPrintLevel(BCLog::NET, BCLog::Level::Alert, "Warning: getsockname failed\n");
    


    ajtowns commented at 6:54 am on July 17, 2024:
    I think this should probably be LogDebug rather than Alert messages? They’re somewhat remote triggerable (that is, if your system is misconfigured so that an error occurs, the error can occur repeatedly on incoming connections via AcceptConnection), and it also gives very little information on how to fix the problem if it occurs.

    maflcko commented at 8:00 am on July 22, 2024:

    I think this should probably be LogDebug rather than Alert messages?

    It may be good to check that at least one warning is emitted to the user. Otherwise, it may be harder for them to spot the config error at all? (However, if non-logging related changes are made, I wonder if such changes can be done in separate (preparatory) pull requests, similar to #30064, as they require in-depth low-level net knowledge?)

  28. in src/net.cpp:1716 in 66d35a5c13
    1712@@ -1713,7 +1713,7 @@ void CConnman::AcceptConnection(const ListenSocket& hListenSocket) {
    1713     }
    1714 
    1715     if (!addr.SetSockAddr((const struct sockaddr*)&sockaddr)) {
    1716-        LogPrintLevel(BCLog::NET, BCLog::Level::Warning, "Unknown socket family\n");
    1717+        LogPrintLevel(BCLog::NET, BCLog::Level::Alert, "Warning: Unknown socket family\n");
    


    ajtowns commented at 6:54 am on July 17, 2024:
    Also seems like should be LogDebug ?
  29. in src/net.cpp:586 in 66d35a5c13
    582@@ -583,7 +583,7 @@ void CNode::SetAddrLocal(const CService& addrLocalIn) {
    583     AssertLockNotHeld(m_addr_local_mutex);
    584     LOCK(m_addr_local_mutex);
    585     if (addrLocal.IsValid()) {
    586-        LogError("Addr local already set for node: %i. Refusing to change from %s to %s\n", id, addrLocal.ToStringAddrPort(), addrLocalIn.ToStringAddrPort());
    587+        LogAlert("Addr local already set for node: %i. Refusing to change from %s to %s\n", id, addrLocal.ToStringAddrPort(), addrLocalIn.ToStringAddrPort());
    


    ajtowns commented at 7:03 am on July 17, 2024:
    This is an internal error, isn’t it? Outside of tests, we only invoke SetAddrLocal() when we receive the first VERSION message, so this is the first time addrLocal is touched, and hence it should have valid=false and never hit this condition. Couldn’t this be replaced by if (Assume(!addrLocal.IsValid())) { addrLocal = addrLocalIn; } ?

    maflcko commented at 12:06 pm on August 9, 2024:
    Fixed in #30617, due to lack of progress here.
  30. in src/netbase.cpp:452 in 66d35a5c13
    448@@ -449,7 +449,7 @@ bool Socks5(const std::string& strDest, uint16_t port, const ProxyCredentials* a
    449             return false;
    450         }
    451         if (pchRet2[2] != 0x00) { // Reserved field must be 0
    452-            LogError("Error: malformed proxy response\n");
    453+            LogAlert("Error: malformed proxy response\n");
    


    ajtowns commented at 7:51 am on July 17, 2024:

    I think all the Log statements in this function could be downgraded to LogDebug(BCLog::PROXY, ...) – they just indicate a p2p connection failure? The LogPrintf("... connect to %s:%d failed ...") on line 448 generates a bit of noise for nodes with tor enabled, I believe:

    02024-07-17T05:23:37.590158Z Socks5() connect to nz7rn2ukf3kwqx24iv6q6tyhiclxwzuk65thkihoo4btbdat4y5ee2qd.onion:8333 failed: host unreachable
    12024-07-17T05:23:51.908547Z Socks5() connect to nz7rn2ukf3kwqx24iv6q6tyhiclxwzuk65thkihoo4btbdat4y5ee2qd.onion:8333 failed: host unreachable
    22024-07-17T06:18:15.494392Z Socks5() connect to bncti2h36dmqk4l76lgxs3c6d7vczvbkhhvbche4yxgztv766yhsyxad.onion:8333 failed: host unreachable
    32024-07-17T07:27:00.134226Z Socks5() connect to kqdw33pqr3ndqmd6lffd2qlvjvkthnximrg4zu35kz2ods7t7zte66yd.onion:8333 failed: host unreachable
    

    Maybe it’s worth having an alert that problems are happening because the socks proxy is misbehaving since that’s something you could fix; but we tend to be pretty silent otherwise when connections aren’t succeeding, so dropping these to debug level seems reasonable to me. I think the only PROXY debug messages we have is prior to the call to ConnectThroughProxy() (which invokes Socks5() which then does a Debug/NET log of slightly less info) and a debug message in Socks5() that reveals the auth/password being used, which I think are only ever set as 0/0, 1/1, 2/2, etc.

  31. in src/node/blockstorage.cpp:140 in 66d35a5c13
    137                 }
    138 
    139                 pcursor->Next();
    140             } else {
    141-                LogError("%s: failed to read value\n", __func__);
    142+                LogAlert("%s: failed to read value\n", __func__);
    


    ajtowns commented at 9:06 am on July 17, 2024:
    “block index” might be clearer than “value”, and could perhaps attempt to decode the block hash from the key and report it? Might be worth pointing out why this is a problem at a higher level, ie “block index database corrupted” or similar?
  32. in src/node/blockstorage.cpp:134 in 66d35a5c13
    130@@ -131,13 +131,13 @@ bool BlockTreeDB::LoadBlockIndexGuts(const Consensus::Params& consensusParams, s
    131                 pindexNew->nTx            = diskindex.nTx;
    132 
    133                 if (!CheckProofOfWork(pindexNew->GetBlockHash(), pindexNew->nBits, consensusParams)) {
    134-                    LogError("%s: CheckProofOfWork failed: %s\n", __func__, pindexNew->ToString());
    135+                    LogAlert("%s: CheckProofOfWork failed: %s\n", __func__, pindexNew->ToString());
    


    ajtowns commented at 9:17 am on July 17, 2024:
    Would probably be better to replace __func__ in all these messages with something more relevant to potential users (filename, or some more general indication of what’s going on). "block index database corrupted: proof of work check failed for %s\n", pindexNew->ToString() eg?
  33. in src/script/signingprovider.cpp:161 in 66d35a5c13
    157@@ -158,7 +158,7 @@ bool FillableSigningProvider::GetKey(const CKeyID &address, CKey &keyOut) const
    158 bool FillableSigningProvider::AddCScript(const CScript& redeemScript)
    159 {
    160     if (redeemScript.size() > MAX_SCRIPT_ELEMENT_SIZE) {
    161-        LogError("FillableSigningProvider::AddCScript(): redeemScripts > %i bytes are invalid\n", MAX_SCRIPT_ELEMENT_SIZE);
    162+        LogAlert("FillableSigningProvider::AddCScript(): redeemScripts > %i bytes are invalid\n", MAX_SCRIPT_ELEMENT_SIZE);
    


    ajtowns commented at 9:29 am on July 17, 2024:
    Should this be an if (!Assume(redeemScript.size() <= MAX_SCRIPT_ELEMENT_SIZE)) return false; ?
  34. in src/test/logging_tests.cpp:144 in 66d35a5c13
    139@@ -140,8 +140,8 @@ BOOST_FIXTURE_TEST_CASE(logging_LogPrintMacros, LogSetup)
    140     LogTrace(BCLog::NET, "foo6: %s\n", "bar6"); // not logged
    141     LogDebug(BCLog::NET, "foo7: %s\n", "bar7");
    142     LogInfo("foo8: %s\n", "bar8");
    143-    LogWarning("foo9: %s\n", "bar9");
    144-    LogError("foo10: %s\n", "bar10");
    145+    LogAlert("foo9: %s\n", "bar9");
    146+    LogAlert("foo10: %s\n", "bar10");
    


    ajtowns commented at 9:30 am on July 17, 2024:
    Not much value testing the same thing twice.
  35. in src/i2p.cpp:151 in 66d35a5c13
    147@@ -148,7 +148,7 @@ bool Session::Listen(Connection& conn)
    148         conn.sock = StreamAccept();
    149         return true;
    150     } catch (const std::runtime_error& e) {
    151-        LogPrintLevel(BCLog::I2P, BCLog::Level::Error, "Couldn't listen: %s\n", e.what());
    152+        LogPrintLevel(BCLog::I2P, BCLog::Level::Alert, "Couldn't listen: %s\n", e.what());
    


    ajtowns commented at 9:37 am on July 17, 2024:

    Touching all the LogPrintLevel warning/error calls without switching them to LogAlert seems a shame. A separate scripted-diff prior to “Replace log error and warning…” with:

    0sed -i 's/LogPrintLevel(\(BCLog::[^,]*\), BCLog::Level::Error, */LogAlert(/' $files
    1sed -i 's/LogPrintLevel(\(BCLog::[^,]*\), BCLog::Level::Warning, */LogAlert(/' $files
    

    should work, I think.

  36. ajtowns commented at 9:42 am on July 17, 2024: contributor

    I think this approach makes sense, though the commit that explicitly adds “Warning” and “Error” prefixes does give me some doubts.

    Either way, given we’re touching a bunch of log lines, I think we should be thinking about whether they actually make sense to be alerts, so most of the following comments are in that vein.

  37. DrahtBot added the label Needs rebase on Aug 5, 2024
  38. DrahtBot commented at 9:59 am on August 5, 2024: contributor

    🐙 This pull request conflicts with the target branch and needs rebase.

  39. glozow referenced this in commit 7583eac43c on Aug 13, 2024
  40. ryanofsky commented at 9:37 pm on August 16, 2024: contributor

    I lost enthusiasm for this PR, so will close it, but tagging as up for grabs, and will happily review if someone else wants to pick it up and respond to the earlier comments, particularly the individual logging improvements suggested #30364#pullrequestreview-2182052463.


    The thing I like about this PR is that it disentangles log message priority levels from log message conditions.

    As I see it, priority levels can distinguish between log messages that:

    • Provide information unlikely to help users, or are high volume (would call Trace)
    • Provide information helpful for debugging user issues and are low volume (would call Debug)
    • Provide information probably helpful in general (would call Notify)
    • Provide information probably requiring some action (would call Critical)

    At each of these levels, different conditions are possible:

    • Normal conditions (would call Info)
    • Abnormal conditions that might indicate a problem (would call Warning)
    • Failure conditions that indicate something has gone wrong (would call Error)
    • Impossible conditions indicating an incorrect assumption, or a bug, or hardware failure (would call Bug)

    Examples of different priority level / condition pairs:

    • Errors
      • An out of disk space error would probably be a Critical/Error message.
      • A case where saved data is missing or corrupted, but can easily be reconstructed would probably be a Notify/Error message.
      • A transient network error, or an incorrectly called RPC would probably be a Debug/Error message.
    • Warnings
      • A network fork or incorrectly set system time would probably be a Critical/Warning message.
      • A valid, but obsolete or suspicious config setting would probably be a Notify/Warning message.
      • A partially successful RPC operation, or incoming data with unrecognized fields or version numbers would probably be Debug/Warning messages.
    • Information
      • Shutdown or reindexing requests that take the node offline, or wallet operations that require generating new backups would probably be Critical/Info messages.
      • Useful, non-spammy status updates would probably be Notify/Info messages.
      • More detailed or spammy status updates would be Debug/Info or Trace/Info message.
    • Bugs
      • Impossible conditions where we might use Assert or std::logic_error, and indicate something is severely wrong, like CheckBlockIndex failing, would probably be Critical/Bug messages.
      • Impossible conditions where we might use Assume or std::logic_error, but indicate a recoverable problem, like a floating point error calculating position of a progress bar, or a local bug inside of an RPC call that can be easily aborted, would probably be Notify/Bug or Debug/Bug messages.

    In my opinion, it is important for the logging framework to be able to distinguish log message priority levels so important information will be seen and logs will not be filled with spam. I think having the 4 priority levels described above would be ideal (Trace Debug Notify Critical), but having the 4 levels defined in this PR would also be ok (Trace Debug Info Alert).

    I don’t think it’s important for the logging framework know about log message conditions, because I think messages can just describe their own conditions clearly, and use Error: Warning: and Bug: prefixes to be explicit.

    If people disagree and think 4 log levels is not enough, or that explicitly tracking conditions is important, probably the easiest way to support this would be expand the number of levels like syslog does, or like #30347 tried to do, so basically each priority+condition pair maps straightforwardly to some logging level.

    But I don’t actually care very much about what logging levels are defined, as long as their usage is documented accurately.

  41. ryanofsky closed this on Aug 16, 2024

  42. ryanofsky added the label Up for grabs on Aug 16, 2024

github-metadata-mirror

This is a metadata mirror of the GitHub repository bitcoin/bitcoin. This site is not affiliated with GitHub. Content is generated from a GitHub metadata backup.
generated: 2024-11-21 12:12 UTC

This site is hosted by @0xB10C
More mirrored repositories can be found on mirror.b10c.me