rclrs/
logging.rs

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
// Copyright (c) 2019 Sequence Planner
// SPDX-License-Identifier: Apache-2.0 AND MIT
// Adapted from https://github.com/sequenceplanner/r2r/blob/89cec03d07a1496a225751159cbc7bfb529d9dd1/r2r/src/utils.rs
// Further adapted from https://github.com/mvukov/rules_ros2/pull/371

use std::{
    collections::HashMap,
    ffi::CString,
    sync::{Mutex, OnceLock},
};

use crate::{rcl_bindings::*, ENTITY_LIFECYCLE_MUTEX};

mod logging_configuration;
pub(crate) use logging_configuration::*;

mod log_params;
pub use log_params::*;

mod logger;
pub use logger::*;

/// log a message to rosout
///
/// # Examples
///
/// ```
/// use rclrs::*;
/// use std::sync::Mutex;
/// use std::time::Duration;
/// use std::env;
///
/// let executor = rclrs::Context::default().create_basic_executor();
/// let node = executor.create_node("test_node").unwrap();
///
/// log!(node.debug(), "Simple debug message");
/// let some_variable = 43;
/// log!(node.debug(), "Formatted debug message: {some_variable}");
/// log!(node.fatal(), "Fatal message from {}", node.name());
/// log!(node.warn().once(), "Only log this the first time");
/// log!(
///     node
///     .error()
///     .skip_first()
///     .throttle(Duration::from_millis(1000)),
///     "Noisy error that we expect the first time"
/// );
///
/// let count = 0;
/// log!(
///     node
///     .info()
///     .throttle(Duration::from_millis(1000))
///     .only_if(count % 10 == 0),
///     "Manually constructed LogConditions",
/// );
/// ```
///
/// All of the above examples will also work with the severity-specific log macros,
/// but any severity that gets passed in will be overridden:
/// - [`log_debug`][crate::log_debug]
/// - [`log_info`][crate::log_info]
/// - [`log_warn`][crate::log_warn]
/// - [`log_error`][crate::log_error]
/// - [`log_fatal`][crate::log_fatal]
///
/// # Panics
///
/// It is theoretically possible for the call to panic if the Mutex used for the throttling is
/// poisoned although this should never happen.
#[macro_export]
macro_rules! log {
    // The variable args captured by the $(, $($args:tt)*)?)) code allows us to omit (or include)
    // formatting parameters in the simple message case, e.g. to write
    // ```
    // log_error!(<logger>, "Log with no params"); // OR
    // log_error!(<logger>, "Log with useful info {}", error_reason);
    ($to_log_params: expr, $($args:tt)*) => {{
        // Adding these use statements here due an issue like this one:
        // https://github.com/intellij-rust/intellij-rust/issues/9853
        // Note: that issue appears to be specific to jetbrains intellisense however,
        // observed same/similar behaviour with rust-analyzer/rustc
        use std::sync::{Once, OnceLock, Mutex};
        use std::time::{SystemTime, Instant};

        // We wrap the functional body of the macro inside of a closure which
        // we immediately trigger. This allows us to use `return` to exit the
        // macro early without causing the calling function to also try to
        // return early.
        (|| {
            let params = $crate::ToLogParams::to_log_params($to_log_params);

            if !params.get_user_filter() {
                // The user filter is telling us not to log this time, so exit
                // before doing anything else.
                return;
            }

            let mut first_time = false;
            static REMEMBER_FIRST_TIME: Once = Once::new();
            REMEMBER_FIRST_TIME.call_once(|| first_time = true);

            let logger_name = params.get_logger_name();
            let severity = params.get_severity();

            match params.get_occurence() {
                // Create the static variables here so we get a per-instance static
                $crate::LogOccurrence::Once => {
                    if first_time {
                        $crate::log_unconditional!(severity, logger_name, $($args)*);
                    }
                    // Since we've already logged once, we should never log again,
                    // so just exit right now.
                    return;
                }
                $crate::LogOccurrence::SkipFirst => {
                    if first_time {
                        // This is the first time that we're seeing this log, and we
                        // were told to skip the first one, so just exit right away.
                        return;
                    }
                }
                // Do nothing
                $crate::LogOccurrence::All => (),
            }

            // If we have a throttle duration then check if we're inside or outside
            // of that interval.
            let throttle = params.get_throttle();
            if throttle > std::time::Duration::ZERO {
                match params.get_throttle_clock() {
                    $crate::ThrottleClock::SteadyTime => {
                        static LAST_LOG_STEADY_TIME: OnceLock<Mutex<Instant>> = OnceLock::new();
                        let last_log_time = LAST_LOG_STEADY_TIME.get_or_init(|| {
                            Mutex::new(Instant::now())
                        });

                        if !first_time {
                            let now = Instant::now();
                            let mut previous = last_log_time.lock().unwrap();
                            if now >= *previous + throttle {
                                *previous = now;
                            } else {
                                // We are still inside the throttle interval, so just exit here.
                                return;
                            }
                        }
                    }
                    $crate::ThrottleClock::SystemTime => {
                        static LAST_LOG_SYSTEM_TIME: OnceLock<Mutex<SystemTime>> = OnceLock::new();
                        let last_log_time = LAST_LOG_SYSTEM_TIME.get_or_init(|| {
                            Mutex::new(SystemTime::now())
                        });

                        if !first_time {
                            let now = SystemTime::now();
                            let mut previous = last_log_time.lock().unwrap();
                            if now >= *previous + throttle {
                                *previous = now;
                            } else {
                                // We are still inside the throttle interval, so just exit here.
                                return;
                            }
                        }
                    }
                    $crate::ThrottleClock::Clock(clock) => {
                        static LAST_LOG_CLOCK_TIME: OnceLock<Mutex<$crate::Time>> = OnceLock::new();
                        let last_log_time = LAST_LOG_CLOCK_TIME.get_or_init(|| {
                            Mutex::new(clock.now())
                        });

                        if !first_time {
                            let now = clock.now();
                            let mut previous = last_log_time.lock().unwrap();

                            let new_interval = !now.compare_with(
                                &(previous.clone() + throttle),
                                |now, interval| now < interval,
                            )
                            .is_some_and(|eval| eval);

                            if new_interval {
                                *previous = now;
                            } else {
                                // We are still inside the throttle interval, so just exit here.
                                return;
                            }
                        }
                    }
                }
            }

            // All filters have been checked, so go ahead and publish the message
            $crate::log_unconditional!(severity, logger_name, $($args)*);
        })();
    }};
}

/// Debug log message. See [`log`] for usage.
#[macro_export]
macro_rules! log_debug {
    ($to_log_params: expr, $($args:tt)*) => {{
        let log_params = $crate::ToLogParams::to_log_params($to_log_params);
        $crate::log!(log_params.debug(), $($args)*);
    }}
}

/// Info log message. See [`log`] for usage.
#[macro_export]
macro_rules! log_info {
    ($to_log_params: expr, $($args:tt)*) => {{
        let log_params = $crate::ToLogParams::to_log_params($to_log_params);
        $crate::log!(log_params.info(), $($args)*);
    }}
}

/// Warning log message. See [`log`] for usage.
#[macro_export]
macro_rules! log_warn {
    ($to_log_params: expr, $($args:tt)*) => {{
        let log_params = $crate::ToLogParams::to_log_params($to_log_params);
        $crate::log!(log_params.warn(), $($args)*);
    }}
}

/// Error log message. See [`log`] for usage.
#[macro_export]
macro_rules! log_error {
    ($to_log_params: expr, $($args:tt)*) => {{
        let log_params = $crate::ToLogParams::to_log_params($to_log_params);
        $crate::log!(log_params.error(), $($args)*);
    }}
}

/// Fatal log message. See [`log`] for usage.
#[macro_export]
macro_rules! log_fatal {
    ($to_log_params: expr, $($args:tt)*) => {{
        let log_params = $crate::ToLogParams::to_log_params($to_log_params);
        $crate::log!(log_params.fatal(), $($args)*);
    }}
}

/// A logging mechanism that does not have any conditions: It will definitely
/// publish the log. This is only meant for internal use, but needs to be exported
/// in order for [`log`] to work.
#[doc(hidden)]
#[macro_export]
macro_rules! log_unconditional {
    ($severity: expr, $logger_name: expr, $($args:tt)*) => {{
        use std::{ffi::CString, sync::OnceLock};

        // Only allocate a CString for the function name once per call to this macro.
        static FUNCTION_NAME: OnceLock<CString> = OnceLock::new();
        let function_name = FUNCTION_NAME.get_or_init(|| {
            // This call to function! is nested within two layers of closures,
            // so we need to strip away those suffixes or else users will be
            // misled. If we ever restructure these macros or if Rust changes
            // the way it names closures, this implementation detail may need to
            // change.
            let function_name = $crate::function!()
                .strip_suffix("::{{closure}}::{{closure}}")
                .unwrap();

            CString::new(function_name).unwrap_or(
                CString::new("<invalid name>").unwrap()
            )
        });

        // Only allocate a CString for the file name once per call to this macro.
        static FILE_NAME: OnceLock<CString> = OnceLock::new();
        let file_name = FILE_NAME.get_or_init(|| {
            CString::new(file!()).unwrap_or(
                CString::new("<invalid name>").unwrap()
            )
        });

        // We have to allocate a CString for the message every time because the
        // formatted data may have changed. We could consider having an alternative
        // macro for string literals that only allocates once, but it not obvious
        // how to guarantee that the user only passes in an unchanging string literal.
        match CString::new(std::fmt::format(format_args!($($args)*))) {
            Ok(message) => {
                // SAFETY: impl_log is actually completely safe to call, we just
                // mark it as unsafe to discourage downstream users from calling it
                unsafe { $crate::impl_log($severity, $logger_name, &message, &function_name, &file_name, line!()) };
            }
            Err(err) => {
                let message = CString::new(format!(
                    "Unable to format log message into a valid c-string. Error: {}", err
                )).unwrap();

                // SAFETY: impl_log is actually completely safe to call, we just
                // mark it as unsafe to discourage downstream users from calling it
                unsafe {
                    $crate::impl_log(
                        $crate::LogSeverity::Error,
                        &$crate::LoggerName::Unvalidated("logger"),
                        &message,
                        &function_name,
                        &file_name,
                        line!(),
                    );
                }
            }
        }
    }}
}

/// Calls the underlying rclutils logging function
/// Don't call this directly, use the logging macros instead, i.e. [`log`].
///
/// SAFETY: This function is not actually unsafe, but it is not meant to be part of the public
/// API, so we mark it as unsafe to discourage users from trying to use it. They should use
/// one of the of log! macros instead. We can't make it private because it needs to be used
/// by exported macros.
#[doc(hidden)]
pub unsafe fn impl_log(
    severity: LogSeverity,
    logger_name: &LoggerName,
    message: &CString,
    function: &CString,
    file: &CString,
    line: u32,
) {
    // We use a closure here because there are several different points in this
    // function where we may need to run this same logic.
    let send_log = |severity: LogSeverity, logger_name: &CString, message: &CString| {
        let location = rcutils_log_location_t {
            function_name: function.as_ptr(),
            file_name: file.as_ptr(),
            line_number: line as usize,
        };

        static FORMAT_STRING: OnceLock<CString> = OnceLock::new();
        let format_string = FORMAT_STRING.get_or_init(|| CString::new("%s").unwrap());

        let severity = severity.as_native();

        let _lifecycle = ENTITY_LIFECYCLE_MUTEX.lock().unwrap();

        #[cfg(test)]
        {
            // If we are compiling for testing purposes, when the default log
            // output handler is being used we need to use the format_string,
            // but when our custom log output handler is being used we need to
            // pass the raw message string so that it can be viewed by the
            // custom log output handler, allowing us to use it for test assertions.
            if log_handler::is_using_custom_handler() {
                // We are using the custom log handler that is only used during
                // logging tests, so pass the raw message as the format string.
                unsafe {
                    // SAFETY: The global mutex is locked as _lifecycle
                    rcutils_log(
                        &location,
                        severity as i32,
                        logger_name.as_ptr(),
                        message.as_ptr(),
                    );
                }
            } else {
                // We are using the normal log handler so call rcutils_log the normal way.
                unsafe {
                    // SAFETY: The global mutex is locked as _lifecycle
                    rcutils_log(
                        &location,
                        severity as i32,
                        logger_name.as_ptr(),
                        format_string.as_ptr(),
                        message.as_ptr(),
                    );
                }
            }
        }

        #[cfg(not(test))]
        {
            unsafe {
                // SAFETY: The global mutex is locked as _lifecycle
                rcutils_log(
                    &location,
                    severity as i32,
                    logger_name.as_ptr(),
                    format_string.as_ptr(),
                    message.as_ptr(),
                );
            }
        }
    };

    match logger_name {
        LoggerName::Validated(c_name) => {
            // The logger name is pre-validated, so just go ahead and use it.
            send_log(severity, c_name, message);
        }
        LoggerName::Unvalidated(str_name) => {
            // The name was not validated before being passed in.
            //
            // We maintain a hashmap of previously validated loggers so
            // we don't need to reallocate the CString on every log instance.
            // This is done inside of the function impl_log instead of in a macro
            // so that this map is global for the entire application.
            static NAME_MAP: OnceLock<Mutex<HashMap<String, CString>>> = OnceLock::new();
            let name_map = NAME_MAP.get_or_init(Default::default);

            {
                // We need to keep name_map locked while we call send_log, but
                // we also need to make sure it gets unlocked right afterward
                // if the condition fails, otherwise this function would
                // deadlock on itself when handling the error case of the logger
                // name being invalid. So we keep name_map_guard in this extra
                // scope to isolate its lifespan.
                let name_map_guard = name_map.lock().unwrap();
                if let Some(c_name) = name_map_guard.get(*str_name) {
                    // The map name has been used before, so we just use the
                    // pre-existing CString
                    send_log(severity, c_name, message);

                    // We return right away because the remainder of this
                    // function just allocates and validates a new CString for
                    // the logger name.
                    return;
                }
            }

            // The unvalidated logger name has not been used before, so we need
            // to convert it and add it to the name_map now.
            let c_name = match CString::new(str_name.to_string()) {
                Ok(c_name) => c_name,
                Err(_) => {
                    static INVALID_MSG: OnceLock<CString> = OnceLock::new();
                    let invalid_msg = INVALID_MSG.get_or_init(|| {
                        CString::new(
                            "Failed to convert logger name into a c-string. \
                            Check for null terminators inside the string.",
                        )
                        .unwrap()
                    });
                    static INTERNAL_LOGGER_NAME: OnceLock<CString> = OnceLock::new();
                    let internal_logger_name =
                        INTERNAL_LOGGER_NAME.get_or_init(|| CString::new("logger").unwrap());
                    send_log(severity, internal_logger_name, invalid_msg);
                    return;
                }
            };

            send_log(severity, &c_name, message);
            name_map
                .lock()
                .unwrap()
                .insert(str_name.to_string(), c_name);
        }
    }
}

/// Used internally by logging macros to get the name of the function that called the
/// logging macro. This is not meant for public use, but we need to export it so the
/// other exported macros can use it. We should remove it if an official function! macro
/// is ever offered.
#[macro_export]
#[doc(hidden)]
macro_rules! function {
    () => {{
        fn f() {}
        fn type_name_of<T>(_: T) -> &'static str {
            std::any::type_name::<T>()
        }
        let name = type_name_of(f);
        name.strip_suffix("::f").unwrap()
    }};
}

#[cfg(test)]
mod tests {
    use crate::{log_handler::*, test_helpers::*, *};
    use std::{
        sync::{Arc, Mutex},
        time::Duration,
    };

    #[test]
    fn test_logging_macros() -> Result<(), RclrsError> {
        // This test ensures that strings which are being sent to the logger are
        // being sanitized correctly. Rust generally and our logging macro in
        // particular do not use C-style formatting strings, but rcutils expects
        // to receive C-style formatting strings alongside variadic arguments
        // that describe how to fill in the formatting.
        //
        // If we pass the final string into rcutils as the format with no
        // variadic arguments, then it may trigger a crash or undefined behavior
        // if the message happens to contain any % symbols. In particular %n
        // will trigger a crash when no variadic arguments are given because it
        // attempts to write to a buffer. If no buffer is given, a seg fault
        // happens.
        log!("please do not crash", "%n");

        let graph = construct_test_graph("test_logging_macros")?;

        let log_collection: Arc<Mutex<Vec<LogEntry<'static>>>> = Arc::new(Mutex::new(Vec::new()));
        let inner_log_collection = log_collection.clone();

        log_handler::set_logging_output_handler(move |log_entry: log_handler::LogEntry| {
            inner_log_collection
                .lock()
                .unwrap()
                .push(log_entry.into_owned());
        })
        .unwrap();

        let last_logger_name = || {
            log_collection
                .lock()
                .unwrap()
                .last()
                .unwrap()
                .logger_name
                .clone()
        };

        let last_message = || {
            log_collection
                .lock()
                .unwrap()
                .last()
                .unwrap()
                .message
                .clone()
        };

        let last_location = || {
            log_collection
                .lock()
                .unwrap()
                .last()
                .unwrap()
                .location
                .clone()
        };

        let last_severity = || log_collection.lock().unwrap().last().unwrap().severity;

        let count_message = |message: &str| {
            let mut count = 0;
            for log in log_collection.lock().unwrap().iter() {
                if log.message == message {
                    count += 1;
                }
            }
            count
        };

        let node = graph.node1;

        log!(&*node, "Logging with node dereference");
        assert_eq!(last_logger_name(), node.logger().name());
        assert_eq!(last_message(), "Logging with node dereference");
        assert_eq!(last_severity(), LogSeverity::Info);
        assert_eq!(
            last_location().function_name,
            "rclrs::logging::tests::test_logging_macros",
        );

        for _ in 0..10 {
            log!(node.once(), "Logging once");
        }
        assert_eq!(count_message("Logging once"), 1);
        assert_eq!(last_severity(), LogSeverity::Info);

        log!(node.logger(), "Logging with node logger");
        assert_eq!(last_message(), "Logging with node logger");
        assert_eq!(last_severity(), LogSeverity::Info);

        log!(node.debug(), "Debug from node");
        // The default severity level is Info so we should not see the last message
        assert_ne!(last_message(), "Debug from node");
        assert_ne!(last_severity(), LogSeverity::Debug);

        log!(node.info(), "Info from node");
        assert_eq!(last_message(), "Info from node");
        assert_eq!(last_severity(), LogSeverity::Info);

        log!(node.warn(), "Warn from node");
        assert_eq!(last_message(), "Warn from node");
        assert_eq!(last_severity(), LogSeverity::Warn);

        log!(node.error(), "Error from node");
        assert_eq!(last_message(), "Error from node");
        assert_eq!(last_severity(), LogSeverity::Error);

        log!(node.fatal(), "Fatal from node");
        assert_eq!(last_message(), "Fatal from node");
        assert_eq!(last_severity(), LogSeverity::Fatal);

        log_debug!(node.logger(), "log_debug macro");
        log_info!(node.logger(), "log_info macro");
        log_warn!(node.logger(), "log_warn macro");
        log_error!(node.logger(), "log_error macro");
        log_fatal!(node.logger(), "log_fatal macro");

        log!(node.only_if(false), "This should not be logged",);
        log!(node.only_if(true), "This should be logged",);

        for i in 0..3 {
            log!(node.warn().skip_first(), "Formatted warning #{}", i);
        }
        assert_eq!(count_message("Formatted warning #0"), 0);
        assert_eq!(count_message("Formatted warning #1"), 1);
        assert_eq!(count_message("Formatted warning #2"), 1);

        node.logger().set_level(LogSeverity::Debug).unwrap();
        log_debug!(node.logger(), "This debug message appears");
        assert_eq!(last_message(), "This debug message appears");
        assert_eq!(last_severity(), LogSeverity::Debug);

        node.logger().set_level(LogSeverity::Info).unwrap();
        log_debug!(node.logger(), "This debug message does not appear");
        assert_ne!(last_message(), "This debug message does not appear");

        log!("custom logger name", "message for custom logger");
        assert_eq!(last_logger_name(), "custom logger name");
        assert_eq!(last_message(), "message for custom logger");

        for _ in 0..3 {
            log!(
                "custom logger name once".once(),
                "one-time message for custom logger",
            );
        }
        assert_eq!(last_logger_name(), "custom logger name once");
        assert_eq!(last_severity(), LogSeverity::Info);
        assert_eq!(count_message("one-time message for custom logger"), 1);

        for _ in 0..3 {
            log!(
                "custom logger name skip".error().skip_first(),
                "error for custom logger",
            );
        }
        assert_eq!(last_logger_name(), "custom logger name skip");
        assert_eq!(last_severity(), LogSeverity::Error);
        assert_eq!(count_message("error for custom logger"), 2);

        // Test whether throttling works correctly with a ROS clock
        let (clock, source) = Clock::with_source();
        source.set_ros_time_override(0);

        for i in 0..15 {
            log!(
                "logger"
                    .throttle(Duration::from_nanos(10))
                    .throttle_clock(ThrottleClock::Clock(&clock)),
                "custom clock throttled message",
            );
            source.set_ros_time_override(i);
        }

        // The throttle interval is 10ns and the loop shifted the time from 0ns
        // to 14ns, triggering the log macro once per nanosecond. That means we
        // should see two messages in the log.
        assert_eq!(count_message("custom clock throttled message"), 2);

        reset_logging_output_handler();
        Ok(())
    }

    #[test]
    fn test_function_macro() {
        assert_eq!(function!(), "rclrs::logging::tests::test_function_macro");
    }
}