]>
git.ipfire.org Git - thirdparty/tor.git/log
teor [Tue, 3 Dec 2019 02:57:06 +0000 (12:57 +1000)]
Merge branch 'pr-1569-squashed'
Nick Mathewson [Mon, 2 Dec 2019 17:43:10 +0000 (12:43 -0500)]
Distribute checkSpaceTest.sh and run it when we have perl.
Nick Mathewson [Mon, 2 Dec 2019 17:43:10 +0000 (12:43 -0500)]
Have checkSpaceTest.sh exit as skipped when on Windows
Managing line-ending issues for this one isn't worth it.
Nick Mathewson [Tue, 26 Nov 2019 18:10:39 +0000 (13:10 -0500)]
Add a simple test for checkSpace.pl
This script is not expected to work on windows due to line-ending
issues, so I'm not making it get run on an automated basis. We
should use it when editing checkSpace.pl.
Closes ticket 32613.
teor [Tue, 3 Dec 2019 02:47:05 +0000 (12:47 +1000)]
Merge branch 'maint-0.4.2'
teor [Tue, 3 Dec 2019 02:46:58 +0000 (12:46 +1000)]
Merge branch 'maint-0.4.1' into maint-0.4.2
teor [Tue, 3 Dec 2019 02:46:50 +0000 (12:46 +1000)]
Merge branch 'maint-0.4.0' into maint-0.4.1
teor [Tue, 3 Dec 2019 02:46:43 +0000 (12:46 +1000)]
Merge branch 'maint-0.3.5' into maint-0.4.0
teor [Thu, 28 Nov 2019 01:38:48 +0000 (11:38 +1000)]
Travis: use -std=gnu99 with NSS, and clang with Chutney
NSS:
* test NSS-specific code with -std=gnu99
* use a recent gcc version from the latest Ubuntu image
Chutney:
* use clang, so we keep one clang Linux job
* keep clang on a fast job, so the overall build finishes quickly
Closes ticket 32500 for 0.3.5.
teor [Tue, 3 Dec 2019 02:45:41 +0000 (12:45 +1000)]
Merge branch 'maint-0.2.9' into maint-0.3.5
Merge C_DIALECT_OPTIONS from ticket32500_029 with
other configure options from maint-0.3.5.
teor [Fri, 15 Nov 2019 00:17:32 +0000 (10:17 +1000)]
Travis: use -std=gnu99 in some jobs
Require C99 standards-conforming code in Travis CI, but allow GNU gcc
extensions. Also activates clang's -Wtypedef-redefinition warnings.
Builds some jobs with -std=gnu99, and some jobs without.
Closes ticket 32500.
Nick Mathewson [Mon, 2 Dec 2019 16:41:40 +0000 (11:41 -0500)]
Merge branch 'ticket32207'
Nick Mathewson [Mon, 2 Dec 2019 16:41:16 +0000 (11:41 -0500)]
Link to mainloop_pubsub.[ch] when describing delivery policies
George Kadianakis [Mon, 2 Dec 2019 10:52:44 +0000 (12:52 +0200)]
Merge branch 'tor-github/pr/1559'
teor [Mon, 2 Dec 2019 01:58:54 +0000 (11:58 +1000)]
Travis: Set pipefail
teor [Sun, 1 Dec 2019 07:53:06 +0000 (17:53 +1000)]
Merge remote-tracking branch 'tor-github/pr/1574'
teor [Fri, 29 Nov 2019 00:55:27 +0000 (10:55 +1000)]
control: Update an outdated function comment
Cleanup after 31531.
teor [Fri, 29 Nov 2019 00:54:42 +0000 (10:54 +1000)]
control: Remove an unused function return value
Cleanup after 31531.
teor [Fri, 29 Nov 2019 00:53:32 +0000 (10:53 +1000)]
control: Rename a function variable
Cleanup after 31531.
teor [Fri, 29 Nov 2019 00:50:09 +0000 (10:50 +1000)]
control: Remove an unnecessary header in control_events.h
And replace it with a struct forward declaration.
Also, move all the headers in the file before the forward
declaration.
Cleanup after 31531.
George Kadianakis [Wed, 27 Nov 2019 13:36:26 +0000 (15:36 +0200)]
Merge branch 'tor-github/pr/1573'
David Goulet [Wed, 20 Nov 2019 16:01:47 +0000 (11:01 -0500)]
hs: Add changes file for 32020
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 31 Oct 2019 13:04:52 +0000 (09:04 -0400)]
test: Add unit tests for closing intro circ on failure
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 20 Nov 2019 16:03:45 +0000 (11:03 -0500)]
hs-v3: Remove unused hs_service_intro_circ_has_closed()
Since the removal of ip->circuit_established, this function does litterally
nothing so clean it up.
Part of #32020
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 31 Oct 2019 12:06:16 +0000 (08:06 -0400)]
hs-v3: Give a cleanup type to hs_circ_cleanup()
By centralizing the circuit cleanup type that is: on close, free and
repurpose, some actions on the circuit can not happen for a certain cleanup
type or for all types.
This passes a cleanup type so the HS subsystem (v2 and v3) can take actions
based on the type of cleanup.
For instance, there is slow code that we do not run on a circuit close but
rather only on free.
Part of #32020
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 30 Oct 2019 19:56:17 +0000 (15:56 -0400)]
hs-v3: Note client intro circuit failure
Report back to the v3 subsystem any introduction point client circuit failure
so they can be noted down in the failure cache.
Fixes #32020
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 30 Oct 2019 19:17:47 +0000 (15:17 -0400)]
hs-v2: Modernize rend_client_circuit_cleanup() code
Old and messy code path. Structure it in a more pleasant and readable way. No
behavior change with this refactor.
Part of #32020
Signed-off-by: David Goulet <dgoulet@torproject.org>
Neel Chauhan [Wed, 27 Nov 2019 01:57:33 +0000 (20:57 -0500)]
Make control_event_conf_changed() take a config_line_t
Neel Chauhan [Wed, 27 Nov 2019 02:58:31 +0000 (21:58 -0500)]
If statements to getresuid() and getresgid() in setuid.c shouldn't have an extra space
Nick Mathewson [Tue, 26 Nov 2019 17:49:13 +0000 (12:49 -0500)]
checkSpace.pl: make output more uniform.
There were lots of slight differences in indentation and formatting
among the in-file error messages.
teor [Tue, 26 Nov 2019 07:50:56 +0000 (17:50 +1000)]
practracker/includes.py: Don't read editor temp files
(Or any files that start with "." or "#".)
Obviously correct changes to already-reviewed code.
teor [Tue, 26 Nov 2019 01:30:49 +0000 (11:30 +1000)]
Merge remote-tracking branch 'tor-github/pr/1564'
teor [Sat, 16 Nov 2019 09:57:22 +0000 (19:57 +1000)]
Makefile: Fix more targets for out-of-tree builds
Support callgraph and rectify-includes in out-of-tree builds.
Part of 32522.
teor [Sat, 16 Nov 2019 13:31:09 +0000 (23:31 +1000)]
crypt_ops: Fix some weird macro spacing
teor [Mon, 25 Nov 2019 23:18:37 +0000 (09:18 +1000)]
Code Style: Remove double newlines in win32/orconfig.h
There's no reason for them to be in there.
Part of 32522.
teor [Sat, 16 Nov 2019 11:43:22 +0000 (21:43 +1000)]
check-spaces: Fix an outdated comment
teor [Sat, 16 Nov 2019 11:47:12 +0000 (21:47 +1000)]
test/controller: Stop including a ".c" source file
Part of 32522.
teor [Mon, 25 Nov 2019 23:27:29 +0000 (09:27 +1000)]
practracker: Fix a typo in a logging function call
Obviously correct changes to already-reviewed code.
teor [Sat, 16 Nov 2019 14:04:10 +0000 (00:04 +1000)]
test: Fix a python double-space
Nick Mathewson [Mon, 25 Nov 2019 18:01:04 +0000 (13:01 -0500)]
configure: reject Python 2.
Python 2 will be end-of-life as of 1 Jan 2020, so we can finally
stop supporting it. As a first step, we should make our configure
script stop accepting python 2 as something acceptable to run our
tests with.
Closes ticket 32608.
Nick Mathewson [Mon, 25 Nov 2019 12:58:02 +0000 (07:58 -0500)]
Merge branch 'stream-socks-auth' into bug19859_merged
teor [Mon, 25 Nov 2019 02:52:10 +0000 (12:52 +1000)]
Merge branch 'maint-0.4.2'
Merge tor_free() notes with whitespace fixes.
teor [Mon, 25 Nov 2019 02:50:15 +0000 (12:50 +1000)]
CodingStandards: Use consistent spacing
* 2 newlines before ====== headers
* 1 newline before ------ headers
teor [Mon, 25 Nov 2019 02:37:26 +0000 (12:37 +1000)]
Merge branch 'maint-0.4.2'
teor [Mon, 25 Nov 2019 02:37:15 +0000 (12:37 +1000)]
Merge branch 'maint-0.4.1' into maint-0.4.2
teor [Mon, 25 Nov 2019 02:37:07 +0000 (12:37 +1000)]
Merge branch 'maint-0.4.0' into maint-0.4.1
teor [Mon, 25 Nov 2019 02:36:59 +0000 (12:36 +1000)]
Merge branch 'maint-0.3.5' into maint-0.4.0
teor [Mon, 25 Nov 2019 02:36:41 +0000 (12:36 +1000)]
Merge remote-tracking branch 'tor-github/pr/1441' into maint-0.4.0
teor [Mon, 25 Nov 2019 02:35:58 +0000 (12:35 +1000)]
Merge remote-tracking branch 'tor-github/pr/1396' into maint-0.4.0
teor [Mon, 25 Nov 2019 02:35:11 +0000 (12:35 +1000)]
Merge remote-tracking branch 'tor-github/pr/1464' into maint-0.3.5
teor [Mon, 25 Nov 2019 02:34:29 +0000 (12:34 +1000)]
Merge remote-tracking branch 'tor-github/pr/1422' into maint-0.3.5
teor [Mon, 25 Nov 2019 02:33:55 +0000 (12:33 +1000)]
Merge remote-tracking branch 'tor-github/pr/1405' into maint-0.3.5
teor [Mon, 25 Nov 2019 02:33:14 +0000 (12:33 +1000)]
Merge remote-tracking branch 'tor-github/pr/1395' into maint-0.3.5
teor [Mon, 25 Nov 2019 02:29:43 +0000 (12:29 +1000)]
Merge remote-tracking branch 'tor-github/pr/1394' into maint-0.3.5
teor [Mon, 25 Nov 2019 02:24:22 +0000 (12:24 +1000)]
Merge remote-tracking branch 'tor-github/pr/1557'
teor [Mon, 25 Nov 2019 01:42:40 +0000 (11:42 +1000)]
CodingStandards: Use the correct changes file format
And remove a duplicate description of the format.
Obviously correct changes to documentation.
Nick Mathewson [Sat, 23 Nov 2019 20:35:59 +0000 (15:35 -0500)]
changes file for 29826
Nick Mathewson [Sat, 23 Nov 2019 20:33:13 +0000 (15:33 -0500)]
process_descs.c: rename confusing identifiers
The FP_ identifiers referred to fingerprints, but they also applied
to address ranges. The router_status_t name invited confusion with
routerstasus_t. Fixes ticket 29826.
This is an automated commit, generated by this command:
./scripts/maint/rename_c_identifier.py \
router_status_t rtr_flags_t \
FP_INVALID RTR_INVALID \
FP_BADEXIT RTR_BADEXIT \
FP_REJECT RTR_REJECT
Nick Mathewson [Sat, 23 Nov 2019 20:30:18 +0000 (15:30 -0500)]
rename_c_identifier: don't crash when doing only one replacement.
Nick Mathewson [Fri, 22 Nov 2019 14:04:36 +0000 (09:04 -0500)]
Fix a low-impact memory leak in options_act_reversible()
Found by Coverity as CID
1455953
Fixes bug 32575; bug not in any released Tor.
Nick Mathewson [Thu, 21 Nov 2019 16:56:42 +0000 (11:56 -0500)]
ht.h: improve documentation for HT_NEXT_RMV.
Nick Mathewson [Thu, 21 Nov 2019 13:26:20 +0000 (08:26 -0500)]
Merge branch 'ticket32209'
Nick Mathewson [Thu, 21 Nov 2019 13:26:12 +0000 (08:26 -0500)]
config.md: suggestions from teor
Nick Mathewson [Thu, 21 Nov 2019 12:49:18 +0000 (07:49 -0500)]
Merge branch 'reversible_3'
George Kadianakis [Thu, 21 Nov 2019 11:03:44 +0000 (13:03 +0200)]
Merge branch 'tor-github/pr/1555'
David Goulet [Wed, 20 Nov 2019 14:24:38 +0000 (09:24 -0500)]
hs-v3: Add changes file for ticket #30382
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 19 Nov 2019 16:10:13 +0000 (11:10 -0500)]
hs-v3: Return bad address SOCKS5 extended error
If ExtendedErrors is set for the SocksPort, an invalid .onion address now
returns the 0xF6 error code per prop304.
Closes #30022
Signed-off-by: David Goulet <dgoulet@torproject.org>
Nick Mathewson [Wed, 20 Nov 2019 18:31:32 +0000 (13:31 -0500)]
Merge branch 'bug32555'
David Goulet [Wed, 30 Oct 2019 18:48:04 +0000 (14:48 -0400)]
hs-v2: Move v2 circuit cleanup actions into hs_circ_cleanup()
Refactor to decomplexify circuit_about_to_free() and finally have one single
entry point into the HS subsystems (v2 and v3) for when a circuit is freed.
With this, hs_circ_cleanup() becomes the one and only entry point when a
circuit is freed which then routes to the right subsystem version for any
actions to be taken.
This moves a big chunk of code from circuituse.c to rendclient.c. No behavior
change. Next commit will refactor it to reduce our technical debt.
Part of #32020
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 30 Oct 2019 18:26:21 +0000 (14:26 -0400)]
circ: Add hidden service helper functions
Functions to correctly identify HS circuit type and version.
Part of #32020
Signed-off-by: David Goulet <dgoulet@torproject.org>
Nick Mathewson [Wed, 20 Nov 2019 14:49:25 +0000 (09:49 -0500)]
options_act_reversible: add more comments to explain ordering
Nick Mathewson [Wed, 20 Nov 2019 14:27:33 +0000 (09:27 -0500)]
Typo/grammar fixes.
Nick Mathewson [Wed, 20 Nov 2019 13:26:37 +0000 (08:26 -0500)]
log config: Set safelogging_changed even if we aren't running Tor.
Nick Mathewson [Tue, 19 Nov 2019 20:45:12 +0000 (15:45 -0500)]
Some tests for log changes, commit, and rollback
Nick Mathewson [Tue, 19 Nov 2019 16:59:21 +0000 (11:59 -0500)]
Make KeyDirectory's GroupReadable behave the same as CacheDirectory's.
In #26913 we solved a bug where CacheDirectoryGroupReadable would
override DataDirectoryGroupReadable when the two directories are the
same. We never did the same for KeyDirectory, though, because
that's a rare setting.
Now that I'm testing this code, though, fixing this issue seems
fine. Fixes bug #27992; bugfix on 0.3.3.1-alpha.
Nick Mathewson [Tue, 19 Nov 2019 16:52:10 +0000 (11:52 -0500)]
New unit tests for options_create_directories().
Nick Mathewson [Mon, 11 Nov 2019 21:32:25 +0000 (16:32 -0500)]
parseconf test: ControlSocketsGroupWriteable without ControlSocket.
Nick Mathewson [Mon, 11 Nov 2019 21:31:50 +0000 (16:31 -0500)]
Typo fix in warning message about ControlSocket
Nick Mathewson [Wed, 20 Nov 2019 14:14:08 +0000 (09:14 -0500)]
Free options objects for which validation fails.
Also free options objects when we discard them due to
TestingTorOptions.
Fixes bug 32555; bug not in any released Tor.
Nick Mathewson [Fri, 8 Nov 2019 03:23:28 +0000 (22:23 -0500)]
Split listener configuration out of options_act_reversible()
Nick Mathewson [Thu, 7 Nov 2019 22:42:47 +0000 (17:42 -0500)]
Split log configuration out of options_act_reversible().
Nick Mathewson [Thu, 7 Nov 2019 17:59:50 +0000 (12:59 -0500)]
options_act_reversible(): Extract more startup-only pieces.
These have to happen after opening listeners and before opening logs :/
Nick Mathewson [Thu, 7 Nov 2019 17:47:20 +0000 (12:47 -0500)]
Extract a function for one-time-only pre-reversible options.
These changes _only_ happen at startup, and happen before _any_
reversible option change is set.
Nick Mathewson [Thu, 7 Nov 2019 17:28:29 +0000 (12:28 -0500)]
Move some ControlSocket checks to options_validate_cb()
There is no reason for them be in options_act_reversible().
George Kadianakis [Mon, 5 Aug 2019 12:45:48 +0000 (15:45 +0300)]
Rename REGISTER_SUCCESS_ALSO_DECRYPTED to REGISTER_SUCCESS_AND_DECRYPTED.
George Kadianakis [Mon, 5 Aug 2019 12:44:18 +0000 (15:44 +0300)]
Various minor improvements after David's review.
- Fix a wrong log message
- Introduce a cap for the nickname size
- Change some 'if' statements to 'switch'.
George Kadianakis [Mon, 3 Jun 2019 13:18:32 +0000 (16:18 +0300)]
hs-v3: Decrypt pending descriptors when we get new client auth creds.
George Kadianakis [Mon, 18 Nov 2019 17:21:10 +0000 (19:21 +0200)]
Add changes file for #30381.
George Kadianakis [Mon, 3 Jun 2019 11:52:25 +0000 (14:52 +0300)]
control-port: Tests for ONION_CLIENT_AUTH_VIEW.
George Kadianakis [Mon, 3 Jun 2019 11:25:38 +0000 (14:25 +0300)]
control-port: Implement ONION_CLIENT_AUTH_VIEW.
George Kadianakis [Mon, 3 Jun 2019 10:41:22 +0000 (13:41 +0300)]
control-port: Tests for ONION_CLIENT_AUTH_REMOVE.
George Kadianakis [Mon, 3 Jun 2019 12:43:54 +0000 (15:43 +0300)]
control-port: Implement ONION_CLIENT_AUTH_REMOVE.
George Kadianakis [Thu, 30 May 2019 15:14:47 +0000 (18:14 +0300)]
control-port: Tests for ONION_CLIENT_AUTH_ADD.
George Kadianakis [Thu, 30 May 2019 12:58:20 +0000 (15:58 +0300)]
control-port: Implement ONION_CLIENT_AUTH_ADD.
George Kadianakis [Mon, 18 Nov 2019 17:06:53 +0000 (19:06 +0200)]
Merge branch 'tor-github/pr/1423'
David Goulet [Thu, 17 Oct 2019 14:28:18 +0000 (10:28 -0400)]
doc: Manpage entry for ExtendedErrors of prop304
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 6 Jun 2019 13:36:02 +0000 (09:36 -0400)]
test: Unit test for the hs cache decrypt on new auth
Part of #30382
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 6 Jun 2019 12:43:48 +0000 (08:43 -0400)]
test: Unit test for the SOCKS5 HS client auth errors
Part of #30382
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 17 Oct 2019 13:50:23 +0000 (09:50 -0400)]
hs-v3: Improve documentation of hs_cache_client_descriptor_t
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Fri, 31 May 2019 13:27:36 +0000 (09:27 -0400)]
hs-v3: Function to re-parse unencrypted descriptor
We now keep descriptor that we can't decode due to missing client
authorization in the cache.
This new function is used when new client authorization are added and to tell
the client cache to retry decoding.
Part of #30382
Signed-off-by: David Goulet <dgoulet@torproject.org>