1. 28 May, 2021 3 commits
  2. 27 May, 2021 1 commit
  3. 26 May, 2021 1 commit
    • Nick Mathewson's avatar
      Prefer mmap()ed consensus files over cached_dir_t entries. · d12b1661
      Nick Mathewson authored
      Cached_dir_t is a somewhat "legacy" kind of storage when used for
      consensus documents, and it appears that there are cases when
      changing our settings causes us to stop updating those entries.
      
      This can cause trouble, as @arma found out in #40375, where he
      changed his settings around, and consensus diff application got
      messed up: consensus diffs were being _requested_ based on the
      latest consensus, but were being (incorrectly) applied to a
      consensus that was no longer the latest one.
      
      This patch is a minimal fix for backporting purposes: it has Tor do
      the same search when applying consensus diffs as we use to request
      them.  This should be sufficient for correct behavior.
      
      There's a similar case in GETINFO handling; I've fixed that too.
      
      Fixes #40375; bugfix on 0.3.1.1-alpha.
      d12b1661
  4. 25 May, 2021 4 commits
  5. 17 May, 2021 4 commits
  6. 12 May, 2021 1 commit
  7. 10 May, 2021 4 commits
  8. 07 May, 2021 18 commits
  9. 05 May, 2021 1 commit
  10. 04 May, 2021 1 commit
    • David Goulet's avatar
      hs: Fix ADD_ONION with client authorization · cf6e72b7
      David Goulet authored
      
      
      Turns out that passing client authorization keys to ADD_ONION for v3 was
      not working because we were not setting the "is_client_auth_enabled"
      flag to true once the clients were configured. This lead to the
      descriptor being encoded without the clients.
      
      This patch removes that flag and instead adds an inline function that
      can be used to check if a given service has client authorization
      enabled.
      
      This will be much less error prone of needing to keep in sync the client
      list and a flag instead.
      
      Fixes #40378
      
      Signed-off-by: David Goulet's avatarDavid Goulet <dgoulet@torproject.org>
      cf6e72b7
  11. 23 Apr, 2021 2 commits