1. 24 Jan, 2022 1 commit
  2. 18 Jan, 2022 5 commits
  3. 08 Nov, 2021 2 commits
  4. 06 Nov, 2021 1 commit
  5. 05 Nov, 2021 6 commits
  6. 03 Nov, 2021 2 commits
  7. 29 Oct, 2021 2 commits
    • Alexander Færøy's avatar
      Fix Windows build. · 5c8deef9
      Alexander Færøy authored
      While trying to resolve our CI issues, the Windows build broke with an
      unused function error:
      
         src/test/test_switch_id.c:37:1: error: ‘unprivileged_port_range_start’
         defined but not used [-Werror=unused-function]
      
      We solve this by moving the `#if !defined(_WIN32)` test above the
      `unprivileged_port_range_start()` function defintion such that it is
      included in its body.
      
      This is an unreviewed commit.
      
      See: tor#40275
      5c8deef9
    • David Goulet's avatar
      changes: Add file for ticket 26299 · 92fedb9f
      David Goulet authored
      
      
      Signed-off-by: David Goulet's avatarDavid Goulet <dgoulet@torproject.org>
      92fedb9f
  8. 28 Oct, 2021 3 commits
  9. 26 Oct, 2021 3 commits
  10. 21 Oct, 2021 1 commit
  11. 20 Oct, 2021 3 commits
  12. 19 Oct, 2021 4 commits
  13. 30 Sep, 2021 5 commits
  14. 13 Sep, 2021 2 commits
    • Alexander Færøy's avatar
      Only check for bindable ports if we are unsure if it will fail. · fcef8e3f
      Alexander Færøy authored
      We currently assume that the only way for Tor to listen on ports in the
      privileged port range (1 to 1023), on Linux, is if we are granted the
      NET_BIND_SERVICE capability. Today on Linux, it's possible to specify
      the beginning of the unprivileged port range using a sysctl
      configuration option. Docker (and thus the CI service Tor uses) recently
      changed this sysctl value to 0, which causes our tests to fail as they
      assume that we should NOT be able to bind to a privileged port *without*
      the NET_BIND_SERVICE capability.
      
      In this patch, we read the value of the sysctl value via the /proc/sys/
      filesystem iff it's present, otherwise we assume the default
      unprivileged port range begins at port 1024.
      
      See: tor#40275
      fcef8e3f
    • Alexander Færøy's avatar
      12b64845