- 13 Oct, 2021 3 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
There are some limitations here, as noted in the comments.
-
Nick Mathewson authored
-
- 11 Oct, 2021 4 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 10 Oct, 2021 6 commits
-
-
Nick Mathewson authored
(When we're building a path with a guard, we need to tell the guard manager whether the path succeeded, and we need to wait to hear whether the guard is usable.)
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
The advantage here is that we no longer have to use a futures-aware Mutex, or a blocking send operation, and therefore can simplify a bunch of the GuardMgr APIs to no longer be async. That'll avoid having to propagate the asyncness up the stack. The disadvantage is that unbounded channels are just that: nothing in the channel prevents us from overfilling it. Fortunately, the process that consumes from the channel shouldn't block much, and the channel only gets filled when we're planning a circuit path.
-
- 09 Oct, 2021 6 commits
-
-
Nick Mathewson authored
I tried using -Z minimal-versions to downgrade all first-level dependencies to their oldest permitted versions, and found that we were apparently depending on newer features of all three crates. I'm kind of surprised there were only three.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 08 Oct, 2021 4 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 07 Oct, 2021 12 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
By the time I merge this, most of the comments should have tickets to go with them.
-
Nick Mathewson authored
Also, refactor our message handling to be more like the tor_proto reactors. The previous code had a bug where, once the stream of events was exhausted, we wouldn't actually get any more notifications.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
There are some missing parts here (like persistence and tests) and some incorrect parts (I am 90% sure that the "exploratory circuit" flag is bogus). Also it is not integrated with the circuit manager code.
-
Nick Mathewson authored
-
Nick Mathewson authored
This will let us provide a couple of better APIs for use in tor-guardmgr
-
Nick Mathewson authored
-
Nick Mathewson authored
The limitations with toml seemed to be reaching a head, and I wasn't able to refactor the guardmgr code enough to actually have its state be serializable as toml. Json's limitations are much narrower.
-
Nick Mathewson authored
I have no idea why this just turned up now.
-
- 06 Oct, 2021 1 commit
-
-
trinity-1686a authored
ctrlc had rustsec issues, der was yanked
-
- 05 Oct, 2021 2 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 01 Oct, 2021 2 commits
-
-
Nick Mathewson authored
Closes #163
-
Nick Mathewson authored
-