Skip to content
Snippets Groups Projects
  1. Oct 20, 2021
  2. Oct 19, 2021
  3. Sep 30, 2021
  4. Sep 13, 2021
    • Alexander Hansen Færøy's avatar
      Only check for bindable ports if we are unsure if it will fail. · fcef8e3f
      Alexander Hansen Færøy authored
      We currently assume that the only way for Tor to listen on ports in the
      privileged port range (1 to 1023), on Linux, is if we are granted the
      NET_BIND_SERVICE capability. Today on Linux, it's possible to specify
      the beginning of the unprivileged port range using a sysctl
      configuration option. Docker (and thus the CI service Tor uses) recently
      changed this sysctl value to 0, which causes our tests to fail as they
      assume that we should NOT be able to bind to a privileged port *without*
      the NET_BIND_SERVICE capability.
      
      In this patch, we read the value of the sysctl value via the /proc/sys/
      filesystem iff it's present, otherwise we assume the default
      unprivileged port range begins at port 1024.
      
      See: tor#40275
      fcef8e3f
    • Alexander Hansen Færøy's avatar
    • Alexander Hansen Færøy's avatar
      Force amd64 for CI builds. · 84d6f977
      Alexander Hansen Færøy authored
      84d6f977
  5. Aug 16, 2021
  6. Aug 13, 2021
  7. Aug 12, 2021
  8. Aug 11, 2021
  9. Jun 14, 2021
  10. Jun 10, 2021
  11. Jun 07, 2021
  12. May 25, 2021
  13. May 18, 2021
  14. May 07, 2021
  15. Apr 21, 2021
  16. Apr 16, 2021
    • Nick Mathewson's avatar
      Stop calling evdns_set_random_bytes_fn() · f20f5a4e
      Nick Mathewson authored
      This function has been a no-op since Libevent 2.0.4-alpha, when
      libevent got an arc4random() implementation.  Libevent has finally
      removed it, which will break our compilation unless we stop calling
      it.  (This is currently breaking compilation in OSS-fuzz.)
      
      Closes #40371.
      f20f5a4e
  17. Apr 14, 2021
  18. Apr 13, 2021
Loading