- Mar 13, 2020
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Feb 13, 2020
-
-
teor authored
Conflicts: * Keep RUST_VERSION from maint-0.4.2 * Keep the commented-out allow_failure entries from bug33195_041
-
teor authored
Conflicts: * Keep TOR_TEST_RNG_SEED from maint-0.4.1 * Keep the ordering from bug33195_035
-
teor authored
Putting the slowest jobs first takes full advantage of Travis concurrency. Closes 33194.
-
teor authored
Part of 33194.
-
teor authored
The job was previously set to fast_finish / allow_failure, to speed up the build. Closes ticket 33195.
-
- Feb 12, 2020
-
-
teor authored
-
teor authored
-
This patch ensures that we always lowercase the BridgeDistribution from torrc in descriptors before submitting it. See: https://bugs.torproject.org/32753
-
teor authored
-
- Feb 11, 2020
-
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Part of #33029 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Authorities were never sending back 503 error code because by design they should be able to always answer directory requests regardless of bandwidth capacity. However, that recently backfired because of a large number of requests from unknown source using the DirPort that are _not_ getting their 503 code which overloaded the DirPort leading to the authority to be unable to answer to its fellow authorities. This is not a complete solution to the problem but it will help ease off the load on the authority side by sending back 503 codes *unless* the connection is from a known relay or an authority. Fixes #33029 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
This controls the previous feature added that makes dirauth send back a 503 error code on non relay connections if under bandwidth pressure. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
The configured, within the torrc or hardcoded, directory authorities addresses are now added to the nodelist address set. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
We separate v4 and v6 because we often use an IPv4 address represented with a uint32_t instead of a tor_addr_t. This will be used to also add the trusted directory addresses taken from the configuration. The trusted directories from the consensus are already added to the address set from their descriptor. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
That function is only used to test the global bucket write limit for a directory connection. It should _not_ be used for anything else since that function looks to see if we are a directory authority. Rename it to something more meaningful. No change in behavior at this commit, only renaming. Part of #33029 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
"ours" merge, since the exceptions.txt file is already fixed in this branch.
-
Nick Mathewson authored
This will our "git push" hook not complain about pushing from maint-0.4.1.
-
- Feb 10, 2020
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Jan 30, 2020
-
-
Nick Mathewson authored
Using "ours" strategy to avoid version bump
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
"Ours" merge to avoid version bump.
-
Nick Mathewson authored
-
- Jan 29, 2020