diff options
author | Nick Mathewson <nickm@torproject.org> | 2020-06-24 14:52:44 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2020-06-24 15:25:26 -0400 |
commit | 6edf7f6710600962f95e7f5458787dbc5e5c7411 (patch) | |
tree | 454a59f034612315d7b4dc2536f8d99464831f4c /src/feature/relay/router.h | |
parent | f9de0affd3f50d411e04bc1229525af2a14927fd (diff) | |
download | tor-6edf7f6710600962f95e7f5458787dbc5e5c7411.tar.gz tor-6edf7f6710600962f95e7f5458787dbc5e5c7411.zip |
Add two new networkstatus parameters to emulate AssumeReachable.
These parameters do not suppress checks, but they tell relays that
it's okay to publish even when those checks fail.
I have chosen lowercase hyphenated names, since these seem to be
more common in networkstatus params.
Closes #33224 and part of #34064.
Diffstat (limited to 'src/feature/relay/router.h')
-rw-r--r-- | src/feature/relay/router.h | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/src/feature/relay/router.h b/src/feature/relay/router.h index 50790a73dd..b1f90699a2 100644 --- a/src/feature/relay/router.h +++ b/src/feature/relay/router.h @@ -34,6 +34,7 @@ void set_server_identity_key(crypto_pk_t *k); MOCK_DECL(crypto_pk_t *,get_server_identity_key,(void)); #else #define get_server_identity_key() (tor_abort_(),NULL) +#define router_new_consensus_params(c) ((void)(c)) #endif int server_identity_key_is_set(void); void set_client_identity_key(crypto_pk_t *k); @@ -81,6 +82,7 @@ int router_should_advertise_dirport(const or_options_t *options, void consider_publishable_server(int force); int should_refuse_unknown_exits(const or_options_t *options); +void router_new_consensus_params(const networkstatus_t *); void router_upload_dir_desc_to_dirservers(int force); void mark_my_descriptor_dirty_if_too_old(time_t now); void mark_my_descriptor_dirty(const char *reason); |