summaryrefslogtreecommitdiff
path: root/src/feature/relay/router.h
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2020-06-24 14:52:44 -0400
committerNick Mathewson <nickm@torproject.org>2020-06-24 15:25:26 -0400
commit6edf7f6710600962f95e7f5458787dbc5e5c7411 (patch)
tree454a59f034612315d7b4dc2536f8d99464831f4c /src/feature/relay/router.h
parentf9de0affd3f50d411e04bc1229525af2a14927fd (diff)
downloadtor-6edf7f6710600962f95e7f5458787dbc5e5c7411.tar.gz
tor-6edf7f6710600962f95e7f5458787dbc5e5c7411.zip
Add two new networkstatus parameters to emulate AssumeReachable.
These parameters do not suppress checks, but they tell relays that it's okay to publish even when those checks fail. I have chosen lowercase hyphenated names, since these seem to be more common in networkstatus params. Closes #33224 and part of #34064.
Diffstat (limited to 'src/feature/relay/router.h')
-rw-r--r--src/feature/relay/router.h2
1 files changed, 2 insertions, 0 deletions
diff --git a/src/feature/relay/router.h b/src/feature/relay/router.h
index 50790a73dd..b1f90699a2 100644
--- a/src/feature/relay/router.h
+++ b/src/feature/relay/router.h
@@ -34,6 +34,7 @@ void set_server_identity_key(crypto_pk_t *k);
MOCK_DECL(crypto_pk_t *,get_server_identity_key,(void));
#else
#define get_server_identity_key() (tor_abort_(),NULL)
+#define router_new_consensus_params(c) ((void)(c))
#endif
int server_identity_key_is_set(void);
void set_client_identity_key(crypto_pk_t *k);
@@ -81,6 +82,7 @@ int router_should_advertise_dirport(const or_options_t *options,
void consider_publishable_server(int force);
int should_refuse_unknown_exits(const or_options_t *options);
+void router_new_consensus_params(const networkstatus_t *);
void router_upload_dir_desc_to_dirservers(int force);
void mark_my_descriptor_dirty_if_too_old(time_t now);
void mark_my_descriptor_dirty(const char *reason);