aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2022-11-05return BSD if tor_libc_get_name sees __BSD_VISIBLEVinícius Zavam
* __BSD_VISIBLE is defined by systems like FreeBSD and OpenBSD; * that also extends to DragonFlyBSD; * it's used on stdlib.h and ctypes.h on those systems.
2022-11-03Merge branch 'tor-gitlab/mr/627'David Goulet
2022-11-01added check for compiler support of Wextra-semiAndy
update AX_CHECK_COMPILE_FLAG function call
2022-11-01Merge branch 'tor-gitlab/mr/649'David Goulet
2022-11-01Merge branch 'tor-gitlab/mr/594'David Goulet
2022-11-01Remove `BUG()` in Windows process read callback.Alexander Færøy
This BUG() was added when the code was written to see if this callback was ever executed after we marked the handle as EOF. It turns out, it does, but we handle it gracefully. We can therefore remove the BUG(). Fixes tpo/core/tor#40596.
2022-10-31Merge branch 'tor-gitlab/mr/579'David Goulet
2022-10-31Merge branch 'maint-0.4.7'David Goulet
2022-10-31Merge branch 'tor-gitlab/mr/636'David Goulet
2022-10-31sandbox: Add my-consensus-<flavor-name> to sandbox for dirauthDavid Goulet
Fixese #40663 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-31Merge branch 'maint-0.4.7'David Goulet
2022-10-28Merge branch 'tor-gitlab/mr/646'David Goulet
2022-10-28thread: Bump max detectable CPU from 16 to 128David Goulet
Lets take advantage of those beefy machines ;). Closes #40703 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-28relay: Skip warnings for single onion servicesJeremy Saklad
Single onion services are not secret, so there is no added risk from using accounting or running a relay in the same instance. Related to #40691
2022-10-27resolve a BUG() on relays at startupRoger Dingledine
Remove a harmless "Bug" log message that can happen in relay_addr_learn_from_dirauth() on relays during startup: tor_bug_occurred_(): Bug: ../src/feature/relay/relay_find_addr.c:225: relay_addr_learn_from_dirauth: Non-fatal assertion !(!ei) failed. (on Tor 0.4.7.10 ) Bug: Tor 0.4.7.10: Non-fatal assertion !(!ei) failed in relay_addr_learn_from_dirauth at ../src/feature/relay/relay_find_addr.c:225. Stack trace: (on Tor 0.4.7.10 ) Finishes fixing bug 40231. Fixes bug 40523; bugfix on 0.4.5.4-rc.
2022-10-27Merge branch 'maint-0.4.7'David Goulet
2022-10-27Merge branch 'tor-gitlab/mr/645' into maint-0.4.7David Goulet
2022-10-27Merge branch 'maint-0.4.7'David Goulet
2022-10-27Merge branch 'tor-gitlab/mr/644' into maint-0.4.7David Goulet
2022-10-27Merge branch 'maint-0.4.7'David Goulet
2022-10-27metrics: Treat relay connections as gauge, not counterDavid Goulet
Fixes #40699 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-27Changes file for 40683Mike Perry
2022-10-27Strip "__.SYMDEF*" before re-archiving in combine_libs on macOS and iOS.Alexander Færøy
This patch changes how combine_libs works on Darwin like platforms to make sure we don't include any `__.SYMDEF` and `__.SYMDEF SORTED` symbols on the archive before we repack and run ${RANLIB} on the archive. See: tpo/core/tor#40683.
2022-10-27changes: Update changes for ticket 40194David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-27metrics: Add number of opened circuits to MetricsPortDavid Goulet
Related to #40194 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-27relay: Add our consensus relay flag to MetricsPortDavid Goulet
Related to #40194 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-27metrics: Add traffic related stats to MetricsPortDavid Goulet
At this commit, bytes read and written are exported. Related to #40194 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-27relay: Add DoS subsystem stats to MetricsPortDavid Goulet
Related to #40194 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-27Merge branch 'maint-0.4.7'David Goulet
2022-10-27metrics: Fix naming and documentationDavid Goulet
After nickm's review, minor changes to names and comments. Related to #40194 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26Merge branch 'tor-gitlab/mr/585'David Goulet
2022-10-26Merge branch 'tor-gitlab/mr/596'David Goulet
2022-10-26relay: Change the connection metrics nameDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26relay: Add CC RTT reset stats to MetricsPortDavid Goulet
Related to #40194 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26relay: Add total number of streams seen on MetricsPortDavid Goulet
Related to #40194 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26rephist: Track number of streams seen per typeDavid Goulet
Related to #40194 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26Merge branch 'maint-0.4.7'David Goulet
2022-10-26Merge remote-tracking branch 'tor-gitlab/mr/638'David Goulet
2022-10-26changes: Ticket 40694David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26hs: Retry service rendezvous on circuit closeDavid Goulet
Move the retry from circuit_expire_building() to when the offending circuit is being closed. Fixes #40695 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26circ: Get rid of hs_circ_has_timed_outDavid Goulet
Logic is too convoluted and we can't efficiently apply a specific timeout depending on the purpose. Remove it and instead rely on the right circuit cutoff instead of keeping this flagged circuit open forever. Part of #40694 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26circ: Set proper timeout cutoff for HS circuitsDavid Goulet
Explicitly set the S_CONNECT_REND purpose to a 4-hop cutoff. As for the established rendezvous circuit waiting on the RENDEZVOUS2, set one that is very long considering the possible waiting time for the service to get the request and join our rendezvous. Part of #40694 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26Merge branch 'maint-0.4.7'David Goulet
2022-10-26Merge branch 'tor-gitlab/mr/637'David Goulet
2022-10-26hs: Retry rdv circuit if repurposedDavid Goulet
This can happen if our measurement subsystem decides to snatch it. Fixes #40696 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26Merge branch 'maint-0.4.7'David Goulet
2022-10-26Merge branch 'tor-gitlab/mr/635' into maint-0.4.7David Goulet
2022-10-26Merge branch 'maint-0.4.7'David Goulet
2022-10-26Merge branch 'tor-gitlab/mr/633'David Goulet
2022-10-26hs: Change the error for a collapsing client circuitDavid Goulet
Change it to an "unreachable" error so the intro point can be retried and not flagged as a failure and never retried again. Closes #40692 Signed-off-by: David Goulet <dgoulet@torproject.org>