aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2024-11-19test-network-run: refactor away test_network_ipv6maint-0.4.8Jim Newsome
This should be a pure refactor to simplify the logic a bit now that we no longer probe for IPv6 support.
2024-11-19test-network: include IPv6 tests unconditionallyJim Newsome
Previously we would incorrectly detect that ipv6 isn't supported if the ping binary isn't present (as it may not be in a relatively stripped down container image), or if ICMP packets aren't permitted (as they often aren't in containers). We don't really have a need to run these network tests on non-IPv6 systems, so it makes more sense to just run them unconditionally.
2024-11-19debian-i386-minimal: explicitly set platformJim Newsome
This is to work around https://github.com/docker-library/official-images/issues/17896
2024-11-19CI: Use TPA-based imagesJim Newsome
2024-11-19debian-gpl: Run on debian:bullseye instead of busterJim Newsome
* buster is now very old * all the other jobs run bullseye * This will facilitate switching to a TPA-maintained image (there is no buster image).
2024-10-31Fix: Use FREE_AND_NULL() for releasing workqueue resourcesWaldemar Zimpel
See issue #40989
2024-10-24Merge branch 'tor-gitlab/mr/840' into maint-0.4.8David Goulet
2024-10-24Use pip to install chutney's python dependenciesJim Newsome
2024-10-24version: Bump version to 0.4.8.13-devTor CI Release
2024-10-24Re-format CHUTNEY installation block into multiple linesJim Newsome
We're about to add a few more steps, which would make the single-line format a bit unwieldy.
2024-10-24version: Bump version to 0.4.8.13Tor CI Release
2024-10-24fallbackdir: Update list generated on October 24, 2024Tor CI Release
2024-10-24Update geoip files to match ipfire location db, 2024/10/24.Tor CI Release
2024-10-15don't build preemptive conflux circuits if no predicted portsRoger Dingledine
Conflux circuit building was ignoring the "predicted ports" feature, which aims to make Tor stop building circuits if there have been no user requests lately. This bug led to every idle Tor on the network building and discarding circuits every 30 seconds, which added overall load to the network, used bandwidth and battery from clients that weren't actively using their Tor, and kept sockets open on guards which added connection padding essentially forever. Bug went in on commit 39c2927d when we added preemptive conflux circuit pools. Fixes bug 40981; bugfix on 0.4.8.1-alpha.
2024-10-10Fix: Memory leaks in cpuworker on shutdownWaldemar Zimpel
Resources allocated by cpuworker weren't being freed on clean shutdown. This applies for worker threads, worker thread pool, reply queue, reply event, ...
2024-08-05dirvote: Fix memleak when computing consensusDavid Goulet
Fixes #40966 Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-06-18bridge: Always put transport-info lineDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-06-18Clean-up Managed Proxy state in PT tests.Alexander Færøy
This patch makes sure we clean up our version and implementation fields in our Managed Proxy struct after each test run. This was detected by LeakSanitizer. See: tpo/core/tor#11101.
2024-06-18Add changes file for tpo/core/tor#11101.Alexander Færøy
2024-06-18Add implementation and version metadata to bridge extra-info.Alexander Færøy
This patch adds two new keys to bridges' extra-info document: "transport-version" and "transport-implementation". These two new values always appear together (if one is missing, the other one will be missing too) and is parsed from PT's STATUS TYPE=version messages. See: tpo/core/tor#11101.
2024-06-18Include "IMPLEMENTATION" parameter to STATUS TYPE=version PT messages.Alexander Færøy
2024-06-18Drop requirement for TRANSPORT being present in STATUS messages.Alexander Færøy
2024-06-18Add support for PT STATUS TYPE=version messages.Alexander Færøy
This patch adds support for handling the version status message. Once we receive such message, we add the given version string to the managed_proxy_t instance. Note this value can be NULL and the value can change throughout the lifetime of the PT as multiple status version messages are handled. See: tpo/core/tor#11101
2024-06-06version: Bump version to 0.4.8.12-devTor CI Release
2024-06-06version: Bump version to 0.4.8.12Tor CI Release
2024-06-06fallbackdir: Update list generated on June 06, 2024Tor CI Release
2024-06-06Update geoip files to match ipfire location db, 2024/06/06.Tor CI Release
2024-05-30Update OverloadStatistics to match prop 328Georg Koppen
Closes: #40940.
2024-05-30Merge branch 'ticket40689_048_01' into maint-0.4.8David Goulet
2024-05-30scripts: Fix Python3 warningsDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-05-30dirauth: Add new faravaharDavid Goulet
Brand new address, brand new keys, brand new day. Closes #40689 Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-30Fix typo in tor-relays list addresshiro
2024-04-16circuit: Remove log_warn triggered by a proto violationDavid Goulet
Fixes #40932 Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-15Merge branch 'tor-gitlab/mr/808' into maint-0.4.8David Goulet
2024-04-15conflux: Don't process a closed circuit on get packaged windowDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-15conflux: Avoid noting a cell was sent on a closed circuitDavid Goulet
It turns out that circuit_package_relay_cell() returns 0 in order to drop a cell but there is a code path, if the circuit queue is full, that also silently closes the circuit and returns 0. This lead to Conflux thinking a cell was sent but actually the cell was not and the circuit was closed leading to the hard assert. And so this function makes sure that circuit_package_relay_cell() and append_cell_to_circuit_queue() returns a value that indicate what happened with the cell and circuit so the caller can make an informed decision with it. This change makes it that we do NOT enter the Conflux subsystem if the cell is not queued on the circuit. Fixes #40921 Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-10version: Bump version to 0.4.8.11-devTor CI Release
2024-04-10version: Bump version to 0.4.8.11Tor CI Release
2024-04-10fallbackdir: Update list generated on April 10, 2024Tor CI Release
2024-04-10Update geoip files to match ipfire location db, 2024/04/10.Tor CI Release
2024-04-08dirauth: New keys and address for tor26David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-02-06Try to appease the changefile format checkerSebastian Hahn
2024-02-01Update test stringsSebastian Hahn
2024-02-01Add a changes fileSebastian Hahn
2024-02-01dirauth: Warn when failing to post during a voteSebastian Hahn
The only way to figure out that posting a vote or signatures to another dirauth failed is by counting how many success messages there are on notice level, and noticing that it is fewer than the number of configured dirauths. Closes #40910.
2024-01-30dirauth: Reject 0.4.7.x series at the authority levelDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-01-30bwauth: Allow "node_id" KeyValue without "$"juga
Allow "node_id" KeyValue without the dollar sign at the start of the hexdigit in the BandwidthFiles, in order to easier database queries combining Tor documents in which the relays fingerprint doesn't include it. Bugfix on all supported versions of Tor. Closes #40891
2024-01-09add release note and changelog entry for #40819trinity-1686a
2023-12-08version: Bump version to 0.4.8.10-devTor CI Release
2023-12-08version: Bump version to 0.4.8.10Tor CI Release