summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2021-02-15Reflow the blurb in the ReleaseNotes too.tor-0.4.5.6Nick Mathewson
2021-02-15Release blurb and dedication for 0.4.5.6Nick Mathewson
2021-02-15Merge branch 'maint-0.4.5' into release-0.4.5Nick Mathewson
2021-02-15Bump to 0.4.5.6.Nick Mathewson
2021-02-150456 ReleaseNotes: remove entries that appeared in 0.4.4.{6,7}Nick Mathewson
2021-02-12Sort the 0.4.5.6 release notes.Nick Mathewson
2021-02-120.4.5.6 releasenotes: remove bugfixes on 0.4.5.xNick Mathewson
2021-02-12Begin releasenotes for 0456Nick Mathewson
2021-02-12Start an 0456 changelog.Nick Mathewson
2021-02-12Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2021-02-12Merge branch 'tor-gitlab/mr/304' into maint-0.4.5David Goulet
2021-02-12test: Fix duplicate ORPort testDavid Goulet
The comment of that specific unit test wanted 4 ORPorts but for some reasons we tested for 3 which before the previous commit related to #40289, test would pass but it was in fact wrong. Now the code is correct and 4 was in fact correct expected number of ports. Related to #40289 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-12config: Do not compare for duplicate ORPorts with different addressesDavid Goulet
We were just looking at the family which is not correct because it is possible to have two explicit ORPort for the same family but different addresses. One example is: ORPort 127.0.0.1:9001 NoAdvertise ORPort 1.2.3.4:9001 NoListen Thus, this patch now ignores ports that have different addresses iff they are both explicits. That is, if we have this example, also two different addresses: ORPort 9001 ORPort 127.0.0.1:9001 NoAdvertise The first one is implicit and second one is explicit and thus we have to consider them for removal which in this case would remove the "ORPort 9001" in favor of the second port. Fixes #40289 Signe-off-by: David Goulet <dgoulet@torproject.org>
2021-02-12Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2021-02-12Merge branch 'tor-gitlab/mr/302' into maint-0.4.5David Goulet
2021-02-12Merge branch 'tor-gitlab/mr/303' into maint-0.4.5David Goulet
2021-02-12Merge branch 'maint-0.4.5' into release-0.4.5Alexander Færøy
2021-02-12Merge remote-tracking branch 'tor-gitlab/mr/293' into maint-0.4.5Alexander Færøy
2021-02-12Merge branch 'maint-0.4.5' into release-0.4.5George Kadianakis
2021-02-12Merge remote-tracking branch 'tor-gitlab/mr/294' into maint-0.4.5George Kadianakis
2021-02-12Merge branch 'maint-0.4.5' into release-0.4.5George Kadianakis
2021-02-12Merge remote-tracking branch 'tor-gitlab/mr/295' into release-0.4.5George Kadianakis
2021-02-12Merge remote-tracking branch 'tor-gitlab/mr/295' into maint-0.4.5George Kadianakis
2021-02-11config: Set flag for implicit port addressDavid Goulet
Fun bug where we thought we were using the default "false" value when an implicit address was detected but if we had an explicit address before, the flag was set to true and then we would only use that value. And thus, for some configurations, implicit addresses would be flagged as explicit and then configuring ports goes bad. Related to #40289 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-10relay: Allow RFC1918 addresses for non public relaysDavid Goulet
In other words, if PublishServerDescriptor is set to 0 and AssumeReachable to 1, then allow a relay to hold a RFC1918 address. Reasons for this are documented in #40208 Fixes #40208 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-10relay: Don't look at omit flag when building descriptorDavid Goulet
That comes from 685c4866acf8489c58aca41ec01aa5a53e39220a which added that check correctly except for when we build a descriptor. We already omit the IPv6 address, if we need to, when we encode the descriptor but we need to keep the actual discovered address in the descriptor so we can notice future IP changes and be able to assess that we are not publishable as long as we don't specifically set the omit flag. This lead to also having tor noticing that our IP changed from <nothing> (no IPv6 in the descriptor) to a discovered one which would trigger every minute. Fixes #40279, #40288 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-08Merge branch 'maint-0.4.5' into release-0.4.5Nick Mathewson
2021-02-08Merge remote-tracking branch 'tor-gitlab/mr/296' into maint-0.4.5Nick Mathewson
2021-02-08Merge branch 'maint-0.4.5' into release-0.4.5Nick Mathewson
2021-02-08conn: Properly close MetricsPort socket on EOFDavid Goulet
Handle the EOF situation for a metrics connection. Furthermore, if we failed to fetch the data from the inbuf properly, mark the socket as closed because the caller, connection_process_inbuf(), assumes that we did so on error. Fixes #40257 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-08Don't log supported-protover warnings if consensus is older than Tor.Nick Mathewson
Previously we would warn in this case... but there's really no justification for doing so, and it can only cause confusion. Fixes bug #40281; bugfix on 0.4.0.1-alpha.
2021-02-08relay: Look at the omit IPv6 flag when publishingDavid Goulet
In two instances we must look at this flag: 1. When we build the descriptor so the IPv6 is NOT added to the descriptor in case we judge that we need to omit the address but still publish. 2. When we are deciding if the descriptor is publishable. This flags tells us that the IPv6 was not found reachable but we should still publish. Fixes #40279 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-08Remove DirCache=1 from list of supported versions.Nick Mathewson
Closes #40221
2021-02-08relay: Fix Coverity warning for unchecked returned valueDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-05Merge branch 'maint-0.4.5' into release-0.4.5Alexander Færøy
2021-02-05Merge branch 'maint-0.4.4' into maint-0.4.5Alexander Færøy
2021-02-05Delete changes/40241_v2 as it breaks CI.Alexander Færøy
Unreviewed build fix. Discussed the cnage on IRC with Nick.
2021-02-05Merge branch 'maint-0.4.5' into release-0.4.5Alexander Færøy
2021-02-05Merge branch 'maint-0.4.4' into maint-0.4.5Alexander Færøy
2021-02-05Fix CI build: practracker error in connection_edge.c, take two.Alexander Færøy
This was a bad copy and paste error from the previous commit which generated a duplicated entry error from practracker. Unreviewed build fix. See: tor#40275.
2021-02-05Merge branch 'maint-0.4.5' into release-0.4.5Alexander Færøy
2021-02-05Merge branch 'maint-0.4.4' into maint-0.4.5Alexander Færøy
2021-02-05Fix CI build: practracker error in connection_edge.c.Alexander Færøy
We solve this error by allowing the connection_exit_connect() function to be 130 lines long. Unreviewed build fix commit. See: tor#40275.
2021-02-05Fix Windows build.Alexander Færøy
While trying to resolve our CI issues, the Windows build broke with an unused function error: src/test/test_switch_id.c:37:1: error: ‘unprivileged_port_range_start’ defined but not used [-Werror=unused-function] We solve this by moving the `#if !defined(_WIN32)` test above the `unprivileged_port_range_start()` function defintion such that it is included in its body. This is an unreviewed commit. See: tor#40275
2021-02-05Merge branch 'maint-0.4.5' into release-0.4.5Alexander Færøy
2021-02-05Merge branch 'maint-0.4.4' into maint-0.4.5Alexander Færøy
2021-02-05Merge branch 'tor-gitlab/mr/292_squashed' into maint-0.4.4Alexander Færøy
2021-02-05Only check for bindable ports if we are unsure if it will fail.Alexander Færøy
We currently assume that the only way for Tor to listen on ports in the privileged port range (1 to 1023), on Linux, is if we are granted the NET_BIND_SERVICE capability. Today on Linux, it's possible to specify the beginning of the unprivileged port range using a sysctl configuration option. Docker (and thus the CI service Tor uses) recently changed this sysctl value to 0, which causes our tests to fail as they assume that we should NOT be able to bind to a privileged port *without* the NET_BIND_SERVICE capability. In this patch, we read the value of the sysctl value via the /proc/sys/ filesystem iff it's present, otherwise we assume the default unprivileged port range begins at port 1024. See: tor#40275
2021-02-03Merge branch 'maint-0.4.5' into release-0.4.5Nick Mathewson
2021-02-03Merge branch 'maint-0.4.4' into maint-0.4.5Nick Mathewson
"ours" to avoid version bump.