aboutsummaryrefslogtreecommitdiff
path: root/src/or/main.c
AgeCommit message (Collapse)Author
2016-08-16Fixes inconsistent version prefix in log messages.Daniel Pinto
Fixes #15381.
2016-08-12Merge remote-tracking branch 'public/Fix_19450'Nick Mathewson
2016-08-10Eliminate redundant hourly reset of descriptor download failuresAndrea Shepard
2016-08-02Search for remaining references to 'bufferevent'.Nick Mathewson
Remove or adjust as appropriate.
2016-08-02Bufferevent removal: remove HAS_BUFFEREVENT macros and usageNick Mathewson
This is another way that we had bufferevents-only code marked.
2016-08-02More bufferevent removal: bev_str is no longer needed in tor_initNick Mathewson
2016-07-19Be sure to call monotime_init() at startup.Nick Mathewson
2016-07-14Remove bufferevents dead codeU+039b
Signed-off-by: U+039b <*@0x39b.fr>
2016-07-08Merge remote-tracking branch 'sebastian/libevent2'Nick Mathewson
2016-07-05Merge remote-tracking branch 'teor/bug18456'Nick Mathewson
2016-07-05Merge branch 'maint-0.2.8'Nick Mathewson
2016-07-04Raise libevent dependency to 2.0.10-stable or newerSebastian Hahn
Only some very ancient distributions don't ship with Libevent 2 anymore, even the oldest supported Ubuntu LTS version has it. This allows us to get rid of a lot of compat code.
2016-07-03sandboxing: allow writing to stats/hidserv-statsPeter Palfrader
Our sandboxing code would not allow us to write to stats/hidserv-stats, causing tor to abort while trying to write stats. This was previously masked by bug#19556.
2016-07-03sandboxing: allow open() of stats dirPeter Palfrader
When sandboxing is enabled, we could not write any stats to disk. check_or_create_data_subdir("stats"), which prepares the private stats directory, calls check_private_dir(), which also opens and not just stats() the directory. Therefore, we need to also allow open() for the stats dir in our sandboxing setup.
2016-07-01Merge remote-tracking branch 'dgoulet/ticket16943_029_05-squashed'Nick Mathewson
Trivial Conflicts: src/or/or.h src/or/routerparse.c
2016-07-01prop250: Initialize the SR subsystem and us it!David Goulet
This commit makes it that tor now uses the shared random protocol by initializing the subsystem. Signed-off-by: David Goulet <dgoulet@torproject.org> Signed-off-by: George Kadianakis <desnacked@riseup.net>
2016-07-01Avoid disclosing exit IP addresses in exit policies by defaultteor (Tim Wilson-Brown)
From 0.2.7.2-alpha onwards, Exits would reject all the IP addresses they knew about in their exit policy. But this may have disclosed addresses that were otherwise unlisted. Now, only advertised addresses are rejected by default by ExitPolicyRejectPrivate. All known addresses are only rejected when ExitPolicyRejectLocalInterfaces is explicitly set to 1.
2016-06-30Move unparseable descriptor dumps into subdirectory of DataDirAndrea Shepard
2016-06-30Add multiple descriptor dump support for dump_desc() in routerparse.c; fixes ↵Andrea Shepard
bug 18322
2016-06-21Merge branch 'maint-0.2.8'Nick Mathewson
2016-06-21Fix bug when disabling heartbeats.George Kadianakis
Callbacks can't return 0.
2016-06-11Merge branch 'bug19180_easy_squashed'Nick Mathewson
2016-06-11Add -Wmissing-variable-declarations, with attendant fixesNick Mathewson
This is a big-ish patch, but it's very straightforward. Under this clang warning, we're not actually allowed to have a global variable without a previous extern declaration for it. The cases where we violated this rule fall into three roughly equal groups: * Stuff that should have been static. * Stuff that was global but where the extern was local to some other C file. * Stuff that was only global when built for the unit tests, that needed a conditional extern in the headers. The first two were IMO genuine problems; the last is a wart of how we build tests.
2016-05-30Replace nearly all XXX0vv comments with smarter onesNick Mathewson
So, back long ago, XXX012 meant, "before Tor 0.1.2 is released, we had better revisit this comment and fix it!" But we have a huge pile of such comments accumulated for a large number of released versions! Not cool. So, here's what I tried to do: * 0.2.9 and 0.2.8 are retained, since those are not yet released. * XXX+ or XXX++ or XXX++++ or whatever means, "This one looks quite important!" * The others, after one-by-one examination, are downgraded to plain old XXX. Which doesn't mean they aren't a problem -- just that they cannot possibly be a release-blocking problem.
2016-05-19Merge branch 'maint-0.2.8'Nick Mathewson
2016-05-19Merge branch 'bug18809_028_squashed' into maint-0.2.8Nick Mathewson
2016-05-17Merge branch 'maint-0.2.8'Nick Mathewson
2016-05-16touchups and refactorings on bug 18616 branchRoger Dingledine
no behavior changes
2016-05-09close other consensus fetches when we get a consensusRoger Dingledine
not once per second, and only do it when a consensus arrives
2016-05-09fix typos/etc before i go nuts on #18809Roger Dingledine
2016-04-14Merge branch 'assert_nonfatal_squashed'Nick Mathewson
2016-04-14Add new tor_assert_nonfatal*() macros.Nick Mathewson
Unlike tor_assert(), these macros don't abort the process. They're good for checking conditions we want to warn about, but which don't warrant a full crash. This commit also changes the default implementation for tor_fragile_assert() to tor_assert_nonfatal_unreached_once(). Closes ticket 18613.
2016-04-13fix typos/etc before i go nuts on #18809Roger Dingledine
2016-03-28Fix memory leaks that stopped chutney working with asanNick Mathewson
2016-03-26Fix all doxygen warnings (other than missing docs)Nick Mathewson
2016-03-26Clarify excess consensus connection cleanup by adding commentsteor (Tim Wilson-Brown)
Comment-only change
2016-03-22Merge remote-tracking branch 'public/bug18253'Nick Mathewson
2016-03-15Sandbox: Don't preseed getaddrinfo(gethostname()) in client mode.Nick Mathewson
If we're a server with no address configured, resolve_my_hostname will need this. But not otherwise. And the preseeding itself can consume a few seconds if like tails we have no resolvers. Fixes bug 18548.
2016-03-15Fix whitespace.Nick Mathewson
2016-03-14Make unix sockets work with the linux seccomp2 sandbox againNick Mathewson
I didn't want to grant blanket permissions for chmod() and chown(), so here's what I had to do: * Grant open() on all parent directories of a unix socket * Write code to allow chmod() and chown() on a given file only. * Grant chmod() and chown() on the unix socket.
2016-03-14Merge remote-tracking branch 'public/bug16248_027'Nick Mathewson
2016-03-14Add comments to connection_check_event().Nick Mathewson
2016-03-11Change behavior on missing/present event to warn instead of asserting.Nick Mathewson
Add a changes file.
2016-03-11If we start/stop reading on a dnsserv connection, don't assert.Nick Mathewson
Fixes bug 16248. Patch from cypherpunks. Bugfix on 0.2.0.1-alpha.
2016-02-27Update the copyright year.Nick Mathewson
2016-02-24Make the sandbox work again with chutney.Nick Mathewson
Previously, we had a problem due to the check_private_dir() rewrite. Bug not in any released Tor.
2016-02-24Remove the freelist from memarea.cNick Mathewson
This is in accordance with our usual policy against freelists, now that working allocators are everywhere. It should also make memarea.c's coverage higher. I also doubt that this code ever helped performance.
2016-02-22refactor directory_info_has_arrived so we can quiet the logsRoger Dingledine
no actual behavior changes
2016-02-10Merge remote-tracking branch 'teor/bug18208'Nick Mathewson
2016-02-10Merge branch 'bug17682_squashed'Nick Mathewson