aboutsummaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2021-05-12relay: Add the onionskins processing metricsDavid Goulet
With this commit, a relay now emits metrics event on the MetricsPort related to how many onionskins were handled (processed or dropped) for each handshake type. Related to #40367 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-05-12relay: Add the OOM invocation metricsDavid Goulet
With this commit, a relay now emits metrics event on the MetricsPort related to the OOM invocation for: - DNS cache - GeoIP database - Cell queues - HSDir caches Everytime the OOM is invoked, the number of bytes is added to the metrics counter for that specific type of invocation. Related to #40367 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-05-12relay: Code and objects to initialize metrics storeDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-05-12relay: Groundwork for relay metrics supportDavid Goulet
The basic functions for the relay subsystem to expose metrics onto the MetricsPort. Part of #40367 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-05-12metrics: Add a reset store helper functionDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-05-12metrics: Move helper function to lib/metricsDavid Goulet
It is a common function that a lot of subsystem can use which is to format a label so move it out of the HS subsystem into the more generic metrics library. Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-05-12metrics: Print once the Promtheus commentsDavid Goulet
An entry can have multiple labels but only print once the comments at the first one. This follows the Promtheus best practices. Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-05-11Make client heartbeat stats tied to the heartbeat period.Nick Mathewson
Patch from cypherpunks. Closes #40330.
2021-05-10Merge branch 'maint-0.4.6'Nick Mathewson
2021-05-10Merge branch 'ticket40374_046' into maint-0.4.6Nick Mathewson
2021-05-10Bump to 0.4.6.3-rc-devNick Mathewson
2021-05-10Remove unused function: dns_randfn_() in dns.c.Alexander Færøy
This patch unbreaks the current build after tor!369 landed. See: https://bugs.torproject.org/tpo/core/tor/40371
2021-05-10Merge remote-tracking branch 'tor-gitlab/mr/369'Alexander Færøy
2021-05-07Merge branch 'maint-0.4.5' into maint-0.4.6Nick Mathewson
2021-05-07Merge branch 'maint-0.4.6'Nick Mathewson
2021-05-07Add a sandbox workaround for Glibc 2.33Nick Mathewson
This change permits the newfstatat() system call, and fixes issues 40382 (and 40381). This isn't a free change. From the commit: // Libc 2.33 uses this syscall to implement both fstat() and stat(). // // The trouble is that to implement fstat(fd, &st), it calls: // newfstatat(fs, "", &st, AT_EMPTY_PATH) // We can't detect this usage in particular, because "" is a pointer // we don't control. And we can't just look for AT_EMPTY_PATH, since // AT_EMPTY_PATH only has effect when the path string is empty. // // So our only solution seems to be allowing all fstatat calls, which // means that an attacker can stat() anything on the filesystem. That's // not a great solution, but I can't find a better one.
2021-05-07Merge branch 'maint-0.4.5' into maint-0.4.6Nick Mathewson
2021-05-07Merge branch 'maint-0.4.6'Nick Mathewson
2021-05-07Merge branch 'maint-0.4.4' into maint-0.4.5Nick Mathewson
2021-05-07Merge branch 'maint-0.3.5' into maint-0.4.4Nick Mathewson
2021-05-07Reindent a few lines to fix a GCC warning.Nick Mathewson
As of GCC 11.1.1, the compiler warns us about code like this: if (a) b; c; and that's a good thing: we wouldn't want to "goto fail". But we had an instance if this in circuituse.c, which was making our compilation sad. Fixes bug 40380; bugfix on 0.3.0.1-alpha.
2021-05-07Merge branch 'maint-0.4.5' into maint-0.4.6Nick Mathewson
2021-05-07Merge branch 'maint-0.4.6'Nick Mathewson
2021-05-07Merge branch 'maint-0.4.4' into maint-0.4.5Nick Mathewson
2021-05-07Merge branch 'maint-0.3.5' into maint-0.4.4Nick Mathewson
2021-05-07Update geoip files to match ipfire location db, 2021/05/07.Nick Mathewson
2021-05-07Bump to 0.4.6.3-rcNick Mathewson
2021-05-07Bump to 0.4.5.8.Nick Mathewson
2021-05-07Merge branch 'maint-0.4.6'David Goulet
2021-05-07Log warning when connecting to soon-to-be-deprecated v2 onions.George Kadianakis
2021-05-07Add warning when trying to connect to deprecated v2 onions.George Kadianakis
2021-05-05Prepare for #40373: Re-introduce parsing for v2 onion addresses.George Kadianakis
Welcome back ONION_V2_HOSTNAME! :)
2021-05-05Merge branch 'maint-0.4.6'George Kadianakis
2021-05-04hs: Fix ADD_ONION with client authorizationDavid Goulet
Turns out that passing client authorization keys to ADD_ONION for v3 was not working because we were not setting the "is_client_auth_enabled" flag to true once the clients were configured. This lead to the descriptor being encoded without the clients. This patch removes that flag and instead adds an inline function that can be used to check if a given service has client authorization enabled. This will be much less error prone of needing to keep in sync the client list and a flag instead. Fixes #40378 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-04-23Remove NEED_SKEY_1024 parsing.Nick Mathewson
Only v2 onion services needed this, and they are now gone. Closes #40374.
2021-04-23Remove HSv2 leftovers after merging #18346David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-04-23Merge branch 'tor-gitlab/mr/327'David Goulet
Conflicts: src/test/test.c Minor comment issue.
2021-04-23Merge branch 'maint-0.4.6'George Kadianakis
2021-04-23Merge branch 'maint-0.4.5' into maint-0.4.6George Kadianakis
2021-04-21hs: Fix memory leak in client cacheDavid Goulet
Fixes #40356 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-04-21Merge remote-tracking branch 'tor-gitlab/mr/363' into maint-0.3.5George Kadianakis
2021-04-19Merge branch 'maint-0.4.6'Nick Mathewson
2021-04-19Merge branch 'mr_347_squashed' into maint-0.4.6Nick Mathewson
2021-04-19relay: Emit log warning if Address is internal and can't be usedDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-04-19Merge remote-tracking branch 'jigsaw/fix-40317_046-saveconf-sandbox-one-backup'Nick Mathewson
2021-04-19Merge remote-tracking branch 'tor-gitlab/mr/364'George Kadianakis
2021-04-16Stop calling evdns_set_random_bytes_fn()Nick Mathewson
This function has been a no-op since Libevent 2.0.4-alpha, when libevent got an arc4random() implementation. Libevent has finally removed it, which will break our compilation unless we stop calling it. (This is currently breaking compilation in OSS-fuzz.) Closes #40371.
2021-04-15Bump to 0.4.7.0-alpha-devtor-0.4.7.0-alpha-devNick Mathewson
2021-04-15Bump to 0.4.6.2-alpha-devNick Mathewson
2021-04-14Bump version to 0.4.6.2-alpha.Nick Mathewson