[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #33675 [Core Tor/Chutney]: Search microdescriptor files for relay ed25519 keys



#33675: Search microdescriptor files for relay ed25519 keys
-------------------------------------------+-------------------------------
 Reporter:  teor                           |          Owner:  anuradha1904
     Type:  enhancement                    |         Status:  assigned
 Priority:  Medium                         |      Milestone:
Component:  Core Tor/Chutney               |        Version:
 Severity:  Normal                         |     Resolution:
 Keywords:  ipv6, prop311, outreachy-ipv6  |  Actual Points:  0.1
Parent ID:  #33428                         |         Points:  0.5
 Reviewer:  teor                           |        Sponsor:  Sponsor55-can
-------------------------------------------+-------------------------------

Comment (by teor):

 That looks great!

 But base64 contains "+" characters:
 https://docs.python.org/3.5/library/base64.html#base64.b64encode

 And "+" is a special character in regular expressions:
 https://docs.python.org/3/library/re.html#regular-expression-syntax

 So you'll need to use re.escape() on ed25519-id:
 https://docs.python.org/3/library/re.html#re.escape

 Please write some code, and test it using "make test-network-all".
 Send us a pull request when you're done.

 If you get stuck, send us:
 * a pull request with your draft code
 * the detailed logs from the ".log" files
 And tell us what you've tried already.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33675#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs