[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r16383: Break compatibility with Domenik's Vidalia extension. (tor/branches/121-hs-authorization/src/or)
Author: kloesing
Date: 2008-08-04 11:48:25 -0400 (Mon, 04 Aug 2008)
New Revision: 16383
Modified:
tor/branches/121-hs-authorization/src/or/rendservice.c
tor/branches/121-hs-authorization/src/or/routerparse.c
Log:
Break compatibility with Domenik's Vidalia extension.
Modified: tor/branches/121-hs-authorization/src/or/rendservice.c
===================================================================
--- tor/branches/121-hs-authorization/src/or/rendservice.c 2008-08-04 15:46:46 UTC (rev 16382)
+++ tor/branches/121-hs-authorization/src/or/rendservice.c 2008-08-04 15:48:25 UTC (rev 16383)
@@ -348,24 +348,17 @@
service->clients = smartlist_create();
type_names_split = smartlist_create();
smartlist_split_string(type_names_split, line->value, " ", 0, 0);
- /* BEGIN of hack to keep Domenik's Vidalia extension running. */
- if (smartlist_len(type_names_split) == 1) {
- auth_type = strdup("2");
- client_names = smartlist_get(type_names_split, 0);
- } else {
- /* END of hack to keep Domenik's Vidalia extension running. */
- if (smartlist_len(type_names_split) != 2) {
- log_warn(LD_CONFIG, "HiddenServiceAuthorizeClient must be formatted "
- "as 'HiddenServiceAuthorizeClient auth-type client-name,"
- "client-name,...'.");
- SMARTLIST_FOREACH(type_names_split, char *, cp, tor_free(cp));
- smartlist_free(type_names_split);
- rend_service_free(service);
- return -1;
- }
- auth_type = smartlist_get(type_names_split, 0);
- client_names = smartlist_get(type_names_split, 1);
+ if (smartlist_len(type_names_split) != 2) {
+ log_warn(LD_CONFIG, "HiddenServiceAuthorizeClient must be formatted "
+ "as 'HiddenServiceAuthorizeClient auth-type client-name,"
+ "client-name,...'.");
+ SMARTLIST_FOREACH(type_names_split, char *, cp, tor_free(cp));
+ smartlist_free(type_names_split);
+ rend_service_free(service);
+ return -1;
}
+ auth_type = smartlist_get(type_names_split, 0);
+ client_names = smartlist_get(type_names_split, 1);
smartlist_free(type_names_split);
if (strlen(auth_type) != 1 || strspn(auth_type, "12") != 1) {
log_warn(LD_CONFIG, "HiddenServiceAuthorizeClient contains "
@@ -664,9 +657,8 @@
return -1;
}
written = tor_snprintf(buf + written, sizeof(buf) - written,
- "service-address %s.onion\n"
"client-key\n%s",
- service_id, client_key_out);
+ client_key_out);
if (written < 0) {
log_warn(LD_BUG, "Could not write client entry.");
strmap_free(parsed_clients, rend_authorized_client_free);
Modified: tor/branches/121-hs-authorization/src/or/routerparse.c
===================================================================
--- tor/branches/121-hs-authorization/src/or/routerparse.c 2008-08-04 15:46:46 UTC (rev 16382)
+++ tor/branches/121-hs-authorization/src/or/routerparse.c 2008-08-04 15:48:25 UTC (rev 16383)
@@ -359,7 +359,6 @@
static token_rule_t client_keys_token_table[] = {
T1_START("client-name", C_CLIENT_NAME, CONCAT_ARGS, NO_OBJ),
T1("descriptor-cookie", C_DESCRIPTOR_COOKIE, EQ(1), NO_OBJ),
- T01("service-address", C_SERVICE_ADDRESS, EQ(1), NO_OBJ),
T01("client-key", C_CLIENT_KEY, NO_ARGS, NEED_KEY_1024),
END_OF_TABLE
};