[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r8630: more minor cleanups (in tor/trunk: . doc src/common src/or)
Author: arma
Date: 2006-10-07 02:28:50 -0400 (Sat, 07 Oct 2006)
New Revision: 8630
Modified:
tor/trunk/ChangeLog
tor/trunk/doc/path-spec.txt
tor/trunk/src/common/log.c
tor/trunk/src/common/util.c
tor/trunk/src/or/circuitbuild.c
tor/trunk/src/or/config.c
tor/trunk/src/or/directory.c
tor/trunk/src/or/relay.c
tor/trunk/src/or/routerlist.c
Log:
more minor cleanups
Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog 2006-10-07 02:57:19 UTC (rev 8629)
+++ tor/trunk/ChangeLog 2006-10-07 06:28:50 UTC (rev 8630)
@@ -176,9 +176,13 @@
- Be clearer that the *ListenAddress directives can be repeated
multiple times.
- (stopped at r8536)
+ (stopped at r8571)
- Build correctly for use on OS X platforms with case-sensitive
filesystems.
+ - Bugfix: when we tunnel our dir fetches via tor, don't believe
+ the X-Forwarded-For header.
+ - stop trying to hammer router_rebuild_descriptor() when we don't
+ have a public address we like yet.
Changes in version 0.1.2.1-alpha - 2006-08-27
Modified: tor/trunk/doc/path-spec.txt
===================================================================
--- tor/trunk/doc/path-spec.txt 2006-10-07 02:57:19 UTC (rev 8629)
+++ tor/trunk/doc/path-spec.txt 2006-10-07 06:28:50 UTC (rev 8630)
@@ -160,11 +160,11 @@
For circuits that do not need to be not "fast", when choosing among
multiple candidates for a path element, we choose randomly.
- For "fast" circuits, we a given router as an exit with probability
+ For "fast" circuits, we pick a given router as an exit with probability
proportional to its advertised bandwidth [the smaller of the 'rate' and
'observed' arguments to the "bandwidth" element in its descriptor]. If a
- router's advertised bandwidth is greater than MAX_BELIEVEABLE_BANDWIDTH
- (1.5 MB/sec), we clip to that value.
+ router's advertised bandwidth is greater than MAX_BELIEVABLE_BANDWIDTH
+ (1.5 MB/s), we clip to that value.
For non-exit positions on "fast" circuits, we pick routers as above, but
we weight the clipped advertised bandwidth of Exit-flagged nodes depending
Modified: tor/trunk/src/common/log.c
===================================================================
--- tor/trunk/src/common/log.c 2006-10-07 02:57:19 UTC (rev 8629)
+++ tor/trunk/src/common/log.c 2006-10-07 06:28:50 UTC (rev 8630)
@@ -618,7 +618,7 @@
{
event_set_log_callback(libevent_logging_callback);
}
-/** Ignore any libevent log message that contains <b>msg</b> */
+/** Ignore any libevent log message that contains <b>msg</b>. */
void
suppress_libevent_log_msg(const char *msg)
{
Modified: tor/trunk/src/common/util.c
===================================================================
--- tor/trunk/src/common/util.c 2006-10-07 02:57:19 UTC (rev 8629)
+++ tor/trunk/src/common/util.c 2006-10-07 06:28:50 UTC (rev 8630)
@@ -532,7 +532,7 @@
CHECK_STRTOX_RESULT();
}
-/** As tor_parse_log, but return an unsigned long */
+/** As tor_parse_log, but return an unsigned long. */
unsigned long
tor_parse_ulong(const char *s, int base, unsigned long min,
unsigned long max, int *ok, char **next)
@@ -964,7 +964,7 @@
unsigned int year=0, month=0, day=0, hour=100, minute=100, second=100;
if (sscanf(cp, "%u-%u-%u %u:%u:%u", &year, &month,
&day, &hour, &minute, &second) < 6) {
- log_warn(LD_GENERAL, "ISO time time was unparseable"); return -1;
+ log_warn(LD_GENERAL, "ISO time was unparseable"); return -1;
}
if (year < 1970 || month < 1 || month > 12 || day < 1 || day > 31 ||
hour > 23 || minute > 59 || second > 61) {
@@ -1246,7 +1246,7 @@
}
/* Given a smartlist of sized_chunk_t, write them atomically to a file
- * <b>fname</b>, overwriting or creating the file as necessary. */
+ * <b>fname</b>, overwriting or creating the file as necessary. */
int
write_chunks_to_file(const char *fname, const smartlist_t *chunks, int bin)
{
@@ -1254,7 +1254,7 @@
return write_chunks_to_file_impl(fname, chunks, flags);
}
-/** As write_str_to_file, but does not assume a NUL-terminated *
+/** As write_str_to_file, but does not assume a NUL-terminated
* string. Instead, we write <b>len</b> bytes, starting at <b>str</b>. */
int
write_bytes_to_file(const char *fname, const char *str, size_t len,
Modified: tor/trunk/src/or/circuitbuild.c
===================================================================
--- tor/trunk/src/or/circuitbuild.c 2006-10-07 02:57:19 UTC (rev 8629)
+++ tor/trunk/src/or/circuitbuild.c 2006-10-07 06:28:50 UTC (rev 8630)
@@ -49,8 +49,7 @@
uint8_t cell_type, char *payload);
static int onion_pick_cpath_exit(origin_circuit_t *circ, extend_info_t *exit);
static crypt_path_t *onion_next_hop_in_cpath(crypt_path_t *cpath);
-static int onion_extend_cpath(uint8_t purpose, crypt_path_t **head_ptr,
- cpath_build_state_t *state);
+static int onion_extend_cpath(origin_circuit_t *circ);
static int count_acceptable_routers(smartlist_t *routers);
static int onion_append_hop(crypt_path_t **head_ptr, extend_info_t *choice);
@@ -263,7 +262,7 @@
{
int r;
again:
- r = onion_extend_cpath(circ->_base.purpose, &circ->cpath, circ->build_state);
+ r = onion_extend_cpath(circ);
if (r < 0) {
log_info(LD_CIRC,"Generating cpath hop failed.");
return -1;
@@ -1632,24 +1631,13 @@
* based on <b>state</b>. Append the hop info to head_ptr.
*/
static int
-onion_extend_cpath(uint8_t purpose, crypt_path_t **head_ptr,
- cpath_build_state_t *state)
+onion_extend_cpath(origin_circuit_t *circ)
{
- int cur_len;
- crypt_path_t *cpath;
+ uint8_t purpose = circ->_base.purpose;
+ cpath_build_state_t *state = circ->build_state;
+ int cur_len = circuit_get_cpath_len(circ);
extend_info_t *info = NULL;
- tor_assert(head_ptr);
-
- if (!*head_ptr) {
- cur_len = 0;
- } else {
- cur_len = 1;
- for (cpath = *head_ptr; cpath->next != *head_ptr; cpath = cpath->next) {
- ++cur_len;
- }
- }
-
if (cur_len >= state->desired_path_len) {
log_debug(LD_CIRC, "Path is complete: %d steps long",
state->desired_path_len);
@@ -1667,7 +1655,7 @@
info = extend_info_from_router(r);
} else {
routerinfo_t *r =
- choose_good_middle_server(purpose, state, *head_ptr, cur_len);
+ choose_good_middle_server(purpose, state, circ->cpath, cur_len);
if (r)
info = extend_info_from_router(r);
}
@@ -1681,7 +1669,7 @@
log_debug(LD_CIRC,"Chose router %s for hop %d (exit is %s)",
info->nickname, cur_len+1, build_state_get_exit_nickname(state));
- onion_append_hop(head_ptr, info);
+ onion_append_hop(&circ->cpath, info);
extend_info_free(info);
return 0;
}
Modified: tor/trunk/src/or/config.c
===================================================================
--- tor/trunk/src/or/config.c 2006-10-07 02:57:19 UTC (rev 8629)
+++ tor/trunk/src/or/config.c 2006-10-07 06:28:50 UTC (rev 8630)
@@ -3467,8 +3467,8 @@
log_notice(LD_CONFIG, "Renaming old configuration file to \"%s\"", fn_tmp);
if (rename(fname, fn_tmp) < 0) {
log_warn(LD_FS,
- "Couldn't rename configuration file \"%s\" to \"%s\": %s",
- fname, fn_tmp, strerror(errno));
+ "Couldn't rename configuration file \"%s\" to \"%s\": %s",
+ fname, fn_tmp, strerror(errno));
tor_free(fn_tmp);
goto err;
}
Modified: tor/trunk/src/or/directory.c
===================================================================
--- tor/trunk/src/or/directory.c 2006-10-07 02:57:19 UTC (rev 8629)
+++ tor/trunk/src/or/directory.c 2006-10-07 06:28:50 UTC (rev 8630)
@@ -1160,7 +1160,7 @@
break;
default:
log_warn(LD_GENERAL,
- "http status %d (%s) reason unexpected while uploding "
+ "http status %d (%s) reason unexpected while uploading "
"descriptor to server '%s:%d').",
status_code, escaped(reason), conn->_base.address,
conn->_base.port);
@@ -1197,8 +1197,7 @@
break;
default:
log_warn(LD_REND,"http status %d (%s) response unexpected while "
- "fetching hidden service descriptor (server "
- "'%s:%d').",
+ "fetching hidden service descriptor (server '%s:%d').",
status_code, escaped(reason), conn->_base.address,
conn->_base.port);
break;
Modified: tor/trunk/src/or/relay.c
===================================================================
--- tor/trunk/src/or/relay.c 2006-10-07 02:57:19 UTC (rev 8629)
+++ tor/trunk/src/or/relay.c 2006-10-07 06:28:50 UTC (rev 8630)
@@ -590,7 +590,7 @@
return SOCKS5_NET_UNREACHABLE;
default:
log_warn(LD_PROTOCOL,"Reason for ending (%d) not recognized; "
- "sending generic socks error.",reason);
+ "sending generic socks error.", reason);
return SOCKS5_GENERAL_ERROR;
}
}
Modified: tor/trunk/src/or/routerlist.c
===================================================================
--- tor/trunk/src/or/routerlist.c 2006-10-07 02:57:19 UTC (rev 8629)
+++ tor/trunk/src/or/routerlist.c 2006-10-07 06:28:50 UTC (rev 8630)
@@ -3481,7 +3481,7 @@
router->is_fast = rs->status.is_fast;
router->is_stable = rs->status.is_stable;
router->is_possible_guard = rs->status.is_possible_guard;
- router->is_exit = rs->status.is_exit;
+ router->is_exit = rs->status.is_exit;
}
if (router->is_running && ds) {
ds->n_networkstatus_failures = 0;