[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r12000: Make unverified-consensus get removed when it is accepted or (in tor/trunk: . src/or)
Author: nickm
Date: 2007-10-17 12:55:44 -0400 (Wed, 17 Oct 2007)
New Revision: 12000
Modified:
tor/trunk/
tor/trunk/ChangeLog
tor/trunk/src/or/config.c
tor/trunk/src/or/control.c
tor/trunk/src/or/dirserv.c
tor/trunk/src/or/hibernate.c
tor/trunk/src/or/networkstatus.c
tor/trunk/src/or/or.h
tor/trunk/src/or/rephist.c
tor/trunk/src/or/router.c
tor/trunk/src/or/routerlist.c
tor/trunk/src/or/test.c
Log:
r15877@catbus: nickm | 2007-10-17 12:54:56 -0400
Make unverified-consensus get removed when it is accepted or rejected. Make a new get_datadir_fname*() set of functions to eliminate the common code of "get the options, get the datadir, append some stuff".
Property changes on: tor/trunk
___________________________________________________________________
svk:merge ticket from /tor/trunk [r15877] on 8246c3cf-6607-4228-993b-4d95d33730f1
Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog 2007-10-17 16:55:41 UTC (rev 11999)
+++ tor/trunk/ChangeLog 2007-10-17 16:55:44 UTC (rev 12000)
@@ -33,6 +33,7 @@
- When we're configured to be a v3 authority, but we're only listed
as a non-v3 authority in our DirServer line for ourself, correct the
listing.
+ - Delete unverified-consensus when the real consensus is set.
o Minor bugfixes (memory leaks):
- Stop leaking memory on failing case of base32_decode. Bugfix on
@@ -48,8 +49,8 @@
This may result in bandwidth accounting errors if you try to upgrade
from 0.1.1.x or earlier, or if you try to downgrade to 0.1.1.x or
earlier.
+ - New convenience code to locate a file within the DataDirectory.
-
Changes in version 0.2.0.8-alpha - 2007-10-12
o Major features (router descriptor cache):
- Store routers in a file called cached-descriptors instead of in
Modified: tor/trunk/src/or/config.c
===================================================================
--- tor/trunk/src/or/config.c 2007-10-17 16:55:41 UTC (rev 11999)
+++ tor/trunk/src/or/config.c 2007-10-17 16:55:44 UTC (rev 12000)
@@ -4312,18 +4312,57 @@
return global_state;
}
-/** Return the filename used to write and read the persistent state. */
-static char *
-get_or_state_fname(void)
+/** Return a newly allocated string holding a filename relative to the data
+ * directory. If <b>sub1</b> is present, it is the first path component after
+ * the data directory. If <b>sub2</b> is also present, it is the second path
+ * component after the data directory. If <b>suffix</b> is present, it
+ * is appended to the filename.
+ *
+ * Examples:
+ * get_datadir_fname2_suffix("a", NULL, NULL) -> $DATADIR/a
+ * get_datadir_fname2_suffix("a", NULL, ".tmp") -> $DATADIR/a.tmp
+ * get_datadir_fname2_suffix("a", "b", ".tmp") -> $DATADIR/a/b/.tmp
+ * get_datadir_fname2_suffix("a", "b", NULL) -> $DATADIR/a/b
+ *
+ * Note: Consider using the get_datadir_fname* macros in or.h.
+ */
+char *
+get_datadir_fname2_suffix(const char *sub1, const char *sub2,
+ const char *suffix)
{
+ or_options_t *options = get_options();
char *fname = NULL;
- or_options_t *options = get_options();
- size_t len = strlen(options->DataDirectory) + 16;
+ size_t len;
+ tor_assert(options);
+ tor_assert(options->DataDirectory);
+ tor_assert(sub1 || !sub2); /* If sub2 is present, sub1 must be present. */
+ len = strlen(options->DataDirectory);
+ if (sub1) {
+ len += strlen(sub1)+1;
+ if (sub2)
+ len += strlen(sub2)+1;
+ }
+ if (suffix)
+ len += strlen(suffix);
+ len++;
fname = tor_malloc(len);
- tor_snprintf(fname, len, "%s"PATH_SEPARATOR"state", options->DataDirectory);
+ if (sub1) {
+ if (sub2) {
+ tor_snprintf(fname, len, "%s"PATH_SEPARATOR"%s"PATH_SEPARATOR"%s",
+ options->DataDirectory, sub1, sub2);
+ } else {
+ tor_snprintf(fname, len, "%s"PATH_SEPARATOR"%s",
+ options->DataDirectory, sub1);
+ }
+ } else {
+ strlcpy(fname, options->DataDirectory, len);
+ }
+ if (suffix)
+ strlcat(fname, suffix, len);
return fname;
}
+
/** Return 0 if every setting in <b>state</b> is reasonable, and a
* permissible transition from <b>old_state</b>. Else warn and return -1.
* Should have no side effects, except for normalizing the contents of
@@ -4375,7 +4414,7 @@
char *errmsg = NULL;
int r = -1, badstate = 0;
- fname = get_or_state_fname();
+ fname = get_datadir_fname("state");
switch (file_status(fname)) {
case FN_FILE:
if (!(contents = read_file_to_str(fname, 0, NULL))) {
@@ -4510,7 +4549,7 @@
"# You *do not* need to edit this file.\n\n%s",
tbuf, state);
tor_free(state);
- fname = get_or_state_fname();
+ fname = get_datadir_fname("state");
if (write_str_to_file(fname, contents, 0)<0) {
log_warn(LD_FS, "Unable to write state to file \"%s\"", fname);
tor_free(fname);
Modified: tor/trunk/src/or/control.c
===================================================================
--- tor/trunk/src/or/control.c 2007-10-17 16:55:41 UTC (rev 11999)
+++ tor/trunk/src/or/control.c 2007-10-17 16:55:44 UTC (rev 12000)
@@ -1397,19 +1397,15 @@
} else {
smartlist_t *fp_list = smartlist_create();
smartlist_t *status_list = smartlist_create();
- size_t fn_len = strlen(get_options()->DataDirectory)+HEX_DIGEST_LEN+32;
- char *fn = tor_malloc(fn_len+1);
- char hex_id[HEX_DIGEST_LEN+1];
dirserv_get_networkstatus_v2_fingerprints(
fp_list, question+strlen("dir/status/"));
SMARTLIST_FOREACH(fp_list, const char *, fp, {
char *s;
- base16_encode(hex_id, sizeof(hex_id), fp, DIGEST_LEN);
- tor_snprintf(fn, fn_len, "%s/cached-status/%s",
- get_options()->DataDirectory, hex_id);
- s = read_file_to_str(fn, 0, NULL);
+ char *fname = networkstatus_get_cache_filename(fp);
+ s = read_file_to_str(fname, 0, NULL);
if (s)
smartlist_add(status_list, s);
+ tor_free(fname);
});
SMARTLIST_FOREACH(fp_list, char *, fp, tor_free(fp));
smartlist_free(fp_list);
@@ -3565,11 +3561,7 @@
if (options->CookieAuthFile && strlen(options->CookieAuthFile)) {
return tor_strdup(options->CookieAuthFile);
} else {
- const char *datadir = get_options()->DataDirectory;
- size_t len = strlen(datadir)+64;
- char *fname = tor_malloc(len);
- tor_snprintf(fname, len, "%s"PATH_SEPARATOR"control_auth_cookie", datadir);
- return fname;
+ return get_datadir_fname("control_auth_cookie");
}
}
Modified: tor/trunk/src/or/dirserv.c
===================================================================
--- tor/trunk/src/or/dirserv.c 2007-10-17 16:55:41 UTC (rev 11999)
+++ tor/trunk/src/or/dirserv.c 2007-10-17 16:55:44 UTC (rev 12000)
@@ -178,7 +178,7 @@
int
dirserv_load_fingerprint_file(void)
{
- char fname[512];
+ char *fname;
char *cf;
char *nickname, *fingerprint;
authdir_config_t *fingerprint_list_new;
@@ -186,8 +186,7 @@
config_line_t *front=NULL, *list;
or_options_t *options = get_options();
- tor_snprintf(fname, sizeof(fname),
- "%s/approved-routers", options->DataDirectory);
+ fname = get_datadir_fname("approved-routers");
log_info(LD_GENERAL,
"Reloading approved fingerprints from \"%s\"...", fname);
@@ -195,12 +194,16 @@
if (!cf) {
if (options->NamingAuthoritativeDir) {
log_warn(LD_FS, "Cannot open fingerprint file '%s'. Failing.", fname);
+ tor_free(fname);
return -1;
} else {
log_info(LD_FS, "Cannot open fingerprint file '%s'. Returning.", fname);
+ tor_free(fname);
return 0;
}
}
+ tor_free(fname);
+
result = config_get_lines(cf, &front);
tor_free(cf);
if (result < 0) {
Modified: tor/trunk/src/or/hibernate.c
===================================================================
--- tor/trunk/src/or/hibernate.c 2007-10-17 16:55:41 UTC (rev 11999)
+++ tor/trunk/src/or/hibernate.c 2007-10-17 16:55:44 UTC (rev 12000)
@@ -575,10 +575,9 @@
or_state_t *state = get_or_state();
{
- char fname[512];
- tor_snprintf(fname, sizeof(fname), "%s/bw_accounting",
- get_options()->DataDirectory);
+ char *fname = get_datadir_fname("bw_accounting");
unlink(fname);
+ tor_free(fname);
}
if (!state)
Modified: tor/trunk/src/or/networkstatus.c
===================================================================
--- tor/trunk/src/or/networkstatus.c 2007-10-17 16:55:41 UTC (rev 11999)
+++ tor/trunk/src/or/networkstatus.c 2007-10-17 16:55:44 UTC (rev 12000)
@@ -118,17 +118,15 @@
int
router_reload_v2_networkstatus(void)
{
- char filename[512];
smartlist_t *entries;
struct stat st;
char *s;
- tor_assert(get_options()->DataDirectory);
+ char *filename = get_datadir_fname("cached-status");
if (!networkstatus_v2_list)
networkstatus_v2_list = smartlist_create();
- tor_snprintf(filename,sizeof(filename),"%s"PATH_SEPARATOR"cached-status",
- get_options()->DataDirectory);
entries = tor_listdir(filename);
+ tor_free(filename);
SMARTLIST_FOREACH(entries, const char *, fn, {
char buf[DIGEST_LEN];
if (strlen(fn) != HEX_DIGEST_LEN ||
@@ -137,9 +135,7 @@
"Skipping cached-status file with unexpected name \"%s\"",fn);
continue;
}
- tor_snprintf(filename,sizeof(filename),
- "%s"PATH_SEPARATOR"cached-status"PATH_SEPARATOR"%s",
- get_options()->DataDirectory, fn);
+ filename = get_datadir_fname2("cached-status", fn);
s = read_file_to_str(filename, 0, &st);
if (s) {
if (router_set_networkstatus_v2(s, st.st_mtime, NS_FROM_CACHE,
@@ -148,6 +144,7 @@
}
tor_free(s);
}
+ tor_free(filename);
});
SMARTLIST_FOREACH(entries, char *, fn, tor_free(fn));
smartlist_free(entries);
@@ -160,13 +157,12 @@
int
router_reload_consensus_networkstatus(void)
{
- char filename[512];
+ char *filename;
char *s;
/* XXXX020 Suppress warnings if cached consensus is bad. */
- tor_snprintf(filename,sizeof(filename),"%s"PATH_SEPARATOR"cached-consensus",
- get_options()->DataDirectory);
+ filename = get_datadir_fname("cached-consensus");
s = read_file_to_str(filename, RFTS_IGNORE_MISSING, NULL);
if (s) {
if (networkstatus_set_current_consensus(s, 1, 0)) {
@@ -175,10 +171,9 @@
}
tor_free(s);
}
+ tor_free(filename);
- tor_snprintf(filename,sizeof(filename),
- "%s"PATH_SEPARATOR"unverified-consensus",
- get_options()->DataDirectory);
+ filename = get_datadir_fname("unverified-consensus");
s = read_file_to_str(filename, RFTS_IGNORE_MISSING, NULL);
if (s) {
if (networkstatus_set_current_consensus(s, 1, 1)) {
@@ -187,6 +182,7 @@
}
tor_free(s);
}
+ tor_free(filename);
return 0;
}
@@ -221,14 +217,9 @@
char *
networkstatus_get_cache_filename(const char *identity_digest)
{
- const char *datadir = get_options()->DataDirectory;
- size_t len = strlen(datadir)+64;
char fp[HEX_DIGEST_LEN+1];
- char *fn = tor_malloc(len+1);
base16_encode(fp, HEX_DIGEST_LEN+1, identity_digest, DIGEST_LEN);
- tor_snprintf(fn, len, "%s"PATH_SEPARATOR"cached-status"PATH_SEPARATOR"%s",
- datadir,fp);
- return fn;
+ return get_datadir_fname2("cached-status", fp);
}
/** Helper for smartlist_sort: Compare two networkstatus objects by
@@ -901,16 +892,20 @@
int was_waiting_for_certs)
{
networkstatus_vote_t *c;
- int r;
+ int r, result=-1;
time_t now = time(NULL);
+ char *unverified_fname = NULL, *consensus_fname = NULL;
/* Make sure it's parseable. */
c = networkstatus_parse_vote_from_string(consensus, NULL, 0);
if (!c) {
log_warn(LD_DIR, "Unable to parse networkstatus consensus");
- return -1;
+ goto done;
}
+ consensus_fname = get_datadir_fname("cached-consensus");
+ unverified_fname = get_datadir_fname("unverified-consensus");
+
/* Make sure it's signed enough. */
if ((r=networkstatus_check_consensus_signature(c, 1))<0) {
if (r == -1 && !was_waiting_for_certs) {
@@ -927,23 +922,27 @@
consensus_waiting_for_certs_body = tor_strdup(consensus);
/*XXXX020 delay next update. NMNM */
if (!from_cache) {
- or_options_t *options = get_options();
- char filename[512];
- tor_snprintf(filename, sizeof(filename),
- "%s"PATH_SEPARATOR"unverified-consensus",
- options->DataDirectory);
- write_str_to_file(filename, consensus, 0);
+ write_str_to_file(unverified_fname, consensus, 0);
}
authority_certs_fetch_missing(c, now);
+ } else {
+ /* Even if we had enough signatures, we'd never use this as the
+ * latest consensus. */
+ if (was_waiting_for_certs && from_cache)
+ unlink(unverified_fname);
}
download_status_reset(&consensus_dl_status); /*XXXX020 not quite right.*/
- return 0;
+ result = 0;
+ goto done;
} else {
+ /* This can never be signed enough Kill it. */
if (!was_waiting_for_certs)
log_warn(LD_DIR, "Not enough good signatures on networkstatus "
"consensus");
+ if (was_waiting_for_certs && from_cache)
+ unlink(unverified_fname);
networkstatus_vote_free(c);
- return -1;
+ goto done;
}
}
@@ -964,6 +963,7 @@
consensus_waiting_for_certs = NULL;
if (consensus != consensus_waiting_for_certs_body)
tor_free(consensus_waiting_for_certs_body);
+ unlink(unverified_fname);
}
current_consensus = c;
@@ -973,12 +973,7 @@
routerstatus_list_update_named_server_map();
if (!from_cache) {
- or_options_t *options = get_options();
- char filename[512];
- tor_snprintf(filename, sizeof(filename),
- "%s"PATH_SEPARATOR"cached-consensus",
- options->DataDirectory);
- write_str_to_file(filename, consensus, 0);
+ write_str_to_file(consensus_fname, consensus, 0);
}
if (dirserver_mode(get_options()))
@@ -986,7 +981,11 @@
router_dir_info_changed();
- return 0;
+ result = 0;
+ done:
+ tor_free(consensus_fname);
+ tor_free(unverified_fname);
+ return result;
}
/** DOCDOC */
Modified: tor/trunk/src/or/or.h
===================================================================
--- tor/trunk/src/or/or.h 2007-10-17 16:55:41 UTC (rev 11999)
+++ tor/trunk/src/or/or.h 2007-10-17 16:55:44 UTC (rev 12000)
@@ -2443,6 +2443,14 @@
const char *key);
int options_save_current(void);
const char *get_torrc_fname(void);
+char *get_datadir_fname2_suffix(const char *sub1, const char *sub2,
+ const char *suffix);
+/**DOCDOC*/
+#define get_datadir_fname(sub1) get_datadir_fname2_suffix((sub1), NULL, NULL)
+#define get_datadir_fname2(sub1,sub2) \
+ get_datadir_fname2_suffix((sub1), (sub2), NULL)
+#define get_datadir_fname_suffix(sub1, suffix) \
+ get_datadir_fname2_suffix((sub1), NULL, (suffix))
or_state_t *get_or_state(void);
int or_state_save(time_t now);
Modified: tor/trunk/src/or/rephist.c
===================================================================
--- tor/trunk/src/or/rephist.c 2007-10-17 16:55:41 UTC (rev 11999)
+++ tor/trunk/src/or/rephist.c 2007-10-17 16:55:44 UTC (rev 12000)
@@ -595,18 +595,6 @@
}
}
-/** Return a newly allocated string holding the filename in which we store
- * MTBF information. */
-static char *
-get_mtbf_filename(void)
-{
- const char *datadir = get_options()->DataDirectory;
- size_t len = strlen(datadir)+32;
- char *fn = tor_malloc(len);
- tor_snprintf(fn, len, "%s"PATH_SEPARATOR"router-stability", datadir);
- return fn;
-}
-
/** Write MTBF data to disk. Returns 0 on success, negative on failure. */
int
rep_hist_record_mtbf_data(void)
@@ -621,7 +609,7 @@
FILE *f;
{
- char *filename = get_mtbf_filename();
+ char *filename = get_datadir_fname("router-stability");
f = start_writing_to_stdio_file(filename, OPEN_FLAGS_REPLACE|O_TEXT, 0600,
&open_file);
tor_free(filename);
@@ -725,7 +713,7 @@
long format = -1;
{
- char *filename = get_mtbf_filename();
+ char *filename = get_datadir_fname("router-stability");
char *d = read_file_to_str(filename, RFTS_IGNORE_MISSING, NULL);
tor_free(filename);
if (!d)
Modified: tor/trunk/src/or/router.c
===================================================================
--- tor/trunk/src/or/router.c 2007-10-17 16:55:41 UTC (rev 11999)
+++ tor/trunk/src/or/router.c 2007-10-17 16:55:44 UTC (rev 12000)
@@ -153,17 +153,12 @@
void
rotate_onion_key(void)
{
- char fname[512];
- char fname_prev[512];
+ char *fname, *fname_prev;
crypto_pk_env_t *prkey;
or_state_t *state = get_or_state();
time_t now;
- tor_snprintf(fname,sizeof(fname),
- "%s"PATH_SEPARATOR"keys"PATH_SEPARATOR"secret_onion_key",
- get_options()->DataDirectory);
- tor_snprintf(fname_prev,sizeof(fname_prev),
- "%s"PATH_SEPARATOR"keys"PATH_SEPARATOR"secret_onion_key.old",
- get_options()->DataDirectory);
+ fname = get_datadir_fname2("keys", "secret_onion_key");
+ fname_prev = get_datadir_fname2("keys", "secret_onion_key.old");
if (!(prkey = crypto_new_pk_env())) {
log_err(LD_GENERAL,"Error constructing rotated onion key");
goto error;
@@ -191,9 +186,12 @@
tor_mutex_release(key_lock);
mark_my_descriptor_dirty();
or_state_mark_dirty(state, get_options()->AvoidDiskWrites ? now+3600 : 0);
- return;
+ goto done;
error:
log_warn(LD_GENERAL, "Couldn't rotate onion key.");
+ done:
+ tor_free(fname);
+ tor_free(fname_prev);
}
/** Try to read an RSA key from <b>fname</b>. If <b>fname</b> doesn't exist
@@ -372,11 +370,11 @@
int
init_keys(void)
{
- char keydir[512];
+ char *keydir;
char fingerprint[FINGERPRINT_LEN+1];
/*nickname<space>fp\n\0 */
char fingerprint_line[MAX_NICKNAME_LEN+FINGERPRINT_LEN+3];
- const char *mydesc, *datadir;
+ const char *mydesc;
crypto_pk_env_t *prkey;
char digest[20];
char v3_digest[20];
@@ -408,15 +406,16 @@
return 0;
}
/* Make sure DataDirectory exists, and is private. */
- datadir = options->DataDirectory;
- if (check_private_dir(datadir, CPD_CREATE)) {
+ if (check_private_dir(options->DataDirectory, CPD_CREATE)) {
return -1;
}
/* Check the key directory. */
- tor_snprintf(keydir,sizeof(keydir),"%s"PATH_SEPARATOR"keys", datadir);
+ keydir = get_datadir_fname("keys");
if (check_private_dir(keydir, CPD_CREATE)) {
+ tor_free(keydir);
return -1;
}
+ tor_free(keydir);
/* 1a. Read v3 directory authority key/cert information. */
memset(v3_digest, 0, sizeof(v3_digest));
@@ -430,18 +429,18 @@
}
/* 1. Read identity key. Make it if none is found. */
- tor_snprintf(keydir,sizeof(keydir),
- "%s"PATH_SEPARATOR"keys"PATH_SEPARATOR"secret_id_key",datadir);
+ keydir = get_datadir_fname2("keys", "secret_id_key");
log_info(LD_GENERAL,"Reading/making identity key \"%s\"...",keydir);
prkey = init_key_from_file(keydir, 1, LOG_ERR);
+ tor_free(keydir);
if (!prkey) return -1;
set_identity_key(prkey);
/* 2. Read onion key. Make it if none is found. */
- tor_snprintf(keydir,sizeof(keydir),
- "%s"PATH_SEPARATOR"keys"PATH_SEPARATOR"secret_onion_key",datadir);
+ keydir = get_datadir_fname2("keys", "secret_onion_key");
log_info(LD_GENERAL,"Reading/making onion key \"%s\"...",keydir);
prkey = init_key_from_file(keydir, 1, LOG_ERR);
+ tor_free(keydir);
if (!prkey) return -1;
set_onion_key(prkey);
if (options->command == CMD_RUN_TOR) {
@@ -463,13 +462,13 @@
}
}
- tor_snprintf(keydir,sizeof(keydir),
- "%s"PATH_SEPARATOR"keys"PATH_SEPARATOR"secret_onion_key.old",datadir);
+ keydir = get_datadir_fname2("keys", "secret_onion_key.old");
if (file_status(keydir) == FN_FILE) {
prkey = init_key_from_file(keydir, 1, LOG_ERR);
if (prkey)
lastonionkey = prkey;
}
+ tor_free(keydir);
/* 3. Initialize link key and TLS context. */
if (tor_tls_context_new(get_identity_key(), options->Nickname,
@@ -503,8 +502,9 @@
}
/* 5. Dump fingerprint to 'fingerprint' */
- tor_snprintf(keydir,sizeof(keydir),"%s"PATH_SEPARATOR"fingerprint", datadir);
+ keydir = get_datadir_fname("fingerprint");
log_info(LD_GENERAL,"Dumping fingerprint to \"%s\"...",keydir);
+ tor_free(keydir);
if (crypto_pk_get_fingerprint(get_identity_key(), fingerprint, 1)<0) {
log_err(LD_GENERAL,"Error computing fingerprint");
return -1;
Modified: tor/trunk/src/or/routerlist.c
===================================================================
--- tor/trunk/src/or/routerlist.c 2007-10-17 16:55:41 UTC (rev 11999)
+++ tor/trunk/src/or/routerlist.c 2007-10-17 16:55:44 UTC (rev 12000)
@@ -87,13 +87,13 @@
int
trusted_dirs_reload_certs(void)
{
- char filename[512];
+ char *filename;
char *contents;
int r;
- tor_snprintf(filename,sizeof(filename),"%s"PATH_SEPARATOR"cached-certs",
- get_options()->DataDirectory);
+ filename = get_datadir_fname("cached-certs");
contents = read_file_to_str(filename, RFTS_IGNORE_MISSING, NULL);
+ tor_free(filename);
if (!contents)
return 0;
r = trusted_dirs_load_certs_from_string(contents, 1);
@@ -161,7 +161,7 @@
void
trusted_dirs_flush_certs_to_disk(void)
{
- char filename[512];
+ char *filename;
smartlist_t *chunks;
if (!trusted_dir_servers_certs_changed)
@@ -169,8 +169,6 @@
chunks = smartlist_create();
- tor_snprintf(filename,sizeof(filename),"%s"PATH_SEPARATOR"cached-certs",
- get_options()->DataDirectory);
SMARTLIST_FOREACH(trusted_dir_servers, trusted_dir_server_t *, ds,
{
if (ds->v3_certs) {
@@ -183,9 +181,11 @@
});
}
});
+ filename = get_datadir_fname("cached-certs");
if (write_chunks_to_file(filename, chunks, 0)) {
log_warn(LD_FS, "Error writing certificates to disk.");
}
+ tor_free(filename);
SMARTLIST_FOREACH(chunks, sized_chunk_t *, c, tor_free(c));
smartlist_free(chunks);
@@ -415,16 +415,10 @@
signed_desc_append_to_journal(signed_descriptor_t *desc,
desc_store_t *store)
{
- or_options_t *options = get_options();
- size_t fname_len = strlen(options->DataDirectory)+32;
- char *fname;
+ char *fname = get_datadir_fname_suffix(store->fname_base, ".new");
const char *body = signed_descriptor_get_body_impl(desc,1);
size_t len = desc->signed_descriptor_len + desc->annotations_len;
- fname = tor_malloc(fname_len);
- tor_snprintf(fname, fname_len, "%s"PATH_SEPARATOR"%s.new",
- options->DataDirectory, store->fname_base);
-
tor_assert(len == strlen(body));
if (append_bytes_to_file(fname, body, len, 1)) {
@@ -462,7 +456,6 @@
router_rebuild_store(int force, desc_store_t *store)
{
or_options_t *options;
- size_t fname_len;
smartlist_t *chunk_list = NULL;
char *fname = NULL, *fname_tmp = NULL;
int r = -1;
@@ -483,14 +476,10 @@
log_info(LD_DIR, "Rebuilding %s cache", store->description);
options = get_options();
- fname_len = strlen(options->DataDirectory)+32;
- fname = tor_malloc(fname_len);
- fname_tmp = tor_malloc(fname_len);
- tor_snprintf(fname, fname_len, "%s"PATH_SEPARATOR"%s",
- options->DataDirectory, store->fname_base);
- tor_snprintf(fname_tmp, fname_len, "%s"PATH_SEPARATOR"%s.tmp",
- options->DataDirectory, store->fname_base);
+ fname = get_datadir_fname(store->fname_base);
+ fname_tmp = get_datadir_fname_suffix(store->fname_base, ".tmp");
+
chunk_list = smartlist_create();
/* We sort the routers by age to enhance locality on disk. */
@@ -571,9 +560,8 @@
signed_descriptor_get_body(sd); /* reconstruct and assert */
});
- tor_snprintf(fname, fname_len, "%s"PATH_SEPARATOR"%s.new",
- options->DataDirectory, store->fname_base);
-
+ tor_free(fname);
+ fname = get_datadir_fname_suffix(store->fname_base, ".new");
write_str_to_file(fname, "", 1);
r = 0;
@@ -597,23 +585,16 @@
static int
router_reload_router_list_impl(desc_store_t *store)
{
- or_options_t *options = get_options();
- size_t fname_len = strlen(options->DataDirectory)+32;
- char *fname = tor_malloc(fname_len), *altname = NULL,
- *contents = NULL;
+ char *fname = NULL, *altname = NULL, *contents = NULL;
struct stat st;
int read_from_old_location = 0;
int extrainfo = (store->type == EXTRAINFO_STORE);
time_t now = time(NULL);
store->journal_len = store->store_len = 0;
- tor_snprintf(fname, fname_len, "%s"PATH_SEPARATOR"%s",
- options->DataDirectory, store->fname_base);
- if (store->fname_alt_base) {
- altname = tor_malloc(fname_len);
- tor_snprintf(altname, fname_len, "%s"PATH_SEPARATOR"%s",
- options->DataDirectory, store->fname_alt_base);
- }
+ fname = get_datadir_fname(store->fname_base);
+ if (store->fname_alt_base)
+ altname = get_datadir_fname(store->fname_alt_base);
if (store->mmap) /* get rid of it first */
tor_munmap_file(store->mmap);
@@ -642,13 +623,13 @@
SAVED_IN_CACHE, NULL, 0, NULL);
}
- tor_snprintf(fname, fname_len, "%s"PATH_SEPARATOR"%s.new",
- options->DataDirectory, store->fname_base);
+ tor_free(fname);
+ fname = get_datadir_fname_suffix(store->fname_base, ".new");
if (file_status(fname) == FN_FILE)
contents = read_file_to_str(fname, RFTS_BIN|RFTS_IGNORE_MISSING, &st);
if (read_from_old_location) {
- tor_snprintf(altname, fname_len, "%s"PATH_SEPARATOR"%s.new",
- options->DataDirectory, store->fname_alt_base);
+ tor_free(altname);
+ altname = get_datadir_fname_suffix(store->fname_alt_base, ".new");
if (!contents)
contents = read_file_to_str(altname, RFTS_BIN|RFTS_IGNORE_MISSING, &st);
else
Modified: tor/trunk/src/or/test.c
===================================================================
--- tor/trunk/src/or/test.c 2007-10-17 16:55:41 UTC (rev 11999)
+++ tor/trunk/src/or/test.c 2007-10-17 16:55:44 UTC (rev 12000)
@@ -3033,6 +3033,36 @@
smartlist_free(allocated);
}
+static void
+test_util_datadir(void)
+{
+ char buf[1024];
+ char *f;
+
+ f = get_datadir_fname(NULL);
+ test_streq(f, temp_dir);
+ tor_free(f);
+ f = get_datadir_fname("state");
+ tor_snprintf(buf, sizeof(buf), "%s"PATH_SEPARATOR"state", temp_dir);
+ test_streq(f, buf);
+ tor_free(f);
+ f = get_datadir_fname2("cache", "thingy");
+ tor_snprintf(buf, sizeof(buf),
+ "%s"PATH_SEPARATOR"cache"PATH_SEPARATOR"thingy", temp_dir);
+ test_streq(f, buf);
+ tor_free(f);
+ f = get_datadir_fname2_suffix("cache", "thingy", ".foo");
+ tor_snprintf(buf, sizeof(buf),
+ "%s"PATH_SEPARATOR"cache"PATH_SEPARATOR"thingy.foo", temp_dir);
+ test_streq(f, buf);
+ tor_free(f);
+ f = get_datadir_fname_suffix("cache", ".foo");
+ tor_snprintf(buf, sizeof(buf), "%s"PATH_SEPARATOR"cache.foo",
+ temp_dir);
+ test_streq(f, buf);
+ tor_free(f);
+}
+
/* Test AES-CTR encryption and decryption with IV. */
static void
test_crypto_aes_iv(void)
@@ -3194,6 +3224,7 @@
ENT(util),
SUBENT(util, ip6_helpers),
SUBENT(util, gzip),
+ SUBENT(util, datadir),
SUBENT(util, smartlist),
SUBENT(util, bitarray),
SUBENT(util, mempool),