[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #33675 [Core Tor/Chutney]: Search microdescriptor files for relay ed25519 keys
#33675: Search microdescriptor files for relay ed25519 keys
-------------------------------------------+-------------------------------
Reporter: teor | Owner: anuradha1904
Type: enhancement | Status: assigned
Priority: Medium | Milestone:
Component: Core Tor/Chutney | Version:
Severity: Normal | Resolution:
Keywords: ipv6, prop311, outreachy-ipv6 | Actual Points: 0.1
Parent ID: #33428 | Points: 0.5
Reviewer: teor | Sponsor: Sponsor55-can
-------------------------------------------+-------------------------------
Comment (by teor):
That looks great!
But base64 contains "+" characters:
https://docs.python.org/3.5/library/base64.html#base64.b64encode
And "+" is a special character in regular expressions:
https://docs.python.org/3/library/re.html#regular-expression-syntax
So you'll need to use re.escape() on ed25519-id:
https://docs.python.org/3/library/re.html#re.escape
Please write some code, and test it using "make test-network-all".
Send us a pull request when you're done.
If you get stuck, send us:
* a pull request with your draft code
* the detailed logs from the ".log" files
And tell us what you've tried already.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33675#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs