[or-cvs] r11086: Cache v3 networkstatus consensuses on disk. (in tor/trunk: . doc src/or)

nickm at seul.org nickm at seul.org
Mon Aug 13 18:47:22 UTC 2007


Author: nickm
Date: 2007-08-13 14:47:22 -0400 (Mon, 13 Aug 2007)
New Revision: 11086

Modified:
   tor/trunk/
   tor/trunk/ChangeLog
   tor/trunk/doc/TODO
   tor/trunk/src/or/dirvote.c
   tor/trunk/src/or/main.c
   tor/trunk/src/or/or.h
   tor/trunk/src/or/routerlist.c
Log:
 r14531 at catbus:  nickm | 2007-08-13 14:46:25 -0400
 Cache v3 networkstatus consensuses on disk.



Property changes on: tor/trunk
___________________________________________________________________
 svk:merge ticket from /tor/trunk [r14531] on 8246c3cf-6607-4228-993b-4d95d33730f1

Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2007-08-13 18:47:17 UTC (rev 11085)
+++ tor/trunk/ChangeLog	2007-08-13 18:47:22 UTC (rev 11086)
@@ -11,6 +11,10 @@
     - Fix compile on platforms without getaddrinfo: bug found by Li-Hui
       Zhou.
 
+  o Minor features (directory voting):
+    - Store v3 consensus status consensuses on disk, and reload them
+      on startup.
+
   o Minor featuers (security):
     - Warn about unsafe ControlPort configurations.
 

Modified: tor/trunk/doc/TODO
===================================================================
--- tor/trunk/doc/TODO	2007-08-13 18:47:17 UTC (rev 11085)
+++ tor/trunk/doc/TODO	2007-08-13 18:47:22 UTC (rev 11086)
@@ -92,7 +92,7 @@
           * Detect whether votes are really all for the same period.
         - Push/pull documents as appropriate.
           - Pull votes and signatures if we don't get them.
-        - Store consensuses
+        o Store consensuses
         - Cache votes and signatures on disk.
         o Have clients know which authorities are v3 authorities, and what
           their keys are.

Modified: tor/trunk/src/or/dirvote.c
===================================================================
--- tor/trunk/src/or/dirvote.c	2007-08-13 18:47:17 UTC (rev 11085)
+++ tor/trunk/src/or/dirvote.c	2007-08-13 18:47:22 UTC (rev 11086)
@@ -1400,7 +1400,7 @@
       networkstatus_check_consensus_signature(pending_consensus)<0)
     return -1;
 
-  networkstatus_set_current_consensus(pending_consensus_body);
+  networkstatus_set_current_consensus(pending_consensus_body, 0);
   return 0;
 }
 

Modified: tor/trunk/src/or/main.c
===================================================================
--- tor/trunk/src/or/main.c	2007-08-13 18:47:17 UTC (rev 11085)
+++ tor/trunk/src/or/main.c	2007-08-13 18:47:22 UTC (rev 11086)
@@ -1353,6 +1353,9 @@
   if (router_reload_networkstatus()) {
     return -1;
   }
+  if (router_reload_consensus_networkstatus()) {
+    return -1;
+  }
   directory_info_has_arrived(time(NULL),1);
 
   if (authdir_mode_tests_reachability(get_options())) {

Modified: tor/trunk/src/or/or.h
===================================================================
--- tor/trunk/src/or/or.h	2007-08-13 18:47:17 UTC (rev 11085)
+++ tor/trunk/src/or/or.h	2007-08-13 18:47:22 UTC (rev 11086)
@@ -3427,9 +3427,10 @@
                                                           const char *digest);
 
 /* for consensuses. */
+int router_reload_consensus_networkstatus(void);
 networkstatus_vote_t *networkstatus_get_latest_consensus(void);
 networkstatus_vote_t *networkstatus_get_live_consensus(time_t now);
-int networkstatus_set_current_consensus(const char *consensus);
+int networkstatus_set_current_consensus(const char *consensus, int from_cache);
 
 //routerstatus_t *routerstatus_get_by_hexdigest(const char *hexdigest);
 int should_delay_dir_fetches(or_options_t *options);

Modified: tor/trunk/src/or/routerlist.c
===================================================================
--- tor/trunk/src/or/routerlist.c	2007-08-13 18:47:17 UTC (rev 11085)
+++ tor/trunk/src/or/routerlist.c	2007-08-13 18:47:22 UTC (rev 11086)
@@ -175,6 +175,27 @@
   return 0;
 }
 
+/**DOCDOC */
+int
+router_reload_consensus_networkstatus(void)
+{
+  char filename[512];
+  char *s;
+
+  tor_snprintf(filename,sizeof(filename),"%s"PATH_SEPARATOR"cached-consensus",
+               get_options()->DataDirectory);
+  s = read_file_to_str(filename, 0, NULL);
+  if (!s)
+    return 0;
+
+  if (networkstatus_set_current_consensus(s, 1)) {
+    log_warn(LD_FS, "Couldn't load consensus networkstatus from \"%s\"",
+             filename);
+  }
+  tor_free(s);
+  return 0;
+}
+
 /** Reload the cached v3 key certificates from the cached-certs file in
  * the data directory. Return 0 on success, -1 on failure. */
 int
@@ -3837,8 +3858,9 @@
   return current_consensus;
 }
 
+/** DOCDOC */
 int
-networkstatus_set_current_consensus(const char *consensus)
+networkstatus_set_current_consensus(const char *consensus, int from_cache)
 {
   networkstatus_vote_t *c;
   /* Make sure it's parseable. */
@@ -3857,6 +3879,15 @@
 
   current_consensus = c;
 
+  if (!from_cache) {
+    or_options_t *options = get_options();
+    char filename[512];
+    tor_snprintf(filename, sizeof(filename),
+                 "%s"PATH_SEPARATOR"cached-consensus",
+                 options->DataDirectory);
+    write_str_to_file(filename, consensus, 0);
+  }
+
   if (get_options()->DirPort)
     dirserv_set_cached_networkstatus_v3(consensus, c->valid_after);
 



More information about the tor-commits mailing list