[or-cvs] r12867: When we were reading router descriptors from cache, we were (in tor/trunk: . src/or)

arma at seul.org arma at seul.org
Wed Dec 19 03:11:02 UTC 2007


Author: arma
Date: 2007-12-18 22:11:02 -0500 (Tue, 18 Dec 2007)
New Revision: 12867

Modified:
   tor/trunk/ChangeLog
   tor/trunk/src/or/routerlist.c
   tor/trunk/src/or/routerparse.c
Log:
When we were reading router descriptors from cache, we were ignoring
the annotations -- including reading in bridge-purpose descriptors
as general-purpose descriptors.


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2007-12-19 00:04:50 UTC (rev 12866)
+++ tor/trunk/ChangeLog	2007-12-19 03:11:02 UTC (rev 12867)
@@ -23,6 +23,9 @@
     - Relays were publishing their server descriptor to v1 and v2
       directory authorities, but they didn't try publishing to v3-only
       authorities. Fix this; and also stop publishing to v1 authorities.
+    - When we were reading router descriptors from cache, we were ignoring
+      the annotations -- including reading in bridge-purpose descriptors
+      as general-purpose descriptors.
 
   o Major features:
     - Bridges now behave like clients with respect to time intervals for

Modified: tor/trunk/src/or/routerlist.c
===================================================================
--- tor/trunk/src/or/routerlist.c	2007-12-19 00:04:50 UTC (rev 12866)
+++ tor/trunk/src/or/routerlist.c	2007-12-19 03:11:02 UTC (rev 12867)
@@ -2506,7 +2506,8 @@
 #endif
 }
 
-/** DOCDOC */
+/** DOCDOC -NM */
+/* XXX020 why are we dropping all router annotations here? -RD */
 static routerinfo_t *
 routerlist_reparse_old(routerlist_t *rl, signed_descriptor_t *sd)
 {

Modified: tor/trunk/src/or/routerparse.c
===================================================================
--- tor/trunk/src/or/routerparse.c	2007-12-19 00:04:50 UTC (rev 12866)
+++ tor/trunk/src/or/routerparse.c	2007-12-19 03:11:02 UTC (rev 12867)
@@ -978,6 +978,8 @@
                                               allow_annotations,
                                               prepend_annotations);
       if (router) {
+        log_debug(LD_DIR, "Read router '%s', purpose '%s'",
+                  router->nickname, router_purpose_to_string(router->purpose));
         signed_desc = &router->cache_info;
         elt = router;
       }
@@ -1063,7 +1065,7 @@
   if (prepend_annotations) {
     if (tokenize_string(prepend_annotations,NULL,tokens,
                         routerdesc_token_table,TS_NOCHECK)) {
-      log_warn(LD_DIR, "Error tokenizing router descriptor.");
+      log_warn(LD_DIR, "Error tokenizing router descriptor (annotations).");
       goto err;
     }
   }
@@ -1079,6 +1081,14 @@
     s = cp+1;
   }
 
+  if (allow_annotations && start_of_annotations != s) {
+    if (tokenize_string(start_of_annotations,s,tokens,
+                        routerdesc_token_table,TS_NOCHECK)) {
+      log_warn(LD_DIR, "Error tokenizing router descriptor (annotations).");
+      goto err;
+    }
+  }
+
   if (router_get_router_hash(s, digest) < 0) {
     log_warn(LD_DIR, "Couldn't compute router hash.");
     return NULL;
@@ -1130,7 +1140,7 @@
   }
   router->address = tor_strdup(tok->args[1]);
   if (!tor_inet_aton(router->address, &in)) {
-    log_warn(LD_DIR,"Router address is not an IP.");
+    log_warn(LD_DIR,"Router address is not an IP address.");
     goto err;
   }
   router->addr = ntohl(in.s_addr);
@@ -2798,7 +2808,8 @@
 
 /** Read all tokens from a string between <b>start</b> and <b>end</b>, and add
  * them to <b>out</b>.  Parse according to the token rules in <b>table</b>.
- * Caller must free tokens in <b>out</b>.
+ * Caller must free tokens in <b>out</b>.  If <b>end</b> is NULL, use the
+ * entire string.
  */
 static int
 tokenize_string(const char *start, const char *end, smartlist_t *out,



More information about the tor-commits mailing list