[or-cvs] r12047: Report our IP address in our vote if it turns out that our h (in tor/trunk: . src/or)

nickm at seul.org nickm at seul.org
Fri Oct 19 16:28:14 UTC 2007


Author: nickm
Date: 2007-10-19 12:28:13 -0400 (Fri, 19 Oct 2007)
New Revision: 12047

Modified:
   tor/trunk/
   tor/trunk/ChangeLog
   tor/trunk/src/or/dirserv.c
Log:
 r15957 at catbus:  nickm | 2007-10-19 12:22:18 -0400
 Report our IP address in our vote if it turns out that our hostname isn't a fqdn.



Property changes on: tor/trunk
___________________________________________________________________
 svk:merge ticket from /tor/trunk [r15957] on 8246c3cf-6607-4228-993b-4d95d33730f1

Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2007-10-19 16:28:10 UTC (rev 12046)
+++ tor/trunk/ChangeLog	2007-10-19 16:28:13 UTC (rev 12047)
@@ -52,6 +52,9 @@
     - Treat missing v3 keys or certificates as an error when running as a
       v3 directory authority.
 
+    - If an authority doesn't have a qualified hostname, just put its address
+      in the 
+
   o Minor bugfixes (v3 directory protocol)
     - Delete unverified-consensus when the real consensus is set.
     - Consider retrying a consensus networkstatus fetch immediately after one

Modified: tor/trunk/src/or/dirserv.c
===================================================================
--- tor/trunk/src/or/dirserv.c	2007-10-19 16:28:10 UTC (rev 12046)
+++ tor/trunk/src/or/dirserv.c	2007-10-19 16:28:13 UTC (rev 12047)
@@ -1875,6 +1875,10 @@
     log_warn(LD_NET, "Couldn't resolve my hostname");
     return NULL;
   }
+  if (!strchr(hostname, '.')) {
+    tor_free(hostname);
+    hostname = tor_dup_addr(addr);
+  }
   if (crypto_pk_get_digest(private_key, signing_key_digest)<0) {
     log_err(LD_BUG, "Error computing signing key digest");
     return NULL;



More information about the tor-commits mailing list