[or-cvs] r13387: Correctly register failures in connection_add() in dnsserv_l (in tor/trunk: . src/or)
nickm at seul.org
nickm at seul.org
Tue Feb 5 21:39:41 UTC 2008
Author: nickm
Date: 2008-02-05 16:39:40 -0500 (Tue, 05 Feb 2008)
New Revision: 13387
Modified:
tor/trunk/
tor/trunk/ChangeLog
tor/trunk/src/or/control.c
tor/trunk/src/or/dnsserv.c
tor/trunk/src/or/or.h
Log:
r17913 at catbus: nickm | 2008-02-05 16:11:33 -0500
Correctly register failures in connection_add() in dnsserv_launch_request()
Property changes on: tor/trunk
___________________________________________________________________
svk:merge ticket from /tor/trunk [r17913] on 8246c3cf-6607-4228-993b-4d95d33730f1
Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog 2008-02-05 21:39:38 UTC (rev 13386)
+++ tor/trunk/ChangeLog 2008-02-05 21:39:40 UTC (rev 13387)
@@ -1,4 +1,8 @@
Changes in version 0.2.0.19-alpha - 2008-02-??
+ o Minor features:
+ - Actually validate the options passed to AuthDirReject, AuthDirInvalid,
+ AuthDirBadDir, and AuthDirBadExit.
+
o Major bugfixes:
- If we're a relay, avoid picking ourselves as an introduction point,
a rendezvous point, or as the final hop for internal circuits. Bug
@@ -23,6 +27,11 @@
signature download requests. Fix for bug 593. Bugfix on 0.2.0.x.
- Don't trigger an assert if we start a directory authority with a
private IP address (like 127.0.0.1).
+ - Avoid possible failures when generating a directory with routers with
+ over-long versions strings, or too many flags set. Bugfix on 0.1.2.x.
+ - If an attempt to launch a DNS resolve request over the control
+ port fails because we have overrun the limit on the number of
+ connections, tell the controller that the request has failed.
Changes in version 0.2.0.18-alpha - 2008-01-25
Modified: tor/trunk/src/or/control.c
===================================================================
--- tor/trunk/src/or/control.c 2008-02-05 21:39:38 UTC (rev 13386)
+++ tor/trunk/src/or/control.c 2008-02-05 21:39:40 UTC (rev 13387)
@@ -2439,7 +2439,7 @@
handle_control_resolve(control_connection_t *conn, uint32_t len,
const char *body)
{
- smartlist_t *args;
+ smartlist_t *args, *failed;
int is_reverse = 0;
(void) len; /* body is nul-terminated; it's safe to ignore the length */
@@ -2458,14 +2458,21 @@
tor_free(cp);
is_reverse = 1;
}
+ failed = smartlist_create();
SMARTLIST_FOREACH(args, const char *, arg, {
- dnsserv_launch_request(arg, is_reverse);
+ if (dnsserv_launch_request(arg, is_reverse)<0)
+ smartlist_add(failed, (char*)arg);
});
+ send_control_done(conn);
+ SMARTLIST_FOREACH(failed, const char *, arg, {
+ control_event_address_mapped(arg, arg, time(NULL),
+ "Unable to launch resolve request");
+ });
+
SMARTLIST_FOREACH(args, char *, cp, tor_free(cp));
smartlist_free(args);
-
- send_control_done(conn);
+ smartlist_free(failed);
return 0;
}
Modified: tor/trunk/src/or/dnsserv.c
===================================================================
--- tor/trunk/src/or/dnsserv.c 2008-02-05 21:39:38 UTC (rev 13386)
+++ tor/trunk/src/or/dnsserv.c 2008-02-05 21:39:40 UTC (rev 13387)
@@ -47,7 +47,7 @@
(void) addrlen;
sa = (struct sockaddr*) &addr;
if (sa->sa_family != AF_INET) {
- /* XXXX020 Handle IPV6 */
+ /* XXXX_IP6 Handle IPV6 */
log_warn(LD_APP, "Requesting address wasn't ipv4.");
evdns_server_request_respond(req, DNS_ERR_SERVERFAILED);
return;
@@ -155,8 +155,10 @@
/* Helper function: called whenever the client sends a resolve request to our
* controller. We need to eventually answer the request <b>req</b>.
+ * Returns 0 if the controller will be getting (or has gotten) an event in
+ * response; -1 if we couldn't launch the request.
*/
-void
+int
dnsserv_launch_request(const char *name, int reverse)
{
edge_connection_t *conn;
@@ -178,9 +180,8 @@
if (connection_add(TO_CONN(conn))<0) {
log_warn(LD_APP, "Couldn't register dummy connection for RESOLVE request");
- /* XXXX020 Answer the controller. */
connection_free(TO_CONN(conn));
- return;
+ return -1;
}
/* Now, throw the connection over to get rewritten (which will answer it
@@ -195,6 +196,7 @@
log_info(LD_APP, "Passed request for %s to rewrite_and_attach.",
escaped_safe_str(q_name));
tor_free(q_name);
+ return 0;
}
/** If there is a pending request on <b>conn</b> that's waiting for an answer,
Modified: tor/trunk/src/or/or.h
===================================================================
--- tor/trunk/src/or/or.h 2008-02-05 21:39:38 UTC (rev 13386)
+++ tor/trunk/src/or/or.h 2008-02-05 21:39:40 UTC (rev 13387)
@@ -3221,7 +3221,7 @@
const char *answer,
int ttl);
void dnsserv_reject_request(edge_connection_t *conn);
-void dnsserv_launch_request(const char *name, int is_reverse);
+int dnsserv_launch_request(const char *name, int is_reverse);
/********************************* geoip.c **************************/
More information about the tor-commits
mailing list