commit c4554e3f021c66729cebaff5c320da61cfc7b895 Author: Georg Koppen <g...@torproject.org> Date: Thu May 8 10:44:55 2014 +0000
Rebased Yawning's patch to fix build bustage. --- gitian/patches/bug8402-master.patch | 112 ++++++++++++++++++----------------- 1 file changed, 58 insertions(+), 54 deletions(-) diff --git a/gitian/patches/bug8402-master.patch b/gitian/patches/bug8402-master.patch index 33d6e20..d5e7b37 100644 --- a/gitian/patches/bug8402-master.patch +++ b/gitian/patches/bug8402-master.patch @@ -1,4 +1,4 @@ -From 7476a5c00aabdb2b2b4cd29f3029a7fa3afc657d Mon Sep 17 00:00:00 2001 +From 2c9bcdf79a9ba98b79feba10a8000f5609de36e6 Mon Sep 17 00:00:00 2001 From: Yawning Angel <yawn...@schwanenlied.me> Date: Tue, 25 Mar 2014 07:21:22 +0000 Subject: [PATCH 1/5] Allow ClientTransportPlugins to use proxies @@ -17,10 +17,10 @@ This fixes bug #8402. 5 files changed, 258 insertions(+), 27 deletions(-) diff --git a/src/or/config.c b/src/or/config.c -index da6aec0..91e8410 100644 +index 1faf138..614e779 100644 --- a/src/or/config.c +++ b/src/or/config.c -@@ -535,7 +535,9 @@ static int options_transition_affects_descriptor( +@@ -536,7 +536,9 @@ static int options_transition_affects_descriptor( const or_options_t *old_options, const or_options_t *new_options); static int check_nickname_list(char **lst, const char *name, char **msg); @@ -31,7 +31,7 @@ index da6aec0..91e8410 100644 static int parse_server_transport_line(const char *line, int validate_only); static char *get_bindaddr_from_transport_listen_line(const char *line, -@@ -1399,7 +1401,7 @@ options_act(const or_options_t *old_options) +@@ -1426,7 +1428,7 @@ options_act(const or_options_t *old_options) pt_prepare_proxy_list_for_config_read(); if (options->ClientTransportPlugin) { for (cl = options->ClientTransportPlugin; cl; cl = cl->next) { @@ -40,7 +40,7 @@ index da6aec0..91e8410 100644 log_warn(LD_BUG, "Previously validated ClientTransportPlugin line " "could not be added!"); -@@ -3120,11 +3122,11 @@ options_validate(or_options_t *old_options, or_options_t *options, +@@ -3169,11 +3171,11 @@ options_validate(or_options_t *old_options, or_options_t *options, } } @@ -55,7 +55,7 @@ index da6aec0..91e8410 100644 /* Check if the proxies will give surprising behavior. */ if (options->HTTPProxy && !(options->Socks4Proxy || -@@ -3237,7 +3239,7 @@ options_validate(or_options_t *old_options, or_options_t *options, +@@ -3284,7 +3286,7 @@ options_validate(or_options_t *old_options, or_options_t *options, } for (cl = options->ClientTransportPlugin; cl; cl = cl->next) { @@ -64,7 +64,7 @@ index da6aec0..91e8410 100644 REJECT("Transport line did not parse. See logs for details."); } -@@ -4609,7 +4611,8 @@ parse_bridge_line(const char *line) +@@ -4734,7 +4736,8 @@ parse_bridge_line(const char *line) * our internal transport list. * - If it's a managed proxy line, launch the managed proxy. */ static int @@ -74,7 +74,7 @@ index da6aec0..91e8410 100644 { smartlist_t *items = NULL; int r; -@@ -4700,6 +4703,13 @@ parse_client_transport_line(const char *line, int validate_only) +@@ -4825,6 +4828,13 @@ parse_client_transport_line(const char *line, int validate_only) pt_kickstart_client_proxy(transport_list, proxy_argv); } } else { /* external */ @@ -89,7 +89,7 @@ index da6aec0..91e8410 100644 log_warn(LD_CONFIG, "You can't have an external proxy with " "more than one transports."); diff --git a/src/or/connection.c b/src/or/connection.c -index 8c697d6..93d164c 100644 +index 3cc4e09..a9c5596 100644 --- a/src/or/connection.c +++ b/src/or/connection.c @@ -86,6 +86,8 @@ static int connection_read_https_proxy_response(connection_t *conn); @@ -101,7 +101,7 @@ index 8c697d6..93d164c 100644 /** The last addresses that our network interface seemed to have been * binding to. We use this as one way to detect when our IP changes. -@@ -1671,14 +1673,14 @@ get_proxy_type(void) +@@ -1689,14 +1691,14 @@ get_proxy_type(void) { const or_options_t *options = get_options(); @@ -119,7 +119,7 @@ index 8c697d6..93d164c 100644 else return PROXY_NONE; } -@@ -4733,6 +4735,35 @@ assert_connection_ok(connection_t *conn, time_t now) +@@ -4771,6 +4773,35 @@ assert_connection_ok(connection_t *conn, time_t now) } /** Fills <b>addr</b> and <b>port</b> with the details of the global @@ -155,7 +155,7 @@ index 8c697d6..93d164c 100644 * proxy server we are using. * <b>conn</b> contains the connection we are using the proxy for. * -@@ -4744,6 +4775,16 @@ get_proxy_addrport(tor_addr_t *addr, uint16_t *port, int *proxy_type, +@@ -4782,6 +4813,16 @@ get_proxy_addrport(tor_addr_t *addr, uint16_t *port, int *proxy_type, { const or_options_t *options = get_options(); @@ -172,7 +172,7 @@ index 8c697d6..93d164c 100644 if (options->HTTPSProxy) { tor_addr_copy(addr, &options->HTTPSProxyAddr); *port = options->HTTPSProxyPort; -@@ -4759,19 +4800,8 @@ get_proxy_addrport(tor_addr_t *addr, uint16_t *port, int *proxy_type, +@@ -4797,19 +4838,8 @@ get_proxy_addrport(tor_addr_t *addr, uint16_t *port, int *proxy_type, *port = options->Socks5ProxyPort; *proxy_type = PROXY_SOCKS5; return 0; @@ -193,12 +193,12 @@ index 8c697d6..93d164c 100644 + return get_bridge_pt_addrport(addr, port, proxy_type, conn); } - *proxy_type = PROXY_NONE; + tor_addr_make_unspec(addr); diff --git a/src/or/transports.c b/src/or/transports.c -index 8b4a118..8e82a41 100644 +index dc30754..b810315 100644 --- a/src/or/transports.c +++ b/src/or/transports.c -@@ -122,6 +122,8 @@ static INLINE void free_execve_args(char **arg); +@@ -124,6 +124,8 @@ static INLINE void free_execve_args(char **arg); #define PROTO_SMETHOD_ERROR "SMETHOD-ERROR" #define PROTO_CMETHODS_DONE "CMETHODS DONE" #define PROTO_SMETHODS_DONE "SMETHODS DONE" @@ -207,7 +207,7 @@ index 8b4a118..8e82a41 100644 /** The first and only supported - at the moment - configuration protocol version. */ -@@ -437,6 +439,17 @@ add_transport_to_proxy(const char *transport, managed_proxy_t *mp) +@@ -439,6 +441,17 @@ add_transport_to_proxy(const char *transport, managed_proxy_t *mp) static int proxy_needs_restart(const managed_proxy_t *mp) { @@ -225,7 +225,7 @@ index 8b4a118..8e82a41 100644 /* mp->transport_to_launch is populated with the names of the transports that must be launched *after* the SIGHUP. mp->transports is populated with the transports that were -@@ -457,10 +470,10 @@ proxy_needs_restart(const managed_proxy_t *mp) +@@ -459,10 +472,10 @@ proxy_needs_restart(const managed_proxy_t *mp) } SMARTLIST_FOREACH_END(t); @@ -240,7 +240,7 @@ index 8b4a118..8e82a41 100644 } /** Managed proxy <b>mp</b> must be restarted. Do all the necessary -@@ -491,6 +504,11 @@ proxy_prepare_for_restart(managed_proxy_t *mp) +@@ -493,6 +506,11 @@ proxy_prepare_for_restart(managed_proxy_t *mp) SMARTLIST_FOREACH(mp->transports, transport_t *, t, transport_free(t)); smartlist_clear(mp->transports); @@ -252,7 +252,7 @@ index 8b4a118..8e82a41 100644 /* flag it as an infant proxy so that it gets launched on next tick */ mp->conf_state = PT_PROTO_INFANT; unconfigured_proxies_n++; -@@ -725,12 +743,52 @@ managed_proxy_destroy(managed_proxy_t *mp, +@@ -727,12 +745,52 @@ managed_proxy_destroy(managed_proxy_t *mp, /* free the argv */ free_execve_args(mp->argv); @@ -305,7 +305,7 @@ index 8b4a118..8e82a41 100644 /** Handle a configured or broken managed proxy <b>mp</b>. */ static void handle_finished_proxy(managed_proxy_t *mp) -@@ -743,6 +801,12 @@ handle_finished_proxy(managed_proxy_t *mp) +@@ -745,6 +803,12 @@ handle_finished_proxy(managed_proxy_t *mp) managed_proxy_destroy(mp, 0); /* destroy it but don't terminate */ break; case PT_PROTO_CONFIGURED: /* if configured correctly: */ @@ -318,7 +318,7 @@ index 8b4a118..8e82a41 100644 register_proxy(mp); /* register its transports */ mp->conf_state = PT_PROTO_COMPLETED; /* and mark it as completed. */ break; -@@ -860,6 +924,22 @@ handle_proxy_line(const char *line, managed_proxy_t *mp) +@@ -862,6 +926,22 @@ handle_proxy_line(const char *line, managed_proxy_t *mp) goto err; return; @@ -341,7 +341,7 @@ index 8b4a118..8e82a41 100644 } else if (!strcmpstart(line, SPAWN_ERROR_MESSAGE)) { /* managed proxy launch failed: parse error message to learn why. */ int retval, child_state, saved_errno; -@@ -1126,6 +1206,21 @@ parse_cmethod_line(const char *line, managed_proxy_t *mp) +@@ -1128,6 +1208,21 @@ parse_cmethod_line(const char *line, managed_proxy_t *mp) return r; } @@ -363,7 +363,7 @@ index 8b4a118..8e82a41 100644 /** Return a newly allocated string that tor should place in * TOR_PT_SERVER_TRANSPORT_OPTIONS while configuring the server * manged proxy in <b>mp</b>. Return NULL if no such options are found. */ -@@ -1286,6 +1381,14 @@ create_managed_proxy_environment(const managed_proxy_t *mp) +@@ -1292,6 +1387,14 @@ create_managed_proxy_environment(const managed_proxy_t *mp) } else { smartlist_add_asprintf(envs, "TOR_PT_EXTENDED_SERVER_PORT="); } @@ -378,7 +378,7 @@ index 8b4a118..8e82a41 100644 } SMARTLIST_FOREACH_BEGIN(envs, const char *, env_var) { -@@ -1318,6 +1421,7 @@ managed_proxy_create(const smartlist_t *transport_list, +@@ -1324,6 +1427,7 @@ managed_proxy_create(const smartlist_t *transport_list, mp->is_server = is_server; mp->argv = proxy_argv; mp->transports = smartlist_new(); @@ -387,7 +387,7 @@ index 8b4a118..8e82a41 100644 mp->transports_to_launch = smartlist_new(); SMARTLIST_FOREACH(transport_list, const char *, transport, diff --git a/src/or/transports.h b/src/or/transports.h -index 7b524f2..5b8144b 100644 +index 1365ead..bc2331d 100644 --- a/src/or/transports.h +++ b/src/or/transports.h @@ -81,6 +81,9 @@ typedef struct { @@ -418,11 +418,11 @@ index 7b524f2..5b8144b 100644 #endif diff --git a/src/test/test_pt.c b/src/test/test_pt.c -index 3277921..ada8dbe 100644 +index f71627d..788d420 100644 --- a/src/test/test_pt.c +++ b/src/test/test_pt.c -@@ -435,6 +435,85 @@ test_pt_configure_proxy(void *arg) - } +@@ -450,6 +450,85 @@ test_pt_configure_proxy(void *arg) + tor_free(mp); } +/* Test the get_pt_proxy_uri() function. */ @@ -507,7 +507,7 @@ index 3277921..ada8dbe 100644 #define PT_LEGACY(name) \ { #name, legacy_test_helper, 0, &legacy_setup, test_pt_ ## name } -@@ -447,6 +526,8 @@ struct testcase_t pt_tests[] = { +@@ -462,6 +541,8 @@ struct testcase_t pt_tests[] = { NULL, NULL }, { "configure_proxy",test_pt_configure_proxy, TT_FORK, NULL, NULL }, @@ -517,9 +517,10 @@ index 3277921..ada8dbe 100644 }; -- -1.8.1.2 +2.0.0.rc0 + -From bc59556e87a0b0ebaf2adfc57147522f05b3f974 Mon Sep 17 00:00:00 2001 +From d1f3631335cc2757e2319055348a1614a00fa7b2 Mon Sep 17 00:00:00 2001 From: Yawning Angel <yawn...@schwanenlied.me> Date: Mon, 14 Apr 2014 21:51:34 +0000 Subject: [PATCH 2/5] Fixed the test build with --enable-gcc-warnings @@ -529,10 +530,10 @@ Subject: [PATCH 2/5] Fixed the test build with --enable-gcc-warnings 1 file changed, 14 insertions(+), 14 deletions(-) diff --git a/src/test/test_pt.c b/src/test/test_pt.c -index ada8dbe..ac604eb 100644 +index 788d420..cfbd084 100644 --- a/src/test/test_pt.c +++ b/src/test/test_pt.c -@@ -449,7 +449,7 @@ test_get_pt_proxy_uri(void *arg) +@@ -464,7 +464,7 @@ test_get_pt_proxy_uri(void *arg) tt_assert(uri == NULL); /* Test with a SOCKS4 proxy. */ @@ -541,7 +542,7 @@ index ada8dbe..ac604eb 100644 ret = tor_addr_port_lookup(options->Socks4Proxy, &options->Socks4ProxyAddr, &options->Socks4ProxyPort); -@@ -457,11 +457,10 @@ test_get_pt_proxy_uri(void *arg) +@@ -472,11 +472,10 @@ test_get_pt_proxy_uri(void *arg) uri = get_pt_proxy_uri(); tt_str_op(uri, ==, "socks4a://192.0.2.1:1080"); tor_free(uri); @@ -555,7 +556,7 @@ index ada8dbe..ac604eb 100644 ret = tor_addr_port_lookup(options->Socks5Proxy, &options->Socks5ProxyAddr, &options->Socks5ProxyPort); -@@ -471,16 +470,17 @@ test_get_pt_proxy_uri(void *arg) +@@ -486,16 +485,17 @@ test_get_pt_proxy_uri(void *arg) tor_free(uri); /* Test with a SOCKS5 proxy, with username/password. */ @@ -578,7 +579,7 @@ index ada8dbe..ac604eb 100644 ret = tor_addr_port_lookup(options->HTTPSProxy, &options->HTTPSProxyAddr, &options->HTTPSProxyPort); -@@ -490,15 +490,15 @@ test_get_pt_proxy_uri(void *arg) +@@ -505,15 +505,15 @@ test_get_pt_proxy_uri(void *arg) tor_free(uri); /* Test with a HTTPS proxy, with authenticator. */ @@ -598,7 +599,7 @@ index ada8dbe..ac604eb 100644 ret = tor_addr_port_lookup(options->Socks4Proxy, &options->Socks4ProxyAddr, &options->Socks4ProxyPort); -@@ -506,7 +506,7 @@ test_get_pt_proxy_uri(void *arg) +@@ -521,7 +521,7 @@ test_get_pt_proxy_uri(void *arg) uri = get_pt_proxy_uri(); tt_str_op(uri, ==, "socks4a://[2001:db8::1]:1080"); tor_free(uri); @@ -608,9 +609,10 @@ index ada8dbe..ac604eb 100644 done: if (uri) -- -1.8.1.2 +2.0.0.rc0 -From 3c991178926f39ffacef1d86e403f5d360d30404 Mon Sep 17 00:00:00 2001 + +From e2b63cda85ba08b1675c7cf376d21700ca34bcf5 Mon Sep 17 00:00:00 2001 From: Yawning Angel <yawn...@schwanenlied.me> Date: Thu, 1 May 2014 03:30:09 +0000 Subject: [PATCH 3/5] Remove get_bridge_pt_addrport(). @@ -627,7 +629,7 @@ being used, it is PT/proxy-less. 1 file changed, 12 insertions(+), 34 deletions(-) diff --git a/src/or/connection.c b/src/or/connection.c -index 93d164c..9a766d6 100644 +index a9c5596..4bb2683 100644 --- a/src/or/connection.c +++ b/src/or/connection.c @@ -86,8 +86,6 @@ static int connection_read_https_proxy_response(connection_t *conn); @@ -639,7 +641,7 @@ index 93d164c..9a766d6 100644 /** The last addresses that our network interface seemed to have been * binding to. We use this as one way to detect when our IP changes. -@@ -4735,35 +4733,6 @@ assert_connection_ok(connection_t *conn, time_t now) +@@ -4773,35 +4771,6 @@ assert_connection_ok(connection_t *conn, time_t now) } /** Fills <b>addr</b> and <b>port</b> with the details of the global @@ -675,7 +677,7 @@ index 93d164c..9a766d6 100644 * proxy server we are using. * <b>conn</b> contains the connection we are using the proxy for. * -@@ -4781,8 +4750,19 @@ get_proxy_addrport(tor_addr_t *addr, uint16_t *port, int *proxy_type, +@@ -4819,8 +4788,19 @@ get_proxy_addrport(tor_addr_t *addr, uint16_t *port, int *proxy_type, * the config to have unused ClientTransportPlugin entries. */ if (options->ClientTransportPlugin) { @@ -696,7 +698,7 @@ index 93d164c..9a766d6 100644 } if (options->HTTPSProxy) { -@@ -4800,8 +4780,6 @@ get_proxy_addrport(tor_addr_t *addr, uint16_t *port, int *proxy_type, +@@ -4838,8 +4818,6 @@ get_proxy_addrport(tor_addr_t *addr, uint16_t *port, int *proxy_type, *port = options->Socks5ProxyPort; *proxy_type = PROXY_SOCKS5; return 0; @@ -704,11 +706,12 @@ index 93d164c..9a766d6 100644 - return get_bridge_pt_addrport(addr, port, proxy_type, conn); } - *proxy_type = PROXY_NONE; + tor_addr_make_unspec(addr); -- -1.8.1.2 +2.0.0.rc0 + -From c4c41bb8e31ab39f2c7fe3c8f11ee727a65c3e09 Mon Sep 17 00:00:00 2001 +From ae0174c6e1da1051403c51fa881f66d57cc22acd Mon Sep 17 00:00:00 2001 From: Yawning Angel <yawn...@schwanenlied.me> Date: Thu, 1 May 2014 03:43:53 +0000 Subject: [PATCH 4/5] Log the correct proxy type on failure. @@ -721,10 +724,10 @@ config. 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/or/connection.c b/src/or/connection.c -index 9a766d6..b2e6a69 100644 +index 4bb2683..cfa6ee5 100644 --- a/src/or/connection.c +++ b/src/or/connection.c -@@ -4801,7 +4801,7 @@ log_failed_proxy_connection(connection_t *conn) +@@ -4841,7 +4841,7 @@ log_failed_proxy_connection(connection_t *conn) log_warn(LD_NET, "The connection to the %s proxy server at %s just failed. " "Make sure that the proxy server is up and running.", @@ -734,9 +737,10 @@ index 9a766d6..b2e6a69 100644 } -- -1.8.1.2 +2.0.0.rc0 + -From e3b5b7f4b9e5ef4637f0719d54be9f534e41019c Mon Sep 17 00:00:00 2001 +From 378e6f7f8521ed0c35dc1afc91840117713498fb Mon Sep 17 00:00:00 2001 From: Yawning Angel <yawn...@schwanenlied.me> Date: Thu, 1 May 2014 18:58:53 +0000 Subject: [PATCH 5/5] Improve the log message when a transport doesn't support @@ -749,10 +753,10 @@ does not acknowledge the configured outgoing proxy. 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/src/or/transports.c b/src/or/transports.c -index 8e82a41..3991bd3 100644 +index b810315..eee159d 100644 --- a/src/or/transports.c +++ b/src/or/transports.c -@@ -803,7 +803,8 @@ handle_finished_proxy(managed_proxy_t *mp) +@@ -805,7 +805,8 @@ handle_finished_proxy(managed_proxy_t *mp) case PT_PROTO_CONFIGURED: /* if configured correctly: */ if (mp->proxy_uri && !mp->proxy_supported) { log_warn(LD_CONFIG, "Managed proxy '%s' did not configure the " @@ -763,5 +767,5 @@ index 8e82a41..3991bd3 100644 break; } -- -1.8.1.2 +2.0.0.rc0 _______________________________________________ tor-commits mailing list tor-commits@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits