Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ticket32822 #1626

Closed
wants to merge 5 commits into from
Closed

Ticket32822 #1626

wants to merge 5 commits into from

Conversation

Labels
None yet
Projects
None yet
4 participants
@teor2345
Copy link
Contributor

@teor2345 teor2345 commented Dec 20, 2019

No description provided.

@coveralls
Copy link

@coveralls coveralls commented Dec 20, 2019

Pull Request Test Coverage Report for Build 7780

  • 1 of 20 (5.0%) changed or added relevant lines in 2 files are covered.
  • 703 unchanged lines in 6 files lost coverage.
  • Overall coverage increased (+0.009%) to 63.344%

Changes Missing Coverage Covered Lines Changed/Added Lines %
src/feature/relay/router.c 0 19 0.0%
Files with Coverage Reduction New Missed Lines %
src/feature/hs/hs_service.c 1 73.29%
src/app/main/main.c 10 22.02%
src/feature/rend/rendcache.c 23 91.98%
src/core/or/command.c 112 2.19%
src/core/or/channel.c 150 81.67%
src/app/config/config.c 407 79.76%
Totals Coverage Status
Change from base Build 7725: 0.009%
Covered Lines: 49961
Relevant Lines: 78872

💛 - Coveralls

tor_addr_port_t *ipv6_ap_out)
{
if (BUG(!ipv6_ap_out))
return;
Copy link
Contributor

@dgoulet-tor dgoulet-tor Jan 8, 2020

I would use tor_assert() here because this is a caller convention setup rather than external input we can't control.

Furthermore, tor will misbehave after this return by accessing stack junk :S.

Copy link
Contributor Author

@teor2345 teor2345 Jan 13, 2020

Fixed in 532d9b6, squashed into #1654.

I'll force-push the squashed and merged branch to this PR.

"Unable to use configured IPv6 address \"%s\" in a "
"descriptor. Skipping it. "
"Try specifying a globally reachable address explicitly.",
tor_addr_to_str(addrbuf, addr, sizeof(addrbuf), 1));
Copy link
Contributor

@dgoulet-tor dgoulet-tor Jan 8, 2020

To avoid that extra addrbuf[], you could use fmt_addrport(). No strong opinion there.

Copy link
Contributor Author

@teor2345 teor2345 Jan 13, 2020

Fixed in f63e110, squashed into #1654.

I'll force-push the squashed and merged branch to this PR.

teor2345 added 4 commits Jan 13, 2020
When IPv6 ORPorts are set to "auto", tor relays and bridges would
advertise an incorrect port in their descriptor.

This may be a low-severity memory safety issue, because the published
port number may be derived from uninitialised or out-of-bounds memory
reads.

Fixes bug 32588; bugfix on 0.2.3.9-alpha.
Return early when there is no suitable IPv6 ORPort.
Show the address and port on error, using a convenience function.

Code simplification and refactoring.

Cleanup after 32588.
Authorities currently add themselves to the trusted dir servers list,
but if they have an IPv6 ORPort, they leave it out.

This commit makes authorities add their own IPv6 ORPort to the trusted
dir servers list.

Closes ticket 32822.
These tests don't actually exercise the authority IPv6 ORPort
self-add feature in 32822, but they do improve coverage of the
related config code.

Part of 32822.
@torproject-pusher torproject-pusher deleted the branch torproject:master May 25, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment