|
@@ -4707,6 +4707,14 @@ struct routerset_t {
|
|
|
|
|
|
* a router belongs to the set if it is _rejected_ by this policy. */
|
|
|
smartlist_t *policies;
|
|
|
+
|
|
|
+
|
|
|
+ char *description;
|
|
|
+
|
|
|
+
|
|
|
+ smartlist_t *country_names;
|
|
|
+ int n_countries;
|
|
|
+ bitarray_t *countries;
|
|
|
};
|
|
|
|
|
|
|
|
@@ -4718,9 +4726,85 @@ routerset_new(void)
|
|
|
result->names = strmap_new();
|
|
|
result->digests = digestmap_new();
|
|
|
result->policies = smartlist_create();
|
|
|
+ result->country_names = smartlist_create();
|
|
|
return result;
|
|
|
}
|
|
|
|
|
|
+
|
|
|
+static char *
|
|
|
+routerset_get_countryname(const char *c)
|
|
|
+{
|
|
|
+ char *country;
|
|
|
+
|
|
|
+ if (strlen(c) < 4 || c[0] !='{' || c[3] !='}')
|
|
|
+ return NULL;
|
|
|
+
|
|
|
+ country = tor_strndup(c+1, 2);
|
|
|
+ tor_strlower(country);
|
|
|
+ return country;
|
|
|
+}
|
|
|
+
|
|
|
+#if 0
|
|
|
+
|
|
|
+ * country code to the routerset's <b>countries</b> bitarray. Return the
|
|
|
+ * integer index if the country code is valid, -1 otherwise.*/
|
|
|
+static int
|
|
|
+routerset_add_country(const char *c)
|
|
|
+{
|
|
|
+ char country[3];
|
|
|
+ country_t cc;
|
|
|
+
|
|
|
+
|
|
|
+ \{[.]{2}\}. Do we need to be strict? -RH */
|
|
|
+
|
|
|
+
|
|
|
+ if (!geoip_is_loaded()) {
|
|
|
+ log(LOG_WARN, LD_CONFIG, "GeoIP database not loaded: Cannot add country"
|
|
|
+ "entry %s, ignoring.", c);
|
|
|
+ return -1;
|
|
|
+ }
|
|
|
+
|
|
|
+ memcpy(country, c+1, 2);
|
|
|
+ country[2] = '\0';
|
|
|
+ tor_strlower(country);
|
|
|
+
|
|
|
+ if ((cc=geoip_get_country(country))==-1) {
|
|
|
+ log(LOG_WARN, LD_CONFIG, "Country code '%s' is not valid, ignoring.",
|
|
|
+ country);
|
|
|
+ }
|
|
|
+ return cc;
|
|
|
+}
|
|
|
+#endif
|
|
|
+
|
|
|
+
|
|
|
+ * the GeoIP database is reloaded.
|
|
|
+ */
|
|
|
+void
|
|
|
+routerset_refresh_countries(routerset_t *target)
|
|
|
+{
|
|
|
+ int cc;
|
|
|
+ if (target->countries) {
|
|
|
+ bitarray_free(target->countries);
|
|
|
+ }
|
|
|
+ if (!geoip_is_loaded()) {
|
|
|
+ target->countries = NULL;
|
|
|
+ target->n_countries = 0;
|
|
|
+ return;
|
|
|
+ }
|
|
|
+ target->n_countries = geoip_get_n_countries();
|
|
|
+ target->countries = bitarray_init_zero(target->n_countries);
|
|
|
+ SMARTLIST_FOREACH_BEGIN(target->country_names, const char *, country) {
|
|
|
+ cc = geoip_get_country(country);
|
|
|
+ if (cc >= 0) {
|
|
|
+ tor_assert(cc < target->n_countries);
|
|
|
+ bitarray_set(target->countries, cc);
|
|
|
+ } else {
|
|
|
+ log(LOG_WARN, LD_CONFIG, "Country code '%s' is not recognized.",
|
|
|
+ country);
|
|
|
+ }
|
|
|
+ } SMARTLIST_FOREACH_END(country);
|
|
|
+}
|
|
|
+
|
|
|
|
|
|
* them to <b>target</b>. In log messages, refer to the string as
|
|
|
* <b>description</b>. Return 0 on success, -1 on failure.
|
|
@@ -4733,10 +4817,12 @@ int
|
|
|
routerset_parse(routerset_t *target, const char *s, const char *description)
|
|
|
{
|
|
|
int r = 0;
|
|
|
+ int added_countries = 0;
|
|
|
+ char *countryname;
|
|
|
smartlist_t *list = smartlist_create();
|
|
|
smartlist_split_string(list, s, ",",
|
|
|
SPLIT_SKIP_SPACE | SPLIT_IGNORE_BLANK, 0);
|
|
|
- SMARTLIST_FOREACH(list, char *, nick, {
|
|
|
+ SMARTLIST_FOREACH_BEGIN(list, char *, nick) {
|
|
|
addr_policy_t *p;
|
|
|
if (is_legal_hexdigest(nick)) {
|
|
|
char d[DIGEST_LEN];
|
|
@@ -4748,21 +4834,28 @@ routerset_parse(routerset_t *target, const char *s, const char *description)
|
|
|
} else if (is_legal_nickname(nick)) {
|
|
|
log_debug(LD_CONFIG, "Adding nickname %s to %s", nick, description);
|
|
|
strmap_set_lc(target->names, nick, (void*)1);
|
|
|
+ } else if ((countryname = routerset_get_countryname(nick)) != NULL) {
|
|
|
+ log_debug(LD_CONFIG, "Adding country %s to %s", nick,
|
|
|
+ description);
|
|
|
+ smartlist_add(target->country_names, countryname);
|
|
|
+ added_countries = 1;
|
|
|
} else if ((strchr(nick,'.') || strchr(nick, '*')) &&
|
|
|
(p = router_parse_addr_policy_item_from_string(
|
|
|
nick, ADDR_POLICY_REJECT))) {
|
|
|
log_debug(LD_CONFIG, "Adding address %s to %s", nick, description);
|
|
|
smartlist_add(target->policies, p);
|
|
|
} else {
|
|
|
- log_warn(LD_CONFIG, "Nickname '%s' in %s is misformed.", nick,
|
|
|
+ log_warn(LD_CONFIG, "Entry '%s' in %s is misformed.", nick,
|
|
|
description);
|
|
|
r = -1;
|
|
|
tor_free(nick);
|
|
|
SMARTLIST_DEL_CURRENT(list, nick);
|
|
|
}
|
|
|
- });
|
|
|
+ } SMARTLIST_FOREACH_END(nick);
|
|
|
smartlist_add_all(target->list, list);
|
|
|
smartlist_free(list);
|
|
|
+ if (added_countries)
|
|
|
+ routerset_refresh_countries(target);
|
|
|
return r;
|
|
|
}
|
|
|
|
|
@@ -4779,22 +4872,48 @@ routerset_union(routerset_t *target, const routerset_t *source)
|
|
|
tor_free(s);
|
|
|
}
|
|
|
|
|
|
+
|
|
|
+ * no IP ranges or countries. */
|
|
|
+int
|
|
|
+routerset_is_list(const routerset_t *set)
|
|
|
+{
|
|
|
+ return smartlist_len(set->country_names) == 0 &&
|
|
|
+ smartlist_len(set->policies) == 0;
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+static int
|
|
|
+routerset_is_empty(const routerset_t *set)
|
|
|
+{
|
|
|
+ return !set || smartlist_len(set->list) == 0;
|
|
|
+}
|
|
|
+
|
|
|
|
|
|
- * provided fields. */
|
|
|
+ * provided fields. Return higher values for more specific subentries.
|
|
|
+ (If country is -1, then we take the country from addr.) */
|
|
|
static int
|
|
|
routerset_contains(const routerset_t *set, const tor_addr_t *addr,
|
|
|
uint16_t orport,
|
|
|
- const char *nickname, const char *id_digest, int is_named)
|
|
|
+ const char *nickname, const char *id_digest, int is_named,
|
|
|
+ country_t country)
|
|
|
{
|
|
|
if (!set || !set->list) return 0;
|
|
|
(void) is_named;
|
|
|
if (nickname && strmap_get_lc(set->names, nickname))
|
|
|
- return 1;
|
|
|
+ return 4;
|
|
|
if (id_digest && digestmap_get(set->digests, id_digest))
|
|
|
- return 1;
|
|
|
+ return 4;
|
|
|
if (addr && compare_tor_addr_to_addr_policy(addr, orport, set->policies)
|
|
|
== ADDR_POLICY_REJECTED)
|
|
|
- return 1;
|
|
|
+ return 3;
|
|
|
+ if (set->countries) {
|
|
|
+ if (country < 0 && addr)
|
|
|
+ country = geoip_get_country_by_ip(tor_addr_to_ipv4h(addr));
|
|
|
+
|
|
|
+ if (country >= 0 && country < set->n_countries &&
|
|
|
+ bitarray_is_set(set->countries, country))
|
|
|
+ return 2;
|
|
|
+ }
|
|
|
return 0;
|
|
|
}
|
|
|
|
|
@@ -4807,7 +4926,8 @@ routerset_contains_extendinfo(const routerset_t *set, extend_info_t *ei)
|
|
|
ei->port,
|
|
|
ei->nickname,
|
|
|
ei->identity_digest,
|
|
|
- -1);
|
|
|
+ -1,
|
|
|
+ -1 );
|
|
|
}
|
|
|
|
|
|
|
|
@@ -4821,7 +4941,8 @@ routerset_contains_router(const routerset_t *set, routerinfo_t *ri)
|
|
|
ri->or_port,
|
|
|
ri->nickname,
|
|
|
ri->cache_info.identity_digest,
|
|
|
- ri->is_named);
|
|
|
+ ri->is_named,
|
|
|
+ ri->country);
|
|
|
}
|
|
|
|
|
|
|
|
@@ -4835,7 +4956,8 @@ routerset_contains_routerstatus(const routerset_t *set, routerstatus_t *rs)
|
|
|
rs->or_port,
|
|
|
rs->nickname,
|
|
|
rs->identity_digest,
|
|
|
- rs->is_named);
|
|
|
+ rs->is_named,
|
|
|
+ -1);
|
|
|
}
|
|
|
|
|
|
|
|
@@ -4849,24 +4971,56 @@ routerset_get_all_routers(smartlist_t *out, const routerset_t *routerset,
|
|
|
return;
|
|
|
if (!warned_nicknames)
|
|
|
warned_nicknames = smartlist_create();
|
|
|
- SMARTLIST_FOREACH(routerset->list, const char *, name, {
|
|
|
- routerinfo_t *router = router_get_by_nickname(name, 1);
|
|
|
- if (router) {
|
|
|
- if (!running_only || router->is_running)
|
|
|
- smartlist_add(out, router);
|
|
|
- }
|
|
|
- });
|
|
|
- if (smartlist_len(routerset->policies)) {
|
|
|
+ if (routerset_is_list(routerset)) {
|
|
|
+
|
|
|
+
|
|
|
+ * we can do a lookup in O(len(list)). */
|
|
|
+ SMARTLIST_FOREACH(routerset->list, const char *, name, {
|
|
|
+ routerinfo_t *router = router_get_by_nickname(name, 1);
|
|
|
+ if (router) {
|
|
|
+ if (!running_only || router->is_running)
|
|
|
+ smartlist_add(out, router);
|
|
|
+ }
|
|
|
+ });
|
|
|
+ } else {
|
|
|
+
|
|
|
+ * right kind. */
|
|
|
routerlist_t *rl = router_get_routerlist();
|
|
|
- SMARTLIST_FOREACH(rl->routers, routerinfo_t *, router,
|
|
|
- if (compare_addr_to_addr_policy(router->addr, router->or_port,
|
|
|
- routerset->policies) == ADDR_POLICY_REJECT) {
|
|
|
- if (!running_only || router->is_running)
|
|
|
+ SMARTLIST_FOREACH(rl->routers, routerinfo_t *, router, {
|
|
|
+ if (running_only && !router->is_running)
|
|
|
+ continue;
|
|
|
+ if (routerset_contains_router(routerset, router))
|
|
|
smartlist_add(out, router);
|
|
|
- });
|
|
|
+ });
|
|
|
}
|
|
|
}
|
|
|
|
|
|
+
|
|
|
+ * <b>include</b> not excluded in a more specific fashion by
|
|
|
+ * <b>exclude</b>. DOCDOC */
|
|
|
+void
|
|
|
+routersets_get_disjunction(smartlist_t *target,
|
|
|
+ const smartlist_t *source,
|
|
|
+ const routerset_t *include,
|
|
|
+ const routerset_t *exclude, int running_only)
|
|
|
+{
|
|
|
+ SMARTLIST_FOREACH(source, routerinfo_t *, router, {
|
|
|
+ int include_result;
|
|
|
+ if (running_only && !router->is_running)
|
|
|
+ continue;
|
|
|
+ if (!routerset_is_empty(include))
|
|
|
+ include_result = routerset_contains_router(include, router);
|
|
|
+ else
|
|
|
+ include_result = 1;
|
|
|
+
|
|
|
+ if (include_result) {
|
|
|
+ int exclude_result = routerset_contains_router(exclude, router);
|
|
|
+ if (include_result >= exclude_result)
|
|
|
+ smartlist_add(target, router);
|
|
|
+ }
|
|
|
+ });
|
|
|
+}
|
|
|
+
|
|
|
|
|
|
void
|
|
|
routerset_subtract_routers(smartlist_t *lst, const routerset_t *routerset)
|
|
@@ -4892,6 +5046,46 @@ routerset_to_string(const routerset_t *set)
|
|
|
return smartlist_join_strings(set->list, ",", 0, NULL);
|
|
|
}
|
|
|
|
|
|
+
|
|
|
+ * equal routersets. */
|
|
|
+int
|
|
|
+routerset_equal(const routerset_t *old, const routerset_t *new)
|
|
|
+{
|
|
|
+ if (smartlist_len(old->list) != smartlist_len(new->list))
|
|
|
+ return 0;
|
|
|
+
|
|
|
+ SMARTLIST_FOREACH(old->list, const char *, cp1, {
|
|
|
+ const char *cp2 = smartlist_get(new->list, cp1_sl_idx);
|
|
|
+ if (strcmp(cp1, cp2))
|
|
|
+ return 0;
|
|
|
+ });
|
|
|
+
|
|
|
+ return 1;
|
|
|
+
|
|
|
+#if 0
|
|
|
+
|
|
|
+ different order. Checking for exact equality would be heavy going,
|
|
|
+ is it worth it? -RH*/
|
|
|
+
|
|
|
+ * code seems to think. Let's revert to a string-based comparison for
|
|
|
+ * now. -NM*/
|
|
|
+ if (sizeof(old->names) != sizeof(new->names))
|
|
|
+ return 0;
|
|
|
+
|
|
|
+ if (memcmp(old->names,new->names,sizeof(new->names)))
|
|
|
+ return 0;
|
|
|
+ if (sizeof(old->digests) != sizeof(new->digests))
|
|
|
+ return 0;
|
|
|
+ if (memcmp(old->digests,new->digests,sizeof(new->digests)))
|
|
|
+ return 0;
|
|
|
+ if (sizeof(old->countries) != sizeof(new->countries))
|
|
|
+ return 0;
|
|
|
+ if (memcmp(old->countries,new->countries,sizeof(new->countries)))
|
|
|
+ return 0;
|
|
|
+ return 1;
|
|
|
+#endif
|
|
|
+}
|
|
|
+
|
|
|
|
|
|
void
|
|
|
routerset_free(routerset_t *routerset)
|
|
@@ -4901,13 +5095,32 @@ routerset_free(routerset_t *routerset)
|
|
|
SMARTLIST_FOREACH(routerset->policies, addr_policy_t *, p,
|
|
|
addr_policy_free(p));
|
|
|
smartlist_free(routerset->policies);
|
|
|
+ SMARTLIST_FOREACH(routerset->country_names, char *, cp, tor_free(cp));
|
|
|
+ smartlist_free(routerset->country_names);
|
|
|
|
|
|
strmap_free(routerset->names, NULL);
|
|
|
digestmap_free(routerset->digests, NULL);
|
|
|
-
|
|
|
+ if (routerset->countries)
|
|
|
+ bitarray_free(routerset->countries);
|
|
|
tor_free(routerset);
|
|
|
}
|
|
|
|
|
|
+
|
|
|
+void
|
|
|
+routerinfo_set_country(routerinfo_t *ri)
|
|
|
+{
|
|
|
+ ri->country = geoip_get_country_by_ip(ri->addr);
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+void
|
|
|
+routerlist_refresh_countries(void)
|
|
|
+{
|
|
|
+ routerlist_t *rl = router_get_routerlist();
|
|
|
+ SMARTLIST_FOREACH(rl->routers, routerinfo_t *, ri,
|
|
|
+ routerinfo_set_country(ri));
|
|
|
+}
|
|
|
+
|
|
|
|
|
|
* add pointers to those routers' routerstatus_t to <b>responsible_dirs</b>.
|
|
|
* Return -1 if we're returning an empty smartlist, else return 0.
|