mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-30 23:53:32 +01:00
refetch bridge descriptors in a timely fashion
When we configure a new bridge via the controller, don't wait up to ten seconds before trying to fetch its descriptor. This wasn't so bad when you listed your bridges in torrc, but it's dreadful if you configure your bridges via vidalia.
This commit is contained in:
parent
bc89ef0ca8
commit
07c5026efa
4
changes/bug3198
Normal file
4
changes/bug3198
Normal file
@ -0,0 +1,4 @@
|
||||
o Major bugfixes:
|
||||
- When we configure a new bridge via the controller, don't wait up
|
||||
to ten seconds before trying to fetch its descriptor. Bugfix on
|
||||
0.2.0.3-alpha; fixes bug 3198 (suggested by 2355).
|
@ -924,8 +924,6 @@ run_scheduled_events(time_t now)
|
||||
if (time_to_try_getting_descriptors < now) {
|
||||
update_router_descriptor_downloads(now);
|
||||
update_extrainfo_downloads(now);
|
||||
if (options->UseBridges)
|
||||
fetch_bridge_descriptors(options, now);
|
||||
if (router_have_minimum_dir_info())
|
||||
time_to_try_getting_descriptors = now + LAZY_DESCRIPTOR_RETRY_INTERVAL;
|
||||
else
|
||||
@ -938,6 +936,9 @@ run_scheduled_events(time_t now)
|
||||
now + DESCRIPTOR_FAILURE_RESET_INTERVAL;
|
||||
}
|
||||
|
||||
if (options->UseBridges)
|
||||
fetch_bridge_descriptors(options, now);
|
||||
|
||||
/** 1b. Every MAX_SSL_KEY_LIFETIME seconds, we change our TLS context. */
|
||||
if (!last_rotated_x509_certificate)
|
||||
last_rotated_x509_certificate = now;
|
||||
|
Loading…
Reference in New Issue
Block a user