hs-v3: Log client auth load activities client side

Signed-off-by: David Goulet <dgoulet@torproject.org>
This commit is contained in:
Suphanat Chunhapanya 2018-08-19 19:47:46 +07:00 committed by David Goulet
parent 7ace28c952
commit 5b2871d2f2

View File

@ -1567,8 +1567,14 @@ hs_config_client_authorization(const or_options_t *options,
hs_client_service_authorization_t *auth = NULL;
ed25519_public_key_t identity_pk;
log_info(LD_REND, "Loading a client authorization key file %s...",
filename);
if (!auth_key_filename_is_valid(filename)) {
log_warn(LD_REND, "The filename is invalid.");
continue;
}
if (auth_key_filename_is_valid(filename)) {
/* Create a full path for a file. */
client_key_file_path = hs_path_from_filename(key_dir, filename);
client_key_str = read_file_to_str(client_key_file_path, 0, NULL);
@ -1577,6 +1583,7 @@ hs_config_client_authorization(const or_options_t *options,
/* If we cannot read the file, continue with the next file. */
if (!client_key_str) {
log_warn(LD_REND, "The file cannot be read.");
continue;
}
@ -1590,6 +1597,7 @@ hs_config_client_authorization(const or_options_t *options,
if (hs_parse_address(auth->onion_address, &identity_pk,
NULL, NULL) < 0) {
client_service_authorization_free(auth);
log_warn(LD_REND, "The onion address is invalid.");
continue;
}
@ -1602,7 +1610,8 @@ hs_config_client_authorization(const or_options_t *options,
}
digest256map_set(auths, identity_pk.pubkey, auth);
}
log_info(LD_REND, "Loaded a client authorization key file %s.",
filename);
}
} SMARTLIST_FOREACH_END(filename);