tor

The Tor anonymity network
git clone https://git.dasho.dev/tor.git
Log | Files | Refs | README | LICENSE

commit 33c99cf56539a077723940f3ef4f1d54ddd5c5bc
parent 7e406ec40f5fef21c07bea9db51615e11a749ee8
Author: David Goulet <dgoulet@torproject.org>
Date:   Fri, 14 Sep 2018 12:04:01 -0400

hs-v2: Demote log warning to info when we don't have a consensus

Fixes #27040

Signed-off-by: David Goulet <dgoulet@torproject.org>

Diffstat:
Achanges/ticket27040 | 5+++++
Msrc/feature/rend/rendcommon.c | 2+-
2 files changed, 6 insertions(+), 1 deletion(-)

diff --git a/changes/ticket27040 b/changes/ticket27040 @@ -0,0 +1,5 @@ + o Minor bugfixes (hidden service v2): + - Demote a log warning to info in case we do not have a consensus when a + .onion request comes in. This can happen while bootstrapping for + instance. The request will follow through after so we really don't need + to warn the user loudly. Fixes bug 27040; bugfix on 0.2.8.2-alpha. diff --git a/src/feature/rend/rendcommon.c b/src/feature/rend/rendcommon.c @@ -843,7 +843,7 @@ hid_serv_get_responsible_directories(smartlist_t *responsible_dirs, int start, found, n_added = 0, i; networkstatus_t *c = networkstatus_get_latest_consensus(); if (!c || !smartlist_len(c->routerstatus_list)) { - log_warn(LD_REND, "We don't have a consensus, so we can't perform v2 " + log_info(LD_REND, "We don't have a consensus, so we can't perform v2 " "rendezvous operations."); return -1; }