From 8e8d599ade6e18cd77f1a12e6ddb4a689e95a3fe Mon Sep 17 00:00:00 2001 From: cyBerta Date: Sat, 4 Mar 2023 02:21:45 +0100 Subject: [PATCH] RiseupVPN: re-run fetches from the API using Tor+Snowflake, if the API was considered to be blocked --- internal/experiment/riseupvpn/riseupvpn.go | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/internal/experiment/riseupvpn/riseupvpn.go b/internal/experiment/riseupvpn/riseupvpn.go index cea5e3a75e..202cb34d50 100644 --- a/internal/experiment/riseupvpn/riseupvpn.go +++ b/internal/experiment/riseupvpn/riseupvpn.go @@ -241,10 +241,20 @@ func (m Measurer) Run(ctx context.Context, args *model.ExperimentArgs) error { NoTLSVerify: !testkeys.CACertStatus, }}, } + for entry := range multi.CollectOverall(ctx, inputs, 1, 50, "riseupvpn", callbacks) { testkeys.UpdateProviderAPITestKeys(entry) } + if testkeys.APIStatus == "blocked" { + for _, input := range inputs { + input.Config.Tunnel = "torsf" + } + for entry := range multi.CollectOverall(ctx, inputs, 1, 50, "riseupvpn", callbacks) { + testkeys.UpdateProviderAPITestKeys(entry) + } + } + // test gateways now testkeys.TransportStatus = map[string]string{} gateways := parseGateways(testkeys)