[or-cvs] r8860: clean changelog, bump to 0.1.2.3-alpha (in tor/trunk: . contrib src/win32)

arma at seul.org arma at seul.org
Mon Oct 30 02:55:18 UTC 2006


Author: arma
Date: 2006-10-29 21:55:17 -0500 (Sun, 29 Oct 2006)
New Revision: 8860

Modified:
   tor/trunk/ChangeLog
   tor/trunk/configure.in
   tor/trunk/contrib/tor.nsi.in
   tor/trunk/src/win32/orconfig.h
Log:
clean changelog, bump to 0.1.2.3-alpha


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2006-10-30 02:54:44 UTC (rev 8859)
+++ tor/trunk/ChangeLog	2006-10-30 02:55:17 UTC (rev 8860)
@@ -1,13 +1,13 @@
-Changes in version 0.1.2.3-alpha - 2006-10-??
+Changes in version 0.1.2.3-alpha - 2006-10-29
   o Minor features:
-    - If most authorities set a BadExit flag for a server, do not consider
-      it as a general-purpose exit. Only consider authorities that
-      advertise themselves as listing bad exits.
-    - Start making it possible for servers to publish less often: never
+    - Prepare for servers to publish descriptors less often: never
       discard a descriptor simply for being too old until either it is
       recommended by no authorities, or until we get a better one for
       the same router. Make caches consider retaining old recommended
       routers for even longer.
+    - If most authorities set a BadExit flag for a server, clients
+      don't think of it as a general-purpose exit. Clients only consider
+      authorities that advertise themselves as listing bad exits.
     - Directory servers now provide 'Pragma: no-cache' and 'Expires'
       headers for content, so that we can work better in the presence of
       caching HTTP proxies.
@@ -17,38 +17,41 @@
   o Minor features, controller:
     - Add a REASON field to CIRC events; for backward compatibility, this
       field is sent only to controllers that have enabled the extended
-      event format.  Also, add additional reason codes to explain why a
-      given circuit has been destroyed or truncated. (Patches from Mike
-      Perry)
+      event format.  Also, add additional reason codes to explain why
+      a given circuit has been destroyed or truncated. (Patches from
+      Mike Perry)
     - Add a REMOTE_REASON field to extended CIRC events to tell the
       controller about why a remote OR told us to close a circuit.
+    - Stream events also now have REASON and REMOTE_REASON fields,
+      working much like those for circuit events.
     - There's now a GETINFO ns/... field so that controllers can ask Tor
-      about the current state of a router.
-    - Stream events also have REASON and REMOTE_REASON fields, working
-      much like those for circuit events.
-    - NS events to inform a controller when our opinion of a router's
-      status has changed.
+      about the current status of a router.
+    - A new event type "NS" to inform a controller when our opinion of
+      a router's status has changed.
     - Add a GETINFO events/names and GETINFO features/names so controllers
       can tell which events and features are supported.
     - A new CLEARDNSCACHE signal to allow controllers to clear the
       client-side DNS cache without expiring circuits.
-    - When the controller does a "GETINFO network-status", tell it
-      about even those routers whose descriptors are very old, and use
-      long nicknames where appropriate.
 
   o Security bugfixes:
     - When the user sends a NEWNYM signal, clear the client-side DNS
       cache too. Otherwise we continue to act on previous information.
 
   o Minor bugfixes:
+    - Avoid sending junk to controllers or segfaulting when a controller
+      uses EVENT_NEW_DESC with verbose nicknames.
+    - Stop triggering asserts if the controller tries to extend hidden
+      service circuits (reported by mwenge).
+    - Avoid infinite loop on unexpected controller input.
+    - When the controller does a "GETINFO network-status", tell it
+      about even those routers whose descriptors are very old, and use
+      long nicknames where appropriate.
     - Change NT service functions to be loaded on demand.  This lets us
       build with MinGW without breaking Tor for Windows 98 users.
     - Do DirPort reachability tests less often, since a single test
       chews through many circuits before giving up.
     - In the hidden service example in torrc.sample, stop recommending
       esoteric and discouraged hidden service options.
-    - Avoid sending junk to controllers or segfaulting when a controller
-      uses EVENT_NEW_DESC with verbose nicknames.
     - When stopping an NT service, wait up to 10 sec for it to actually
       stop.  (Patch from Matt Edman; resolves bug 295.)
     - Fix handling of verbose nicknames with ORCONN controller events:
@@ -56,8 +59,6 @@
       not requested.
     - When reporting verbose nicknames in entry_guards_getinfo(), avoid
       printing a duplicate "$" in the keys we send (reported by mwenge).
-    - Stop triggering asserts if the controller tries to extend hidden
-      service circuits (reported by mwenge).
     - Correctly set maximum connection limit on Cygwin. (This time
       for sure!)
     - Try to detect Windows correctly when cross-compiling.
@@ -70,20 +71,17 @@
       unhandleable requests will now get an error rather than timing out.
     - Resolve two memory leaks when rebuilding the on-disk router cache
       (reported by fookoowa).
-    - Avoid infinite loop on unexpected controller input.
     - Clean up minor code warnings suggested by the MIPSpro C compiler,
       and reported by some Centos users.
     - Controller signals now work on non-Unix platforms that don't define
       SIGUSR1 and SIGUSR2 the way we expect.
-
+    - Patch from Michael Mohr to contrib/cross.sh, so it checks more
+      values before failing, and always enables eventdns.
     - Libevent-1.2 exports, but does not define in its headers, strlcpy.
       Try to fix this in configure.in by checking for most functions
       before we check for libevent.
 
-    - Patch from Michael Mohr to cross.sh, so it checks more values
-      before failing, and always enables eventdns.
 
-
 Changes in version 0.1.2.2-alpha - 2006-10-07
   o Major features:
     - Make our async eventdns library on-by-default for Tor servers,

Modified: tor/trunk/configure.in
===================================================================
--- tor/trunk/configure.in	2006-10-30 02:54:44 UTC (rev 8859)
+++ tor/trunk/configure.in	2006-10-30 02:55:17 UTC (rev 8860)
@@ -4,7 +4,7 @@
 dnl See LICENSE for licensing information
 
 AC_INIT
-AM_INIT_AUTOMAKE(tor, 0.1.2.2-alpha-dev)
+AM_INIT_AUTOMAKE(tor, 0.1.2.3-alpha)
 AM_CONFIG_HEADER(orconfig.h)
 
 AC_CANONICAL_HOST

Modified: tor/trunk/contrib/tor.nsi.in
===================================================================
--- tor/trunk/contrib/tor.nsi.in	2006-10-30 02:54:44 UTC (rev 8859)
+++ tor/trunk/contrib/tor.nsi.in	2006-10-30 02:55:17 UTC (rev 8860)
@@ -31,7 +31,7 @@
 
 !include "MUI.nsh"
 
-!define VERSION "0.1.2.2-alpha-dev"
+!define VERSION "0.1.2.3-alpha"
 !define INSTALLER "tor-${VERSION}-win32.exe"
 !define WEBSITE "http://tor.eff.org/"
 

Modified: tor/trunk/src/win32/orconfig.h
===================================================================
--- tor/trunk/src/win32/orconfig.h	2006-10-30 02:54:44 UTC (rev 8859)
+++ tor/trunk/src/win32/orconfig.h	2006-10-30 02:55:17 UTC (rev 8860)
@@ -224,5 +224,5 @@
 #define USING_TWOS_COMPLEMENT
 
 /* Version number of package */
-#define VERSION "0.1.2.2-alpha-dev"
+#define VERSION "0.1.2.3-alpha"
 



More information about the tor-commits mailing list