[or-cvs] r12455: bump to 0.2.0.10-alpha (in tor/trunk: . contrib src/or src/win32)

arma at seul.org arma at seul.org
Sat Nov 10 07:26:56 UTC 2007


Author: arma
Date: 2007-11-10 02:26:56 -0500 (Sat, 10 Nov 2007)
New Revision: 12455

Modified:
   tor/trunk/ChangeLog
   tor/trunk/configure.in
   tor/trunk/contrib/tor-mingw.nsi.in
   tor/trunk/src/or/rephist.c
   tor/trunk/src/win32/orconfig.h
Log:
bump to 0.2.0.10-alpha


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2007-11-10 07:03:05 UTC (rev 12454)
+++ tor/trunk/ChangeLog	2007-11-10 07:26:56 UTC (rev 12455)
@@ -17,6 +17,8 @@
       to advertise as Guards: they must be in the top 7/8 in terms of
       how long we have known about them, and above the median of those
       nodes in terms of weighted fractional uptime.
+    - Make "not enough dir info yet" warnings describe *why* Tor feels
+      it doesn't have enough directory info yet.
 
   o Major bugfixes:
     - Stop servers from crashing if they set a Family option (or
@@ -57,11 +59,11 @@
 
   o Minor features:
     - Clients now hold circuitless TLS connections open for 1.5 times
-      MaxCircuitDirtiness, since it is likely that they'll need to build
-      a circuit over them within that timeframe. Previously, they held
-      them open only for KeepalivePeriod.
-    - Use "If-Modified-Since" to avoid retrieving consensus networkstatuses
-      that we already have.
+      MaxCircuitDirtiness (15 minutes), since it is likely that they'll
+      rebuild a new circuit over them within that timeframe. Previously,
+      they held them open only for KeepalivePeriod (5 minutes).
+    - Use "If-Modified-Since" to avoid retrieving consensus
+      networkstatuses that we already have.
     - When we have no consensus, check FallbackNetworkstatusFile (defaults
       to $PREFIX/share/tor/fallback-consensus) for a consensus.  This way
       we start knowing some directory caches.
@@ -75,8 +77,6 @@
     - Authorities send back an X-Descriptor-Not-New header in response to
       an accepted-but-discarded descriptor upload.  Partially implements
       fix for bug 535.
-    - Make "not enough dir info yet" warnings describe *why* Tor feels
-      it doesn't have enough directory info yet.
     - Make the log message for "tls error. breaking." more useful.
     - Better log messages about certificate downloads, to attempt to
       track down the second incarnation of bug 546.
@@ -100,18 +100,18 @@
 
   o Minor bugfixes:
     - Refuse to start if both ORPort and UseBridges are set. Bugfix
-      on 0.2.0.x.
+      on 0.2.0.x, suggested by Matt Edman.
     - Don't stop fetching descriptors when FetchUselessDescriptors is
       set, even if we stop asking for circuits. Bugfix on 0.1.2.x;
       reported by tup and ioerror.
     - Better log message on vote from unknown authority.
-    - Don't log "Launching 0 request for 0 router".
+    - Don't log "Launching 0 request for 0 router" message.
 
   o Minor bugfixes (memory leaks):
     - Stop leaking memory every time we parse a v3 certificate. Bugfix
       on 0.2.0.1-alpha.
     - Stop leaking memory every time we load a v3 certificate. Bugfix
-      on 0.2.0.1-alpha.  Fixes Bug 536
+      on 0.2.0.1-alpha. Fixes Bug 536.
     - Stop leaking a cached networkstatus on exit.  Bugfix on
       0.2.0.3-alpha.
     - Stop leaking voter information every time we free a consensus.

Modified: tor/trunk/configure.in
===================================================================
--- tor/trunk/configure.in	2007-11-10 07:03:05 UTC (rev 12454)
+++ tor/trunk/configure.in	2007-11-10 07:26:56 UTC (rev 12455)
@@ -4,7 +4,7 @@
 dnl See LICENSE for licensing information
 
 AC_INIT
-AM_INIT_AUTOMAKE(tor, 0.2.0.9-alpha-dev)
+AM_INIT_AUTOMAKE(tor, 0.2.0.10-alpha)
 AM_CONFIG_HEADER(orconfig.h)
 
 AC_CANONICAL_HOST

Modified: tor/trunk/contrib/tor-mingw.nsi.in
===================================================================
--- tor/trunk/contrib/tor-mingw.nsi.in	2007-11-10 07:03:05 UTC (rev 12454)
+++ tor/trunk/contrib/tor-mingw.nsi.in	2007-11-10 07:26:56 UTC (rev 12455)
@@ -5,7 +5,7 @@
 ;
 !include "MUI.nsh"
 
-!define VERSION "0.2.0.9-alpha-dev"
+!define VERSION "0.2.0.10-alpha"
 !define INSTALLER "tor-${VERSION}-win32.exe"
 !define WEBSITE "https://www.torproject.org/"
 

Modified: tor/trunk/src/or/rephist.c
===================================================================
--- tor/trunk/src/or/rephist.c	2007-11-10 07:03:05 UTC (rev 12454)
+++ tor/trunk/src/or/rephist.c	2007-11-10 07:26:56 UTC (rev 12455)
@@ -456,7 +456,7 @@
 }
 
 /** Return true if we've been measuring MTBFs for long enough to
- * prounounce on Stability. */
+ * pronounce on Stability. */
 int
 rep_hist_have_measured_enough_stability(void)
 {

Modified: tor/trunk/src/win32/orconfig.h
===================================================================
--- tor/trunk/src/win32/orconfig.h	2007-11-10 07:03:05 UTC (rev 12454)
+++ tor/trunk/src/win32/orconfig.h	2007-11-10 07:26:56 UTC (rev 12455)
@@ -227,6 +227,6 @@
 #define USING_TWOS_COMPLEMENT
 
 /* Version number of package */
-#define VERSION "0.2.0.9-alpha-dev"
+#define VERSION "0.2.0.10-alpha"
 
 



More information about the tor-commits mailing list