[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [tor/master] Light changelog edits



commit 0ba05092ad16c37ef12db37816b06f160e4cfcb8
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date:   Wed Oct 17 09:40:20 2018 -0400

    Light changelog edits
---
 ChangeLog | 46 +++++++++++++++++++++++-----------------------
 1 file changed, 23 insertions(+), 23 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index 6f16173db..ca9729c00 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -33,20 +33,20 @@ Changes in version 0.3.5.3-alpha - 2018-10-17
   o Minor features (onion services):
     - Version 3 onion services can now use the per-service
       HiddenServiceExportCircuitID option to differentiate client
-      circuits by using the HAProxy proxy protocol which assigns IP
-      addresses to inbound client circuits. Closes ticket 4700. Patch by
-      Mahrud Sayrafi.
+      circuits. It communicates with the service by using the HAProxy
+      protocol to assign virtual IP addresses to inbound client
+      circuits. Closes ticket 4700. Patch by Mahrud Sayrafi.
 
   o Minor bugfixes (code safety):
     - Rewrite our assertion macros so that they no longer suppress the
-      compiler's -Wparentheses warnings on their inputs. Fixes bug
-      27709; bugfix on 0.0.6.
+      compiler's -Wparentheses warnings. Fixes bug 27709; bugfix
+      on 0.0.6.
 
   o Minor bugfixes (compilation):
     - Compile the ed25519-donna code with a correct declaration of
-      crypto_strongest_rand(). Previously, we build it with one type,
-      but link it against another in the unit tests, which caused
-      compilation failures with LTO enabled, and which could have caused
+      crypto_strongest_rand(). Previously, we built it with one type,
+      but linked it against another in the unit tests, which caused
+      compilation failures with LTO enabled. This could have caused
       other undefined behavior in the tests. Fixes bug 27728; bugfix
       on 0.3.5.1-alpha.
 
@@ -64,7 +64,7 @@ Changes in version 0.3.5.3-alpha - 2018-10-17
     - When a user requests a group-readable DataDirectory, give it to
       them. Previously, when the DataDirectory and the CacheDirectory
       were the same, the default setting (0) for
-      CacheDirectoryGroupReadable would always override the setting for
+      CacheDirectoryGroupReadable would override the setting for
       DataDirectoryGroupReadable. Fixes bug 26913; bugfix
       on 0.3.3.1-alpha.
 
@@ -73,7 +73,7 @@ Changes in version 0.3.5.3-alpha - 2018-10-17
       bug 27893; bugfix on 0.3.2.1-alpha.
 
   o Minor bugfixes (networking):
-    - In retry_listeners_ports() make sure that we're removing a member
+    - In retry_listeners_ports(), make sure that we're removing a member
       of old_conns smartlist at most once. Fixes bug 27808; bugfix
       on 0.3.5.1-alpha.
     - Refrain from attempting socket rebinding when old and new
@@ -81,17 +81,17 @@ Changes in version 0.3.5.3-alpha - 2018-10-17
       bugfix on 0.3.5.1-alpha.
 
   o Minor bugfixes (onion service v3):
-    - Client side would dump a stack trace if tor doesn't have the
-      descriptor for the intro point it is trying to connect to. Fixes
-      bug 27774; bugfix on 0.3.2.1-alpha.
-    - Don't warn so loudly when tor is unable to decode a descriptor.
+    - Stop dumping a stack trace when trying to connect to an intro
+      point without having a descriptor for it. Fixes bug 27774; bugfix
+      on 0.3.2.1-alpha.
+    - Don't warn so loudly when Tor is unable to decode a descriptor.
       This can now happen as a normal use case if a client gets a
       descriptor with client authorization but the client is not
       authorized. Fixes bug 27550; bugfix on 0.3.5.1-alpha.
-    - When selecting a v3 rendezvous point, not only look at the
-      protover but also if the curve25519 onion key is present. That way
-      we avoid picking a node that supports the v3 rendezvous but for
-      which we don't have the descriptor yet for the key. Fixes bug
+    - When selecting a v3 rendezvous point, don't only look at the
+      protover, but also check whether the curve25519 onion key is
+      present. This way we avoid picking a relay that supports the v3
+      rendezvous but for which we don't have the descriptor. Fixes bug
       27797; bugfix on 0.3.2.1-alpha.
 
   o Minor bugfixes (protover):
@@ -104,8 +104,8 @@ Changes in version 0.3.5.3-alpha - 2018-10-17
       creating the introduction point and testing it. This helps make
       test work on very slow system like ARM or Travis. Fixes bug 27810;
       bugfix on 0.3.2.1-alpha.
-    - In test_rebind.py check if Python version is in supported ranges.
-      Fixes bug 27675; bugfix on 0.3.5.1-alpha.
+    - In test_rebind.py, check if the Python version is in supported
+      ranges. Fixes bug 27675; bugfix on 0.3.5.1-alpha.
 
   o Code simplification and refactoring:
     - Divide more large Tor source files -- especially ones that span
@@ -123,10 +123,10 @@ Changes in version 0.3.5.3-alpha - 2018-10-17
       help with future modularization. Closes ticket 27864.
 
   o Documentation:
-    - In tor-resolve(1) manpage, fix the reference to socks-
+    - In the tor-resolve(1) manpage, fix the reference to socks-
       extensions.txt by adding web URL. Resolves ticket 27853.
-    - Mention that we require Python to be 2.7 or newer for integration
-      tests that we ship with Tor. Resolves ticket 27677.
+    - Mention that we require Python to be 2.7 or newer for some
+      integration tests that we ship with Tor. Resolves ticket 27677.
 
 
 Changes in version 0.3.5.2-alpha - 2018-09-21

_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits