[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r9015: cleanups, bump to 0.1.2.4-alpha (in tor/trunk: . contrib doc src/common src/or src/win32)
- To: or-cvs@xxxxxxxxxxxxx
- Subject: [or-cvs] r9015: cleanups, bump to 0.1.2.4-alpha (in tor/trunk: . contrib doc src/common src/or src/win32)
- From: arma@xxxxxxxx
- Date: Sat, 2 Dec 2006 17:47:53 -0500 (EST)
- Delivered-to: archiver@seul.org
- Delivered-to: or-cvs-outgoing@seul.org
- Delivered-to: or-cvs@seul.org
- Delivery-date: Sat, 02 Dec 2006 17:48:05 -0500
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-cvs@xxxxxxxxxxxxx
Author: arma
Date: 2006-12-02 17:47:46 -0500 (Sat, 02 Dec 2006)
New Revision: 9015
Modified:
tor/trunk/ChangeLog
tor/trunk/configure.in
tor/trunk/contrib/tor-mingw.nsi.in
tor/trunk/doc/control-spec.txt
tor/trunk/src/common/compat.c
tor/trunk/src/or/connection.c
tor/trunk/src/or/connection_edge.c
tor/trunk/src/or/main.c
tor/trunk/src/or/routerlist.c
tor/trunk/src/win32/orconfig.h
Log:
cleanups, bump to 0.1.2.4-alpha
Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog 2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/ChangeLog 2006-12-02 22:47:46 UTC (rev 9015)
@@ -1,28 +1,31 @@
-Changes in version 0.1.2.4-alpha - 2006-11-??
- o Major features
- - Add support for using natd; this allows FreeBSDs earlier than 5.1.2 to
- have ipfw send connections through Tor without using SOCKS. (Patch from
- Zajcev Evgeny with tweaks from tup.)
+Changes in version 0.1.2.4-alpha - 2006-12-02
+ o Major features:
+ - Add support for using natd; this allows FreeBSDs earlier than
+ 5.1.2 to have ipfw send connections through Tor without using
+ SOCKS. (Patch from Zajcev Evgeny with tweaks from tup.)
- o Minor features
- - Add breakdown of public key operations to dumped statistics.
- - Make cross.sh cross-compilation script work even when autogen.sh hasn't
- been run. (Patch from Michael Mohr.)
+ o Minor features:
+ - Make all connections to addresses of the form ".noconnect"
+ immediately get closed. This lets application/controller combos
+ successfully test whether they're talking to the same Tor by
+ watching for STREAM events.
+ - Make cross.sh cross-compilation script work even when autogen.sh
+ hasn't been run. (Patch from Michael Mohr.)
+ - Statistics dumped by -USR2 now include a breakdown of public key
+ operations, for profiling.
- o Minor features, controller
- - Make all connections to addresses of the form .noconnect immediately
- get closed. This is more useful than you'd think, since it lets
- application/controller combos successfully tell when they're talking to
- the same Tor by watching for STREAM events.
-
- o Major bugfixes
+ o Major bugfixes:
+ - Fix a major leak when directory authorities parse their
+ approved-routers list, a minor memory leak when we fail to pick
+ an exit node, and a few rare leaks on errors.
- Handle TransPort connections even when the server sends data before
- the client sends data. Previously, the connection would just hang
+ the client sends data. Previously, the connection would just hang
until the client sent data. (Patch from tup based on patch from
Zajcev Evgeny.)
- - Fix a memory leak when we fail to pick an exit node.
+ - Avoid assert failure when our cached-routers file is empty on
+ startup.
- o Minor bugfixes
+ o Minor bugfixes:
- Don't log spurious warnings when we see a circuit close reason we
don't recognize; it's probably just from a newer version of Tor.
- Have directory authorities allow larger amounts of drift in uptime
@@ -31,10 +34,12 @@
per day.
- Start linking to the Tor specification and Tor reference manual
correctly in the Windows installer.
- - Avoid assert failure when our cached-routers file is empty on
- startup.
- - Don't corrupt last_guesssed_ip in router_new_address_suggestion() when
- we're running as a client.
+ - Add Vidalia to the OS X uninstaller script, so when we uninstall
+ Tor/Privoxy we also uninstall Vidalia.
+ - Resume building on Irix64, and fix a lot of warnings from its
+ MIPSpro C compiler.
+ - Don't corrupt last_guessed_ip in router_new_address_suggestion()
+ when we're running as a client.
Changes in version 0.1.2.3-alpha - 2006-10-29
Modified: tor/trunk/configure.in
===================================================================
--- tor/trunk/configure.in 2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/configure.in 2006-12-02 22:47:46 UTC (rev 9015)
@@ -4,7 +4,7 @@
dnl See LICENSE for licensing information
AC_INIT
-AM_INIT_AUTOMAKE(tor, 0.1.2.3-alpha-dev)
+AM_INIT_AUTOMAKE(tor, 0.1.2.4-alpha)
AM_CONFIG_HEADER(orconfig.h)
AC_CANONICAL_HOST
Modified: tor/trunk/contrib/tor-mingw.nsi.in
===================================================================
--- tor/trunk/contrib/tor-mingw.nsi.in 2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/contrib/tor-mingw.nsi.in 2006-12-02 22:47:46 UTC (rev 9015)
@@ -5,7 +5,7 @@
;
!include "MUI.nsh"
-!define VERSION "0.1.2.3-alpha-dev"
+!define VERSION "0.1.2.4-alpha"
!define INSTALLER "tor-${VERSION}-win32.exe"
!define WEBSITE "http://tor.eff.org/"
Modified: tor/trunk/doc/control-spec.txt
===================================================================
--- tor/trunk/doc/control-spec.txt 2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/doc/control-spec.txt 2006-12-02 22:47:46 UTC (rev 9015)
@@ -460,6 +460,9 @@
A space-separated list of all the events supported by this version of
Tor's USEFEATURE.
+ "next-circuit/IP:port"
+ XXX todo.
+
"dir/status/authority"
"dir/status/fp/<F>"
"dir/status/fp/<F1>+<F2>+<F3>"
Modified: tor/trunk/src/common/compat.c
===================================================================
--- tor/trunk/src/common/compat.c 2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/src/common/compat.c 2006-12-02 22:47:46 UTC (rev 9015)
@@ -142,8 +142,8 @@
size += (size%page_size) ? page_size-(size%page_size) : 0;
if (!size) {
- /* zero-length file. if we call mmap on it, we'll end up setting
- * data to NULL below, and bad things will happen. So just fail. */
+ /* Zero-length file. If we call mmap on it, it will succeed but
+ * return NULL, and bad things will happen. So just fail. */
log_notice(LD_FS,"File \"%s\" is empty. Ignoring.",filename);
return NULL;
}
Modified: tor/trunk/src/or/connection.c
===================================================================
--- tor/trunk/src/or/connection.c 2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/src/or/connection.c 2006-12-02 22:47:46 UTC (rev 9015)
@@ -1166,7 +1166,7 @@
}
}
-/** If we have exhaused our global read bucket, or the read bucket for conn,
+/** If we have exhausted our global read bucket, or the read bucket for conn,
* stop reading. */
static void
connection_consider_empty_buckets(connection_t *conn)
Modified: tor/trunk/src/or/connection_edge.c
===================================================================
--- tor/trunk/src/or/connection_edge.c 2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/src/or/connection_edge.c 2006-12-02 22:47:46 UTC (rev 9015)
@@ -1396,7 +1396,7 @@
* If the handshake is complete, send it to
* connection_ap_handshake_rewrite_and_attach().
*
- * Return -1 if an unexpected error with conn ocurrs (and mark it for close),
+ * Return -1 if an unexpected error with conn occurs (and mark it for close),
* else return 0.
*/
static int
Modified: tor/trunk/src/or/main.c
===================================================================
--- tor/trunk/src/or/main.c 2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/src/or/main.c 2006-12-02 22:47:46 UTC (rev 9015)
@@ -319,7 +319,7 @@
tor_assert(conn);
tor_assert(conn->read_event);
- log_debug(LD_NET,"connection_stop_reading() called.");
+ log_debug(LD_NET,"entering.");
if (event_del(conn->read_event))
log_warn(LD_NET, "Error from libevent setting read event state for %d "
"to unwatched: %s",
Modified: tor/trunk/src/or/routerlist.c
===================================================================
--- tor/trunk/src/or/routerlist.c 2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/src/or/routerlist.c 2006-12-02 22:47:46 UTC (rev 9015)
@@ -4108,7 +4108,7 @@
return 0;
/* Did uptime fail to increase by approximately the amount we would think,
- * give or take 4 hours? */
+ * give or take some slop? */
r1pub = r1->cache_info.published_on;
r2pub = r2->cache_info.published_on;
time_difference = abs(r2->uptime - (r1->uptime + (r2pub - r1pub)));
Modified: tor/trunk/src/win32/orconfig.h
===================================================================
--- tor/trunk/src/win32/orconfig.h 2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/src/win32/orconfig.h 2006-12-02 22:47:46 UTC (rev 9015)
@@ -227,5 +227,5 @@
#define USING_TWOS_COMPLEMENT
/* Version number of package */
-#define VERSION "0.1.2.3-alpha-dev"
+#define VERSION "0.1.2.4-alpha"