[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r9015: cleanups, bump to 0.1.2.4-alpha (in tor/trunk: . contrib doc src/common src/or src/win32)



Author: arma
Date: 2006-12-02 17:47:46 -0500 (Sat, 02 Dec 2006)
New Revision: 9015

Modified:
   tor/trunk/ChangeLog
   tor/trunk/configure.in
   tor/trunk/contrib/tor-mingw.nsi.in
   tor/trunk/doc/control-spec.txt
   tor/trunk/src/common/compat.c
   tor/trunk/src/or/connection.c
   tor/trunk/src/or/connection_edge.c
   tor/trunk/src/or/main.c
   tor/trunk/src/or/routerlist.c
   tor/trunk/src/win32/orconfig.h
Log:
cleanups, bump to 0.1.2.4-alpha


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/ChangeLog	2006-12-02 22:47:46 UTC (rev 9015)
@@ -1,28 +1,31 @@
-Changes in version 0.1.2.4-alpha - 2006-11-??
-  o Major features
-    - Add support for using natd; this allows FreeBSDs earlier than 5.1.2 to
-      have ipfw send connections through Tor without using SOCKS. (Patch from
-      Zajcev Evgeny with tweaks from tup.)
+Changes in version 0.1.2.4-alpha - 2006-12-02
+  o Major features:
+    - Add support for using natd; this allows FreeBSDs earlier than
+      5.1.2 to have ipfw send connections through Tor without using
+      SOCKS. (Patch from Zajcev Evgeny with tweaks from tup.)
 
-  o Minor features
-    - Add breakdown of public key operations to dumped statistics.
-    - Make cross.sh cross-compilation script work even when autogen.sh hasn't
-      been run. (Patch from Michael Mohr.)
+  o Minor features:
+    - Make all connections to addresses of the form ".noconnect"
+      immediately get closed. This lets application/controller combos
+      successfully test whether they're talking to the same Tor by
+      watching for STREAM events.
+    - Make cross.sh cross-compilation script work even when autogen.sh
+      hasn't been run. (Patch from Michael Mohr.)
+    - Statistics dumped by -USR2 now include a breakdown of public key
+      operations, for profiling.
 
-  o Minor features, controller
-    - Make all connections to addresses of the form .noconnect immediately
-      get closed.  This is more useful than you'd think, since it lets
-      application/controller combos successfully tell when they're talking to
-      the same Tor by watching for STREAM events.
-
-  o Major bugfixes
+  o Major bugfixes:
+    - Fix a major leak when directory authorities parse their
+      approved-routers list, a minor memory leak when we fail to pick
+      an exit node, and a few rare leaks on errors.
     - Handle TransPort connections even when the server sends data before
-      the client sends data.  Previously, the connection would just hang
+      the client sends data. Previously, the connection would just hang
       until the client sent data. (Patch from tup based on patch from
       Zajcev Evgeny.)
-    - Fix a memory leak when we fail to pick an exit node.
+    - Avoid assert failure when our cached-routers file is empty on
+      startup.
 
-  o Minor bugfixes
+  o Minor bugfixes:
     - Don't log spurious warnings when we see a circuit close reason we
       don't recognize; it's probably just from a newer version of Tor.
     - Have directory authorities allow larger amounts of drift in uptime
@@ -31,10 +34,12 @@
       per day.
     - Start linking to the Tor specification and Tor reference manual
       correctly in the Windows installer.
-    - Avoid assert failure when our cached-routers file is empty on
-      startup.
-    - Don't corrupt last_guesssed_ip in router_new_address_suggestion() when
-      we're running as a client.
+    - Add Vidalia to the OS X uninstaller script, so when we uninstall
+      Tor/Privoxy we also uninstall Vidalia.
+    - Resume building on Irix64, and fix a lot of warnings from its
+      MIPSpro C compiler.
+    - Don't corrupt last_guessed_ip in router_new_address_suggestion()
+      when we're running as a client.
 
 
 Changes in version 0.1.2.3-alpha - 2006-10-29

Modified: tor/trunk/configure.in
===================================================================
--- tor/trunk/configure.in	2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/configure.in	2006-12-02 22:47:46 UTC (rev 9015)
@@ -4,7 +4,7 @@
 dnl See LICENSE for licensing information
 
 AC_INIT
-AM_INIT_AUTOMAKE(tor, 0.1.2.3-alpha-dev)
+AM_INIT_AUTOMAKE(tor, 0.1.2.4-alpha)
 AM_CONFIG_HEADER(orconfig.h)
 
 AC_CANONICAL_HOST

Modified: tor/trunk/contrib/tor-mingw.nsi.in
===================================================================
--- tor/trunk/contrib/tor-mingw.nsi.in	2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/contrib/tor-mingw.nsi.in	2006-12-02 22:47:46 UTC (rev 9015)
@@ -5,7 +5,7 @@
 ;
 !include "MUI.nsh"
 
-!define VERSION "0.1.2.3-alpha-dev"
+!define VERSION "0.1.2.4-alpha"
 !define INSTALLER "tor-${VERSION}-win32.exe"
 !define WEBSITE "http://tor.eff.org/";
 

Modified: tor/trunk/doc/control-spec.txt
===================================================================
--- tor/trunk/doc/control-spec.txt	2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/doc/control-spec.txt	2006-12-02 22:47:46 UTC (rev 9015)
@@ -460,6 +460,9 @@
       A space-separated list of all the events supported by this version of
       Tor's USEFEATURE.
 
+    "next-circuit/IP:port"
+      XXX todo.
+
     "dir/status/authority"
     "dir/status/fp/<F>"
     "dir/status/fp/<F1>+<F2>+<F3>"

Modified: tor/trunk/src/common/compat.c
===================================================================
--- tor/trunk/src/common/compat.c	2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/src/common/compat.c	2006-12-02 22:47:46 UTC (rev 9015)
@@ -142,8 +142,8 @@
   size += (size%page_size) ? page_size-(size%page_size) : 0;
 
   if (!size) {
-    /* zero-length file. if we call mmap on it, we'll end up setting
-     * data to NULL below, and bad things will happen. So just fail. */
+    /* Zero-length file. If we call mmap on it, it will succeed but
+     * return NULL, and bad things will happen. So just fail. */
     log_notice(LD_FS,"File \"%s\" is empty. Ignoring.",filename);
     return NULL;
   }

Modified: tor/trunk/src/or/connection.c
===================================================================
--- tor/trunk/src/or/connection.c	2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/src/or/connection.c	2006-12-02 22:47:46 UTC (rev 9015)
@@ -1166,7 +1166,7 @@
   }
 }
 
-/** If we have exhaused our global read bucket, or the read bucket for conn,
+/** If we have exhausted our global read bucket, or the read bucket for conn,
  * stop reading. */
 static void
 connection_consider_empty_buckets(connection_t *conn)

Modified: tor/trunk/src/or/connection_edge.c
===================================================================
--- tor/trunk/src/or/connection_edge.c	2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/src/or/connection_edge.c	2006-12-02 22:47:46 UTC (rev 9015)
@@ -1396,7 +1396,7 @@
  * If the handshake is complete, send it to
  * connection_ap_handshake_rewrite_and_attach().
  *
- * Return -1 if an unexpected error with conn ocurrs (and mark it for close),
+ * Return -1 if an unexpected error with conn occurs (and mark it for close),
  * else return 0.
  */
 static int

Modified: tor/trunk/src/or/main.c
===================================================================
--- tor/trunk/src/or/main.c	2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/src/or/main.c	2006-12-02 22:47:46 UTC (rev 9015)
@@ -319,7 +319,7 @@
   tor_assert(conn);
   tor_assert(conn->read_event);
 
-  log_debug(LD_NET,"connection_stop_reading() called.");
+  log_debug(LD_NET,"entering.");
   if (event_del(conn->read_event))
     log_warn(LD_NET, "Error from libevent setting read event state for %d "
              "to unwatched: %s",

Modified: tor/trunk/src/or/routerlist.c
===================================================================
--- tor/trunk/src/or/routerlist.c	2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/src/or/routerlist.c	2006-12-02 22:47:46 UTC (rev 9015)
@@ -4108,7 +4108,7 @@
     return 0;
 
   /* Did uptime fail to increase by approximately the amount we would think,
-   * give or take 4 hours? */
+   * give or take some slop? */
   r1pub = r1->cache_info.published_on;
   r2pub = r2->cache_info.published_on;
   time_difference = abs(r2->uptime - (r1->uptime + (r2pub - r1pub)));

Modified: tor/trunk/src/win32/orconfig.h
===================================================================
--- tor/trunk/src/win32/orconfig.h	2006-12-01 12:23:45 UTC (rev 9014)
+++ tor/trunk/src/win32/orconfig.h	2006-12-02 22:47:46 UTC (rev 9015)
@@ -227,5 +227,5 @@
 #define USING_TWOS_COMPLEMENT
 
 /* Version number of package */
-#define VERSION "0.1.2.3-alpha-dev"
+#define VERSION "0.1.2.4-alpha"