[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r12249: bump stable to 0.1.2.18, and schedule it for today. (in tor/branches/tor-0_1_2-patches: . contrib src/win32)
Author: arma
Date: 2007-10-28 07:17:47 -0400 (Sun, 28 Oct 2007)
New Revision: 12249
Modified:
tor/branches/tor-0_1_2-patches/ChangeLog
tor/branches/tor-0_1_2-patches/configure.in
tor/branches/tor-0_1_2-patches/contrib/tor-mingw.nsi.in
tor/branches/tor-0_1_2-patches/src/win32/orconfig.h
Log:
bump stable to 0.1.2.18, and schedule it for today.
Modified: tor/branches/tor-0_1_2-patches/ChangeLog
===================================================================
--- tor/branches/tor-0_1_2-patches/ChangeLog 2007-10-28 11:00:42 UTC (rev 12248)
+++ tor/branches/tor-0_1_2-patches/ChangeLog 2007-10-28 11:17:47 UTC (rev 12249)
@@ -1,4 +1,4 @@
-Changes in version 0.1.2.18 - 2007-10-??
+Changes in version 0.1.2.18 - 2007-10-28
o Major bugfixes (crashes):
- If a connection is shut down abruptly because of something that
happened inside connection_flushed_some(), do not call
@@ -8,10 +8,7 @@
- Fix possible segfaults in functions called from
rend_process_relay_cell().
- o Major bugfixes (other):
- - Stop publishing a new server descriptor just because we get a
- HUP signal. This led (in a roundabout way) to some servers getting
- dropped from the networkstatus lists for a few hours each day.
+ o Major bugfixes (hidden services):
- Hidden services were choosing introduction points uniquely by
hexdigest, but when constructing the hidden service descriptor
they merely wrote the (potentially ambiguous) nickname.
@@ -19,6 +16,11 @@
connections: they specify their chosen rendezvous point by identity
digest rather than by (potentially ambiguous) nickname. These
changes could speed up hidden service connections dramatically.
+
+ o Major bugfixes (other):
+ - Stop publishing a new server descriptor just because we get a
+ HUP signal. This led (in a roundabout way) to some servers getting
+ dropped from the networkstatus lists for a few hours each day.
- When looking for a circuit to cannibalize, consider family as well
as identity. Fixes bug 438. Bugfix on 0.1.0.x (which introduced
circuit cannibalization).
@@ -55,8 +57,8 @@
- It's not actually an error to find a non-pending entry in the DNS
cache when canceling a pending resolve. Don't log unless stuff
is fishy. Resolves bug 463.
- - Don't reset trusted dir server list when we set a configuration option.
- (Patch from Robert Hogan.)
+ - Don't reset trusted dir server list when we set a configuration
+ option. Patch from Robert Hogan.
Changes in version 0.1.2.17 - 2007-08-30
Modified: tor/branches/tor-0_1_2-patches/configure.in
===================================================================
--- tor/branches/tor-0_1_2-patches/configure.in 2007-10-28 11:00:42 UTC (rev 12248)
+++ tor/branches/tor-0_1_2-patches/configure.in 2007-10-28 11:17:47 UTC (rev 12249)
@@ -4,7 +4,7 @@
dnl See LICENSE for licensing information
AC_INIT
-AM_INIT_AUTOMAKE(tor, 0.1.2.17-dev)
+AM_INIT_AUTOMAKE(tor, 0.1.2.18)
AM_CONFIG_HEADER(orconfig.h)
AC_CANONICAL_HOST
Modified: tor/branches/tor-0_1_2-patches/contrib/tor-mingw.nsi.in
===================================================================
--- tor/branches/tor-0_1_2-patches/contrib/tor-mingw.nsi.in 2007-10-28 11:00:42 UTC (rev 12248)
+++ tor/branches/tor-0_1_2-patches/contrib/tor-mingw.nsi.in 2007-10-28 11:17:47 UTC (rev 12249)
@@ -5,7 +5,7 @@
;
!include "MUI.nsh"
-!define VERSION "0.1.2.17-dev"
+!define VERSION "0.1.2.18"
!define INSTALLER "tor-${VERSION}-win32.exe"
!define WEBSITE "http://tor.eff.org/"
Modified: tor/branches/tor-0_1_2-patches/src/win32/orconfig.h
===================================================================
--- tor/branches/tor-0_1_2-patches/src/win32/orconfig.h 2007-10-28 11:00:42 UTC (rev 12248)
+++ tor/branches/tor-0_1_2-patches/src/win32/orconfig.h 2007-10-28 11:17:47 UTC (rev 12249)
@@ -227,6 +227,6 @@
#define USING_TWOS_COMPLEMENT
/* Version number of package */
-#define VERSION "0.1.2.17-dev"
+#define VERSION "0.1.2.18"