Browse Source

Remove changes files from master for stuff that will be in 0.3.3.4-alpha

Nick Mathewson 6 years ago
parent
commit
024a1aaa66
11 changed files with 0 additions and 50 deletions
  1. 0 5
      changes/bug24767
  2. 0 5
      changes/bug24903
  3. 0 4
      changes/bug24904
  4. 0 5
      changes/bug25213
  5. 0 6
      changes/bug25306
  6. 0 3
      changes/bug25372
  7. 0 5
      changes/bug25560
  8. 0 3
      changes/bug25629
  9. 0 3
      changes/bug25664
  10. 0 7
      changes/bugs_25036_25055
  11. 0 4
      changes/feature25313

+ 0 - 5
changes/bug24767

@@ -1,5 +0,0 @@
-  o Major bugfixes (relay, connection):
-    - Refuse to connect again to a relay from which we failed previously with
-      a connection refused, timeout or error (at the TCP level). The relay
-      won't be retried for 60 seconds after the failure occured. Fixes bug
-      24767; bugfix on 0.0.6.

+ 0 - 5
changes/bug24903

@@ -1,5 +0,0 @@
-  o Minor bugfixes (controller, reliability):
-    - Avoid a (nonfatal) assertion failure when extending a one-hop circuit
-      from the controller to become a multihop circuit. Fixes bug 24903;
-      bugfix on 0.2.5.2-alpha.
-

+ 0 - 4
changes/bug24904

@@ -1,4 +0,0 @@
-  o Minor bugfix (channel, client):
-    - Better identify client connection when reporting to the geoip client
-      cache. Fixes bug 24904; bugfix on 0.3.1.7.
-

+ 0 - 5
changes/bug25213

@@ -1,5 +0,0 @@
-  o Minor bugfixes (warnings, ipv6):
-    - Avoid a bug warning that could occur when trying to connect to
-      a relay over IPv6 on a Tor instance that downloads router descriptors,
-      but prefers to use microdescriptors. Fixes bug 25213; bugfix on
-      0.3.3.1-alpha.

+ 0 - 6
changes/bug25306

@@ -1,6 +0,0 @@
-  o Minor bugfixes (hidden service v3):
-    - Avoid asserting when building descriptors in the next rotation time is
-      out of sync with the consensus valid after time. Instead, log a bug
-      warning with extra information to hunt down the cause of this assert.
-      Fixes bug 25306; bugfix on 0.3.2.1-alpha.
-

+ 0 - 3
changes/bug25372

@@ -1,3 +0,0 @@
-  o Minor features (log messages):
-    - Improve log message in the out of memory handler to include information
-      about memory usage from the different compression backends. Closes ticket 25372.

+ 0 - 5
changes/bug25560

@@ -1,5 +0,0 @@
-  o Minor bugfixes (testing, rust):
-    - Some of our Rust crates were not having their tests run with `make
-      test-rust` due to a static string in the `src/test/test_rust.sh` script
-      specifying which crates to test.  Rust crates are not automatically
-      detected and tested.  Fixes bug 25560; bugfix on 0.3.3.3-alpha.

+ 0 - 3
changes/bug25629

@@ -1,3 +0,0 @@
-  o Minor bugfixes (C correctness):
-    - Fix a very unlikely null pointer dereference.  Fixes bug 25629;
-      bugfix on 0.2.9.15.  Found by Coverity; this is CID 1430932.

+ 0 - 3
changes/bug25664

@@ -1,3 +0,0 @@
-  o New system requirements:
-    - When built with Rust, Tor now depends on version 0.2.39 of the libc
-      crate. Closes tickets 25310 and 25664.

+ 0 - 7
changes/bugs_25036_25055

@@ -1,7 +0,0 @@
-  o Minor bugfixes (networking):
-    - Tor will not reject IPv6 address strings from TorBrowser when they
-      are passed as hostnames in SOCKS5 requests. Fixes bug 25036,
-      bugfix on Tor 0.3.1.2.
-    - string_is_valid_hostname() will not consider IP strings to be valid
-      hostnames. Fixes bug 25055; bugfix on Tor 0.2.5.5.
-

+ 0 - 4
changes/feature25313

@@ -1,4 +0,0 @@
-  o Minor features (sandbox):
-    - Explicitly permit the poll() system call when the Linux seccomp2-based
-      sandbox is enabled: apparently, some versions of libc use poll() when
-      calling getpwnam(). Closes ticket 25313.