Browse Source

Use the lintChanges script to fix style issues in changes entries

Nick Mathewson 6 years ago
parent
commit
523188afdb

+ 0 - 0
changes/19037 → changes/19307


+ 4 - 4
changes/bug17639

@@ -1,4 +1,4 @@
- o Minor features:
-   - Add a new commandline option, --key-expiration, which prints when
-     the current signing key is going to expire. Implements ticket
-     17639; patch by Isis Lovecruft.
+  o Minor features (command line):
+    - Add a new commandline option, --key-expiration, which prints when
+      the current signing key is going to expire. Implements ticket
+      17639; patch by Isis Lovecruft.

+ 1 - 1
changes/bug17750

@@ -1,4 +1,4 @@
   o Minor bugfixes (directory downloads):
   o Minor bugfixes (directory downloads):
     - Make clients wait for 6 seconds before trying to download their
     - Make clients wait for 6 seconds before trying to download their
       consensus from an authority.
       consensus from an authority.
-      Fixes bug 17750, bugfix on 0.2.8.1-alpha.
+      Fixes bug 17750; bugfix on 0.2.8.1-alpha.

+ 2 - 2
changes/bug18982

@@ -1,6 +1,6 @@
   o Minor bugfixes (circuit logging):
   o Minor bugfixes (circuit logging):
     - torspec says hop counts are 1-based, so fix two log messages
     - torspec says hop counts are 1-based, so fix two log messages
       that mistakenly logged 0-based hop counts.
       that mistakenly logged 0-based hop counts.
-      Closes ticket 18982, bugfix on 0275b6876 in tor 0.2.6.2-alpha
-      and 907db008a in tor 0.2.4.5-alpha. Patch by teor.
+      Fixes bug 18982; bugfix on 0.2.6.2-alpha
+      and 0.2.4.5-alpha. Patch by teor.
       Credit to Xiaofan Li for reporting this issue.
       Credit to Xiaofan Li for reporting this issue.

+ 4 - 3
changes/bug19476

@@ -1,3 +1,4 @@
- o Minor changes:
-   - If we fail to write a heartbeat message, schedule a retry for the minimum
-     heartbeat interval number of seconds in the future. Fixes bug 19476.
+  o Minor bugfixes (heartbeat):
+    - If we fail to write a heartbeat message, schedule a retry for the minimum
+      heartbeat interval number of seconds in the future. Fixes bug 19476;
+      bugfix on 0.2.3.1-alpha.

+ 4 - 4
changes/bug19871

@@ -1,4 +1,4 @@
- o Code refactoring:
-   - Remove dead code for largely unused statistics on the number of
-     times we've attempted various public key operations. Fixes bug
-     19871; fix by Isis Lovecruft. Bugfix on 0.1.2.4-alpha.
+  o Code simplification and refactoring:
+    - Remove dead code for largely unused statistics on the number of
+      times we've attempted various public key operations. Fixes bug
+      19871; bugfix on 0.1.2.4-alpha. Fix by Isis Lovecruft.

+ 3 - 3
changes/bug22006

@@ -1,4 +1,4 @@
   o Minor features (ed25519):
   o Minor features (ed25519):
-    - Add validation function that checks for torsion components in ed25119
-      public keys. Currently unused but will be used by prop224 client-side
-      code. Addresses ticket #22006. Math help by Ian Goldberg.
+    - Add validation function to checks for torsion components in ed25119
+      public keys, used by prop224 client-side
+      code. Closes ticket 22006. Math help by Ian Goldberg.

+ 2 - 2
changes/bug22410

@@ -1,4 +1,4 @@
-  o Minor bugfixes (portability):
+  o Minor features (portability):
     - Check at configure time whether uint8_t is unsigned char.  Lots
     - Check at configure time whether uint8_t is unsigned char.  Lots
       of existing code already assumes this, and there could be strict
       of existing code already assumes this, and there could be strict
-      aliasing issues if they aren't the same type.  Fixes #22410.
+      aliasing issues if they aren't the same type. Closes ticket 22410.

+ 1 - 1
changes/bug22461

@@ -4,4 +4,4 @@
       enabled, as this prevents user from connecting to known IP addresses
       enabled, as this prevents user from connecting to known IP addresses
       without relying on DNS for resolving. SafeSocks still rejects SOCKS
       without relying on DNS for resolving. SafeSocks still rejects SOCKS
       connections that connect to IP addresses when those addresses are _not_
       connections that connect to IP addresses when those addresses are _not_
-      encoded as hostnames. Fixes bug 22461, bugfix on Tor 0.2.6.2-alpha.
+      encoded as hostnames. Fixes bug 22461; bugfix on Tor 0.2.6.2-alpha.

+ 1 - 1
changes/bug22924

@@ -1,4 +1,4 @@
-  o Minor bugfies (tests):
+  o Minor bugfixes (tests):
     - Fix a signed-integer overflow in the unit tests for
     - Fix a signed-integer overflow in the unit tests for
       dir/download_status_random_backoff, which was untriggered until we
       dir/download_status_random_backoff, which was untriggered until we
       fixed bug 17750.  Fixes bug 22924; bugfix on 0.2.9.1-alpha.
       fixed bug 17750.  Fixes bug 22924; bugfix on 0.2.9.1-alpha.

+ 1 - 1
changes/bug23091

@@ -3,4 +3,4 @@
       instead of only doing it for a consensus that is more than 24 hours old
       instead of only doing it for a consensus that is more than 24 hours old
       (badly expired). This specific check is done in the tor main loop
       (badly expired). This specific check is done in the tor main loop
       callback that validates if we have an expired consensus. Fixes bug
       callback that validates if we have an expired consensus. Fixes bug
-      23091; bugfix on tor-0.2.0.19-alpha.
+      23091; bugfix on 0.2.0.19-alpha.

+ 0 - 9
changes/bug23347

@@ -1,9 +0,0 @@
-  o Minor fixes (bridge client bootstrap):
-    - Make bridge clients with no running bridges try to download
-      bridge descriptors immediately. But when bridge clients have
-      running bridges, make them wait at least 3 hours before
-      refreshing recently received bridge descriptors.
-      Download schedules used to start with an implicit 0, but the
-      fix for 17750 changed this undocumented behaviour, and made
-      bridge clients hang for 15 minutes before bootstrapping.
-      Fixes bug 23347, not in any released version of Tor.

+ 3 - 3
changes/bug23366

@@ -1,4 +1,4 @@
   o Minor bugfixes (test):
   o Minor bugfixes (test):
-    - Fix a broken OutboundAddress option unit test because the parsing
-      function was never returning an error on failure. Fixes bug #23366.;
-      bugfix on tor-0.3.0.3-alpha.
+    - Fix a broken unit test for the OutboundAddress option: the parsing
+      function was never returning an error on failure. Fixes bug 23366;
+      bugfix on 0.3.0.3-alpha.

+ 2 - 3
changes/bug23470

@@ -1,6 +1,5 @@
   o Minor bugfix (relay address resolution):
   o Minor bugfix (relay address resolution):
     - Avoid unnecessary calls to directory_fetches_from_authorities()
     - Avoid unnecessary calls to directory_fetches_from_authorities()
       on relays. This avoids spurious address resolutions and
       on relays. This avoids spurious address resolutions and
-      descriptor rebuilds. This is a mitigation for 21789. The original
-      bug was introduced in commit 35bbf2e as part of prop210.
-      Fixes 23470 in 0.2.8.1-alpha.
+      descriptor rebuilds. This is a mitigation for bug 21789.
+      Fixes bug 23470; bugfix on in 0.2.8.1-alpha.

+ 1 - 1
changes/bug23499

@@ -1,4 +1,4 @@
-  o Minor bugfixes:
+  o Minor bugfixes (directories):
     - Directory servers now include a "Date:" http header for response
     - Directory servers now include a "Date:" http header for response
       codes other than 200. Clients starting with a skewed clock and a
       codes other than 200. Clients starting with a skewed clock and a
       recent consensus were getting "304 Not modified" responses from
       recent consensus were getting "304 Not modified" responses from

+ 1 - 1
changes/bug23524

@@ -1,4 +1,4 @@
   o Minor bugfixes (DoS-resistance):
   o Minor bugfixes (DoS-resistance):
     - If future code asks if there are any running bridges, without checking
     - If future code asks if there are any running bridges, without checking
       if bridges are enabled, log a BUG warning rather than crashing.
       if bridges are enabled, log a BUG warning rather than crashing.
-      Fixes 23524 on 0.3.0.1-alpha.
+      Fixes bug 23524; bugfix on 0.3.0.1-alpha.

+ 0 - 6
changes/bug23525

@@ -1,6 +0,0 @@
-  o Minor bugfixes (control port):
-    - Make download status next attempts reported over the control port
-      consistent with the time used by tor. This issue only occurs if a
-      download status has not been reset before it is queried over the
-      control port.
-      Fixes 23525, not in any released version of tor.

+ 3 - 3
changes/bug3056

@@ -1,3 +1,3 @@
-   o Minor features (exit relay, DNS):
-     - Improve the clarity and safety of the log message from evdns when
-       receiving an apparent spoofed DNS reply. Closes ticket 3056.
+  o Minor features (exit relay, DNS):
+    - Improve the clarity and safety of the log message from evdns when
+      receiving an apparent spoofed DNS reply. Closes ticket 3056.

+ 1 - 1
changes/bug4019

@@ -1,4 +1,4 @@
   o Minor bugfixes (logging):
   o Minor bugfixes (logging):
     - Remove duplicate log messages regarding opening non-local SocksPorts
     - Remove duplicate log messages regarding opening non-local SocksPorts
       upon parsing config and opening listeners at startup. Fixes bug 4019;
       upon parsing config and opening listeners at startup. Fixes bug 4019;
-      bugfix on tor-0.2.3.3-alpha.
+      bugfix on 0.2.3.3-alpha.

+ 1 - 1
changes/refactor-buffer

@@ -1,3 +1,3 @@
-  o Code simplifications and refactoring:
+  o Code simplification and refactoring:
     - Split the portions of the buffer.c module that handle particular
     - Split the portions of the buffer.c module that handle particular
       protocols into separate modules. Part of ticket 23149.
       protocols into separate modules. Part of ticket 23149.

+ 3 - 3
changes/ticket20575

@@ -1,4 +1,4 @@
-  o Deprecation (config):
-    - Deprecate HTTPProxy/HTTPProxyAuthenticator config options. It only
+  o Deprecated features:
+    - Deprecate HTTPProxy/HTTPProxyAuthenticator config options. They only
       applies to direct unencrypted HTTP connections to your directory server,
       applies to direct unencrypted HTTP connections to your directory server,
-      which your Tor probably isn't using. Fixes bug 20575.
+      which your Tor probably isn't using. Closes ticket 20575.

+ 1 - 1
changes/ticket22215

@@ -1,5 +1,5 @@
   o Code simplification and refactoring:
   o Code simplification and refactoring:
     - Remove some of the code that once supported "Named" and "Unnamed"
     - Remove some of the code that once supported "Named" and "Unnamed"
       routers.  Authorities no longer vote for these flags. Closes ticket
       routers.  Authorities no longer vote for these flags. Closes ticket
-      23478.
+      22215.