Bläddra i källkod

Remove changes files for items already in release-0.3.1

Nick Mathewson 6 år sedan
förälder
incheckning
a374fa7285

+ 0 - 4
changes/bug16082

@@ -1,4 +0,0 @@
-  o Documentation:
-    - Correctly note that bandwidth accounting values are stored in the
-      state file, and the bw_accounting file is now obsolete. Closes
-      ticket 16082.

+ 0 - 4
changes/bug20247

@@ -1,4 +0,0 @@
-  o Minor bugfixes (linux seccomp2 sandbox):
-    - Avoid a sandbox failure when trying to re-bind to a socket and mark
-      it as IPv6-only. Fixes bug 20247; bugfix on 0.2.5.1-alpha.
-

+ 0 - 5
changes/bug22212

@@ -1,5 +0,0 @@
-  o Minor bugfixes (netflow padding logging):
-    - Demote a warn that was caused by libevent delays to info if
-      the padding is less than 4.5 seconds late, or notice if it is more
-      (4.5 seconds is the amount of time that a netflow record might
-       be emitted after, if we chose the maximum timeout). Fixes bug #22212.

+ 0 - 2
changes/bug22347

@@ -1,2 +0,0 @@
-  o Documentation:
-    - Add a manpage description for the key-pinning-journal file.

+ 0 - 9
changes/bug22349

@@ -1,9 +0,0 @@
-  o Minor bugfixes (directory authority):
-    - When a directory authority rejects a descriptor or extrainfo with
-      a given digest, mark that digest as undownloadable, so that we
-      do not attempt to download it again over and over. We previously
-      tried to avoid downloading such descriptors by other means, but
-      we didn't notice if we accidentally downloaded one anyway. This
-      behavior became problematic in 0.2.7.2-alpha, when authorities
-      began pinning Ed25519 keys. Fixes ticket
-      22349; bugfix on 0.2.1.19-alpha.

+ 0 - 5
changes/bug22356

@@ -1,5 +0,0 @@
-  o Minor bugfixes (logging, relay):
-    - Downgrade "assigned_to_cpuworker failed" message to INFO-level
-      severity. In every case that can reach it, either a better warning
-      has already been logged, or no warning is warranted. Fixes bug 22356;
-      bugfix on 0.2.6.3-alpha.

+ 0 - 4
changes/bug22400_01

@@ -1,4 +0,0 @@
-  o Major bugfixes (entry guards):
-    - When starting with an old consensus, do not add new entry guards
-      unless the consensus is "reasonably live" (under 1 day old). Fixes
-      one root cause of bug 22400; bugfix on 0.3.0.1-alpha.

+ 0 - 12
changes/bug22502_part1

@@ -1,12 +0,0 @@
-  o Major bugfixes (compression, zstd):
-    - Correctly detect a full buffer when decompessing a large
-      zstd-compressed input. Fixes bug 22628; bugfix on 0.3.1.1-alpha.
-
-  o Minor bugfixes (compression):
-    - When compressing or decompressing a buffer, check for a failure to
-      create a compression object. Fixes bug 22626; bugfix on
-      0.3.1.1-alpha.
-
-    - When decompressing a buffer, check for extra data after the end of
-      the compressed data. Fixes bug 22629; bugfix on 0.3.1.1-alpha.
-

+ 0 - 5
changes/bug22516

@@ -1,5 +0,0 @@
-  o Minor bugfixes (linux seccomp2 sandbox):
-    - Permit the fchmod system call, to avoid crashing on startup when
-      starting with the seccomp2 sandbox and an unexpected set of permissions
-      on the data directory or its contents. Fixes bug 22516; bugfix on
-      0.2.5.4-alpha.

+ 0 - 5
changes/bug22520

@@ -1,5 +0,0 @@
-  o Minor bugfixes (error reporting, windows):
-    - When formatting Windows error messages, use the English format
-      to avoid codepage issues. Fixes bug 22520; bugfix on
-      0.1.2.8-alpha. Patch from "Vort".
-

+ 0 - 8
changes/bug22636

@@ -1,8 +0,0 @@
- o Build features:
-   - Tor's repository now includes a Travis Continuous Integration (CI)
-     configuration file (.travis.yml). This is meant to help new developers and
-     contributors who fork Tor to a Github repository be better able to test
-     their changes, and understand what we expect to pass. To use this new build
-     feature, you must fork Tor to your Github account, then go into the
-     "Integrations" menu in the repository settings for your fork and enable
-     Travis, then push your changes.

+ 0 - 4
changes/bug22669

@@ -1,4 +0,0 @@
-  o Minor bugfixes (compression):
-    - When serving directory votes compressed with zlib,
-      do not claim to have compressed them with zstd. Fixes bug 22669;
-      bugfix on 0.3.1.1-alpha.

+ 0 - 4
changes/bug22670

@@ -1,4 +0,0 @@
-  o Minor bugfixes (logging, compression):
-    - When decompressing, do not warn if we fail to decompress using a
-      compression method that we merely guessed. Fixes part of
-      bug 22670; bugfix on 0.1.1.14-alpha.

+ 0 - 4
changes/bug22670_02

@@ -1,4 +0,0 @@
-  o Minor bugfixes (logging, compression):
-   - When decompressing, treat mismatch between content-encoding and
-      actual compression type as a protocol warning. Fixes part of bug
-      22670; bugfix on 0.1.1.9-alpha.

+ 0 - 6
changes/bug22670_03

@@ -1,6 +0,0 @@
-  o Minor bugfixes (compression):
-    - When decompressing an object received over an anonymous directory
-      connection, if we have already successfully decompressed it using an
-      acceptable compression method, do not reject it for looking like an
-      unacceptable compression method. Fixes part of bug 22670; bugfix on
-      0.3.1.1-alpha.

+ 0 - 5
changes/bug22672

@@ -1,5 +0,0 @@
-  o Minor features (compression, defensive programming):
-    - Detect and break out of infinite loops in our compression code.
-      We don't think that any such loops exist now, but it's best to be
-      safe. Closes ticket 22672.
-

+ 0 - 5
changes/bug22702

@@ -1,5 +0,0 @@
-  o Major bugfixes (directory protocol):
-    - Ensure that we sent "304 Not modified" as HTTP status code when a
-      client is attempting to fetch a consensus or consensus diff that
-      matches the latest consensus we have available. Fixes bug 22702;
-      bugfix on 0.3.1.1-alpha.

+ 0 - 7
changes/bug22719

@@ -1,7 +0,0 @@
-  o Minor bugfixes (compression):
-    - When spooling compressed data to an output buffer, don't try to
-      spool more data when there is no more data to spool and we are
-      not trying to flush the input. Previously, we would sometimes
-      launch compression requests with nothing to do, which interferes
-      with our 22672 checks. Fixes bug 22719; bugfix on 0.2.0.16-alpha.
-

+ 0 - 9
changes/bug22720

@@ -1,9 +0,0 @@
-  o Minor bugfixes (process behavior):
-    - When exiting because of an error, always exit with a nonzero
-      exit status. Previously, we would fail to report an error in
-      our exit status in cases related to lockfile contention,
-      __OwningControllerProcess failure, and Ed25519 key
-      initialization.  Fixes bug 22720; bugfix on versions
-      0.2.1.6-alpha, 0.2.2.28-beta, and 0.2.7.2-alpha
-      respectively. Reported by "f55jwk4f"; patch from "huyvq".
-

+ 0 - 12
changes/bug22737

@@ -1,12 +0,0 @@
-  o Minor bugfixes (defensive programming, undefined behavior):
-
-    - Fix a memset() off the end of an array when packing cells.  This
-      bug should be harmless in practice, since the corrupted bytes
-      are still in the same structure, and are always padding bytes,
-      ignored, or immediately overwritten, depending on compiler
-      behavior. Nevertheless, because the memset()'s purpose is to
-      make sure that any other cell-handling bugs can't expose bytes
-      to the network, we need to fix it. Fixes bug 22737; bugfix on
-      0.2.4.11-alpha. Fixes CID 1401591.
-
-

+ 0 - 5
changes/bug22751

@@ -1,5 +0,0 @@
-  o Major bugfixes (compression):
-    - Fix crash in LZMA module, when the Sandbox is enabled, where
-      liblzma would allocate more than 16 MB of memory.  We solve this
-      by bumping the mprotect() limit in the Sandbox module from 16 MB
-      to 20 MB.  Fixes bug 22751; bugfix on 0.3.1.1-alpha.

+ 0 - 7
changes/bug22753

@@ -1,7 +0,0 @@
-  o Major bugfixes (path selection, security):
-    - When choosing which guard to use for a circuit, avoid the
-      exit's family along with the exit itself. Previously, the new
-      guard selection logic avoided the exit, but did not consider
-      its family.  Fixes bug 22753; bugfix on 0.3.0.1-alpha. Tracked
-      as TROVE-2016-006 and CVE-2017-0377.
-

+ 0 - 7
changes/bug22789

@@ -1,7 +0,0 @@
-  o Major bugfixes (openbsd, denial-of-service):
-    - Avoid an assertion failure bug affecting our implementation of
-      inet_pton(AF_INET6) on certain OpenBSD systems whose strtol()
-      handling of "0xfoo" differs from what we had expected.
-      Fixes bug 22789; bugfix on 0.2.3.8-alpha. Also tracked as
-      TROVE-2017-007.
-

+ 0 - 4
changes/bug22797

@@ -1,4 +0,0 @@
-  o Minor bugfixes (file limits):
-    - When setting the maximum number of connections allowed by the OS,
-      always allow some extra file descriptors for other files.
-      Fixes bug 22797; bugfix on 0.2.0.10-alpha.

+ 0 - 5
changes/bug22801

@@ -1,5 +0,0 @@
-  o Minor bugfixes (compilation):
-    - When building with certain versions the mingw C header files, avoid
-      float-conversion warnings when calling the C functions isfinite(),
-      isnan(), and signbit(). Fixes bug 22801; bugfix on 0.2.8.1-alpha.
-

+ 0 - 3
changes/bug22803

@@ -1,3 +0,0 @@
-  o Minor bugfixes (unit tests):
-    - Fix a memory leak in the link-handshake/certs_ok_ed25519 test.
-      Fixes bug 22803; bugfix on 0.3.0.1-alpha.

+ 0 - 5
changes/bug22830

@@ -1,5 +0,0 @@
- o Minor bugfixes:
-   - Fix a problem with Rust toolchains not being found when building
-     without --enable-cargo-online-mode, due to setting the $HOME
-     environment variable instead of $CARGO_HOME.  Fixes bug 22830;
-     fix by Chelsea Komlo.  Bugfix on 0.3.1.1-alpha.

+ 0 - 7
changes/bug22883-config

@@ -1,7 +0,0 @@
-  o Minor features (directory cache, consensus diff):
-    - Add a new MaxConsensusAgeForDiffs option to allow directory cache
-      operators with low-resource environments to adjust the number of
-      consensuses they'll store and generate diffs from. Most cache operators
-      should leave it unchanged. Helps to work around bug 22883.
-
-

+ 0 - 8
changes/bug22883-priority

@@ -1,8 +0,0 @@
-  o Major bugfixes (relay, performance):
-
-    - Perform circuit handshake operations at a higher priority than we use
-      for consensus diff creation and compression. This should prevent
-      circuits from starving when a relay or bridge receive a new consensus,
-      especially on lower-powered machines. Fixes bug 22883; bugfix on
-      0.3.1.1-alpha.
-

+ 0 - 4
changes/bug22892

@@ -1,4 +0,0 @@
-  o Minor bugfixes (compilation):
-    - Compile correctly when both openssl 1.1.0 and libscrypt are detected.
-      Previously this would cause an error. Fixes bug 22892; bugfix on 
-      0.3.1.1-alpha.

+ 0 - 3
changes/bug22915

@@ -1,3 +0,0 @@
-  o Minor bugfixes (compilation warnings):
-    - Suppress -Wdouble-promotion warnings with clang 4.0. Fixes bug 22915;
-      bugfix on 0.2.8.1-alpha.

+ 0 - 3
changes/bug22916_027

@@ -1,3 +0,0 @@
-  o Minor bugfixes (Compilation):
-    - Fix warnings when building with libscrypt and openssl scrypt support
-      on Clang. Fixes bug 22916; bugfix on 0.2.7.2-alpha.

+ 0 - 6
changes/bug22927

@@ -1,6 +0,0 @@
-  o Minor bugfixes (compatibility, zstd):
-    - Write zstd epilogues correctly when the epilogue requires reallocation
-      of the output buffer, even with zstd 1.3.0. (Previously,
-      we worked on 1.2.0 and failed with 1.3.0).  Fixes bug 22927; bugfix on
-      0.3.1.1-alpha.
-

+ 0 - 7
changes/bug23030_029

@@ -1,7 +0,0 @@
-  o Minor bugfixes (coverity builds):
-    - Avoid Coverity build warnings related to our BUG() macro. By
-      default, Coverity treats BUG() as the Linux kernel does: an
-      instant abort(). We need to override that so our BUG() macro
-      doesn't prevent Coverity from analyzing functions that use it.
-      Fixes bug 23030; bugfix on 0.2.9.1-alpha.
-

+ 0 - 5
changes/bug23053

@@ -1,5 +0,0 @@
-  o Minor bugfixes (memory leak):
-    - Fix a small memory leak when validating a configuration that
-      uses two or more AF_UNIX sockets for the same port type.
-      Fixes bug 23053; bugfix on 0.2.6.3-alpha. This is CID
-      1415725.

+ 0 - 4
changes/diagnose_22752

@@ -1,4 +0,0 @@
-  o Minor features (bug mitigation, diagnostics, logging):
-    - Avoid an assertion failure, and log a better error message,
-      when unable to remove a file from the consensus cache on
-      Windows. Attempts to mitigate and diagnose bug 22752.

+ 0 - 4
changes/geoip-june2017

@@ -1,4 +0,0 @@
-  o Minor features:
-    - Update geoip and geoip6 to the June 8 2017 Maxmind GeoLite2
-      Country database.
-

+ 0 - 4
changes/more-files

@@ -1,4 +0,0 @@
-  o Documentation:
-    - Document more of the files in the Tor data directory, including
-      cached-extrainfo, secret_onion_key{,_ntor}.old, hidserv-stats,
-      approved-routers, sr-random, and diff-cache.

+ 0 - 3
changes/more-threads

@@ -1,3 +0,0 @@
-  o Minor features (relay, performance):
-    - Always start relays with at least two worker threads, to prevent
-      priority inversion on slow tasks.  Part of the fix for bug 22883.

+ 0 - 5
changes/multi-priority

@@ -1,5 +0,0 @@
-  o Minor features (relay, thread pool):
-    - Allow background work to be queued with different priorities, so
-      that a big pile of slow low-priority jobs will not starve out
-      higher priority jobs. This lays the groundwork for a fix for bug
-      22883.

+ 0 - 5
changes/new_requirement_pkgconfig

@@ -1,5 +0,0 @@
-  o New dependencies:
-    - To build with zstd and lzma support, Tor now requires the
-      pkg-config tool at build time. (This requirement was new in
-      0.3.1.1-alpha, but was not noted at the time. Noting it here to
-      close ticket 22623.)

+ 0 - 4
changes/task-22207

@@ -1,4 +0,0 @@
-  o Minor features:
-    - Add "fingerprint" line to networkstatus-bridges produced by
-      bridge authorities. Implements #22207.
-

+ 0 - 5
changes/ticket22870

@@ -1,5 +0,0 @@
-  o Minor bugfixes (consensus diff):
-    - test_consdiff_base64cmp would fail on OS X because while OS X
-      follows the standard of (less than zero/zero/greater than zero),
-      it doesn't follow the convention of (-1/0/+1). Make the test
-      comply with the standard. Fixes bug 22870; bugfix on 0.3.1.1-alpha.