Fix warnings from lintchanges script

This commit is contained in:
Nick Mathewson 2017-01-22 18:54:13 -05:00
parent 753f6a9e70
commit 955846fbab
10 changed files with 21 additions and 21 deletions

View File

@ -1,4 +1,4 @@
o Minor features: o Minor features (hidden service directories):
- Relays are now willing act as v3 hidden service directories, - Relays are now willing act as v3 hidden service directories,
regardless of the EnableOnionServicvesV3 parameter. Implements regardless of the EnableOnionServicvesV3 parameter. Implements
ticket 19899. ticket 19899.

View File

@ -1,6 +1,6 @@
o Minor bugfixes (relay) o Minor bugfixes (relay):
- Honor DataDirectoryGroupReadable when tor is a relay. Previously, the - Honor DataDirectoryGroupReadable when tor is a relay. Previously, the
initialization of the keys would reset the DataDirectory to 0700 instead initialization of the keys would reset the DataDirectory to 0700 instead
of 0750 if DataDirectoryGroupReadable was set to 1. Fixes #19953. Patch of 0750 if DataeDirectoryGroupReadable was set to 1. Fixes bug 19953;
by "redfish".; bugfix on tor-0.0.2pre16. bugfix on 0.0.2pre16.
Patch by "redfish".

View File

@ -4,4 +4,4 @@
our internal reasons (ex: END_CIRC_REASON_IP_NOW_REDUNDANT). On the HS our internal reasons (ex: END_CIRC_REASON_IP_NOW_REDUNDANT). On the HS
side, this was causing introduction points to be flagged as unusable side, this was causing introduction points to be flagged as unusable
because the reason wasn't the right one due to the bad conversion. because the reason wasn't the right one due to the bad conversion.
Partially fixes bug 21056 and fixes bug 20307; Bugfix on 0.2.8.1-alpha. Partially fixes bug 21056 and fixes bug 20307; bugfix on 0.2.8.1-alpha.

View File

@ -1,4 +1,4 @@
o Minor features o Minor features (entry guards):
- Require UseEntryGuards when UseBridges is set in order to make sure - Require UseEntryGuards when UseBridges is set in order to make sure
bridges aren't bypassed. Resolves ticket 20502. bridges aren't bypassed. Resolves ticket 20502.
- Add UseEntryGuards to TEST_OPTIONS_DEFAULT_VALUES in order to not break - Add UseEntryGuards to TEST_OPTIONS_DEFAULT_VALUES in order to not break

View File

@ -1,5 +1,5 @@
o Minor bugfixes (hidden service): o Minor bugfixes (hidden service):
- Restrict the number of introduction point from 0 to the maximum allowed - Restrict the number of introduction point from 0 to the maximum allowed
instead of the default value to the maximum. That was stopping operators instead of the default value to the maximum. That was stopping operators
from using less than 3 introduction points. Closes #21033; bugfix on from using less than 3 introduction points. Fixes bug 21033; bugfix on
tor-0.2.7.2-alpha. 0.2.7.2-alpha.

View File

@ -1,5 +1,5 @@
o Minor bugfixes (hidden service): o Minor bugfixes (hidden service):
- Fix the config reload pruning of old vs new services so it actually - Fix the config reload pruning of old vs new services so it actually
works when both ephemeral and non ephemeral services were configured works when both ephemeral and non ephemeral services were configured
which lead to a BUG() stacktrace. Close #21054; Bugfix on which lead to a BUG() stacktrace. Fixes bug 21054; bugfix on
tor-0.3.0.1-alpha. 0.3.0.1-alpha.

View File

@ -1,3 +1,3 @@
o Documentation (man page): o Documentation (man page):
- Clarify a number of options in tor.1 and add some min/max values for - Clarify a number of options in tor.1 and add some min/max values for
HiddenService options. Closes #21058. HiddenService options. Closes ticket 21058.

View File

@ -1,4 +1,4 @@
o Minor bugfixex (config): o Minor bugfixes (config):
- Don't assert when trying to get the options list when - Don't assert when trying to get the options list when
LearnCircuitBuildTimeout is set to 0 and we are actually currently LearnCircuitBuildTimeout is set to 0 and we are actually currently
parsing the options. Fixes #21062; bugfix on tor-0.2.9.3-alpha. parsing the options. Fixes bug 21062; bugfix on 0.2.9.3-alpha.

View File

@ -1,4 +1,4 @@
o Minor bugfixes (client, guards): o Minor bugfixes (client, guards):
- Fix bug where Tor would think that there are circuits waiting for better - Fix bug where Tor would think that there are circuits waiting for better
guards even though those circuits have been freed. Fixes bug #21142; guards even though those circuits have been freed. Fixes bug 21142;
bugfix on 0.3.0.1-alpha. bugfix on 0.3.0.1-alpha.

View File

@ -8,8 +8,7 @@
7 dayss. (Due to the number of relays with enough stability.) Relays 7 dayss. (Due to the number of relays with enough stability.) Relays
whose OnionOO stability timer is reset on restart by bug 18050 should whose OnionOO stability timer is reset on restart by bug 18050 should
upgrade to Tor 0.2.8.7 or later, which has a fix for this issue. upgrade to Tor 0.2.8.7 or later, which has a fix for this issue.
Closes ticket 20880; maintains short-term fix in e220214 in Closes ticket 20880; maintains short-term fix in 0.2.8.2-alpha.
tor-0.2.8.2-alpha.
- Make it easier to change the output sort order of fallbacks. - Make it easier to change the output sort order of fallbacks.
Closes ticket 20822. Closes ticket 20822.
- Exclude relays affected by 20499 from the fallback list. Exclude known - Exclude relays affected by 20499 from the fallback list. Exclude known
@ -25,13 +24,14 @@
- Allow 3 fallbacks per operator. (This is safe now we are choosing 200 - Allow 3 fallbacks per operator. (This is safe now we are choosing 200
fallbacks.) Closes ticket 20912. fallbacks.) Closes ticket 20912.
- Reduce the minimum fallback bandwidth to 1 MByte/s. - Reduce the minimum fallback bandwidth to 1 MByte/s.
Part of #18828. Part of ticket 18828.
o Minor bugfixes (fallback directories): o Minor bugfixes (fallback directories):
- Stop failing when OUTPUT_COMMENTS is True in updateFallbackDirs.py. - Stop failing when OUTPUT_COMMENTS is True in updateFallbackDirs.py.
Closes ticket 20877; bugfix on commit 9998343 in tor-0.2.8.3-alpha. Fixes bug 20877; bugfix on 0.2.8.3-alpha.
- Avoid checking fallback candidates' DirPorts if they are down in - Avoid checking fallback candidates' DirPorts if they are down in
OnionOO. When a relay operator has multiple relays, this prioritises OnionOO. When a relay operator has multiple relays, this prioritises
relays that are up over relays that are down. relays that are up over relays that are down.
Closes ticket #20926; bugfix on 0.2.8.3-alpha. Fixes bug 20926; bugfix on 0.2.8.3-alpha.
- Stop failing when a relay has no uptime data in updateFallbackDirs.py. - Stop failing when a relay has no uptime data in updateFallbackDirs.py.
Closes ticket 20945; bugfix on tor-0.2.8.1-alpha. Fixes bug 20945; bugfix on 0.2.8.1-alpha.