Gentoo Archives: gentoo-commits

From: "Anthony G. Basile" <blueness@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] dev/blueness:master commit in: net-misc/tor/files/, net-misc/tor/
Date: Tue, 30 Aug 2011 03:35:50
Message-Id: c9d55ae40ab685bc3b40b573ed6236de6c0f600d.blueness@gentoo
1 commit: c9d55ae40ab685bc3b40b573ed6236de6c0f600d
2 Author: Anthony G. Basile <blueness <AT> gentoo <DOT> org>
3 AuthorDate: Tue Aug 30 03:35:30 2011 +0000
4 Commit: Anthony G. Basile <blueness <AT> gentoo <DOT> org>
5 CommitDate: Tue Aug 30 03:35:30 2011 +0000
6 URL: http://git.overlays.gentoo.org/gitweb/?p=dev/blueness.git;a=commit;h=c9d55ae4
7
8 net-misc/tor: Log to syslog rather than a file, bug #380117
9
10 (Portage version: 2.1.10.11/git/Linux x86_64, signed Manifest commit with key 0xD0455535)
11
12 ---
13 net-misc/tor/ChangeLog | 1176 ++++++++++++++++++++
14 net-misc/tor/Manifest | 22 +
15 .../files/tor-0.2.2.24_alpha-respect-CFLAGS.patch | 24 +
16 .../tor/files/tor-0.2.3.2_alpha-fix-asneeded.patch | 11 +
17 net-misc/tor/files/tor.confd | 3 +
18 net-misc/tor/files/tor.initd-r4 | 57 +
19 net-misc/tor/files/torrc-r1 | 8 +
20 net-misc/tor/files/torrc.sample.patch | 31 +
21 net-misc/tor/metadata.xml | 20 +
22 net-misc/tor/tor-0.2.2.32-r1.ebuild | 82 ++
23 net-misc/tor/tor-0.2.3.2_alpha-r3.ebuild | 88 ++
24 11 files changed, 1522 insertions(+), 0 deletions(-)
25
26 diff --git a/net-misc/tor/ChangeLog b/net-misc/tor/ChangeLog
27 new file mode 100644
28 index 0000000..8c04f9b
29 --- /dev/null
30 +++ b/net-misc/tor/ChangeLog
31 @@ -0,0 +1,1176 @@
32 +# ChangeLog for net-misc/tor
33 +# Copyright 1999-2011 Gentoo Foundation; Distributed under the GPL v2
34 +# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/ChangeLog,v 1.269 2011/08/28 11:15:42 blueness Exp $
35 +
36 + 30 Aug 2011; Anthony G. Basile <blueness@g.o>
37 + +files/tor-0.2.2.24_alpha-respect-CFLAGS.patch, +tor-0.2.2.32-r1.ebuild,
38 + +tor-0.2.3.2_alpha-r3.ebuild, +files/tor-0.2.3.2_alpha-fix-asneeded.patch,
39 + +files/tor.confd, +files/tor.initd-r4, +files/torrc-r1,
40 + +files/torrc.sample.patch, +metadata.xml:
41 + Log to syslog rather than a file, bug #380117
42 +
43 +*tor-0.2.3.2_alpha-r3 (30 Aug 2011)
44 +*tor-0.2.2.32-r1 (30 Aug 2011)
45 +
46 + 30 Aug 2011; Anthony G. Basile <blueness@g.o>
47 + +files/tor-0.2.2.24_alpha-respect-CFLAGS.patch, +tor-0.2.2.32-r1.ebuild,
48 + +tor-0.2.3.2_alpha-r3.ebuild, +files/tor-0.2.3.2_alpha-fix-asneeded.patch,
49 + +files/tor.confd, +files/tor.initd-r4, +files/torrc-r1,
50 + +files/torrc.sample.patch, +metadata.xml:
51 + Move logging to syslog, bug #380117
52 +
53 + 28 Aug 2011; Anthony G. Basile <blueness@g.o> -tor-0.2.2.31_rc.ebuild:
54 + Removed old release candidate
55 +
56 +*tor-0.2.2.32 (28 Aug 2011)
57 +
58 + 28 Aug 2011; Anthony G. Basile <blueness@g.o> +tor-0.2.2.32.ebuild:
59 + Version bump to new stable candidate
60 +
61 + 23 Aug 2011; Anthony G. Basile <blueness@g.o> files/tor.initd-r4:
62 + Removed incorrect --stop from init script, bug #379939
63 +
64 +*tor-0.2.2.31_rc (19 Aug 2011)
65 +
66 + 19 Aug 2011; Anthony G. Basile <blueness@g.o> -tor-0.2.2.30_rc.ebuild,
67 + -tor-0.2.2.30_rc-r1.ebuild, +tor-0.2.2.31_rc.ebuild,
68 + -tor-0.2.3.2_alpha.ebuild:
69 + Version bump RC and remove deprecated
70 +
71 + 05 Aug 2011; Anthony G. Basile <blueness@g.o> files/tor.initd-r4:
72 + Removed deprecated -oknodo, bug #377773
73 +
74 + 30 Jul 2011; Anthony G. Basile <blueness@g.o>
75 + tor-0.2.3.2_alpha-r2.ebuild:
76 + DEPEND only on <net-libs/miniupnpc-1.6, bug #376621
77 +
78 +*tor-0.2.3.2_alpha-r2 (22 Jul 2011)
79 +
80 + 22 Jul 2011; Anthony G. Basile <blueness@g.o>
81 + -tor-0.2.3.2_alpha-r1.ebuild, +tor-0.2.3.2_alpha-r2.ebuild,
82 + +files/tor-0.2.3.2_alpha-fix-asneeded.patch:
83 + Address bug #375955
84 +
85 +*tor-0.2.3.2_alpha-r1 (21 Jul 2011)
86 +*tor-0.2.2.30_rc-r1 (21 Jul 2011)
87 +
88 + 21 Jul 2011; Anthony G. Basile <blueness@g.o> metadata.xml,
89 + +tor-0.2.2.30_rc-r1.ebuild, +tor-0.2.3.2_alpha-r1.ebuild:
90 + Removed automatic configuration of features
91 +
92 +*tor-0.2.2.30_rc (19 Jul 2011)
93 +
94 + 19 Jul 2011; Anthony G. Basile <blueness@g.o>
95 + -tor-0.2.2.29_beta.ebuild, +tor-0.2.2.30_rc.ebuild:
96 + Beta bumped to first rc and removed deprecated
97 +
98 +*tor-0.2.3.2_alpha (19 Jul 2011)
99 +
100 + 19 Jul 2011; Anthony G. Basile <blueness@g.o>
101 + -tor-0.2.3.1_alpha-r1.ebuild, +tor-0.2.3.2_alpha.ebuild:
102 + Bumped alpha and removed deprecated
103 +
104 +*tor-0.2.2.29_beta (21 Jun 2011)
105 +
106 + 21 Jun 2011; Anthony G. Basile <blueness@g.o>
107 + -tor-0.2.2.28_beta.ebuild, +tor-0.2.2.29_beta.ebuild:
108 + Version bump beta, removed deprecated
109 +
110 +*tor-0.2.2.28_beta (10 Jun 2011)
111 +
112 + 10 Jun 2011; Anthony G. Basile <blueness@g.o> -tor-0.2.1.30-r1.ebuild,
113 + -tor-0.2.2.27_beta-r1.ebuild, +tor-0.2.2.28_beta.ebuild:
114 + Version bump beta, and removed deprecated
115 +
116 +*tor-0.2.3.1_alpha-r1 (07 Jun 2011)
117 +*tor-0.2.2.27_beta-r1 (07 Jun 2011)
118 +
119 + 07 Jun 2011; Anthony G. Basile <blueness@g.o>
120 + -tor-0.2.2.27_beta.ebuild, +tor-0.2.2.27_beta-r1.ebuild,
121 + -tor-0.2.3.1_alpha.ebuild, +tor-0.2.3.1_alpha-r1.ebuild:
122 + Forward ported rc_ulimit fix to beta and alpha, see bug #268396, comment #19
123 +
124 +*tor-0.2.1.30-r2 (07 Jun 2011)
125 +
126 + 07 Jun 2011; Anthony G. Basile <blueness@g.o> +tor-0.2.1.30-r2.ebuild,
127 + +files/tor.confd:
128 + Use rc_ulimit to set file limit, see bug #268396, comment #19
129 +
130 +*tor-0.2.2.27_beta (30 May 2011)
131 +
132 + 30 May 2011; Anthony G. Basile <blueness@g.o>
133 + -tor-0.2.2.25_alpha.ebuild, +tor-0.2.2.27_beta.ebuild:
134 + Version bump and removed deprecated
135 +
136 +*tor-0.2.3.1_alpha (08 May 2011)
137 +
138 + 08 May 2011; Anthony G. Basile <blueness@g.o>
139 + -tor-0.2.2.24_alpha.ebuild, +tor-0.2.3.1_alpha.ebuild:
140 + Added new alpha 0.2.3.1 and removed older alpha 0.2.2.24
141 +
142 + 29 Apr 2011; Anthony G. Basile <blueness@g.o>
143 + -tor-0.2.2.23_alpha.ebuild, -tor-0.2.2.23_alpha-r1.ebuild,
144 + -files/tor-0.2.2.23_alpha-respect-CFLAGS.patch:
145 + Removed deprecated alpha
146 +
147 +*tor-0.2.2.25_alpha (29 Apr 2011)
148 +
149 + 29 Apr 2011; Anthony G. Basile <blueness@g.o>
150 + +tor-0.2.2.25_alpha.ebuild:
151 + Version bump
152 +
153 +*tor-0.2.2.24_alpha (18 Apr 2011)
154 +
155 + 18 Apr 2011; Anthony G. Basile <blueness@g.o>
156 + +tor-0.2.2.24_alpha.ebuild,
157 + +files/tor-0.2.2.24_alpha-respect-CFLAGS.patch:
158 + Version bump
159 +
160 +*tor-0.2.1.30-r1 (10 Apr 2011)
161 +
162 + 10 Apr 2011; Anthony G. Basile <blueness@g.o>
163 + +tor-0.2.1.30-r1.ebuild, +files/tor-0.2.1.30-respect-CFLAGS.patch,
164 + files/torrc:
165 + Backport of improved build system, see bug #360765
166 +
167 + 02 Apr 2011; Anthony G. Basile <blueness@g.o> -tor-0.2.1.29.ebuild,
168 + -tor-0.2.1.29-r1.ebuild:
169 + Removed vulnerable versions, bug #359789
170 +
171 + 02 Apr 2011; Raúl Porcel <armin76@g.o> tor-0.2.1.30.ebuild:
172 + arm/sparc stable wrt #359789
173 +
174 + 28 Mar 2011; Anthony G. Basile <blueness@g.o>
175 + files/tor-0.2.2.23_alpha-respect-CFLAGS.patch:
176 + Improved fix to build system, see bug #360765
177 +
178 +*tor-0.2.2.23_alpha-r1 (25 Mar 2011)
179 +
180 + 25 Mar 2011; Anthony G. Basile <blueness@g.o>
181 + +tor-0.2.2.23_alpha-r1.ebuild,
182 + +files/tor-0.2.2.23_alpha-respect-CFLAGS.patch:
183 + Fixed build system to fully respect CFLAGS
184 +
185 + 25 Mar 2011; Anthony G. Basile <blueness@g.o>
186 + tor-0.2.2.23_alpha.ebuild:
187 + Removed superfluous USE flag
188 +
189 + 25 Mar 2011; Anthony G. Basile <blueness@g.o>
190 + -tor-0.2.2.22_alpha-r1.ebuild:
191 + Removed outdated alpha
192 +
193 + 22 Mar 2011; Thomas Kahle <tomka@g.o> tor-0.2.1.30.ebuild:
194 + x86 stable per bug 359789
195 +
196 + 21 Mar 2011; Christoph Mende <angelos@g.o> tor-0.2.1.30.ebuild:
197 + Stable on amd64 wrt bug #359789
198 +
199 + 21 Mar 2011; Kacper Kowalik <xarthisius@g.o> tor-0.2.1.30.ebuild:
200 + ppc/ppc64 stable wrt #359789
201 +
202 +*tor-0.2.2.23_alpha (11 Mar 2011)
203 +
204 + 11 Mar 2011; Anthony G. Basile <blueness@g.o>
205 + +tor-0.2.2.23_alpha.ebuild:
206 + Version bump on alpha and removal of deprecated vesion.
207 +
208 + 27 Feb 2011; Anthony G. Basile <blueness@g.o> +tor-0.2.1.29.ebuild:
209 + Reverted removal of only stable ebuild on most arches.
210 +
211 +*tor-0.2.1.30 (27 Feb 2011)
212 +
213 + 27 Feb 2011; Tomas Touceda <chiiph@g.o> -tor-0.2.1.29.ebuild,
214 + +tor-0.2.1.30.ebuild:
215 + Version bump and clean up.
216 +
217 + 12 Feb 2011; Raúl Porcel <armin76@g.o> tor-0.2.1.29-r1.ebuild:
218 + sparc stable wrt #351920
219 +
220 +*tor-0.2.2.22_alpha-r1 (10 Feb 2011)
221 +
222 + 10 Feb 2011; Anthony G. Basile <blueness@g.o>
223 + -tor-0.2.2.22_alpha.ebuild, +tor-0.2.2.22_alpha-r1.ebuild:
224 + Added /etc/tor/torrc for alpha.
225 +
226 +*tor-0.2.1.29-r1 (09 Feb 2011)
227 +
228 + 09 Feb 2011; Anthony G. Basile <blueness@g.o>
229 + +tor-0.2.1.29-r1.ebuild, +files/torrc:
230 + Added /etc/tor/torrc so tor works out of the box.
231 +
232 +*tor-0.2.2.22_alpha (01 Feb 2011)
233 +
234 + 01 Feb 2011; Tomas Touceda <chiiph@g.o> -tor-0.2.2.21_alpha.ebuild,
235 + +tor-0.2.2.22_alpha.ebuild:
236 + Version bump on alpha and cleanup.
237 +
238 + 24 Jan 2011; Anthony G. Basile <blueness@g.o> -tor-0.2.1.28.ebuild:
239 + Removed vulnerable version, see bug #351920
240 +
241 + 24 Jan 2011; Raúl Porcel <armin76@g.o> tor-0.2.1.29.ebuild:
242 + sparc stable
243 +
244 + 23 Jan 2011; Markus Meier <maekke@g.o> tor-0.2.1.29.ebuild:
245 + arm stable, bug #351920
246 +
247 + 18 Jan 2011; Christian Faulhammer <fauli@g.o> tor-0.2.1.29.ebuild:
248 + stable x86, security bug 351920
249 +
250 + 17 Jan 2011; Markos Chandras <hwoarang@g.o> tor-0.2.1.29.ebuild:
251 + Stable on amd64 wrt bug #351920
252 +
253 + 17 Jan 2011; <xarth@g.o> tor-0.2.1.29.ebuild:
254 + ppc/ppc64 stable wrt #351920
255 +
256 +*tor-0.2.2.21_alpha (17 Jan 2011)
257 +*tor-0.2.1.29 (17 Jan 2011)
258 +
259 + 17 Jan 2011; Tomas Touceda <chiiph@g.o> +tor-0.2.1.29.ebuild,
260 + -tor-0.2.2.20_alpha.ebuild, +tor-0.2.2.21_alpha.ebuild:
261 + Versiom bump. Clean old alpha.
262 +
263 +*tor-0.2.2.20_alpha (10 Jan 2011)
264 +
265 + 10 Jan 2011; Anthony G. Basile <blueness@g.o>
266 + +tor-0.2.2.20_alpha.ebuild:
267 + added alpha branch
268 +
269 + 07 Jan 2011; Christian Faulhammer <fauli@g.o> -tor-0.2.1.25.ebuild,
270 + -tor-0.2.1.26.ebuild, -tor-0.2.1.27.ebuild:
271 + clean up vulnerable versions
272 +
273 + 07 Jan 2011; Brent Baude <ranger@g.o> tor-0.2.1.28.ebuild:
274 + Marking tor-0.2.1.28 ppc for bug 349312
275 +
276 + 06 Jan 2011; Anthony G. Basile <blueness@g.o> metadata.xml:
277 + Removed fauli and added chiiph as maintainer
278 +
279 + 06 Jan 2011; Anthony G. Basile <blueness@g.o> metadata.xml:
280 + Added myself as maintainer
281 +
282 + 27 Dec 2010; Brent Baude <ranger@g.o> tor-0.2.1.28.ebuild:
283 + Marking tor-0.2.1.28 ppc64 for bug 349312
284 +
285 + 26 Dec 2010; Raúl Porcel <armin76@g.o> tor-0.2.1.28.ebuild:
286 + arm/sparc stable wrt #349312
287 +
288 + 26 Dec 2010; Markos Chandras <hwoarang@g.o> tor-0.2.1.28.ebuild:
289 + Stable on amd64 wrt bug #349312
290 +
291 + 25 Dec 2010; Christian Faulhammer <fauli@g.o> tor-0.2.1.28.ebuild:
292 + stable x86, security bug 349312
293 +
294 +*tor-0.2.1.28 (23 Dec 2010)
295 +
296 + 23 Dec 2010; Christian Faulhammer <fauli@g.o> +tor-0.2.1.28.ebuild:
297 + bump for security bug 349312
298 +
299 + 08 Dec 2010; Markus Meier <maekke@g.o> tor-0.2.1.27.ebuild:
300 + arm stable, bug #346759
301 +
302 + 03 Dec 2010; Christian Faulhammer <fauli@g.o> tor-0.2.1.27.ebuild:
303 + request USE=tordns on net-proxy/tsocks to raise level of anonymity
304 +
305 + 28 Nov 2010; Markos Chandras <hwoarang@g.o> tor-0.2.1.27.ebuild:
306 + Stable on amd64 wrt bug #346759
307 +
308 +*tor-0.2.1.27 (25 Nov 2010)
309 +
310 + 25 Nov 2010; Christian Faulhammer <fauli@g.o> +tor-0.2.1.27.ebuild:
311 + version bump, fixes OpenSSL issues, see bug 346715
312 +
313 + 14 Oct 2010; Brent Baude <ranger@g.o> tor-0.2.1.26.ebuild:
314 + stable ppc, bug 329879
315 +
316 + 30 Sep 2010; Brent Baude <ranger@g.o> tor-0.2.1.25.ebuild:
317 + stable ppc64, bug 309873
318 +
319 + 18 Sep 2010; Raúl Porcel <armin76@g.o> tor-0.2.1.26.ebuild:
320 + sparc stable wrt #329879
321 +
322 + 18 Aug 2010; Markus Meier <maekke@g.o> tor-0.2.1.26.ebuild:
323 + arm stable, bug #329879
324 +
325 + 30 Jul 2010; Markos Chandras <hwoarang@g.o> tor-0.2.1.26.ebuild:
326 + Stable on amd64 wrt bug #329879
327 +
328 + 26 Jul 2010; Christian Faulhammer <fauli@g.o> tor-0.2.1.26.ebuild:
329 + stable x86, bug 329879
330 +
331 +*tor-0.2.1.26 (24 Jun 2010)
332 +
333 + 24 Jun 2010; Christian Faulhammer <fauli@g.o> -tor-0.2.1.22.ebuild,
334 + +tor-0.2.1.26.ebuild:
335 + version bump for bug 325243 by Michael <gentoo AT scribeofthenile DOT
336 + com>, and clean up
337 +
338 + 06 Jun 2010; Raúl Porcel <armin76@g.o> tor-0.2.1.25.ebuild:
339 + arm stable wrt #300830
340 +
341 + 23 May 2010; Pacho Ramos <pacho@g.o> tor-0.2.1.25.ebuild:
342 + stable amd64, bug 309873
343 +
344 + 22 May 2010; Torsten Veller <tove@g.o> metadata.xml:
345 + Remove humpback from metadata.xml (#34793)
346 +
347 + 17 Apr 2010; Raúl Porcel <armin76@g.o> tor-0.2.1.22.ebuild,
348 + tor-0.2.1.25.ebuild:
349 + Add ~arm wrt #300830
350 +
351 + 05 Apr 2010; Raúl Porcel <armin76@g.o> tor-0.2.1.25.ebuild:
352 + sparc stable wrt #309873
353 +
354 + 24 Mar 2010; Brent Baude <ranger@g.o> tor-0.2.1.25.ebuild:
355 + stable ppc, bug 309873
356 +
357 + 24 Mar 2010; Christian Faulhammer <fauli@g.o> tor-0.2.1.25.ebuild:
358 + stable x86, bug 309873
359 +
360 + 23 Mar 2010; Christian Faulhammer <fauli@g.o>
361 + -tor-0.2.1.19-r2.ebuild, -files/tor-0.2.1.19-openssl.patch,
362 + -tor-0.2.1.20-r1.ebuild, -tor-0.2.1.21.ebuild:
363 + clean up
364 +
365 +*tor-0.2.1.25 (23 Mar 2010)
366 +
367 + 23 Mar 2010; Christian Faulhammer <fauli@g.o> +tor-0.2.1.25.ebuild:
368 + version bump
369 +
370 + 10 Feb 2010; Joseph Jezak <josejx@g.o> tor-0.2.1.22.ebuild:
371 + Marked ppc stable for bug #301701.
372 +
373 + 01 Feb 2010; Markus Meier <maekke@g.o> tor-0.2.1.22.ebuild:
374 + amd64 stable, bug #301701
375 +
376 + 30 Jan 2010; Raúl Porcel <armin76@g.o> tor-0.2.1.22.ebuild:
377 + sparc stable wrt #301701
378 +
379 + 22 Jan 2010; Brent Baude <ranger@g.o> tor-0.2.1.22.ebuild:
380 + Marking tor-0.2.1.22 ppc64 for bug 301701
381 +
382 + 22 Jan 2010; Christian Faulhammer <fauli@g.o> tor-0.2.1.22.ebuild:
383 + stable x86, bug 301701
384 +
385 +*tor-0.2.1.22 (22 Jan 2010)
386 +
387 + 22 Jan 2010; Christian Faulhammer <fauli@g.o> +tor-0.2.1.22.ebuild:
388 + version bump for security bug 301701
389 +
390 +*tor-0.2.1.21 (16 Jan 2010)
391 +
392 + 16 Jan 2010; Christian Faulhammer <fauli@g.o> +tor-0.2.1.21.ebuild:
393 + version bump, bug 301169 by Tim O'Kelly <bugs_gentoo_org DOT Tim_OKelly AT
394 + neverbox DOT org>
395 +
396 + 27 Dec 2009; Christian Faulhammer <fauli@g.o>
397 + -files/tor-0.2.0.30-logrotate.patch,
398 + -files/tor-0.2.0.33-no-internal-libevent.patch, -tor-0.2.0.35.ebuild,
399 + -tor-0.2.1.19.ebuild, -tor-0.2.1.19-r1.ebuild:
400 + clean up
401 +
402 + 26 Dec 2009; Raúl Porcel <armin76@g.o> tor-0.2.1.19-r2.ebuild:
403 + sparc stable wrt #294297
404 +
405 + 08 Dec 2009; Brent Baude <ranger@g.o> tor-0.2.1.19-r2.ebuild:
406 + Marking tor-0.2.1.19-r2 ppc64 for bug 294297
407 +
408 +*tor-0.2.1.20-r1 (06 Dec 2009)
409 +
410 + 06 Dec 2009; Christian Faulhammer <fauli@g.o> -tor-0.2.1.20.ebuild,
411 + +tor-0.2.1.20-r1.ebuild:
412 + reintroduce OpenSSL patch for bug 292661
413 +
414 +*tor-0.2.1.20 (02 Dec 2009)
415 +
416 + 02 Dec 2009; Christian Faulhammer <fauli@g.o> +tor-0.2.1.20.ebuild:
417 + version bump
418 +
419 + 25 Nov 2009; Markus Meier <maekke@g.o> tor-0.2.1.19-r2.ebuild:
420 + amd64 stable, bug #294297
421 +
422 + 24 Nov 2009; Christian Faulhammer <fauli@g.o>
423 + tor-0.2.1.19-r2.ebuild:
424 + stable x86, bug 294297
425 +
426 + 21 Nov 2009; nixnut <nixnut@g.o> tor-0.2.1.19-r2.ebuild:
427 + ppc stable #292022
428 +
429 +*tor-0.2.1.19-r2 (12 Nov 2009)
430 +
431 + 12 Nov 2009; Christian Faulhammer <fauli@g.o>
432 + +tor-0.2.1.19-r2.ebuild, +files/tor-0.2.1.19-openssl.patch:
433 + fix bug 2926611, patch discovered by Aidan Marks <aidan AT cisco DOT com>
434 +
435 + 07 Sep 2009; Christian Faulhammer <fauli@g.o> files/tor.initd-r4:
436 + respect CONFFILE variable in start calls, reported by Iome <frodone AT
437 + gmail DOT com> in bug 283524
438 +
439 +*tor-0.2.1.19-r1 (17 Aug 2009)
440 +
441 + 17 Aug 2009; Christian Faulhammer <fauli@g.o>
442 + +tor-0.2.1.19-r1.ebuild, +files/tor-0.2.1.19-logrotate.patch:
443 + fix logrotate support as provided by Martin von Gagern <Martin AT vGagern
444 + AT gmx DOT net> in bug 281439
445 +
446 + 06 Aug 2009; Christian Faulhammer <fauli@g.o>
447 + -tor-0.2.1.16_rc.ebuild:
448 + clean up release candidate
449 +
450 +*tor-0.2.1.19 (06 Aug 2009)
451 +
452 + 06 Aug 2009; Christian Faulhammer <fauli@g.o> +tor-0.2.1.19.ebuild:
453 + version bump
454 +
455 + 14 Jul 2009; Christian Faulhammer <fauli@g.o> -tor-0.2.0.34.ebuild:
456 + remove vulnerable version
457 +
458 + 12 Jul 2009; Joseph Jezak <josejx@g.o> tor-0.2.0.35.ebuild:
459 + Marked ppc stable for bug #275628.
460 +
461 + 30 Jun 2009; Brent Baude <ranger@g.o> tor-0.2.0.35.ebuild:
462 + Marking tor-0.2.0.35 ppc64 for bug 275628
463 +
464 + 30 Jun 2009; Raúl Porcel <armin76@g.o> tor-0.2.0.35.ebuild:
465 + sparc stable wrt #275628
466 +
467 + 29 Jun 2009; Christian Faulhammer <fauli@g.o> tor-0.2.0.34.ebuild,
468 + tor-0.2.0.35.ebuild, tor-0.2.1.16_rc.ebuild:
469 + fix HOMEPAGE entries
470 +
471 + 29 Jun 2009; Markus Meier <maekke@g.o> tor-0.2.0.35.ebuild:
472 + amd64 stable, bug #275628
473 +
474 +*tor-0.2.1.16_rc (29 Jun 2009)
475 +
476 + 29 Jun 2009; Christian Faulhammer <fauli@g.o>
477 + -tor-0.2.1.15_rc.ebuild, +tor-0.2.1.16_rc.ebuild:
478 + extend version bump for security bug 275628 and remove one vulnerable
479 + version
480 +
481 +*tor-0.2.0.35 (28 Jun 2009)
482 +
483 + 28 Jun 2009; Christian Faulhammer <fauli@g.o> +tor-0.2.0.35.ebuild:
484 + version bump for security bug 275628, directly stable for x86
485 +
486 + 17 Jun 2009; Christian Faulhammer <fauli@g.o>
487 + tor-0.2.1.15_rc.ebuild:
488 + remove all occurences of USE=bundledlibevent
489 +
490 +*tor-0.2.1.15_rc (17 Jun 2009)
491 +
492 + 17 Jun 2009; Christian Faulhammer <fauli@g.o>
493 + +tor-0.2.1.15_rc.ebuild:
494 + add release candidate for 0.2.1 series
495 +
496 + 12 Jun 2009; Christian Faulhammer <fauli@g.o>
497 + files/torrc.sample-0.1.2.6.patch, +tor-0.2.0.34.ebuild,
498 + -tor-0.2.0.34-r2.ebuild, +files/tor.initd-r4, -files/tor.initd-r6:
499 + revert all my changes for bug 268396 as they will break badly with
500 + Baselayout 1, see bug 272527
501 +
502 +*tor-0.2.0.34-r2 (03 Jun 2009)
503 +
504 + 03 Jun 2009; Christian Faulhammer <fauli@g.o> -files/tor.initd-r5,
505 + +files/tor.initd-r6, -tor-0.2.0.34-r1.ebuild, +tor-0.2.0.34-r2.ebuild:
506 + revision bump to make it compatible with Baselayout 1, as reported by
507 + Stanislav Cymbalov <DummyUnit AT gmail.com> in bug 272404
508 +
509 +*tor-0.2.0.34-r1 (03 Jun 2009)
510 +
511 + 03 Jun 2009; Christian Faulhammer <fauli@g.o>
512 + files/torrc.sample-0.1.2.6.patch, -files/tor.initd-r4,
513 + +files/tor.initd-r5, -tor-0.2.0.34.ebuild, +tor-0.2.0.34-r1.ebuild:
514 + Really respect limits from /etc/limits.d/ by some tweaks: moving user
515 + context switch from torrc to init script, including verification of config
516 + file in the latter; fixes bug 268396 by W. Elschner <gentoobugzilla_reply AT
517 + elschner DOT net>
518 +
519 + 19 Feb 2009; nixnut <nixnut@g.o> tor-0.2.0.34.ebuild:
520 + ppc stable
521 +
522 + 18 Feb 2009; Christian Faulhammer <fauli@g.o> -tor-0.2.0.33.ebuild:
523 + clean up vulnerable versions
524 +
525 + 15 Feb 2009; Markus Meier <maekke@g.o> tor-0.2.0.34.ebuild:
526 + amd64/x86 stable, bug #258833
527 +
528 + 13 Feb 2009; Brent Baude <ranger@g.o> tor-0.2.0.34.ebuild:
529 + Marking tor-0.2.0.34 ppc64 for bug 258833
530 +
531 + 13 Feb 2009; Ferris McCormick <fmccor@g.o> tor-0.2.0.34.ebuild:
532 + Sparc stable --- Security Bug #258833 --- tests good.
533 +
534 +*tor-0.2.0.34 (13 Feb 2009)
535 +
536 + 13 Feb 2009; Christian Faulhammer <fauli@g.o> +tor-0.2.0.34.ebuild:
537 + version bump for security bug 258833, reported by Jesse Adelman <jesse AT
538 + boldandbusted DOT com>
539 +
540 + 08 Feb 2009; Christian Faulhammer <fauli@g.o> tor-0.2.0.33.ebuild:
541 + kill logrotate USE flag as requested by bangert on bug 258188
542 +
543 + 05 Feb 2009; Christian Faulhammer <fauli@g.o>
544 + +files/tor-0.2.0.33-no-internal-libevent.patch, metadata.xml,
545 + tor-0.2.0.33.ebuild:
546 + make use of bundled libevent async DNS part optional via USE=flag, this
547 + should fix bug 206969
548 +
549 + 26 Jan 2009; Christian Faulhammer <fauli@g.o> -tor-0.2.0.32.ebuild,
550 + -tor-0.2.0.32-r1.ebuild:
551 + clean up
552 +
553 + 25 Jan 2009; Markus Meier <maekke@g.o> tor-0.2.0.33.ebuild:
554 + amd64/x86 stable, bug #256078
555 +
556 + 24 Jan 2009; Tobias Scherbaum <dertobi123@g.o> tor-0.2.0.33.ebuild:
557 + ppc stable, bug #256078
558 +
559 + 24 Jan 2009; Ferris McCormick <fmccor@g.o> tor-0.2.0.33.ebuild:
560 + Sparc stable, Security Bug #256078.
561 +
562 + 24 Jan 2009; Brent Baude <ranger@g.o> tor-0.2.0.33.ebuild:
563 + Marking tor-0.2.0.33 ppc64 for bug 256078
564 +
565 +*tor-0.2.0.33 (24 Jan 2009)
566 +
567 + 24 Jan 2009; Christian Faulhammer <fauli@g.o> +tor-0.2.0.33.ebuild:
568 + version bump for security bug 256078
569 +
570 +*tor-0.2.0.32-r1 (21 Dec 2008)
571 +
572 + 21 Dec 2008; Christian Faulhammer <fauli@g.o> +files/tor.conf,
573 + +tor-0.2.0.32-r1.ebuild:
574 + install limits file so tor can open more files on the system than normally
575 + allowed, this fixes bug 251171 reported by candrews AT integralblue DOT
576 + com
577 +
578 + 10 Dec 2008; Christian Faulhammer <fauli@g.o>
579 + -files/tor-0.2.0.31-sparc.patch, -tor-0.2.0.31-r1.ebuild:
580 + clean up
581 +
582 + 09 Dec 2008; Friedrich Oslage <bluebird@g.o> tor-0.2.0.32.ebuild:
583 + Stable on sparc, security bug #250018
584 +
585 + 08 Dec 2008; Brent Baude <ranger@g.o> tor-0.2.0.32.ebuild:
586 + Marking tor-0.2.0.32 ppc64 for bug 250018
587 +
588 + 08 Dec 2008; Markus Meier <maekke@g.o> tor-0.2.0.32.ebuild:
589 + x86 stable, bug #250018
590 +
591 + 07 Dec 2008; Tobias Scherbaum <dertobi123@g.o> tor-0.2.0.32.ebuild:
592 + ppc stable, bug #250018
593 +
594 + 07 Dec 2008; Richard Freeman <rich0@g.o> tor-0.2.0.32.ebuild:
595 + amd64 stable - 250018
596 +
597 +*tor-0.2.0.32 (06 Dec 2008)
598 +
599 + 06 Dec 2008; Christian Faulhammer <fauli@g.o> +tor-0.2.0.32.ebuild:
600 + version bump for security bug 250018
601 +
602 + 28 Nov 2008; Christian Faulhammer <fauli@g.o> metadata.xml:
603 + Change my email address
604 +
605 + 22 Nov 2008; Christian Faulhammer <opfer@g.o>
606 + -tor-0.2.0.30-r1.ebuild, -tor-0.2.0.31.ebuild, tor-0.2.0.31-r1.ebuild:
607 + clean up and add stable KEYWORDS for -r1
608 +
609 + 22 Nov 2008; Markus Meier <maekke@g.o> tor-0.2.0.31.ebuild:
610 + amd64 stable, bug #244679
611 +
612 + 14 Nov 2008; Ferris McCormick <fmccor@g.o> tor-0.2.0.31.ebuild,
613 + tor-0.2.0.31-r1.ebuild:
614 + Address sparc alignment problems reported in Bug #246483 --- this fixes them
615 + but is untested on anything else.
616 +
617 +*tor-0.2.0.31-r1 (14 Nov 2008)
618 +
619 + 14 Nov 2008; Ferris McCormick <fmccor@g.o>
620 + +files/tor-0.2.0.31-sparc.patch, +tor-0.2.0.31-r1.ebuild:
621 + Add new version to address sparc alignment problem, Bug #246483 which see
622 + for details.
623 +
624 + 01 Nov 2008; nixnut <nixnut@g.o> tor-0.2.0.31.ebuild:
625 + Stable on ppc wrt bug 244679
626 +
627 + 30 Oct 2008; Raúl Porcel <armin76@g.o> tor-0.2.0.31.ebuild:
628 + x86 stable #244679
629 +
630 + 28 Oct 2008; Ferris McCormick <fmccor@g.o> tor-0.2.0.31.ebuild:
631 + Sparc stable, Bug #244679.
632 +
633 + 27 Oct 2008; Brent Baude <ranger@g.o> tor-0.2.0.31.ebuild:
634 + stable ppc64, bug 244679
635 +
636 +*tor-0.2.0.31 (26 Sep 2008)
637 +
638 + 26 Sep 2008; Christian Faulhammer <opfer@g.o> +tor-0.2.0.31.ebuild:
639 + version bump for bug 238787
640 +
641 + 06 Sep 2008; Christian Faulhammer <opfer@g.o> files/tor.initd-r4:
642 + remove bashisms from init file, as reported in bug 236857 by Martin Väth
643 + <vaeth AT mathematik DOT uni-wuerzburg DOT de>
644 +
645 + 06 Sep 2008; Christian Faulhammer <opfer@g.o> -files/tor.initd-r3,
646 + -files/tor.logrotate.patch, -tor-0.1.2.19-r2.ebuild, -tor-0.2.0.30.ebuild:
647 + clean up
648 +
649 + 06 Sep 2008; Raúl Porcel <armin76@g.o> tor-0.2.0.30-r1.ebuild:
650 + x86 stable wrt #236536
651 +
652 + 06 Sep 2008; Brent Baude <ranger@g.o> tor-0.2.0.30-r1.ebuild:
653 + stable ppc64, bug 236536
654 +
655 + 06 Sep 2008; Richard Freeman <rich0@g.o> tor-0.2.0.30-r1.ebuild:
656 + amd64 stable - 236536
657 +
658 + 04 Sep 2008; Brent Baude <ranger@g.o> tor-0.2.0.30-r1.ebuild:
659 + stable ppc, bug 236536
660 +
661 + 03 Sep 2008; Ferris McCormick <fmccor@g.o> tor-0.2.0.30-r1.ebuild:
662 + Sparc stable --- Bug #236536 --- test suite passes.
663 +
664 +*tor-0.2.0.30-r1 (03 Sep 2008)
665 +
666 + 03 Sep 2008; Christian Faulhammer <opfer@g.o> +files/tor.initd-r4,
667 + +tor-0.2.0.30-r1.ebuild:
668 + update init script to prevent runtime failures as reported in bug 235208
669 +
670 +*tor-0.2.0.30 (03 Aug 2008)
671 +
672 + 03 Aug 2008; Christian Faulhammer <opfer@g.o>
673 + +files/tor-0.2.0.30-logrotate.patch, +tor-0.2.0.30.ebuild:
674 + version bump for bug 233612 by puchu <rauchwolke AT gmx DOT net>
675 +
676 + 29 May 2008; Christian Faulhammer <opfer@g.o> -tor-0.1.2.19.ebuild:
677 + clean up
678 +
679 + 29 May 2008; Raúl Porcel <armin76@g.o> tor-0.1.2.19-r2.ebuild:
680 + sparc stable wrt #223705, thanks to Friedrich Oslage for testing
681 +
682 + 28 May 2008; Peter Volkov <pva@g.o> tor-0.1.2.19-r2.ebuild:
683 + amd64 stable, bug #223705.
684 +
685 + 27 May 2008; Markus Rothe <corsair@g.o> tor-0.1.2.19-r2.ebuild:
686 + Stable on ppc64; bug #223705
687 +
688 + 26 May 2008; nixnut <nixnut@g.o> tor-0.1.2.19-r2.ebuild:
689 + Stable on ppc wrt bug 223705
690 +
691 + 26 May 2008; Christian Faulhammer <opfer@g.o>
692 + tor-0.1.2.19-r2.ebuild:
693 + stable x86, bug 223705
694 +
695 +*tor-0.1.2.19-r2 (29 Apr 2008)
696 +
697 + 29 Apr 2008; Christian Faulhammer <opfer@g.o>
698 + -tor-0.1.2.19-r1.ebuild, +tor-0.1.2.19-r2.ebuild:
699 + logrotate should now really work again
700 +
701 +*tor-0.1.2.19-r1 (25 Apr 2008)
702 +
703 + 25 Apr 2008; Christian Faulhammer <opfer@g.o>
704 + +tor-0.1.2.19-r1.ebuild:
705 + create the logrotate file with the correct permissions as pointed out on bug
706 + 216298 by Serge Koksharov <gentoosiast AT yandex DOT ru>
707 +
708 + 05 Mar 2008; Christian Faulhammer <opfer@g.o> -tor-0.1.2.18.ebuild:
709 + clean up
710 +
711 + 04 Mar 2008; Richard Freeman <rich0@g.o> tor-0.1.2.19.ebuild:
712 + amd64 stable - 211021
713 +
714 + 04 Mar 2008; Brent Baude <ranger@g.o> tor-0.1.2.19.ebuild:
715 + stable ppc64, bug 211021
716 +
717 + 03 Mar 2008; Raúl Porcel <armin76@g.o> tor-0.1.2.19.ebuild:
718 + sparc stable wrt #211021
719 +
720 + 02 Mar 2008; nixnut <nixnut@g.o> tor-0.1.2.19.ebuild:
721 + Stable on ppc wrt bug 211021
722 +
723 + 01 Mar 2008; Christian Faulhammer <opfer@g.o> metadata.xml:
724 + adding myself to metadata.xml
725 +
726 + 01 Mar 2008; Christian Faulhammer <opfer@g.o> tor-0.1.2.19.ebuild:
727 + stable x86, bug 211021
728 +
729 + 07 Feb 2008; Christian Faulhammer <opfer@g.o> -files/tor.initd-r2,
730 + -tor-0.1.2.17.ebuild:
731 + clean up
732 +
733 + 07 Feb 2008; Raúl Porcel <armin76@g.o> tor-0.1.2.18.ebuild:
734 + sparc stable wrt #208336
735 +
736 + 06 Feb 2008; nixnut <nixnut@g.o> tor-0.1.2.18.ebuild:
737 + stable on ppc wrt bug #208336
738 +
739 + 02 Feb 2008; Richard Freeman <rich0@g.o> tor-0.1.2.18.ebuild:
740 + amd64 stable - #208336
741 +
742 + 31 Jan 2008; Brent Baude <ranger@g.o> tor-0.1.2.18.ebuild:
743 + Marking tor-0.1.2.18 ppc64 stable for bug 208336
744 +
745 + 31 Jan 2008; Christian Faulhammer <opfer@g.o> tor-0.1.2.18.ebuild:
746 + stable x86, bug 208336
747 +
748 +*tor-0.1.2.19 (31 Jan 2008)
749 +
750 + 31 Jan 2008; Christian Faulhammer <opfer@g.o> +tor-0.1.2.19.ebuild:
751 + version bump
752 +
753 +*tor-0.1.2.18 (03 Jan 2008)
754 +
755 + 03 Jan 2008; Christian Faulhammer <opfer@g.o> -tor-0.1.2.16.ebuild,
756 + -tor-0.1.2.16-r1.ebuild, +tor-0.1.2.18.ebuild:
757 + version bump (bug 199818) and clean up
758 +
759 + 03 Sep 2007; Tobias Scherbaum <dertobi123@g.o> tor-0.1.2.17.ebuild:
760 + ppc stable, bug #190968
761 +
762 + 02 Sep 2007; Jose Luis Rivero <yoswink@g.o> tor-0.1.2.17.ebuild:
763 + Stable on sparc wrt security bug #190968
764 +
765 + 02 Sep 2007; Markus Rothe <corsair@g.o> tor-0.1.2.17.ebuild:
766 + Stable on ppc64; bug #190968
767 +
768 + 02 Sep 2007; Christoph Mende <angelos@g.o> tor-0.1.2.17.ebuild:
769 + Stable on amd64 wrt security bug #190968
770 +
771 +*tor-0.1.2.17 (02 Sep 2007)
772 +
773 + 02 Sep 2007; Christian Faulhammer <opfer@g.o> +tor-0.1.2.17.ebuild:
774 + version bump and stable x86, security bug 190968
775 +
776 + 29 Aug 2007; Gustavo Felisberto <humpback@g.o> files/tor.initd-r3:
777 + Adding correct init script.
778 +
779 +*tor-0.1.2.16-r1 (28 Aug 2007)
780 +
781 + 28 Aug 2007; Gustavo Felisberto <humpback@g.o>
782 + -files/torrc.sample-0.1.0.16.patch, -files/torrc.sample-0.1.1.23.patch,
783 + -files/tor.confd, -files/tor.initd, -files/tor.initd-r1,
784 + +files/tor.initd-r3, -tor-0.1.1.23.ebuild, -tor-0.1.1.26.ebuild,
785 + -tor-0.1.2.14.ebuild, +tor-0.1.2.16-r1.ebuild:
786 + Removed older versions and dangled files. Fixed bug with init with
787 + baselayout-2 closes 189724. Thanks to Christian Faulhammer (opfer) for the
788 + fix.
789 +
790 + 09 Aug 2007; Robert Buchholz <rbu@g.o> tor-0.1.2.16.ebuild:
791 + Stable on amd64 (bug #186644)
792 +
793 + 06 Aug 2007; Gustavo Zacarias <gustavoz@g.o> tor-0.1.2.16.ebuild:
794 + Stable on sparc wrt security #186644
795 +
796 + 04 Aug 2007; Markus Rothe <corsair@g.o> tor-0.1.2.16.ebuild:
797 + Stable on ppc64; bug #186644
798 +
799 + 04 Aug 2007; Tobias Scherbaum <dertobi123@g.o> tor-0.1.2.16.ebuild:
800 + ppc stable, bug #186644
801 +
802 + 03 Aug 2007; Christian Faulhammer <opfer@g.o> tor-0.1.2.16.ebuild:
803 + stable x86, security bug 186644
804 +
805 +*tor-0.1.2.16 (03 Aug 2007)
806 +
807 + 03 Aug 2007; Christian Faulhammer <opfer@g.o> +tor-0.1.2.16.ebuild:
808 + version bump, for security bug 186644
809 +
810 + 02 Jun 2007; René Nussbaumer <killerfox@g.o> tor-0.1.2.14.ebuild:
811 + Stable on ppc. See bug #180139.
812 +
813 + 31 May 2007; Christoph Mende <angelos@g.o> tor-0.1.2.14.ebuild:
814 + Stable on amd64 wrt security bug 180139
815 +
816 + 31 May 2007; Brent Baude <ranger@g.o> tor-0.1.2.14.ebuild:
817 + Marking tor-0.1.2.14 ppc64 stable for bug#180139
818 +
819 + 31 May 2007; Gustavo Zacarias <gustavoz@g.o> tor-0.1.2.14.ebuild:
820 + Stable on sparc wrt security #180139
821 +
822 + 31 May 2007; Christian Faulhammer <opfer@g.o> tor-0.1.2.14.ebuild:
823 + stable x86, security bug 180139
824 +
825 +*tor-0.1.2.14 (31 May 2007)
826 +
827 + 31 May 2007; <humpback@g.o> -tor-0.1.0.18.ebuild,
828 + -tor-0.1.0.18-r1.ebuild, -tor-0.1.2.13.ebuild, +tor-0.1.2.14.ebuild:
829 + Bumped 0.1.2.13 to 0.1.2.14, removed older versions. Fixed #178975 with idea
830 + from Remy Blank
831 +
832 + 15 May 2007; <humpback@g.o> tor-0.1.0.18.ebuild,
833 + tor-0.1.0.18-r1.ebuild, tor-0.1.1.23.ebuild, tor-0.1.1.26.ebuild,
834 + tor-0.1.2.13.ebuild:
835 + Added keepdir. Close Bug #177590.
836 +
837 + 15 May 2007; <humpback@g.o> tor-0.1.1.23.ebuild,
838 + tor-0.1.1.26.ebuild:
839 + Fixed missing RDEP's. Close Bug #174185.
840 +
841 +*tor-0.1.2.13 (15 May 2007)
842 +
843 + 15 May 2007; <humpback@g.o> +files/tor.initd-r2,
844 + -tor-0.1.2.6_alpha.ebuild, +tor-0.1.2.13.ebuild:
845 + Removed alpha 1.2 release and added a bump. Help from all in bug #176018,
846 + specially jakub, was very much apretiated.
847 +
848 + 29 Apr 2007; Torsten Veller <tove@g.o> tor-0.1.1.23.ebuild,
849 + tor-0.1.1.26.ebuild, tor-0.1.2.6_alpha.ebuild:
850 + Fix *initd, *confd and *envd calls (#173884, #174266)
851 +
852 +*tor-0.1.2.6_alpha (27 Jan 2007)
853 +
854 + 27 Jan 2007; Gustavo Felisberto <humpback@g.o>;
855 + +files/torrc.sample-0.1.2.6.patch, +tor-0.1.2.6_alpha.ebuild:
856 + Added alpha release of tor at request from Flameeyes. It seems tork needs
857 + it. As always, if it is masked and you install and destroy your system dont
858 + come complain alot.
859 +
860 +*tor-0.1.1.26 (18 Dec 2006)
861 +
862 + 18 Dec 2006; Gustavo Felisberto <humpback@g.o>;
863 + -tor-0.1.1.24.ebuild, +tor-0.1.1.26.ebuild:
864 + Bumped to 0.1.1.26 and removed older version.
865 +
866 +*tor-0.1.0.18-r1 (22 Oct 2006)
867 +
868 + 22 Oct 2006; Gustavo Felisberto <humpback@g.o>;
869 + tor-0.1.0.18.ebuild, +tor-0.1.0.18-r1.ebuild:
870 + Small configuration issue in the chroot. Fixes bug #139354.
871 +
872 + 21 Oct 2006; Gustavo Felisberto <humpback@g.o>;
873 + tor-0.1.0.18.ebuild, tor-0.1.1.23.ebuild, tor-0.1.1.24.ebuild:
874 + Added ewarn about the needed dot in the privoxy integration. Closes bug
875 + #152137.
876 +
877 +*tor-0.1.1.24 (09 Oct 2006)
878 +
879 + 09 Oct 2006; Gustavo Felisberto <humpback@g.o>;
880 + +tor-0.1.1.24.ebuild:
881 + Bump from 0.1.1.23
882 +
883 + 11 Sep 2006; Gustavo Felisberto <humpback@g.o>;
884 + tor-0.1.0.18.ebuild:
885 + Changed einfo about configuration of chroot. Removes tor from bug #140371
886 +
887 + 05 Sep 2006; Gustavo Felisberto <humpback@g.o>;
888 + -files/torrc.sample-0.1.0.14.patch, -tor-0.1.0.14-r1.ebuild,
889 + -tor-0.1.0.16.ebuild, -tor-0.1.0.17.ebuild, -tor-0.1.1.20.ebuild,
890 + -tor-0.1.1.22.ebuild:
891 + Removed older version that had sec issues.
892 +
893 + 30 Aug 2006; Gustavo Zacarias <gustavoz@g.o> tor-0.1.0.18.ebuild,
894 + tor-0.1.1.23.ebuild:
895 + Stable on sparc wrt security #145458
896 +
897 + 30 Aug 2006; <blubb@g.o> tor-0.1.0.18.ebuild, tor-0.1.1.23.ebuild:
898 + stable on amd64 wrt bug 145458
899 +
900 + 30 Aug 2006; Joshua Jackson <tsunam@g.o> tor-0.1.0.18.ebuild,
901 + tor-0.1.1.23.ebuild:
902 + Stable x86; security bug #145458
903 +
904 + 29 Aug 2006; Markus Rothe <corsair@g.o> tor-0.1.0.18.ebuild,
905 + tor-0.1.1.23.ebuild:
906 + Stable on ppc64; bug #145458
907 +
908 + 29 Aug 2006; Tobias Scherbaum <dertobi123@g.o> tor-0.1.0.18.ebuild,
909 + tor-0.1.1.23.ebuild:
910 + ppc stable, bug #145458
911 +
912 +*tor-0.1.0.18 (29 Aug 2006)
913 +
914 + 29 Aug 2006; Gustavo Felisberto <humpback@g.o>;
915 + +tor-0.1.0.18.ebuild:
916 + Adding 0.1.0.18 that fixes sec issue in the 0.1.0.* series. The 0.1.1.23 is
917 + not affected.
918 +
919 +*tor-0.1.1.23 (24 Aug 2006)
920 +
921 + 24 Aug 2006; Gustavo Felisberto <humpback@g.o>;
922 + +files/torrc.sample-0.1.1.23.patch, +tor-0.1.1.23.ebuild:
923 + Updated version, bump and small cosmetics. Thanks to Olivier Mondolini in
924 + bug #144417.
925 +
926 + 16 Jul 2006; Diego Pettenò <flameeyes@g.o> tor-0.1.1.22.ebuild:
927 + Add ~x86-fbsd keyword.
928 +
929 +*tor-0.1.1.22 (08 Jul 2006)
930 +
931 + 08 Jul 2006; Gustavo Felisberto <humpback@g.o>;
932 + +tor-0.1.1.22.ebuild:
933 + Bump to 0.1.1.22. Closes bug # 138073.
934 +
935 + 05 Jun 2006; Simon Stelling <blubb@g.o> tor-0.1.1.20.ebuild:
936 + stable on amd64 wrt bug 134329
937 +
938 + 01 Jun 2006; Gustavo Zacarias <gustavoz@g.o> tor-0.1.1.20.ebuild:
939 + Stable on sparc wrt security #134329
940 +
941 + 01 Jun 2006; Tobias Scherbaum <dertobi123@g.o> tor-0.1.1.20.ebuild:
942 + ppc stable, bug #134329
943 +
944 + 01 Jun 2006; Markus Rothe <corsair@g.o> tor-0.1.1.20.ebuild:
945 + Stable on ppc64; bug #134329
946 +
947 + 01 Jun 2006; Joshua Jackson <tsunam@g.o> tor-0.1.1.20.ebuild:
948 + Stable on x86; security bug #134329
949 +
950 +*tor-0.1.1.20 (01 Jun 2006)
951 +
952 + 01 Jun 2006; Stefan Cornelius <dercorny@g.o> +tor-0.1.1.20.ebuild:
953 + Bumping to version 0.1.1.20 for security bugs #134329 and #118918
954 +
955 + 23 Apr 2006; Emanuele Giaquinta <exg@g.o> tor-0.1.0.14-r1.ebuild,
956 + tor-0.1.0.16.ebuild, tor-0.1.0.17.ebuild:
957 + Move enew{group,user} in pkg_setup.
958 +
959 +*tor-0.1.0.17 (28 Feb 2006)
960 +
961 + 28 Feb 2006; Gustavo Felisberto <humpback@g.o>;
962 + +tor-0.1.0.17.ebuild:
963 + Bump to 0.1.017. Credits go to Christian Mandery in bug #123530 for
964 + reporting this.
965 +
966 +*tor-0.1.0.16 (04 Jan 2006)
967 +
968 + 04 Jan 2006; Gustavo Felisberto <humpback@g.o>;
969 + +files/torrc.sample-0.1.0.16.patch, +files/tor.confd, +files/tor.initd-r1,
970 + +tor-0.1.0.16.ebuild:
971 + Adding tor 1.0.16 to portage. Arch teams please dont mark stable as the new
972 + chroot stuff needs serious testing.
973 +
974 +*tor-0.1.0.14-r1 (11 Sep 2005)
975 +
976 + 11 Sep 2005; Gustavo Felisberto <humpback@g.o>; files/tor.initd,
977 + -tor-0.1.0.14.ebuild, +tor-0.1.0.14-r1.ebuild:
978 + I was having some strange issues with sending signal 2 to tor. And we do not
979 + need a SIGINT, a SIGTERM is fine.
980 +
981 + 06 Sep 2005; Gustavo Felisberto <humpback@g.o>;
982 + -files/torrc.sample.patch-00, -tor-0.0.9.10.ebuild:
983 + Removing older version.
984 +
985 + 16 Aug 2005; Jason Wever <weeve@g.o> tor-0.1.0.14.ebuild:
986 + Stable on SPARC wrt security bug #102245.
987 +
988 + 15 Aug 2005; Michael Hanselmann <hansmi@g.o> tor-0.1.0.14.ebuild:
989 + Stable on ppc.
990 +
991 + 15 Aug 2005; Markus Rothe <corsair@g.o> tor-0.1.0.14.ebuild:
992 + Stable on ppc64 (bug #102245)
993 +
994 +*tor-0.1.0.14 (14 Aug 2005)
995 +
996 + 14 Aug 2005; Gustavo Felisberto <humpback@g.o>;
997 + +files/torrc.sample-0.1.0.14.patch, +tor-0.1.0.14.ebuild:
998 + Adding new version as amd64 and x86 due to sec bug. See #102245
999 +
1000 + 20 Jul 2005; Herbie Hopkins <herbs@g.o> tor-0.0.9.10.ebuild:
1001 + Stable on amd64.
1002 +
1003 + 22 Jun 2005; Gustavo Zacarias <gustavoz@g.o> tor-0.0.9.10.ebuild:
1004 + Stable on sparc
1005 +
1006 + 21 Jun 2005; Michael Hanselmann <hansmi@g.o> tor-0.0.9.10.ebuild:
1007 + Stable on ppc (#96320).
1008 +
1009 + 21 Jun 2005; Markus Rothe <corsair@g.o> tor-0.0.9.10.ebuild:
1010 + Stable on ppc64
1011 +
1012 +*tor-0.0.9.10 (16 Jun 2005)
1013 +
1014 + 16 Jun 2005; Gustavo Felisberto <humpback@g.o>;
1015 + -tor-0.0.9.5.ebuild, -tor-0.0.9.6.ebuild, -tor-0.0.9.7.ebuild,
1016 + -tor-0.0.9.9.ebuild, +tor-0.0.9.10.ebuild:
1017 + Added version 0.9.0.10 that fixes a security bug, removed older versions
1018 + that were affected.
1019 +
1020 + 12 Jun 2005; Gustavo Felisberto <humpback@g.o>; tor-0.0.9.5.ebuild,
1021 + tor-0.0.9.6.ebuild, tor-0.0.9.7.ebuild, tor-0.0.9.9.ebuild:
1022 + New HOMEPAGE, thanks to Matteo in bug #95754.
1023 +
1024 + 18 May 2005; Markus Rothe <corsair@g.o> tor-0.0.9.6.ebuild:
1025 + Stable on ppc64
1026 +
1027 + 01 May 2005; Michael Hanselmann <hansmi@g.o> tor-0.0.9.5.ebuild:
1028 + Stable on ppc.
1029 +
1030 +*tor-0.0.9.9 (25 Apr 2005)
1031 +
1032 + 25 Apr 2005; Gustavo Felisberto <humpback@g.o>; tor-0.0.9.5.ebuild,
1033 + tor-0.0.9.6.ebuild, +tor-0.0.9.9.ebuild:
1034 + Removing older versions and bumping to 0.9.9 .
1035 +
1036 + 22 Apr 2005; Alin Nastac <mrness@g.o> tor-0.0.9.5.ebuild,
1037 + tor-0.0.9.6.ebuild, tor-0.0.9.7.ebuild:
1038 + net-misc/tsocks -> net-proxy/tsocks
1039 +
1040 + 08 Apr 2005; Gustavo Zacarias <gustavoz@g.o> tor-0.0.9.7.ebuild:
1041 + Keyworded ~sparc wrt #88305
1042 +
1043 +*tor-0.0.9.7 (01 Apr 2005)
1044 +
1045 + 01 Apr 2005; Gustavo Felisberto <humpback@g.o>; +tor-0.0.9.7.ebuild:
1046 + Bumped
1047 +
1048 + 29 Mar 2005; Markus Rothe <corsair@g.o> tor-0.0.9.6.ebuild:
1049 + Added ~ppc64 to KEYWORDS; bug #86993
1050 +
1051 +*tor-0.0.9.6 (25 Mar 2005)
1052 +
1053 + 25 Mar 2005; Gustavo Felisberto <humpback@g.o>; +tor-0.0.9.6.ebuild:
1054 + Bumped to 0.0.9.6
1055 +
1056 + 23 Mar 2005; Gustavo Felisberto <humpback@g.o>; files/tor.initd:
1057 + Changed init script to send SIGINT at shutdown. May increase the shutdown time
1058 + of servers, but will close in a more clean way.
1059 +
1060 + 25 Feb 2005; Gustavo Felisberto <humpback@g.o>;
1061 + -tor-0.0.9.4-r1.ebuild, -tor-0.0.9.4-r2.ebuild, tor-0.0.9.5.ebuild:
1062 + Marking latest as x86 and removing older versions.
1063 +
1064 +*tor-0.0.9.5 (23 Feb 2005)
1065 +
1066 + 23 Feb 2005; Gustavo Felisberto <humpback@g.o>;
1067 + tor-0.0.9.4-r2.ebuild, +tor-0.0.9.5.ebuild:
1068 + Adding version 0.0.9.5 and marking 0.0.9.4-r2 as x86.
1069 +
1070 +*tor-0.0.9.4-r2 (13 Feb 2005)
1071 +
1072 + 13 Feb 2005; Gustavo Felisberto <humpback@g.o>; files/tor.initd,
1073 + +files/torrc.sample.patch-00, -tor-0.0.8.1.ebuild, -tor-0.0.9.1.ebuild,
1074 + -tor-0.0.9.2.ebuild, +tor-0.0.9.4-r2.ebuild, -tor-0.0.9.4.ebuild:
1075 + Adding new version that properly patches the sample config and deleting older
1076 + versions. Lost the stable ppc-macos but that arch is lagging way to much.
1077 +
1078 +*tor-0.0.9.4-r1 (10 Feb 2005)
1079 +
1080 + 10 Feb 2005; Gustavo Felisberto <humpback@g.o>; +files/tor.initd,
1081 + +tor-0.0.9.4-r1.ebuild:
1082 + Using ideas in bug #75381 from Faustus <orlovm@×××××××××.il> and after talking
1083 + to latexer i'm commiting this version that can use a init.d script for easier
1084 + usage.
1085 +
1086 +*tor-0.0.9.4 (04 Feb 2005)
1087 +
1088 + 04 Feb 2005; Peter Johanson <latexer@g.o> +tor-0.0.9.4.ebuild:
1089 + Bump.
1090 +
1091 + 09 Jan 2005; Marcus Hanwell <cryos@g.o> tor-0.0.9.2.ebuild:
1092 + Marked ~amd64, closes bug 76780.
1093 +
1094 +*tor-0.0.9.2 (04 Jan 2005)
1095 +
1096 + 04 Jan 2005; Peter Johanson <latexer@g.o> +tor-0.0.9.2.ebuild:
1097 + Bump.
1098 +
1099 +*tor-0.0.9.1 (16 Dec 2004)
1100 +
1101 + 16 Dec 2004; Peter Johanson <latexer@g.o> +tor-0.0.9.1.ebuild:
1102 + Bump. Add tsocks dependancy, see bug #70879
1103 +
1104 + 20 Oct 2004; Peter Johanson <latexer@g.o> -tor-0.0.6.1.ebuild,
1105 + -tor-0.0.6.ebuild, -tor-0.0.7.2.ebuild, -tor-0.0.7.3.ebuild,
1106 + -tor-0.0.7.ebuild:
1107 + Remove old vulnerable versions. See bug #67756
1108 +
1109 + 21 Oct 2004; Joseph Jezak <josejx@g.o> tor-0.0.8.1.ebuild:
1110 + Keyworded ppc-macos and macos due to vulnerability in previous versions.
1111 + Removed tsocks RDEPEND at the request of latexer. See bug #67756
1112 +
1113 +*tor-0.0.8.1 (17 Oct 2004)
1114 +
1115 + 17 Oct 2004; <peter@g.o> +tor-0.0.8.1.ebuild, -tor-0.0.8.ebuild:
1116 + Bump and remove 0.0.8 which is vulnerable to a remote DoS. See bug #67756.
1117 +
1118 +*tor-0.0.8 (06 Oct 2004)
1119 +
1120 + 06 Oct 2004; <peter@g.o> tor-0.0.6.1.ebuild, tor-0.0.6.ebuild,
1121 + tor-0.0.7.2.ebuild, tor-0.0.7.3.ebuild, tor-0.0.7.ebuild, +tor-0.0.8.ebuild:
1122 + Bump. Also fix the license as this is really under 3-clause BSD.
1123 +
1124 +*tor-0.0.7.3 (15 Aug 2004)
1125 +
1126 + 15 Aug 2004; Peter Johanson <latexer@g.o> +tor-0.0.7.3.ebuild:
1127 + Bump. Only needed for servers.
1128 +
1129 + 25 Jul 2004; Lina Pezzella <j4rg0n@g.o>
1130 + Fixed Manifest.
1131 +
1132 + 24 Jul 2004; Erik Swanson <erik@g.o> tor-0.0.7.2.ebuild:
1133 + Added macos to KEYWORDS
1134 +
1135 +*tor-0.0.7.2 (15 Jul 2004)
1136 +
1137 + 15 Jul 2004; Peter Johanson <latexer@g.o> +tor-0.0.7.2.ebuild:
1138 + Bump to latest version. tsocks is now a depend for everything but macos, since
1139 + tsocks no worky there.
1140 +
1141 +*tor-0.0.7 (07 Jun 2004)
1142 +
1143 + 07 Jun 2004; Peter Johanson,,, <peter@g.o> tor-0.0.2_pre27.ebuild,
1144 + tor-0.0.5.ebuild, tor-0.0.6_rc1.ebuild, tor-0.0.7.ebuild:
1145 + Bump to lates release, and remove older versions.
1146 +
1147 +*tor-0.0.6.1 (06 May 2004)
1148 +
1149 + 06 May 2004; Peter Johanson <latexer@g.o> tor-0.0.6.1.ebuild:
1150 + Bump.
1151 +
1152 + 02 May 2004; Peter Johanson <latexer@g.o> tor-0.0.6.ebuild:
1153 + Adding back ~ppc, as dholm wants me to keep it around for future updates.
1154 +
1155 +*tor-0.0.6 (02 May 2004)
1156 +
1157 + 02 May 2004; Peter Johanson <latexer@g.o> tor-0.0.6.ebuild:
1158 + Bump to latest release.
1159 +
1160 + 30 Apr 2004; David Holm <dholm@g.o> tor-0.0.6_rc1.ebuild:
1161 + Added to ~ppc.
1162 +
1163 +*tor-0.0.6_rc1 (29 Apr 2004)
1164 +
1165 + 29 Apr 2004; Peter Johanson <latexer@g.o> tor-0.0.6_rc1.ebuild:
1166 + Bump to latest. Beware, this version is not backwards compatible with older
1167 + versions.
1168 +
1169 +*tor-0.0.5 (30 Mar 2004)
1170 +
1171 + 30 Mar 2004; Peter Johanson <latexer@g.o> tor-0.0.2_pre21.ebuild,
1172 + tor-0.0.2_pre22.ebuild, tor-0.0.2_pre23.ebuild, tor-0.0.2_pre24.ebuild,
1173 + tor-0.0.2_pre25.ebuild, tor-0.0.5.ebuild:
1174 + Bump to latest release. Removed a bunch of the old stuff. Initscript coming
1175 + soon, i swear.
1176 +
1177 +*tor-0.0.2_pre27 (15 Mar 2004)
1178 +
1179 + 15 Mar 2004; Peter Johanson <latexer@g.o> tor-0.0.2_pre27.ebuild:
1180 + Bump.
1181 +
1182 +*tor-0.0.2_pre25 (04 Mar 2004)
1183 +
1184 + 04 Mar 2004; Peter Johanson <latexer@g.o> tor-0.0.2_pre25.ebuild:
1185 + Bump. Fixes a crash due to DNS stuff.
1186 +
1187 +*tor-0.0.2_pre24 (03 Mar 2004)
1188 +
1189 + 03 Mar 2004; Peter Johanson <latexer@g.o> tor-0.0.2_pre24.ebuild:
1190 + Bump
1191 +
1192 +*tor-0.0.2_pre23 (29 Feb 2004)
1193 +
1194 + 29 Feb 2004; Peter Johanson <latexer@g.o> tor-0.0.2_pre23.ebuild:
1195 + Bump
1196 +
1197 +*tor-0.0.2_pre22 (28 Feb 2004)
1198 +
1199 + 28 Feb 2004; Peter Johanson <latexer@g.o> tor-0.0.2_pre22.ebuild:
1200 + Bump
1201 +
1202 +*tor-0.0.2_pre21 (22 Feb 2004)
1203 +
1204 + 22 Feb 2004; Peter Johanson <latexer@g.o> metadata.xml,
1205 + tor-0.0.2_pre21.ebuild:
1206 + Initial Commit. Ebuild by yours truly.
1207 +
1208
1209 diff --git a/net-misc/tor/Manifest b/net-misc/tor/Manifest
1210 new file mode 100644
1211 index 0000000..ff56277
1212 --- /dev/null
1213 +++ b/net-misc/tor/Manifest
1214 @@ -0,0 +1,22 @@
1215 +-----BEGIN PGP SIGNED MESSAGE-----
1216 +Hash: SHA256
1217 +
1218 +AUX tor-0.2.2.24_alpha-respect-CFLAGS.patch 1001 RMD160 f623fd1f40cd2175c0c5b6bea3441fc87f7e8d0a SHA1 c8634481cd8273f98945f17f297f2506331d3b8d SHA256 2107434c7e7243d24043cf87eeccf60643e0cf94e8a883ebd725c23e13e667e8
1219 +AUX tor-0.2.3.2_alpha-fix-asneeded.patch 654 RMD160 faf9cc37942dfa7f52dbe849c1819b24c0ab7940 SHA1 4400ed72fa60d04a96c82f0aba7c6eb41e23f5c5 SHA256 4500436719cb96a17bfd4eb67b2ebf2b1db222904bf1b14b75cc17b8f1b41345
1220 +AUX tor.confd 44 RMD160 d19946be72538d0826667730e9e9a1736b0385ff SHA1 f9a40fadd018794e537282344f01c609e4dbeac7 SHA256 41d780f291847e19f632428bbf27c3f289414afd237546d2974da1b75384c25c
1221 +AUX tor.initd-r4 1553 RMD160 df0fc912c2e36797059de07d15a384d9ffe7d393 SHA1 82323d97b6d790b41027eec01e263d226c5b83e9 SHA256 4bf3c0906b0406564394eb51d47c1b5566904ed459e31ec1b1c1162c3b4aee92
1222 +AUX torrc-r1 150 RMD160 e44d8b4b371978f09c536c234abbe9d8779eda4c SHA1 36c64d7a1ab33931045e77c3738321ab73141d01 SHA256 0283d644362b9fd36d3d21bb1b0c47e9776de15769a445fcc86e1a8fa5abf139
1223 +AUX torrc.sample.patch 1292 RMD160 7199aa35ede10a2cf76e8deea47a7e399c3188f9 SHA1 aec4b133f7472c0a011b0724dafae464c31f3661 SHA256 7c8dcf90eacc25745d26562dd8d6956def92880948e859b5e75c6bea5f35322e
1224 +DIST tor-0.2.2.32.tar.gz 2701371 RMD160 649c21f7ec89e34774c79db6544b612f0895bb61 SHA1 4baddc836931b3e915974c261e405e111636b716 SHA256 8744328c10b54950e08ee404a75a0e76865be0615cad6f7ffc8c75af7151ef4d
1225 +DIST tor-0.2.3.2-alpha.tar.gz 2755750 RMD160 d34ac6b45360af873202a6884ce12ccf0420adee SHA1 020eb00aaaafa1e7102ae8fd95d3d6a719a61289 SHA256 8f423af73c8d8477752858cfcc0c15860f487a0f9a390e791eaea22f4b467edd
1226 +EBUILD tor-0.2.2.32-r1.ebuild 2381 RMD160 3e8f2666e2f0829450937e1bd587cb48e0ff38fd SHA1 da6f1b7434b8e1f6d16ba8d8eed32f05bd7173d9 SHA256 a4bd4641ada9a06568ba4c48c2daddc49ad6b0db5639e726674454991d1f2cf9
1227 +EBUILD tor-0.2.3.2_alpha-r3.ebuild 2638 RMD160 82238d06d327a8ccabfeb65d3caeff7be5e5be95 SHA1 6e0db3eb3e65c24bb6ca6b249c2b00768bf0ca40 SHA256 a3d6855745bead98ecefec1a6a19b2cdeb35dff7ee03ce9a4b3b8768057b25bc
1228 +MISC ChangeLog 40347 RMD160 5c24f105d438a017ab2269bf298f8afa9454b1d6 SHA1 50ce9dc3e5572191e5822d16fe3d36f3734113e2 SHA256 bf35487d48669fc4532c57738408c45aaee998f13518352b12377f231f146552
1229 +MISC metadata.xml 712 RMD160 d8585c57fead7661b72e383528b6450a2ace05eb SHA1 d97b0d9479c817d5a2207fbfc0fa5b567943c8a5 SHA256 53402fd0dc16696d9504c66ffeb85f3d8583c8621151d2faced9b1ffedbb2dbc
1230 +-----BEGIN PGP SIGNATURE-----
1231 +Version: GnuPG v2.0.17 (GNU/Linux)
1232 +
1233 +iEYEAREIAAYFAk5cWoIACgkQl5yvQNBFVTWbDACfUCNmWhsyRKMR2vT3d99Ut8D/
1234 +eYkAmQE+LH1LrYwcAcL7zfmRMruwXhcm
1235 +=y8Eg
1236 +-----END PGP SIGNATURE-----
1237
1238 diff --git a/net-misc/tor/files/tor-0.2.2.24_alpha-respect-CFLAGS.patch b/net-misc/tor/files/tor-0.2.2.24_alpha-respect-CFLAGS.patch
1239 new file mode 100644
1240 index 0000000..86b797b
1241 --- /dev/null
1242 +++ b/net-misc/tor/files/tor-0.2.2.24_alpha-respect-CFLAGS.patch
1243 @@ -0,0 +1,24 @@
1244 +diff -Naur tor-0.2.2.24-alpha.orig/configure.in tor-0.2.2.24-alpha/configure.in
1245 +--- tor-0.2.2.24-alpha.orig/configure.in 2011-04-08 16:32:17.000000000 -0400
1246 ++++ tor-0.2.2.24-alpha/configure.in 2011-04-18 07:10:57.000000000 -0400
1247 +@@ -9,6 +9,11 @@
1248 +
1249 + AC_CANONICAL_HOST
1250 +
1251 ++GENTOO_CFLAGS="$CFLAGS"
1252 ++GENTOO_LDFLAGS="$LDFLAGS"
1253 ++CFLAGS=
1254 ++LDFLAGS=
1255 ++
1256 + if test -f /etc/redhat-release ; then
1257 + if test -f /usr/kerberos/include ; then
1258 + CPPFLAGS="$CPPFLAGS -I/usr/kerberos/include"
1259 +@@ -971,6 +976,8 @@
1260 +
1261 +
1262 + CPPFLAGS="$CPPFLAGS $TOR_CPPFLAGS_libevent $TOR_CPPFLAGS_openssl $TOR_CPPFLAGS_zlib"
1263 ++CFLAGS="$CFLAGS $GENTOO_CFLAGS"
1264 ++LDFLAGS="$LDFLAGS $GENTOO_LDFLAGS"
1265 +
1266 + AC_CONFIG_FILES([Makefile tor.spec Doxyfile contrib/tor.sh contrib/torctl contrib/torify contrib/tor.logrotate contrib/Makefile src/config/torrc.sample src/Makefile doc/Makefile src/config/Makefile src/common/Makefile src/or/Makefile src/test/Makefile src/win32/Makefile src/tools/Makefile contrib/suse/Makefile contrib/suse/tor.sh])
1267 + AC_OUTPUT
1268
1269 diff --git a/net-misc/tor/files/tor-0.2.3.2_alpha-fix-asneeded.patch b/net-misc/tor/files/tor-0.2.3.2_alpha-fix-asneeded.patch
1270 new file mode 100644
1271 index 0000000..75981d5
1272 --- /dev/null
1273 +++ b/net-misc/tor/files/tor-0.2.3.2_alpha-fix-asneeded.patch
1274 @@ -0,0 +1,11 @@
1275 +diff --git a/tor-0.2.3.2-alpha.orig/src/tools/tor-fw-helper/Makefile.am b/tor-0.2.3.2-alpha/src/tools/tor-fw-helper/Makefile.am
1276 +index 75878f2..77ff63f 100644
1277 +--- a/tor-0.2.3.2-alpha.orig/src/tools/tor-fw-helper/Makefile.am
1278 ++++ b/tor-0.2.3.2-alpha/src/tools/tor-fw-helper/Makefile.am
1279 +@@ -34,5 +34,5 @@ miniupnpc_cppflags =
1280 + endif
1281 +
1282 + tor_fw_helper_LDFLAGS = $(nat_pmp_ldflags) $(miniupnpc_ldflags)
1283 +-tor_fw_helper_LDADD = $(nat_pmp_ldadd) $(miniupnpc_ldadd) ../../common/libor.a @TOR_LIB_WS32@
1284 ++tor_fw_helper_LDADD = ../../common/libor.a $(nat_pmp_ldadd) $(miniupnpc_ldadd) @TOR_LIB_WS32@
1285 + tor_fw_helper_CPPFLAGS = $(nat_pmp_cppflags) $(miniupnpc_cppflags)
1286
1287 diff --git a/net-misc/tor/files/tor.confd b/net-misc/tor/files/tor.confd
1288 new file mode 100644
1289 index 0000000..4195bf3
1290 --- /dev/null
1291 +++ b/net-misc/tor/files/tor.confd
1292 @@ -0,0 +1,3 @@
1293 +#
1294 +# Set the file limit
1295 +rc_ulimit="-n 30000"
1296
1297 diff --git a/net-misc/tor/files/tor.initd-r4 b/net-misc/tor/files/tor.initd-r4
1298 new file mode 100644
1299 index 0000000..597a955
1300 --- /dev/null
1301 +++ b/net-misc/tor/files/tor.initd-r4
1302 @@ -0,0 +1,57 @@
1303 +#!/sbin/runscript
1304 +# Copyright 1999-2011 Gentoo Foundation
1305 +# Distributed under the terms of the GNU General Public License v2
1306 +# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/files/tor.initd-r4,v 1.7 2011/08/23 12:26:36 blueness Exp $
1307 +
1308 +opts="${opts} checkconfig reload"
1309 +PIDFILE=/var/run/tor/tor.pid
1310 +CONFFILE=/etc/tor/torrc
1311 +
1312 +depend() {
1313 + need net
1314 +}
1315 +
1316 +checkconfig() {
1317 + # first check that it exists
1318 + if [ ! -f ${CONFFILE} ] ; then
1319 + eerror "You need to setup ${CONFFILE} first"
1320 + eerror "Example is in ${CONFFILE}.sample"
1321 + return 1
1322 + fi
1323 +
1324 + # now verify whether the configuration is valid
1325 + /usr/bin/tor --verify-config -f ${CONFFILE} > /dev/null 2>&1
1326 + if [ $? -eq 0 ] ; then
1327 + einfo "Tor configuration (${CONFFILE}) is valid."
1328 + return 0
1329 + else
1330 + eerror "Tor configuration (${CONFFILE}) not valid."
1331 + /usr/bin/tor --verify-config -f ${CONFFILE}
1332 + return 1
1333 + fi
1334 +}
1335 +
1336 +start() {
1337 + checkconfig || return 1
1338 + ebegin "Starting Tor"
1339 + HOME=/var/lib/tor
1340 + start-stop-daemon --start --pidfile "${PIDFILE}" --quiet --exec /usr/bin/tor -- -f "${CONFFILE}" --runasdaemon 1 --PidFile "${PIDFILE}" > /dev/null 2>&1
1341 + eend $?
1342 +}
1343 +
1344 +stop() {
1345 + ebegin "Stopping Tor"
1346 + start-stop-daemon --stop --pidfile "${PIDFILE}" --exec /usr/bin/tor -- --PidFile "${PIDFILE}"
1347 + eend $?
1348 +}
1349 +
1350 +reload() {
1351 + if [ ! -f ${PIDFILE} ]; then
1352 + eerror "${SVCNAME} isn't running"
1353 + return 1
1354 + fi
1355 + checkconfig || return 1
1356 + ebegin "Reloading Tor configuration"
1357 + start-stop-daemon --signal HUP --pidfile ${PIDFILE}
1358 + eend $?
1359 +}
1360
1361 diff --git a/net-misc/tor/files/torrc-r1 b/net-misc/tor/files/torrc-r1
1362 new file mode 100644
1363 index 0000000..fdbc2bd
1364 --- /dev/null
1365 +++ b/net-misc/tor/files/torrc-r1
1366 @@ -0,0 +1,8 @@
1367 +#
1368 +# Minimal torrc so tor will work out of the box
1369 +#
1370 +User tor
1371 +Group tor
1372 +PIDFile /var/run/tor/tor.pid
1373 +Log notice syslog
1374 +DataDirectory /var/lib/tor/data
1375
1376 diff --git a/net-misc/tor/files/torrc.sample.patch b/net-misc/tor/files/torrc.sample.patch
1377 new file mode 100644
1378 index 0000000..2ff13c6
1379 --- /dev/null
1380 +++ b/net-misc/tor/files/torrc.sample.patch
1381 @@ -0,0 +1,31 @@
1382 +diff -Nuar tor-0.2.2.32.orig/src/config/torrc.sample.in tor-0.2.2.32/src/config/torrc.sample.in
1383 +--- tor-0.2.2.32.orig/src/config/torrc.sample.in 2011-08-29 23:13:09.000000000 -0400
1384 ++++ tor-0.2.2.32/src/config/torrc.sample.in 2011-08-29 23:14:19.000000000 -0400
1385 +@@ -12,6 +12,11 @@
1386 + ## Tor will look for this file in various places based on your platform:
1387 + ## https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc
1388 +
1389 ++## Default username and group the server will run as
1390 ++User tor
1391 ++Group tor
1392 ++
1393 ++PIDFile /var/run/tor/tor.pid
1394 +
1395 + ## Replace this with "SocksPort 0" if you plan to run Tor only as a
1396 + ## relay, and not make any local application connections yourself.
1397 +@@ -40,6 +45,7 @@
1398 + #Log notice syslog
1399 + ## To send all messages to stderr:
1400 + #Log debug stderr
1401 ++Log notice syslog
1402 +
1403 + ## Uncomment this to start the process in the background... or use
1404 + ## --runasdaemon 1 on the command line. This is ignored on Windows;
1405 +@@ -49,6 +55,7 @@
1406 + ## The directory for keeping all the keys/etc. By default, we store
1407 + ## things in $HOME/.tor on Unix, and in Application Data\tor on Windows.
1408 + #DataDirectory @LOCALSTATEDIR@/lib/tor
1409 ++DataDirectory /var/lib/tor/data
1410 +
1411 + ## The port on which Tor will listen for local connections from Tor
1412 + ## controller applications, as documented in control-spec.txt.
1413
1414 diff --git a/net-misc/tor/metadata.xml b/net-misc/tor/metadata.xml
1415 new file mode 100644
1416 index 0000000..4d8f7a1
1417 --- /dev/null
1418 +++ b/net-misc/tor/metadata.xml
1419 @@ -0,0 +1,20 @@
1420 +<?xml version="1.0" encoding="UTF-8"?>
1421 +<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
1422 +<pkgmetadata>
1423 + <herd>no-herd</herd>
1424 + <maintainer>
1425 + <email>blueness@g.o</email>
1426 + <name>Anthony G. Basile</name>
1427 + </maintainer>
1428 + <maintainer>
1429 + <email>chiiph@g.o</email>
1430 + <name>Tomás Touceda</name>
1431 + </maintainer>
1432 + <use>
1433 + <flag name='tor-hardening'>Compile tor with hardening on vanilla compilers/linkers</flag>
1434 + <flag name='transparent-proxy'>Enable transparent proxying</flag>
1435 + <flag name='bufferevents'>Use Libevent's buffered IO</flag>
1436 + <flag name='nat-pmp'>Enable NAT Port Mapping Protocol</flag>
1437 + <flag name='upnp'>Enable Universal Plug and Play</flag>
1438 + </use>
1439 +</pkgmetadata>
1440
1441 diff --git a/net-misc/tor/tor-0.2.2.32-r1.ebuild b/net-misc/tor/tor-0.2.2.32-r1.ebuild
1442 new file mode 100644
1443 index 0000000..724709f
1444 --- /dev/null
1445 +++ b/net-misc/tor/tor-0.2.2.32-r1.ebuild
1446 @@ -0,0 +1,82 @@
1447 +# Copyright 1999-2011 Gentoo Foundation
1448 +# Distributed under the terms of the GNU General Public License v2
1449 +# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/tor-0.2.2.32.ebuild,v 1.1 2011/08/28 11:10:10 blueness Exp $
1450 +
1451 +EAPI=4
1452 +
1453 +inherit autotools eutils flag-o-matic versionator
1454 +
1455 +MY_PV="$(replace_version_separator 4 -)"
1456 +MY_PF="${PN}-${MY_PV}"
1457 +DESCRIPTION="Anonymizing overlay network for TCP"
1458 +HOMEPAGE="http://www.torproject.org/"
1459 +SRC_URI="http://www.torproject.org/dist/${MY_PF}.tar.gz"
1460 +S="${WORKDIR}/${MY_PF}"
1461 +
1462 +LICENSE="BSD"
1463 +SLOT="0"
1464 +KEYWORDS="~amd64 ~arm ~ppc ~ppc64 ~sparc ~x86 ~x86-fbsd"
1465 +IUSE="doc tor-hardening +transparent-proxy threads"
1466 +
1467 +DEPEND="dev-libs/openssl
1468 + >=dev-libs/libevent-2.0"
1469 +# The tordns patch for tsocks avoids some leakage of information thus raising anonymity
1470 +RDEPEND="${DEPEND}
1471 + net-proxy/tsocks[tordns]"
1472 +
1473 +pkg_setup() {
1474 + enewgroup tor
1475 + enewuser tor -1 -1 /var/lib/tor tor
1476 +}
1477 +
1478 +src_prepare() {
1479 + epatch "${FILESDIR}"/torrc.sample.patch
1480 +
1481 + einfo "Regenerating autotools files ..."
1482 + epatch "${FILESDIR}"/${PN}-0.2.2.24_alpha-respect-CFLAGS.patch
1483 + eautoreconf || die "eautoreconf failed"
1484 +}
1485 +
1486 +src_configure() {
1487 + # Upstream isn't sure of all the user provided CFLAGS that
1488 + # will break tor, but does recommend against -fstrict-aliasing.
1489 + # We'll filter-flags them here as we encounter them.
1490 + filter-flags -fstrict-aliasing
1491 + econf --docdir=/usr/share/doc/${PF} \
1492 + $(use_enable doc asciidoc) \
1493 + $(use_enable tor-hardening gcc-hardening) \
1494 + $(use_enable tor-hardening linker-hardening)\
1495 + $(use_enable transparent-proxy transparent) \
1496 + $(use_enable threads)
1497 +}
1498 +
1499 +src_install() {
1500 + newconfd "${FILESDIR}"/tor.confd tor
1501 + newinitd "${FILESDIR}"/tor.initd-r4 tor
1502 + emake DESTDIR="${D}" install || die
1503 + keepdir /var/{lib,run}/tor
1504 +
1505 + dodoc README ChangeLog ReleaseNotes \
1506 + doc/{HACKING,TODO} \
1507 + doc/spec/README
1508 +
1509 + fperms 750 /var/lib/tor
1510 + fperms 755 /var/run/tor
1511 + fowners tor:tor /var/lib/tor /var/run/tor
1512 +
1513 + insinto /etc/tor/
1514 + newins "${FILESDIR}"/torrc-r1 torrc
1515 +}
1516 +
1517 +pkg_postinst() {
1518 + elog
1519 + elog "We created a configuration file for tor, /etc/tor/torrc, but you can"
1520 + elog "change it according to your needs. Use the torrc.sample that is in"
1521 + elog "that directory as a guide. Also, to have privoxy work with tor"
1522 + elog "just add the following line"
1523 + elog
1524 + elog "forward-socks4a / localhost:9050 ."
1525 + elog
1526 + elog "to /etc/privoxy/config. Notice the . at the end!"
1527 + elog
1528 +}
1529
1530 diff --git a/net-misc/tor/tor-0.2.3.2_alpha-r3.ebuild b/net-misc/tor/tor-0.2.3.2_alpha-r3.ebuild
1531 new file mode 100644
1532 index 0000000..ba6e449
1533 --- /dev/null
1534 +++ b/net-misc/tor/tor-0.2.3.2_alpha-r3.ebuild
1535 @@ -0,0 +1,88 @@
1536 +# Copyright 1999-2011 Gentoo Foundation
1537 +# Distributed under the terms of the GNU General Public License v2
1538 +# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/tor-0.2.3.2_alpha-r2.ebuild,v 1.2 2011/07/30 10:28:35 blueness Exp $
1539 +
1540 +EAPI=4
1541 +
1542 +inherit autotools eutils flag-o-matic versionator
1543 +
1544 +MY_PV="$(replace_version_separator 4 -)"
1545 +MY_PF="${PN}-${MY_PV}"
1546 +DESCRIPTION="Anonymizing overlay network for TCP"
1547 +HOMEPAGE="http://www.torproject.org/"
1548 +SRC_URI="http://www.torproject.org/dist/${MY_PF}.tar.gz"
1549 +S="${WORKDIR}/${MY_PF}"
1550 +
1551 +LICENSE="BSD"
1552 +SLOT="0"
1553 +KEYWORDS="~amd64 ~arm ~ppc ~ppc64 ~sparc ~x86 ~x86-fbsd"
1554 +IUSE="+bufferevents doc nat-pmp tor-hardening transparent-proxy threads upnp"
1555 +DEPEND="dev-libs/openssl
1556 + >=dev-libs/libevent-2.0
1557 + nat-pmp? ( net-libs/libnatpmp )
1558 + upnp? ( <net-libs/miniupnpc-1.6 )"
1559 +
1560 +# The tordns patch for tsocks avoids some leakage of information thus raising anonymity
1561 +RDEPEND="${DEPEND}
1562 + net-proxy/tsocks[tordns]"
1563 +
1564 +pkg_setup() {
1565 + enewgroup tor
1566 + enewuser tor -1 -1 /var/lib/tor tor
1567 +}
1568 +
1569 +src_prepare() {
1570 + epatch "${FILESDIR}"/torrc.sample.patch
1571 + epatch "${FILESDIR}"/${PN}-0.2.3.2_alpha-fix-asneeded.patch
1572 +
1573 + einfo "Regenerating autotools files ..."
1574 + epatch "${FILESDIR}"/${PN}-0.2.2.24_alpha-respect-CFLAGS.patch
1575 + eautoreconf || die "eautoreconf failed"
1576 +}
1577 +
1578 +src_configure() {
1579 + # Upstream isn't sure of all the user provided CFLAGS that
1580 + # will break tor, but does recommend against -fstrict-aliasing.
1581 + # We'll filter-flags them here as we encounter them.
1582 + filter-flags -fstrict-aliasing
1583 + econf --docdir=/usr/share/doc/${PF} \
1584 + $(use_enable bufferevents) \
1585 + $(use_enable doc asciidoc) \
1586 + $(use_enable nat-pmp) \
1587 + $(use_enable tor-hardening gcc-hardening) \
1588 + $(use_enable tor-hardening linker-hardening)\
1589 + $(use_enable transparent-proxy transparent) \
1590 + $(use_enable threads) \
1591 + $(use_enable upnp)
1592 +}
1593 +
1594 +src_install() {
1595 + newconfd "${FILESDIR}"/tor.confd tor
1596 + newinitd "${FILESDIR}"/tor.initd-r4 tor
1597 + emake DESTDIR="${D}" install || die
1598 + keepdir /var/{lib,run}/tor
1599 +
1600 + dodoc README ChangeLog ReleaseNotes \
1601 + doc/{HACKING,TODO} \
1602 + doc/spec/README
1603 +
1604 + fperms 750 /var/lib/tor
1605 + fperms 755 /var/run/tor
1606 + fowners tor:tor /var/lib/tor /var/run/tor
1607 +
1608 + insinto /etc/tor/
1609 + newins "${FILESDIR}"/torrc-r1 torrc
1610 +}
1611 +
1612 +pkg_postinst() {
1613 + elog
1614 + elog "We created a configuration file for tor, /etc/tor/torrc, but you can"
1615 + elog "change it according to your needs. Use the torrc.sample that is in"
1616 + elog "that directory as a guide. Also, to have privoxy work with tor"
1617 + elog "just add the following line"
1618 + elog
1619 + elog "forward-socks4a / localhost:9050 ."
1620 + elog
1621 + elog "to /etc/privoxy/config. Notice the . at the end!"
1622 + elog
1623 +}