From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([208.92.234.80] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1QyF76-0005it-SX for garchives@archives.gentoo.org; Tue, 30 Aug 2011 03:35:50 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 26EDD21C1A0; Tue, 30 Aug 2011 03:35:41 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) by pigeon.gentoo.org (Postfix) with ESMTP id AB3FB21C1A0 for ; Tue, 30 Aug 2011 03:35:40 +0000 (UTC) Received: from pelican.gentoo.org (unknown [66.219.59.40]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 1E14E1B4121 for ; Tue, 30 Aug 2011 03:35:40 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by pelican.gentoo.org (Postfix) with ESMTP id 3CF5D80040 for ; Tue, 30 Aug 2011 03:35:39 +0000 (UTC) From: "Anthony G. Basile" To: gentoo-commits@lists.gentoo.org Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Anthony G. Basile" Message-ID: Subject: [gentoo-commits] dev/blueness:master commit in: net-misc/tor/files/, net-misc/tor/ X-VCS-Repository: dev/blueness X-VCS-Files: net-misc/tor/ChangeLog net-misc/tor/Manifest net-misc/tor/files/tor-0.2.2.24_alpha-respect-CFLAGS.patch net-misc/tor/files/tor-0.2.3.2_alpha-fix-asneeded.patch net-misc/tor/files/tor.confd net-misc/tor/files/tor.initd-r4 net-misc/tor/files/torrc-r1 net-misc/tor/files/torrc.sample.patch net-misc/tor/metadata.xml net-misc/tor/tor-0.2.2.32-r1.ebuild net-misc/tor/tor-0.2.3.2_alpha-r3.ebuild X-VCS-Directories: net-misc/tor/files/ net-misc/tor/ X-VCS-Committer: blueness X-VCS-Committer-Name: Anthony G. Basile X-VCS-Revision: c9d55ae40ab685bc3b40b573ed6236de6c0f600d Date: Tue, 30 Aug 2011 03:35:39 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: quoted-printable X-Archives-Salt: X-Archives-Hash: 1425e43788518f21992d8daac2eb812e commit: c9d55ae40ab685bc3b40b573ed6236de6c0f600d Author: Anthony G. Basile gentoo org> AuthorDate: Tue Aug 30 03:35:30 2011 +0000 Commit: Anthony G. Basile gentoo org> CommitDate: Tue Aug 30 03:35:30 2011 +0000 URL: http://git.overlays.gentoo.org/gitweb/?p=3Ddev/blueness.git;a= =3Dcommit;h=3Dc9d55ae4 net-misc/tor: Log to syslog rather than a file, bug #380117 (Portage version: 2.1.10.11/git/Linux x86_64, signed Manifest commit with= key 0xD0455535) --- net-misc/tor/ChangeLog | 1176 ++++++++++++++= ++++++ net-misc/tor/Manifest | 22 + .../files/tor-0.2.2.24_alpha-respect-CFLAGS.patch | 24 + .../tor/files/tor-0.2.3.2_alpha-fix-asneeded.patch | 11 + net-misc/tor/files/tor.confd | 3 + net-misc/tor/files/tor.initd-r4 | 57 + net-misc/tor/files/torrc-r1 | 8 + net-misc/tor/files/torrc.sample.patch | 31 + net-misc/tor/metadata.xml | 20 + net-misc/tor/tor-0.2.2.32-r1.ebuild | 82 ++ net-misc/tor/tor-0.2.3.2_alpha-r3.ebuild | 88 ++ 11 files changed, 1522 insertions(+), 0 deletions(-) diff --git a/net-misc/tor/ChangeLog b/net-misc/tor/ChangeLog new file mode 100644 index 0000000..8c04f9b --- /dev/null +++ b/net-misc/tor/ChangeLog @@ -0,0 +1,1176 @@ +# ChangeLog for net-misc/tor +# Copyright 1999-2011 Gentoo Foundation; Distributed under the GPL v2 +# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/ChangeLog,v 1.269 2011/0= 8/28 11:15:42 blueness Exp $ + + 30 Aug 2011; Anthony G. Basile + +files/tor-0.2.2.24_alpha-respect-CFLAGS.patch, +tor-0.2.2.32-r1.ebuil= d, + +tor-0.2.3.2_alpha-r3.ebuild, +files/tor-0.2.3.2_alpha-fix-asneeded.pa= tch, + +files/tor.confd, +files/tor.initd-r4, +files/torrc-r1, + +files/torrc.sample.patch, +metadata.xml: + Log to syslog rather than a file, bug #380117 + +*tor-0.2.3.2_alpha-r3 (30 Aug 2011) +*tor-0.2.2.32-r1 (30 Aug 2011) + + 30 Aug 2011; Anthony G. Basile + +files/tor-0.2.2.24_alpha-respect-CFLAGS.patch, +tor-0.2.2.32-r1.ebuil= d, + +tor-0.2.3.2_alpha-r3.ebuild, +files/tor-0.2.3.2_alpha-fix-asneeded.pa= tch, + +files/tor.confd, +files/tor.initd-r4, +files/torrc-r1, + +files/torrc.sample.patch, +metadata.xml: + Move logging to syslog, bug #380117 + + 28 Aug 2011; Anthony G. Basile -tor-0.2.2.31_rc.= ebuild: + Removed old release candidate + +*tor-0.2.2.32 (28 Aug 2011) + + 28 Aug 2011; Anthony G. Basile +tor-0.2.2.32.ebu= ild: + Version bump to new stable candidate + + 23 Aug 2011; Anthony G. Basile files/tor.initd-r= 4: + Removed incorrect --stop from init script, bug #379939 + +*tor-0.2.2.31_rc (19 Aug 2011) + + 19 Aug 2011; Anthony G. Basile -tor-0.2.2.30_rc.= ebuild, + -tor-0.2.2.30_rc-r1.ebuild, +tor-0.2.2.31_rc.ebuild, + -tor-0.2.3.2_alpha.ebuild: + Version bump RC and remove deprecated + + 05 Aug 2011; Anthony G. Basile files/tor.initd-r= 4: + Removed deprecated -oknodo, bug #377773 + + 30 Jul 2011; Anthony G. Basile + tor-0.2.3.2_alpha-r2.ebuild: + DEPEND only on + -tor-0.2.3.2_alpha-r1.ebuild, +tor-0.2.3.2_alpha-r2.ebuild, + +files/tor-0.2.3.2_alpha-fix-asneeded.patch: + Address bug #375955 + +*tor-0.2.3.2_alpha-r1 (21 Jul 2011) +*tor-0.2.2.30_rc-r1 (21 Jul 2011) + + 21 Jul 2011; Anthony G. Basile metadata.xml, + +tor-0.2.2.30_rc-r1.ebuild, +tor-0.2.3.2_alpha-r1.ebuild: + Removed automatic configuration of features + +*tor-0.2.2.30_rc (19 Jul 2011) + + 19 Jul 2011; Anthony G. Basile + -tor-0.2.2.29_beta.ebuild, +tor-0.2.2.30_rc.ebuild: + Beta bumped to first rc and removed deprecated + +*tor-0.2.3.2_alpha (19 Jul 2011) + + 19 Jul 2011; Anthony G. Basile + -tor-0.2.3.1_alpha-r1.ebuild, +tor-0.2.3.2_alpha.ebuild: + Bumped alpha and removed deprecated + +*tor-0.2.2.29_beta (21 Jun 2011) + + 21 Jun 2011; Anthony G. Basile + -tor-0.2.2.28_beta.ebuild, +tor-0.2.2.29_beta.ebuild: + Version bump beta, removed deprecated + +*tor-0.2.2.28_beta (10 Jun 2011) + + 10 Jun 2011; Anthony G. Basile -tor-0.2.1.30-r1.= ebuild, + -tor-0.2.2.27_beta-r1.ebuild, +tor-0.2.2.28_beta.ebuild: + Version bump beta, and removed deprecated + +*tor-0.2.3.1_alpha-r1 (07 Jun 2011) +*tor-0.2.2.27_beta-r1 (07 Jun 2011) + + 07 Jun 2011; Anthony G. Basile + -tor-0.2.2.27_beta.ebuild, +tor-0.2.2.27_beta-r1.ebuild, + -tor-0.2.3.1_alpha.ebuild, +tor-0.2.3.1_alpha-r1.ebuild: + Forward ported rc_ulimit fix to beta and alpha, see bug #268396, comme= nt #19 + +*tor-0.2.1.30-r2 (07 Jun 2011) + + 07 Jun 2011; Anthony G. Basile +tor-0.2.1.30-r2.= ebuild, + +files/tor.confd: + Use rc_ulimit to set file limit, see bug #268396, comment #19 + +*tor-0.2.2.27_beta (30 May 2011) + + 30 May 2011; Anthony G. Basile + -tor-0.2.2.25_alpha.ebuild, +tor-0.2.2.27_beta.ebuild: + Version bump and removed deprecated + +*tor-0.2.3.1_alpha (08 May 2011) + + 08 May 2011; Anthony G. Basile + -tor-0.2.2.24_alpha.ebuild, +tor-0.2.3.1_alpha.ebuild: + Added new alpha 0.2.3.1 and removed older alpha 0.2.2.24 + + 29 Apr 2011; Anthony G. Basile + -tor-0.2.2.23_alpha.ebuild, -tor-0.2.2.23_alpha-r1.ebuild, + -files/tor-0.2.2.23_alpha-respect-CFLAGS.patch: + Removed deprecated alpha + +*tor-0.2.2.25_alpha (29 Apr 2011) + + 29 Apr 2011; Anthony G. Basile + +tor-0.2.2.25_alpha.ebuild: + Version bump + +*tor-0.2.2.24_alpha (18 Apr 2011) + + 18 Apr 2011; Anthony G. Basile + +tor-0.2.2.24_alpha.ebuild, + +files/tor-0.2.2.24_alpha-respect-CFLAGS.patch: + Version bump + +*tor-0.2.1.30-r1 (10 Apr 2011) + + 10 Apr 2011; Anthony G. Basile + +tor-0.2.1.30-r1.ebuild, +files/tor-0.2.1.30-respect-CFLAGS.patch, + files/torrc: + Backport of improved build system, see bug #360765 + + 02 Apr 2011; Anthony G. Basile -tor-0.2.1.29.ebu= ild, + -tor-0.2.1.29-r1.ebuild: + Removed vulnerable versions, bug #359789 + + 02 Apr 2011; Ra=C3=BAl Porcel tor-0.2.1.30.ebuild= : + arm/sparc stable wrt #359789 + + 28 Mar 2011; Anthony G. Basile + files/tor-0.2.2.23_alpha-respect-CFLAGS.patch: + Improved fix to build system, see bug #360765 + +*tor-0.2.2.23_alpha-r1 (25 Mar 2011) + + 25 Mar 2011; Anthony G. Basile + +tor-0.2.2.23_alpha-r1.ebuild, + +files/tor-0.2.2.23_alpha-respect-CFLAGS.patch: + Fixed build system to fully respect CFLAGS + + 25 Mar 2011; Anthony G. Basile + tor-0.2.2.23_alpha.ebuild: + Removed superfluous USE flag + + 25 Mar 2011; Anthony G. Basile + -tor-0.2.2.22_alpha-r1.ebuild: + Removed outdated alpha + + 22 Mar 2011; Thomas Kahle tor-0.2.1.30.ebuild: + x86 stable per bug 359789 + + 21 Mar 2011; Christoph Mende tor-0.2.1.30.ebuild: + Stable on amd64 wrt bug #359789 + + 21 Mar 2011; Kacper Kowalik tor-0.2.1.30.ebuil= d: + ppc/ppc64 stable wrt #359789 + +*tor-0.2.2.23_alpha (11 Mar 2011) + + 11 Mar 2011; Anthony G. Basile + +tor-0.2.2.23_alpha.ebuild: + Version bump on alpha and removal of deprecated vesion. + + 27 Feb 2011; Anthony G. Basile +tor-0.2.1.29.ebu= ild: + Reverted removal of only stable ebuild on most arches. + +*tor-0.2.1.30 (27 Feb 2011) + + 27 Feb 2011; Tomas Touceda -tor-0.2.1.29.ebuild, + +tor-0.2.1.30.ebuild: + Version bump and clean up. + + 12 Feb 2011; Ra=C3=BAl Porcel tor-0.2.1.29-r1.ebu= ild: + sparc stable wrt #351920 + +*tor-0.2.2.22_alpha-r1 (10 Feb 2011) + + 10 Feb 2011; Anthony G. Basile + -tor-0.2.2.22_alpha.ebuild, +tor-0.2.2.22_alpha-r1.ebuild: + Added /etc/tor/torrc for alpha. + +*tor-0.2.1.29-r1 (09 Feb 2011) + + 09 Feb 2011; Anthony G. Basile + +tor-0.2.1.29-r1.ebuild, +files/torrc: + Added /etc/tor/torrc so tor works out of the box. + +*tor-0.2.2.22_alpha (01 Feb 2011) + + 01 Feb 2011; Tomas Touceda -tor-0.2.2.21_alpha.ebu= ild, + +tor-0.2.2.22_alpha.ebuild: + Version bump on alpha and cleanup. + + 24 Jan 2011; Anthony G. Basile -tor-0.2.1.28.ebu= ild: + Removed vulnerable version, see bug #351920 + + 24 Jan 2011; Ra=C3=BAl Porcel tor-0.2.1.29.ebuild= : + sparc stable + + 23 Jan 2011; Markus Meier tor-0.2.1.29.ebuild: + arm stable, bug #351920 + + 18 Jan 2011; Christian Faulhammer tor-0.2.1.29.ebui= ld: + stable x86, security bug 351920 + + 17 Jan 2011; Markos Chandras tor-0.2.1.29.ebuild= : + Stable on amd64 wrt bug #351920 + + 17 Jan 2011; tor-0.2.1.29.ebuild: + ppc/ppc64 stable wrt #351920 + +*tor-0.2.2.21_alpha (17 Jan 2011) +*tor-0.2.1.29 (17 Jan 2011) + + 17 Jan 2011; Tomas Touceda +tor-0.2.1.29.ebuild, + -tor-0.2.2.20_alpha.ebuild, +tor-0.2.2.21_alpha.ebuild: + Versiom bump. Clean old alpha. + +*tor-0.2.2.20_alpha (10 Jan 2011) + + 10 Jan 2011; Anthony G. Basile + +tor-0.2.2.20_alpha.ebuild: + added alpha branch + + 07 Jan 2011; Christian Faulhammer -tor-0.2.1.25.ebu= ild, + -tor-0.2.1.26.ebuild, -tor-0.2.1.27.ebuild: + clean up vulnerable versions + + 07 Jan 2011; Brent Baude tor-0.2.1.28.ebuild: + Marking tor-0.2.1.28 ppc for bug 349312 + + 06 Jan 2011; Anthony G. Basile metadata.xml: + Removed fauli and added chiiph as maintainer + + 06 Jan 2011; Anthony G. Basile metadata.xml: + Added myself as maintainer + + 27 Dec 2010; Brent Baude tor-0.2.1.28.ebuild: + Marking tor-0.2.1.28 ppc64 for bug 349312 + + 26 Dec 2010; Ra=C3=BAl Porcel tor-0.2.1.28.ebuild= : + arm/sparc stable wrt #349312 + + 26 Dec 2010; Markos Chandras tor-0.2.1.28.ebuild= : + Stable on amd64 wrt bug #349312 + + 25 Dec 2010; Christian Faulhammer tor-0.2.1.28.ebui= ld: + stable x86, security bug 349312 + +*tor-0.2.1.28 (23 Dec 2010) + + 23 Dec 2010; Christian Faulhammer +tor-0.2.1.28.ebu= ild: + bump for security bug 349312 + + 08 Dec 2010; Markus Meier tor-0.2.1.27.ebuild: + arm stable, bug #346759 + + 03 Dec 2010; Christian Faulhammer tor-0.2.1.27.ebui= ld: + request USE=3Dtordns on net-proxy/tsocks to raise level of anonymity + + 28 Nov 2010; Markos Chandras tor-0.2.1.27.ebuild= : + Stable on amd64 wrt bug #346759 + +*tor-0.2.1.27 (25 Nov 2010) + + 25 Nov 2010; Christian Faulhammer +tor-0.2.1.27.ebu= ild: + version bump, fixes OpenSSL issues, see bug 346715 + + 14 Oct 2010; Brent Baude tor-0.2.1.26.ebuild: + stable ppc, bug 329879 + + 30 Sep 2010; Brent Baude tor-0.2.1.25.ebuild: + stable ppc64, bug 309873 + + 18 Sep 2010; Ra=C3=BAl Porcel tor-0.2.1.26.ebuild= : + sparc stable wrt #329879 + + 18 Aug 2010; Markus Meier tor-0.2.1.26.ebuild: + arm stable, bug #329879 + + 30 Jul 2010; Markos Chandras tor-0.2.1.26.ebuild= : + Stable on amd64 wrt bug #329879 + + 26 Jul 2010; Christian Faulhammer tor-0.2.1.26.ebui= ld: + stable x86, bug 329879 + +*tor-0.2.1.26 (24 Jun 2010) + + 24 Jun 2010; Christian Faulhammer -tor-0.2.1.22.ebu= ild, + +tor-0.2.1.26.ebuild: + version bump for bug 325243 by Michael , and clean up + + 06 Jun 2010; Ra=C3=BAl Porcel tor-0.2.1.25.ebuild= : + arm stable wrt #300830 + + 23 May 2010; Pacho Ramos tor-0.2.1.25.ebuild: + stable amd64, bug 309873 + + 22 May 2010; Torsten Veller metadata.xml: + Remove humpback from metadata.xml (#34793) + + 17 Apr 2010; Ra=C3=BAl Porcel tor-0.2.1.22.ebuild= , + tor-0.2.1.25.ebuild: + Add ~arm wrt #300830 + + 05 Apr 2010; Ra=C3=BAl Porcel tor-0.2.1.25.ebuild= : + sparc stable wrt #309873 + + 24 Mar 2010; Brent Baude tor-0.2.1.25.ebuild: + stable ppc, bug 309873 + + 24 Mar 2010; Christian Faulhammer tor-0.2.1.25.ebui= ld: + stable x86, bug 309873 + + 23 Mar 2010; Christian Faulhammer + -tor-0.2.1.19-r2.ebuild, -files/tor-0.2.1.19-openssl.patch, + -tor-0.2.1.20-r1.ebuild, -tor-0.2.1.21.ebuild: + clean up + +*tor-0.2.1.25 (23 Mar 2010) + + 23 Mar 2010; Christian Faulhammer +tor-0.2.1.25.ebu= ild: + version bump + + 10 Feb 2010; Joseph Jezak tor-0.2.1.22.ebuild: + Marked ppc stable for bug #301701. + + 01 Feb 2010; Markus Meier tor-0.2.1.22.ebuild: + amd64 stable, bug #301701 + + 30 Jan 2010; Ra=C3=BAl Porcel tor-0.2.1.22.ebuild= : + sparc stable wrt #301701 + + 22 Jan 2010; Brent Baude tor-0.2.1.22.ebuild: + Marking tor-0.2.1.22 ppc64 for bug 301701 + + 22 Jan 2010; Christian Faulhammer tor-0.2.1.22.ebui= ld: + stable x86, bug 301701 + +*tor-0.2.1.22 (22 Jan 2010) + + 22 Jan 2010; Christian Faulhammer +tor-0.2.1.22.ebu= ild: + version bump for security bug 301701 + +*tor-0.2.1.21 (16 Jan 2010) + + 16 Jan 2010; Christian Faulhammer +tor-0.2.1.21.ebu= ild: + version bump, bug 301169 by Tim O'Kelly + + 27 Dec 2009; Christian Faulhammer + -files/tor-0.2.0.30-logrotate.patch, + -files/tor-0.2.0.33-no-internal-libevent.patch, -tor-0.2.0.35.ebuild, + -tor-0.2.1.19.ebuild, -tor-0.2.1.19-r1.ebuild: + clean up + + 26 Dec 2009; Ra=C3=BAl Porcel tor-0.2.1.19-r2.ebu= ild: + sparc stable wrt #294297 + + 08 Dec 2009; Brent Baude tor-0.2.1.19-r2.ebuild: + Marking tor-0.2.1.19-r2 ppc64 for bug 294297 + +*tor-0.2.1.20-r1 (06 Dec 2009) + + 06 Dec 2009; Christian Faulhammer -tor-0.2.1.20.ebu= ild, + +tor-0.2.1.20-r1.ebuild: + reintroduce OpenSSL patch for bug 292661 + +*tor-0.2.1.20 (02 Dec 2009) + + 02 Dec 2009; Christian Faulhammer +tor-0.2.1.20.ebu= ild: + version bump + + 25 Nov 2009; Markus Meier tor-0.2.1.19-r2.ebuild: + amd64 stable, bug #294297 + + 24 Nov 2009; Christian Faulhammer + tor-0.2.1.19-r2.ebuild: + stable x86, bug 294297 + + 21 Nov 2009; nixnut tor-0.2.1.19-r2.ebuild: + ppc stable #292022 + +*tor-0.2.1.19-r2 (12 Nov 2009) + + 12 Nov 2009; Christian Faulhammer + +tor-0.2.1.19-r2.ebuild, +files/tor-0.2.1.19-openssl.patch: + fix bug 2926611, patch discovered by Aidan Marks + + 07 Sep 2009; Christian Faulhammer files/tor.initd-r= 4: + respect CONFFILE variable in start calls, reported by Iome in bug 283524 + +*tor-0.2.1.19-r1 (17 Aug 2009) + + 17 Aug 2009; Christian Faulhammer + +tor-0.2.1.19-r1.ebuild, +files/tor-0.2.1.19-logrotate.patch: + fix logrotate support as provided by Martin von Gagern in bug 281439 + + 06 Aug 2009; Christian Faulhammer + -tor-0.2.1.16_rc.ebuild: + clean up release candidate + +*tor-0.2.1.19 (06 Aug 2009) + + 06 Aug 2009; Christian Faulhammer +tor-0.2.1.19.ebu= ild: + version bump + + 14 Jul 2009; Christian Faulhammer -tor-0.2.0.34.ebu= ild: + remove vulnerable version + + 12 Jul 2009; Joseph Jezak tor-0.2.0.35.ebuild: + Marked ppc stable for bug #275628. + + 30 Jun 2009; Brent Baude tor-0.2.0.35.ebuild: + Marking tor-0.2.0.35 ppc64 for bug 275628 + + 30 Jun 2009; Ra=C3=BAl Porcel tor-0.2.0.35.ebuild= : + sparc stable wrt #275628 + + 29 Jun 2009; Christian Faulhammer tor-0.2.0.34.ebui= ld, + tor-0.2.0.35.ebuild, tor-0.2.1.16_rc.ebuild: + fix HOMEPAGE entries + + 29 Jun 2009; Markus Meier tor-0.2.0.35.ebuild: + amd64 stable, bug #275628 + +*tor-0.2.1.16_rc (29 Jun 2009) + + 29 Jun 2009; Christian Faulhammer + -tor-0.2.1.15_rc.ebuild, +tor-0.2.1.16_rc.ebuild: + extend version bump for security bug 275628 and remove one vulnerable + version + +*tor-0.2.0.35 (28 Jun 2009) + + 28 Jun 2009; Christian Faulhammer +tor-0.2.0.35.ebu= ild: + version bump for security bug 275628, directly stable for x86 + + 17 Jun 2009; Christian Faulhammer + tor-0.2.1.15_rc.ebuild: + remove all occurences of USE=3Dbundledlibevent + +*tor-0.2.1.15_rc (17 Jun 2009) + + 17 Jun 2009; Christian Faulhammer + +tor-0.2.1.15_rc.ebuild: + add release candidate for 0.2.1 series + + 12 Jun 2009; Christian Faulhammer + files/torrc.sample-0.1.2.6.patch, +tor-0.2.0.34.ebuild, + -tor-0.2.0.34-r2.ebuild, +files/tor.initd-r4, -files/tor.initd-r6: + revert all my changes for bug 268396 as they will break badly with + Baselayout 1, see bug 272527 + +*tor-0.2.0.34-r2 (03 Jun 2009) + + 03 Jun 2009; Christian Faulhammer -files/tor.initd-= r5, + +files/tor.initd-r6, -tor-0.2.0.34-r1.ebuild, +tor-0.2.0.34-r2.ebuild: + revision bump to make it compatible with Baselayout 1, as reported by + Stanislav Cymbalov in bug 272404 + +*tor-0.2.0.34-r1 (03 Jun 2009) + + 03 Jun 2009; Christian Faulhammer + files/torrc.sample-0.1.2.6.patch, -files/tor.initd-r4, + +files/tor.initd-r5, -tor-0.2.0.34.ebuild, +tor-0.2.0.34-r1.ebuild: + Really respect limits from /etc/limits.d/ by some tweaks: moving user + context switch from torrc to init script, including verification of co= nfig + file in the latter; fixes bug 268396 by W. Elschner + + 19 Feb 2009; nixnut tor-0.2.0.34.ebuild: + ppc stable + + 18 Feb 2009; Christian Faulhammer -tor-0.2.0.33.ebu= ild: + clean up vulnerable versions + + 15 Feb 2009; Markus Meier tor-0.2.0.34.ebuild: + amd64/x86 stable, bug #258833 + + 13 Feb 2009; Brent Baude tor-0.2.0.34.ebuild: + Marking tor-0.2.0.34 ppc64 for bug 258833 + + 13 Feb 2009; Ferris McCormick tor-0.2.0.34.ebuild: + Sparc stable --- Security Bug #258833 --- tests good. + +*tor-0.2.0.34 (13 Feb 2009) + + 13 Feb 2009; Christian Faulhammer +tor-0.2.0.34.ebu= ild: + version bump for security bug 258833, reported by Jesse Adelman + + 08 Feb 2009; Christian Faulhammer tor-0.2.0.33.ebui= ld: + kill logrotate USE flag as requested by bangert on bug 258188 + + 05 Feb 2009; Christian Faulhammer + +files/tor-0.2.0.33-no-internal-libevent.patch, metadata.xml, + tor-0.2.0.33.ebuild: + make use of bundled libevent async DNS part optional via USE=3Dflag, t= his + should fix bug 206969 + + 26 Jan 2009; Christian Faulhammer -tor-0.2.0.32.ebu= ild, + -tor-0.2.0.32-r1.ebuild: + clean up + + 25 Jan 2009; Markus Meier tor-0.2.0.33.ebuild: + amd64/x86 stable, bug #256078 + + 24 Jan 2009; Tobias Scherbaum tor-0.2.0.33.ebu= ild: + ppc stable, bug #256078 + + 24 Jan 2009; Ferris McCormick tor-0.2.0.33.ebuild: + Sparc stable, Security Bug #256078. + + 24 Jan 2009; Brent Baude tor-0.2.0.33.ebuild: + Marking tor-0.2.0.33 ppc64 for bug 256078 + +*tor-0.2.0.33 (24 Jan 2009) + + 24 Jan 2009; Christian Faulhammer +tor-0.2.0.33.ebu= ild: + version bump for security bug 256078 + +*tor-0.2.0.32-r1 (21 Dec 2008) + + 21 Dec 2008; Christian Faulhammer +files/tor.conf, + +tor-0.2.0.32-r1.ebuild: + install limits file so tor can open more files on the system than norm= ally + allowed, this fixes bug 251171 reported by candrews AT integralblue DO= T + com + + 10 Dec 2008; Christian Faulhammer + -files/tor-0.2.0.31-sparc.patch, -tor-0.2.0.31-r1.ebuild: + clean up + + 09 Dec 2008; Friedrich Oslage tor-0.2.0.32.ebuil= d: + Stable on sparc, security bug #250018 + + 08 Dec 2008; Brent Baude tor-0.2.0.32.ebuild: + Marking tor-0.2.0.32 ppc64 for bug 250018 + + 08 Dec 2008; Markus Meier tor-0.2.0.32.ebuild: + x86 stable, bug #250018 + + 07 Dec 2008; Tobias Scherbaum tor-0.2.0.32.ebu= ild: + ppc stable, bug #250018 + + 07 Dec 2008; Richard Freeman tor-0.2.0.32.ebuild: + amd64 stable - 250018 + +*tor-0.2.0.32 (06 Dec 2008) + + 06 Dec 2008; Christian Faulhammer +tor-0.2.0.32.ebu= ild: + version bump for security bug 250018 + + 28 Nov 2008; Christian Faulhammer metadata.xml: + Change my email address + + 22 Nov 2008; Christian Faulhammer + -tor-0.2.0.30-r1.ebuild, -tor-0.2.0.31.ebuild, tor-0.2.0.31-r1.ebuild: + clean up and add stable KEYWORDS for -r1 + + 22 Nov 2008; Markus Meier tor-0.2.0.31.ebuild: + amd64 stable, bug #244679 + + 14 Nov 2008; Ferris McCormick tor-0.2.0.31.ebuild, + tor-0.2.0.31-r1.ebuild: + Address sparc alignment problems reported in Bug #246483 --- this fixe= s them + but is untested on anything else. + +*tor-0.2.0.31-r1 (14 Nov 2008) + + 14 Nov 2008; Ferris McCormick + +files/tor-0.2.0.31-sparc.patch, +tor-0.2.0.31-r1.ebuild: + Add new version to address sparc alignment problem, Bug #246483 which = see + for details. + + 01 Nov 2008; nixnut tor-0.2.0.31.ebuild: + Stable on ppc wrt bug 244679 + + 30 Oct 2008; Ra=C3=BAl Porcel tor-0.2.0.31.ebuild= : + x86 stable #244679 + + 28 Oct 2008; Ferris McCormick tor-0.2.0.31.ebuild: + Sparc stable, Bug #244679. + + 27 Oct 2008; Brent Baude tor-0.2.0.31.ebuild: + stable ppc64, bug 244679 + +*tor-0.2.0.31 (26 Sep 2008) + + 26 Sep 2008; Christian Faulhammer +tor-0.2.0.31.ebu= ild: + version bump for bug 238787 + + 06 Sep 2008; Christian Faulhammer files/tor.initd-r= 4: + remove bashisms from init file, as reported in bug 236857 by Martin V=C3= =A4th + + + 06 Sep 2008; Christian Faulhammer -files/tor.initd-= r3, + -files/tor.logrotate.patch, -tor-0.1.2.19-r2.ebuild, -tor-0.2.0.30.ebu= ild: + clean up + + 06 Sep 2008; Ra=C3=BAl Porcel tor-0.2.0.30-r1.ebu= ild: + x86 stable wrt #236536 + + 06 Sep 2008; Brent Baude tor-0.2.0.30-r1.ebuild: + stable ppc64, bug 236536 + + 06 Sep 2008; Richard Freeman tor-0.2.0.30-r1.ebuild= : + amd64 stable - 236536 + + 04 Sep 2008; Brent Baude tor-0.2.0.30-r1.ebuild: + stable ppc, bug 236536 + + 03 Sep 2008; Ferris McCormick tor-0.2.0.30-r1.ebui= ld: + Sparc stable --- Bug #236536 --- test suite passes. + +*tor-0.2.0.30-r1 (03 Sep 2008) + + 03 Sep 2008; Christian Faulhammer +files/tor.initd-= r4, + +tor-0.2.0.30-r1.ebuild: + update init script to prevent runtime failures as reported in bug 2352= 08 + +*tor-0.2.0.30 (03 Aug 2008) + + 03 Aug 2008; Christian Faulhammer + +files/tor-0.2.0.30-logrotate.patch, +tor-0.2.0.30.ebuild: + version bump for bug 233612 by puchu + + 29 May 2008; Christian Faulhammer -tor-0.1.2.19.ebu= ild: + clean up + + 29 May 2008; Ra=C3=BAl Porcel tor-0.1.2.19-r2.ebu= ild: + sparc stable wrt #223705, thanks to Friedrich Oslage for testing + + 28 May 2008; Peter Volkov tor-0.1.2.19-r2.ebuild: + amd64 stable, bug #223705. + + 27 May 2008; Markus Rothe tor-0.1.2.19-r2.ebuild: + Stable on ppc64; bug #223705 + + 26 May 2008; nixnut tor-0.1.2.19-r2.ebuild: + Stable on ppc wrt bug 223705 + + 26 May 2008; Christian Faulhammer + tor-0.1.2.19-r2.ebuild: + stable x86, bug 223705 + +*tor-0.1.2.19-r2 (29 Apr 2008) + + 29 Apr 2008; Christian Faulhammer + -tor-0.1.2.19-r1.ebuild, +tor-0.1.2.19-r2.ebuild: + logrotate should now really work again + +*tor-0.1.2.19-r1 (25 Apr 2008) + + 25 Apr 2008; Christian Faulhammer + +tor-0.1.2.19-r1.ebuild: + create the logrotate file with the correct permissions as pointed out = on bug + 216298 by Serge Koksharov + + 05 Mar 2008; Christian Faulhammer -tor-0.1.2.18.ebu= ild: + clean up + + 04 Mar 2008; Richard Freeman tor-0.1.2.19.ebuild: + amd64 stable - 211021 + + 04 Mar 2008; Brent Baude tor-0.1.2.19.ebuild: + stable ppc64, bug 211021 + + 03 Mar 2008; Ra=C3=BAl Porcel tor-0.1.2.19.ebuild= : + sparc stable wrt #211021 + + 02 Mar 2008; nixnut tor-0.1.2.19.ebuild: + Stable on ppc wrt bug 211021 + + 01 Mar 2008; Christian Faulhammer metadata.xml: + adding myself to metadata.xml + + 01 Mar 2008; Christian Faulhammer tor-0.1.2.19.ebui= ld: + stable x86, bug 211021 + + 07 Feb 2008; Christian Faulhammer -files/tor.initd-= r2, + -tor-0.1.2.17.ebuild: + clean up + + 07 Feb 2008; Ra=C3=BAl Porcel tor-0.1.2.18.ebuild= : + sparc stable wrt #208336 + + 06 Feb 2008; nixnut tor-0.1.2.18.ebuild: + stable on ppc wrt bug #208336 + + 02 Feb 2008; Richard Freeman tor-0.1.2.18.ebuild: + amd64 stable - #208336 + + 31 Jan 2008; Brent Baude tor-0.1.2.18.ebuild: + Marking tor-0.1.2.18 ppc64 stable for bug 208336 + + 31 Jan 2008; Christian Faulhammer tor-0.1.2.18.ebui= ld: + stable x86, bug 208336 + +*tor-0.1.2.19 (31 Jan 2008) + + 31 Jan 2008; Christian Faulhammer +tor-0.1.2.19.ebu= ild: + version bump + +*tor-0.1.2.18 (03 Jan 2008) + + 03 Jan 2008; Christian Faulhammer -tor-0.1.2.16.ebu= ild, + -tor-0.1.2.16-r1.ebuild, +tor-0.1.2.18.ebuild: + version bump (bug 199818) and clean up + + 03 Sep 2007; Tobias Scherbaum tor-0.1.2.17.ebu= ild: + ppc stable, bug #190968 + + 02 Sep 2007; Jose Luis Rivero tor-0.1.2.17.ebuild= : + Stable on sparc wrt security bug #190968 + + 02 Sep 2007; Markus Rothe tor-0.1.2.17.ebuild: + Stable on ppc64; bug #190968 + + 02 Sep 2007; Christoph Mende tor-0.1.2.17.ebuild: + Stable on amd64 wrt security bug #190968 + +*tor-0.1.2.17 (02 Sep 2007) + + 02 Sep 2007; Christian Faulhammer +tor-0.1.2.17.ebu= ild: + version bump and stable x86, security bug 190968 + + 29 Aug 2007; Gustavo Felisberto files/tor.initd-= r3: + Adding correct init script. + +*tor-0.1.2.16-r1 (28 Aug 2007) + + 28 Aug 2007; Gustavo Felisberto + -files/torrc.sample-0.1.0.16.patch, -files/torrc.sample-0.1.1.23.patch= , + -files/tor.confd, -files/tor.initd, -files/tor.initd-r1, + +files/tor.initd-r3, -tor-0.1.1.23.ebuild, -tor-0.1.1.26.ebuild, + -tor-0.1.2.14.ebuild, +tor-0.1.2.16-r1.ebuild: + Removed older versions and dangled files. Fixed bug with init with + baselayout-2 closes 189724. Thanks to Christian Faulhammer (opfer) for= the + fix. + + 09 Aug 2007; Robert Buchholz tor-0.1.2.16.ebuild: + Stable on amd64 (bug #186644) + + 06 Aug 2007; Gustavo Zacarias tor-0.1.2.16.ebuil= d: + Stable on sparc wrt security #186644 + + 04 Aug 2007; Markus Rothe tor-0.1.2.16.ebuild: + Stable on ppc64; bug #186644 + + 04 Aug 2007; Tobias Scherbaum tor-0.1.2.16.ebu= ild: + ppc stable, bug #186644 + + 03 Aug 2007; Christian Faulhammer tor-0.1.2.16.ebui= ld: + stable x86, security bug 186644 + +*tor-0.1.2.16 (03 Aug 2007) + + 03 Aug 2007; Christian Faulhammer +tor-0.1.2.16.ebu= ild: + version bump, for security bug 186644 + + 02 Jun 2007; Ren=C3=A9 Nussbaumer tor-0.1.2.14.= ebuild: + Stable on ppc. See bug #180139. + + 31 May 2007; Christoph Mende tor-0.1.2.14.ebuild: + Stable on amd64 wrt security bug 180139 + + 31 May 2007; Brent Baude tor-0.1.2.14.ebuild: + Marking tor-0.1.2.14 ppc64 stable for bug#180139 + + 31 May 2007; Gustavo Zacarias tor-0.1.2.14.ebuil= d: + Stable on sparc wrt security #180139 + + 31 May 2007; Christian Faulhammer tor-0.1.2.14.ebui= ld: + stable x86, security bug 180139 + +*tor-0.1.2.14 (31 May 2007) + + 31 May 2007; -tor-0.1.0.18.ebuild, + -tor-0.1.0.18-r1.ebuild, -tor-0.1.2.13.ebuild, +tor-0.1.2.14.ebuild: + Bumped 0.1.2.13 to 0.1.2.14, removed older versions. Fixed #178975 wit= h idea=20 + from Remy Blank + + 15 May 2007; tor-0.1.0.18.ebuild, + tor-0.1.0.18-r1.ebuild, tor-0.1.1.23.ebuild, tor-0.1.1.26.ebuild, + tor-0.1.2.13.ebuild: + Added keepdir. Close Bug #177590. + + 15 May 2007; tor-0.1.1.23.ebuild, + tor-0.1.1.26.ebuild: + Fixed missing RDEP's. Close Bug #174185. + +*tor-0.1.2.13 (15 May 2007) + + 15 May 2007; +files/tor.initd-r2, + -tor-0.1.2.6_alpha.ebuild, +tor-0.1.2.13.ebuild: + Removed alpha 1.2 release and added a bump. Help from all in bug #1760= 18, + specially jakub, was very much apretiated. + + 29 Apr 2007; Torsten Veller tor-0.1.1.23.ebuild, + tor-0.1.1.26.ebuild, tor-0.1.2.6_alpha.ebuild: + Fix *initd, *confd and *envd calls (#173884, #174266) + +*tor-0.1.2.6_alpha (27 Jan 2007) + + 27 Jan 2007; Gustavo Felisberto ; + +files/torrc.sample-0.1.2.6.patch, +tor-0.1.2.6_alpha.ebuild: + Added alpha release of tor at request from Flameeyes. It seems tork ne= eds + it. As always, if it is masked and you install and destroy your system= dont + come complain alot. + +*tor-0.1.1.26 (18 Dec 2006) + + 18 Dec 2006; Gustavo Felisberto ; + -tor-0.1.1.24.ebuild, +tor-0.1.1.26.ebuild: + Bumped to 0.1.1.26 and removed older version. + +*tor-0.1.0.18-r1 (22 Oct 2006) + + 22 Oct 2006; Gustavo Felisberto ; + tor-0.1.0.18.ebuild, +tor-0.1.0.18-r1.ebuild: + Small configuration issue in the chroot. Fixes bug #139354. + + 21 Oct 2006; Gustavo Felisberto ; + tor-0.1.0.18.ebuild, tor-0.1.1.23.ebuild, tor-0.1.1.24.ebuild: + Added ewarn about the needed dot in the privoxy integration. Closes bu= g + #152137. + +*tor-0.1.1.24 (09 Oct 2006) + + 09 Oct 2006; Gustavo Felisberto ; + +tor-0.1.1.24.ebuild: + Bump from 0.1.1.23 + + 11 Sep 2006; Gustavo Felisberto ; + tor-0.1.0.18.ebuild: + Changed einfo about configuration of chroot. Removes tor from bug #140= 371 + + 05 Sep 2006; Gustavo Felisberto ; + -files/torrc.sample-0.1.0.14.patch, -tor-0.1.0.14-r1.ebuild, + -tor-0.1.0.16.ebuild, -tor-0.1.0.17.ebuild, -tor-0.1.1.20.ebuild, + -tor-0.1.1.22.ebuild: + Removed older version that had sec issues. + + 30 Aug 2006; Gustavo Zacarias tor-0.1.0.18.ebuil= d, + tor-0.1.1.23.ebuild: + Stable on sparc wrt security #145458 + + 30 Aug 2006; tor-0.1.0.18.ebuild, tor-0.1.1.23.ebui= ld: + stable on amd64 wrt bug 145458 + + 30 Aug 2006; Joshua Jackson tor-0.1.0.18.ebuild, + tor-0.1.1.23.ebuild: + Stable x86; security bug #145458 + + 29 Aug 2006; Markus Rothe tor-0.1.0.18.ebuild, + tor-0.1.1.23.ebuild: + Stable on ppc64; bug #145458 + + 29 Aug 2006; Tobias Scherbaum tor-0.1.0.18.ebu= ild, + tor-0.1.1.23.ebuild: + ppc stable, bug #145458 + +*tor-0.1.0.18 (29 Aug 2006) + + 29 Aug 2006; Gustavo Felisberto ; + +tor-0.1.0.18.ebuild: + Adding 0.1.0.18 that fixes sec issue in the 0.1.0.* series. The 0.1.1.= 23 is + not affected. + +*tor-0.1.1.23 (24 Aug 2006) + + 24 Aug 2006; Gustavo Felisberto ; + +files/torrc.sample-0.1.1.23.patch, +tor-0.1.1.23.ebuild: + Updated version, bump and small cosmetics. Thanks to Olivier Mondolini= in + bug #144417. + + 16 Jul 2006; Diego Petten=C3=B2 tor-0.1.1.22.eb= uild: + Add ~x86-fbsd keyword. + +*tor-0.1.1.22 (08 Jul 2006) + + 08 Jul 2006; Gustavo Felisberto ; + +tor-0.1.1.22.ebuild: + Bump to 0.1.1.22. Closes bug # 138073. + + 05 Jun 2006; Simon Stelling tor-0.1.1.20.ebuild: + stable on amd64 wrt bug 134329 + + 01 Jun 2006; Gustavo Zacarias tor-0.1.1.20.ebuil= d: + Stable on sparc wrt security #134329 + + 01 Jun 2006; Tobias Scherbaum tor-0.1.1.20.ebu= ild: + ppc stable, bug #134329 + + 01 Jun 2006; Markus Rothe tor-0.1.1.20.ebuild: + Stable on ppc64; bug #134329 + + 01 Jun 2006; Joshua Jackson tor-0.1.1.20.ebuild: + Stable on x86; security bug #134329 + +*tor-0.1.1.20 (01 Jun 2006) + + 01 Jun 2006; Stefan Cornelius +tor-0.1.1.20.ebui= ld: + Bumping to version 0.1.1.20 for security bugs #134329 and #118918 + + 23 Apr 2006; Emanuele Giaquinta tor-0.1.0.14-r1.ebuil= d, + tor-0.1.0.16.ebuild, tor-0.1.0.17.ebuild: + Move enew{group,user} in pkg_setup. + +*tor-0.1.0.17 (28 Feb 2006) + + 28 Feb 2006; Gustavo Felisberto ; + +tor-0.1.0.17.ebuild: + Bump to 0.1.017. Credits go to Christian Mandery in bug #123530 for + reporting this. + +*tor-0.1.0.16 (04 Jan 2006) + + 04 Jan 2006; Gustavo Felisberto ; + +files/torrc.sample-0.1.0.16.patch, +files/tor.confd, +files/tor.initd= -r1, + +tor-0.1.0.16.ebuild: + Adding tor 1.0.16 to portage. Arch teams please dont mark stable as th= e new + chroot stuff needs serious testing. + +*tor-0.1.0.14-r1 (11 Sep 2005) + + 11 Sep 2005; Gustavo Felisberto ; files/tor.initd= , + -tor-0.1.0.14.ebuild, +tor-0.1.0.14-r1.ebuild: + I was having some strange issues with sending signal 2 to tor. And we = do not + need a SIGINT, a SIGTERM is fine. + + 06 Sep 2005; Gustavo Felisberto ; + -files/torrc.sample.patch-00, -tor-0.0.9.10.ebuild: + Removing older version. + + 16 Aug 2005; Jason Wever tor-0.1.0.14.ebuild: + Stable on SPARC wrt security bug #102245. + + 15 Aug 2005; Michael Hanselmann tor-0.1.0.14.ebuil= d: + Stable on ppc. + + 15 Aug 2005; Markus Rothe tor-0.1.0.14.ebuild: + Stable on ppc64 (bug #102245) + +*tor-0.1.0.14 (14 Aug 2005) + + 14 Aug 2005; Gustavo Felisberto ; + +files/torrc.sample-0.1.0.14.patch, +tor-0.1.0.14.ebuild: + Adding new version as amd64 and x86 due to sec bug. See #102245 + + 20 Jul 2005; Herbie Hopkins tor-0.0.9.10.ebuild: + Stable on amd64. + + 22 Jun 2005; Gustavo Zacarias tor-0.0.9.10.ebuil= d: + Stable on sparc + + 21 Jun 2005; Michael Hanselmann tor-0.0.9.10.ebuil= d: + Stable on ppc (#96320). + + 21 Jun 2005; Markus Rothe tor-0.0.9.10.ebuild: + Stable on ppc64 + +*tor-0.0.9.10 (16 Jun 2005) + + 16 Jun 2005; Gustavo Felisberto ; + -tor-0.0.9.5.ebuild, -tor-0.0.9.6.ebuild, -tor-0.0.9.7.ebuild, + -tor-0.0.9.9.ebuild, +tor-0.0.9.10.ebuild: + Added version 0.9.0.10 that fixes a security bug, removed older versio= ns + that were affected. + + 12 Jun 2005; Gustavo Felisberto ; tor-0.0.9.5.ebu= ild, + tor-0.0.9.6.ebuild, tor-0.0.9.7.ebuild, tor-0.0.9.9.ebuild: + New HOMEPAGE, thanks to Matteo in bug #95754. + + 18 May 2005; Markus Rothe tor-0.0.9.6.ebuild: + Stable on ppc64 + + 01 May 2005; Michael Hanselmann tor-0.0.9.5.ebuild= : + Stable on ppc. + +*tor-0.0.9.9 (25 Apr 2005) + + 25 Apr 2005; Gustavo Felisberto ; tor-0.0.9.5.ebu= ild, + tor-0.0.9.6.ebuild, +tor-0.0.9.9.ebuild: + Removing older versions and bumping to 0.9.9 . + + 22 Apr 2005; Alin Nastac tor-0.0.9.5.ebuild, + tor-0.0.9.6.ebuild, tor-0.0.9.7.ebuild: + net-misc/tsocks -> net-proxy/tsocks + + 08 Apr 2005; Gustavo Zacarias tor-0.0.9.7.ebuild= : + Keyworded ~sparc wrt #88305 + +*tor-0.0.9.7 (01 Apr 2005) + + 01 Apr 2005; Gustavo Felisberto ; +tor-0.0.9.7.eb= uild: + Bumped + + 29 Mar 2005; Markus Rothe tor-0.0.9.6.ebuild: + Added ~ppc64 to KEYWORDS; bug #86993 + +*tor-0.0.9.6 (25 Mar 2005) + + 25 Mar 2005; Gustavo Felisberto ; +tor-0.0.9.6.eb= uild: + Bumped to 0.0.9.6 + + 23 Mar 2005; Gustavo Felisberto ; files/tor.initd= : + Changed init script to send SIGINT at shutdown. May increase the shutd= own time + of servers, but will close in a more clean way. + + 25 Feb 2005; Gustavo Felisberto ; + -tor-0.0.9.4-r1.ebuild, -tor-0.0.9.4-r2.ebuild, tor-0.0.9.5.ebuild: + Marking latest as x86 and removing older versions. + +*tor-0.0.9.5 (23 Feb 2005) + + 23 Feb 2005; Gustavo Felisberto ; + tor-0.0.9.4-r2.ebuild, +tor-0.0.9.5.ebuild: + Adding version 0.0.9.5 and marking 0.0.9.4-r2 as x86. + +*tor-0.0.9.4-r2 (13 Feb 2005) + + 13 Feb 2005; Gustavo Felisberto ; files/tor.initd= , + +files/torrc.sample.patch-00, -tor-0.0.8.1.ebuild, -tor-0.0.9.1.ebuild= , + -tor-0.0.9.2.ebuild, +tor-0.0.9.4-r2.ebuild, -tor-0.0.9.4.ebuild: + Adding new version that properly patches the sample config and deletin= g older + versions. Lost the stable ppc-macos but that arch is lagging way to mu= ch. + +*tor-0.0.9.4-r1 (10 Feb 2005) + + 10 Feb 2005; Gustavo Felisberto ; +files/tor.init= d, + +tor-0.0.9.4-r1.ebuild: + Using ideas in bug #75381 from Faustus and after= talking + to latexer i'm commiting this version that can use a init.d script for= easier + usage. + +*tor-0.0.9.4 (04 Feb 2005) + + 04 Feb 2005; Peter Johanson +tor-0.0.9.4.ebuild: + Bump. + + 09 Jan 2005; Marcus Hanwell tor-0.0.9.2.ebuild: + Marked ~amd64, closes bug 76780. + +*tor-0.0.9.2 (04 Jan 2005) + + 04 Jan 2005; Peter Johanson +tor-0.0.9.2.ebuild: + Bump. + +*tor-0.0.9.1 (16 Dec 2004) + + 16 Dec 2004; Peter Johanson +tor-0.0.9.1.ebuild: + Bump. Add tsocks dependancy, see bug #70879 + + 20 Oct 2004; Peter Johanson -tor-0.0.6.1.ebuild, + -tor-0.0.6.ebuild, -tor-0.0.7.2.ebuild, -tor-0.0.7.3.ebuild, + -tor-0.0.7.ebuild: + Remove old vulnerable versions. See bug #67756 + + 21 Oct 2004; Joseph Jezak tor-0.0.8.1.ebuild: + Keyworded ppc-macos and macos due to vulnerability in previous version= s. + Removed tsocks RDEPEND at the request of latexer. See bug #67756 + +*tor-0.0.8.1 (17 Oct 2004) + + 17 Oct 2004; +tor-0.0.8.1.ebuild, -tor-0.0.8.ebuild= : + Bump and remove 0.0.8 which is vulnerable to a remote DoS. See bug #67= 756. + +*tor-0.0.8 (06 Oct 2004) + + 06 Oct 2004; tor-0.0.6.1.ebuild, tor-0.0.6.ebuild, + tor-0.0.7.2.ebuild, tor-0.0.7.3.ebuild, tor-0.0.7.ebuild, +tor-0.0.8.e= build: + Bump. Also fix the license as this is really under 3-clause BSD. + +*tor-0.0.7.3 (15 Aug 2004) + + 15 Aug 2004; Peter Johanson +tor-0.0.7.3.ebuild: + Bump. Only needed for servers. + + 25 Jul 2004; Lina Pezzella + Fixed Manifest. + + 24 Jul 2004; Erik Swanson tor-0.0.7.2.ebuild: + Added macos to KEYWORDS + +*tor-0.0.7.2 (15 Jul 2004) + + 15 Jul 2004; Peter Johanson +tor-0.0.7.2.ebuild: + Bump to latest version. tsocks is now a depend for everything but maco= s, since + tsocks no worky there. + +*tor-0.0.7 (07 Jun 2004) + + 07 Jun 2004; Peter Johanson,,, tor-0.0.2_pre27.ebui= ld, + tor-0.0.5.ebuild, tor-0.0.6_rc1.ebuild, tor-0.0.7.ebuild: + Bump to lates release, and remove older versions. + +*tor-0.0.6.1 (06 May 2004) + + 06 May 2004; Peter Johanson tor-0.0.6.1.ebuild: + Bump. + + 02 May 2004; Peter Johanson tor-0.0.6.ebuild: + Adding back ~ppc, as dholm wants me to keep it around for future updat= es. + +*tor-0.0.6 (02 May 2004) + + 02 May 2004; Peter Johanson tor-0.0.6.ebuild: + Bump to latest release. + + 30 Apr 2004; David Holm tor-0.0.6_rc1.ebuild: + Added to ~ppc. + +*tor-0.0.6_rc1 (29 Apr 2004) + + 29 Apr 2004; Peter Johanson tor-0.0.6_rc1.ebuild: + Bump to latest. Beware, this version is not backwards compatible with = older + versions. + +*tor-0.0.5 (30 Mar 2004) + + 30 Mar 2004; Peter Johanson tor-0.0.2_pre21.ebuil= d, + tor-0.0.2_pre22.ebuild, tor-0.0.2_pre23.ebuild, tor-0.0.2_pre24.ebuild= , + tor-0.0.2_pre25.ebuild, tor-0.0.5.ebuild: + Bump to latest release. Removed a bunch of the old stuff. Initscript c= oming + soon, i swear. + +*tor-0.0.2_pre27 (15 Mar 2004) + + 15 Mar 2004; Peter Johanson tor-0.0.2_pre27.ebuil= d: + Bump. + +*tor-0.0.2_pre25 (04 Mar 2004) + + 04 Mar 2004; Peter Johanson tor-0.0.2_pre25.ebuil= d: + Bump. Fixes a crash due to DNS stuff. + +*tor-0.0.2_pre24 (03 Mar 2004) + + 03 Mar 2004; Peter Johanson tor-0.0.2_pre24.ebuil= d: + Bump + +*tor-0.0.2_pre23 (29 Feb 2004) + + 29 Feb 2004; Peter Johanson tor-0.0.2_pre23.ebuil= d: + Bump + +*tor-0.0.2_pre22 (28 Feb 2004) + + 28 Feb 2004; Peter Johanson tor-0.0.2_pre22.ebuil= d: + Bump + +*tor-0.0.2_pre21 (22 Feb 2004) + + 22 Feb 2004; Peter Johanson metadata.xml, + tor-0.0.2_pre21.ebuild: + Initial Commit. Ebuild by yours truly. + diff --git a/net-misc/tor/Manifest b/net-misc/tor/Manifest new file mode 100644 index 0000000..ff56277 --- /dev/null +++ b/net-misc/tor/Manifest @@ -0,0 +1,22 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA256 + +AUX tor-0.2.2.24_alpha-respect-CFLAGS.patch 1001 RMD160 f623fd1f40cd2175= c0c5b6bea3441fc87f7e8d0a SHA1 c8634481cd8273f98945f17f297f2506331d3b8d SH= A256 2107434c7e7243d24043cf87eeccf60643e0cf94e8a883ebd725c23e13e667e8 +AUX tor-0.2.3.2_alpha-fix-asneeded.patch 654 RMD160 faf9cc37942dfa7f52db= e849c1819b24c0ab7940 SHA1 4400ed72fa60d04a96c82f0aba7c6eb41e23f5c5 SHA256= 4500436719cb96a17bfd4eb67b2ebf2b1db222904bf1b14b75cc17b8f1b41345 +AUX tor.confd 44 RMD160 d19946be72538d0826667730e9e9a1736b0385ff SHA1 f9= a40fadd018794e537282344f01c609e4dbeac7 SHA256 41d780f291847e19f632428bbf2= 7c3f289414afd237546d2974da1b75384c25c +AUX tor.initd-r4 1553 RMD160 df0fc912c2e36797059de07d15a384d9ffe7d393 SH= A1 82323d97b6d790b41027eec01e263d226c5b83e9 SHA256 4bf3c0906b0406564394eb= 51d47c1b5566904ed459e31ec1b1c1162c3b4aee92 +AUX torrc-r1 150 RMD160 e44d8b4b371978f09c536c234abbe9d8779eda4c SHA1 36= c64d7a1ab33931045e77c3738321ab73141d01 SHA256 0283d644362b9fd36d3d21bb1b0= c47e9776de15769a445fcc86e1a8fa5abf139 +AUX torrc.sample.patch 1292 RMD160 7199aa35ede10a2cf76e8deea47a7e399c318= 8f9 SHA1 aec4b133f7472c0a011b0724dafae464c31f3661 SHA256 7c8dcf90eacc2574= 5d26562dd8d6956def92880948e859b5e75c6bea5f35322e +DIST tor-0.2.2.32.tar.gz 2701371 RMD160 649c21f7ec89e34774c79db6544b612f= 0895bb61 SHA1 4baddc836931b3e915974c261e405e111636b716 SHA256 8744328c10b= 54950e08ee404a75a0e76865be0615cad6f7ffc8c75af7151ef4d +DIST tor-0.2.3.2-alpha.tar.gz 2755750 RMD160 d34ac6b45360af873202a6884ce= 12ccf0420adee SHA1 020eb00aaaafa1e7102ae8fd95d3d6a719a61289 SHA256 8f423a= f73c8d8477752858cfcc0c15860f487a0f9a390e791eaea22f4b467edd +EBUILD tor-0.2.2.32-r1.ebuild 2381 RMD160 3e8f2666e2f0829450937e1bd587cb= 48e0ff38fd SHA1 da6f1b7434b8e1f6d16ba8d8eed32f05bd7173d9 SHA256 a4bd4641a= da9a06568ba4c48c2daddc49ad6b0db5639e726674454991d1f2cf9 +EBUILD tor-0.2.3.2_alpha-r3.ebuild 2638 RMD160 82238d06d327a8ccabfeb65d3= caeff7be5e5be95 SHA1 6e0db3eb3e65c24bb6ca6b249c2b00768bf0ca40 SHA256 a3d6= 855745bead98ecefec1a6a19b2cdeb35dff7ee03ce9a4b3b8768057b25bc +MISC ChangeLog 40347 RMD160 5c24f105d438a017ab2269bf298f8afa9454b1d6 SHA= 1 50ce9dc3e5572191e5822d16fe3d36f3734113e2 SHA256 bf35487d48669fc4532c577= 38408c45aaee998f13518352b12377f231f146552 +MISC metadata.xml 712 RMD160 d8585c57fead7661b72e383528b6450a2ace05eb SH= A1 d97b0d9479c817d5a2207fbfc0fa5b567943c8a5 SHA256 53402fd0dc16696d9504c6= 6ffeb85f3d8583c8621151d2faced9b1ffedbb2dbc +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.0.17 (GNU/Linux) + +iEYEAREIAAYFAk5cWoIACgkQl5yvQNBFVTWbDACfUCNmWhsyRKMR2vT3d99Ut8D/ +eYkAmQE+LH1LrYwcAcL7zfmRMruwXhcm +=3Dy8Eg +-----END PGP SIGNATURE----- diff --git a/net-misc/tor/files/tor-0.2.2.24_alpha-respect-CFLAGS.patch b= /net-misc/tor/files/tor-0.2.2.24_alpha-respect-CFLAGS.patch new file mode 100644 index 0000000..86b797b --- /dev/null +++ b/net-misc/tor/files/tor-0.2.2.24_alpha-respect-CFLAGS.patch @@ -0,0 +1,24 @@ +diff -Naur tor-0.2.2.24-alpha.orig/configure.in tor-0.2.2.24-alpha/confi= gure.in +--- tor-0.2.2.24-alpha.orig/configure.in 2011-04-08 16:32:17.000000000 -= 0400 ++++ tor-0.2.2.24-alpha/configure.in 2011-04-18 07:10:57.000000000 -0400 +@@ -9,6 +9,11 @@ +=20 + AC_CANONICAL_HOST +=20 ++GENTOO_CFLAGS=3D"$CFLAGS" ++GENTOO_LDFLAGS=3D"$LDFLAGS" ++CFLAGS=3D ++LDFLAGS=3D ++ + if test -f /etc/redhat-release ; then + if test -f /usr/kerberos/include ; then + CPPFLAGS=3D"$CPPFLAGS -I/usr/kerberos/include" +@@ -971,6 +976,8 @@ +=20 +=20 + CPPFLAGS=3D"$CPPFLAGS $TOR_CPPFLAGS_libevent $TOR_CPPFLAGS_openssl $TOR= _CPPFLAGS_zlib" ++CFLAGS=3D"$CFLAGS $GENTOO_CFLAGS" ++LDFLAGS=3D"$LDFLAGS $GENTOO_LDFLAGS" +=20 + AC_CONFIG_FILES([Makefile tor.spec Doxyfile contrib/tor.sh contrib/torc= tl contrib/torify contrib/tor.logrotate contrib/Makefile src/config/torrc= .sample src/Makefile doc/Makefile src/config/Makefile src/common/Makefile= src/or/Makefile src/test/Makefile src/win32/Makefile src/tools/Makefile = contrib/suse/Makefile contrib/suse/tor.sh]) + AC_OUTPUT diff --git a/net-misc/tor/files/tor-0.2.3.2_alpha-fix-asneeded.patch b/ne= t-misc/tor/files/tor-0.2.3.2_alpha-fix-asneeded.patch new file mode 100644 index 0000000..75981d5 --- /dev/null +++ b/net-misc/tor/files/tor-0.2.3.2_alpha-fix-asneeded.patch @@ -0,0 +1,11 @@ +diff --git a/tor-0.2.3.2-alpha.orig/src/tools/tor-fw-helper/Makefile.am = b/tor-0.2.3.2-alpha/src/tools/tor-fw-helper/Makefile.am +index 75878f2..77ff63f 100644 +--- a/tor-0.2.3.2-alpha.orig/src/tools/tor-fw-helper/Makefile.am ++++ b/tor-0.2.3.2-alpha/src/tools/tor-fw-helper/Makefile.am +@@ -34,5 +34,5 @@ miniupnpc_cppflags =3D + endif +=20 + tor_fw_helper_LDFLAGS =3D $(nat_pmp_ldflags) $(miniupnpc_ldflags) +-tor_fw_helper_LDADD =3D $(nat_pmp_ldadd) $(miniupnpc_ldadd) ../../commo= n/libor.a @TOR_LIB_WS32@ ++tor_fw_helper_LDADD =3D ../../common/libor.a $(nat_pmp_ldadd) $(miniupn= pc_ldadd) @TOR_LIB_WS32@ + tor_fw_helper_CPPFLAGS =3D $(nat_pmp_cppflags) $(miniupnpc_cppflags) diff --git a/net-misc/tor/files/tor.confd b/net-misc/tor/files/tor.confd new file mode 100644 index 0000000..4195bf3 --- /dev/null +++ b/net-misc/tor/files/tor.confd @@ -0,0 +1,3 @@ +# +# Set the file limit +rc_ulimit=3D"-n 30000" diff --git a/net-misc/tor/files/tor.initd-r4 b/net-misc/tor/files/tor.ini= td-r4 new file mode 100644 index 0000000..597a955 --- /dev/null +++ b/net-misc/tor/files/tor.initd-r4 @@ -0,0 +1,57 @@ +#!/sbin/runscript +# Copyright 1999-2011 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/files/tor.initd-r4,v 1.7= 2011/08/23 12:26:36 blueness Exp $ + +opts=3D"${opts} checkconfig reload" +PIDFILE=3D/var/run/tor/tor.pid +CONFFILE=3D/etc/tor/torrc + +depend() { + need net +} + +checkconfig() { + # first check that it exists + if [ ! -f ${CONFFILE} ] ; then + eerror "You need to setup ${CONFFILE} first" + eerror "Example is in ${CONFFILE}.sample" + return 1 + fi + + # now verify whether the configuration is valid + /usr/bin/tor --verify-config -f ${CONFFILE} > /dev/null 2>&1 + if [ $? -eq 0 ] ; then + einfo "Tor configuration (${CONFFILE}) is valid." + return 0 + else + eerror "Tor configuration (${CONFFILE}) not valid." + /usr/bin/tor --verify-config -f ${CONFFILE} + return 1 + fi +} + +start() { + checkconfig || return 1 + ebegin "Starting Tor" + HOME=3D/var/lib/tor + start-stop-daemon --start --pidfile "${PIDFILE}" --quiet --exec /usr/bi= n/tor -- -f "${CONFFILE}" --runasdaemon 1 --PidFile "${PIDFILE}" > /dev/= null 2>&1 + eend $? +} + +stop() { + ebegin "Stopping Tor" + start-stop-daemon --stop --pidfile "${PIDFILE}" --exec /usr/bin/tor -- = --PidFile "${PIDFILE}" + eend $? +} + +reload() { + if [ ! -f ${PIDFILE} ]; then + eerror "${SVCNAME} isn't running" + return 1 + fi + checkconfig || return 1 + ebegin "Reloading Tor configuration" + start-stop-daemon --signal HUP --pidfile ${PIDFILE} + eend $? +} diff --git a/net-misc/tor/files/torrc-r1 b/net-misc/tor/files/torrc-r1 new file mode 100644 index 0000000..fdbc2bd --- /dev/null +++ b/net-misc/tor/files/torrc-r1 @@ -0,0 +1,8 @@ +# +# Minimal torrc so tor will work out of the box +# +User tor +Group tor +PIDFile /var/run/tor/tor.pid +Log notice syslog +DataDirectory /var/lib/tor/data diff --git a/net-misc/tor/files/torrc.sample.patch b/net-misc/tor/files/t= orrc.sample.patch new file mode 100644 index 0000000..2ff13c6 --- /dev/null +++ b/net-misc/tor/files/torrc.sample.patch @@ -0,0 +1,31 @@ +diff -Nuar tor-0.2.2.32.orig/src/config/torrc.sample.in tor-0.2.2.32/src= /config/torrc.sample.in +--- tor-0.2.2.32.orig/src/config/torrc.sample.in 2011-08-29 23:13:09.000= 000000 -0400 ++++ tor-0.2.2.32/src/config/torrc.sample.in 2011-08-29 23:14:19.00000000= 0 -0400 +@@ -12,6 +12,11 @@ + ## Tor will look for this file in various places based on your platform= : + ## https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc +=20 ++## Default username and group the server will run as ++User tor ++Group tor ++ ++PIDFile /var/run/tor/tor.pid +=20 + ## Replace this with "SocksPort 0" if you plan to run Tor only as a + ## relay, and not make any local application connections yourself. +@@ -40,6 +45,7 @@ + #Log notice syslog + ## To send all messages to stderr: + #Log debug stderr ++Log notice syslog +=20 + ## Uncomment this to start the process in the background... or use + ## --runasdaemon 1 on the command line. This is ignored on Windows; +@@ -49,6 +55,7 @@ + ## The directory for keeping all the keys/etc. By default, we store + ## things in $HOME/.tor on Unix, and in Application Data\tor on Windows= . + #DataDirectory @LOCALSTATEDIR@/lib/tor ++DataDirectory /var/lib/tor/data +=20 + ## The port on which Tor will listen for local connections from Tor + ## controller applications, as documented in control-spec.txt. diff --git a/net-misc/tor/metadata.xml b/net-misc/tor/metadata.xml new file mode 100644 index 0000000..4d8f7a1 --- /dev/null +++ b/net-misc/tor/metadata.xml @@ -0,0 +1,20 @@ + + + + no-herd + + blueness@gentoo.org + Anthony G. Basile + + + chiiph@gentoo.org + Tom=C3=A1s Touceda + + + Compile tor with hardening on vanilla com= pilers/linkers + Enable transparent proxying + Use Libevent's buffered IO + Enable NAT Port Mapping Protocol + Enable Universal Plug and Play + + diff --git a/net-misc/tor/tor-0.2.2.32-r1.ebuild b/net-misc/tor/tor-0.2.2= .32-r1.ebuild new file mode 100644 index 0000000..724709f --- /dev/null +++ b/net-misc/tor/tor-0.2.2.32-r1.ebuild @@ -0,0 +1,82 @@ +# Copyright 1999-2011 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/tor-0.2.2.32.ebuild,v 1.= 1 2011/08/28 11:10:10 blueness Exp $ + +EAPI=3D4 + +inherit autotools eutils flag-o-matic versionator + +MY_PV=3D"$(replace_version_separator 4 -)" +MY_PF=3D"${PN}-${MY_PV}" +DESCRIPTION=3D"Anonymizing overlay network for TCP" +HOMEPAGE=3D"http://www.torproject.org/" +SRC_URI=3D"http://www.torproject.org/dist/${MY_PF}.tar.gz" +S=3D"${WORKDIR}/${MY_PF}" + +LICENSE=3D"BSD" +SLOT=3D"0" +KEYWORDS=3D"~amd64 ~arm ~ppc ~ppc64 ~sparc ~x86 ~x86-fbsd" +IUSE=3D"doc tor-hardening +transparent-proxy threads" + +DEPEND=3D"dev-libs/openssl + >=3Ddev-libs/libevent-2.0" +# The tordns patch for tsocks avoids some leakage of information thus ra= ising anonymity +RDEPEND=3D"${DEPEND} + net-proxy/tsocks[tordns]" + +pkg_setup() { + enewgroup tor + enewuser tor -1 -1 /var/lib/tor tor +} + +src_prepare() { + epatch "${FILESDIR}"/torrc.sample.patch + + einfo "Regenerating autotools files ..." + epatch "${FILESDIR}"/${PN}-0.2.2.24_alpha-respect-CFLAGS.patch + eautoreconf || die "eautoreconf failed" +} + +src_configure() { + # Upstream isn't sure of all the user provided CFLAGS that + # will break tor, but does recommend against -fstrict-aliasing. + # We'll filter-flags them here as we encounter them. + filter-flags -fstrict-aliasing + econf --docdir=3D/usr/share/doc/${PF} \ + $(use_enable doc asciidoc) \ + $(use_enable tor-hardening gcc-hardening) \ + $(use_enable tor-hardening linker-hardening)\ + $(use_enable transparent-proxy transparent) \ + $(use_enable threads) +} + +src_install() { + newconfd "${FILESDIR}"/tor.confd tor + newinitd "${FILESDIR}"/tor.initd-r4 tor + emake DESTDIR=3D"${D}" install || die + keepdir /var/{lib,run}/tor + + dodoc README ChangeLog ReleaseNotes \ + doc/{HACKING,TODO} \ + doc/spec/README + + fperms 750 /var/lib/tor + fperms 755 /var/run/tor + fowners tor:tor /var/lib/tor /var/run/tor + + insinto /etc/tor/ + newins "${FILESDIR}"/torrc-r1 torrc +} + +pkg_postinst() { + elog + elog "We created a configuration file for tor, /etc/tor/torrc, but you = can" + elog "change it according to your needs. Use the torrc.sample that is = in" + elog "that directory as a guide. Also, to have privoxy work with tor" + elog "just add the following line" + elog + elog "forward-socks4a / localhost:9050 ." + elog + elog "to /etc/privoxy/config. Notice the . at the end!" + elog +} diff --git a/net-misc/tor/tor-0.2.3.2_alpha-r3.ebuild b/net-misc/tor/tor-= 0.2.3.2_alpha-r3.ebuild new file mode 100644 index 0000000..ba6e449 --- /dev/null +++ b/net-misc/tor/tor-0.2.3.2_alpha-r3.ebuild @@ -0,0 +1,88 @@ +# Copyright 1999-2011 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/tor-0.2.3.2_alpha-r2.ebu= ild,v 1.2 2011/07/30 10:28:35 blueness Exp $ + +EAPI=3D4 + +inherit autotools eutils flag-o-matic versionator + +MY_PV=3D"$(replace_version_separator 4 -)" +MY_PF=3D"${PN}-${MY_PV}" +DESCRIPTION=3D"Anonymizing overlay network for TCP" +HOMEPAGE=3D"http://www.torproject.org/" +SRC_URI=3D"http://www.torproject.org/dist/${MY_PF}.tar.gz" +S=3D"${WORKDIR}/${MY_PF}" + +LICENSE=3D"BSD" +SLOT=3D"0" +KEYWORDS=3D"~amd64 ~arm ~ppc ~ppc64 ~sparc ~x86 ~x86-fbsd" +IUSE=3D"+bufferevents doc nat-pmp tor-hardening transparent-proxy thread= s upnp" +DEPEND=3D"dev-libs/openssl + >=3Ddev-libs/libevent-2.0 + nat-pmp? ( net-libs/libnatpmp ) + upnp? (