summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorChristian Faulhammer <fauli@gentoo.org>2011-01-07 23:54:09 +0000
committerChristian Faulhammer <fauli@gentoo.org>2011-01-07 23:54:09 +0000
commitc4bb87491408cc5bfcbc31369b7fcf8d7f87c639 (patch)
tree10f976ddaafe762821ac2e50d8b442fe760ed805 /net-misc/tor
parentVersion bump. (diff)
downloadhistorical-c4bb87491408cc5bfcbc31369b7fcf8d7f87c639.tar.gz
historical-c4bb87491408cc5bfcbc31369b7fcf8d7f87c639.tar.bz2
historical-c4bb87491408cc5bfcbc31369b7fcf8d7f87c639.zip
clean up vulnerable versions
Package-Manager: portage-2.1.9.25/cvs/Linux i686
Diffstat (limited to 'net-misc/tor')
-rw-r--r--net-misc/tor/ChangeLog6
-rw-r--r--net-misc/tor/Manifest18
-rw-r--r--net-misc/tor/tor-0.2.1.25.ebuild78
-rw-r--r--net-misc/tor/tor-0.2.1.26.ebuild78
-rw-r--r--net-misc/tor/tor-0.2.1.27.ebuild79
5 files changed, 16 insertions, 243 deletions
diff --git a/net-misc/tor/ChangeLog b/net-misc/tor/ChangeLog
index 12ed8489254e..4b0aab46b938 100644
--- a/net-misc/tor/ChangeLog
+++ b/net-misc/tor/ChangeLog
@@ -1,6 +1,10 @@
# ChangeLog for net-misc/tor
# Copyright 1999-2011 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/ChangeLog,v 1.224 2011/01/07 23:41:06 ranger Exp $
+# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/ChangeLog,v 1.225 2011/01/07 23:54:09 fauli Exp $
+
+ 07 Jan 2011; Christian Faulhammer <fauli@gentoo.org> -tor-0.2.1.25.ebuild,
+ -tor-0.2.1.26.ebuild, -tor-0.2.1.27.ebuild:
+ clean up vulnerable versions
07 Jan 2011; Brent Baude <ranger@gentoo.org> tor-0.2.1.28.ebuild:
Marking tor-0.2.1.28 ppc for bug 349312
diff --git a/net-misc/tor/Manifest b/net-misc/tor/Manifest
index 897ddd0115f8..30dcd61f01ff 100644
--- a/net-misc/tor/Manifest
+++ b/net-misc/tor/Manifest
@@ -1,14 +1,18 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA1
+
AUX tor-0.2.1.19-logrotate.patch 746 RMD160 34ae926877e1b388c5e1c3cf0a16feba8b3f010b SHA1 3df06da077694b2312cc33a76db4a9e27a602d78 SHA256 60370cb70e089f4e675f39610c651537d0df5e5d1066c36417f479738549bec3
AUX tor.conf 89 RMD160 3ed95351d715ed05db3baa3dd8802832cb06989f SHA1 ec2a2cb216c35e37803b29a508d0914639a7f82b SHA256 3ed15ecce5c312fb4d50e0e8f3a645d67c660e2930a9dbadf010803b8fd095a0
AUX tor.initd-r4 1566 RMD160 95692924474ad8e76dfdd60c44a9b4a618356d75 SHA1 cefe786a37b042edde03c00cb0500d6aade6cdd9 SHA256 aa5733badb87ebfe5efd0c3750a24f4589a480555f7c6ed579aa1c621ad09efc
AUX torrc.sample-0.1.2.6.patch 1145 RMD160 3656774f05abe54ec22a121954a1d437fe1da520 SHA1 a0c658eafc8feb134e4ce8c7a5cdf94074ad79f5 SHA256 5b94e1d8c097626402b0b388fefb15f11b95db112b23d358e04cfe55331911f1
-DIST tor-0.2.1.25.tar.gz 2406985 RMD160 e691b904e0d447b3f590f1e9e71b4daad020bd8d SHA1 11c176374be47825b4b7fa00b5654277d0838022 SHA256 8758b489ea5686fa09cdc50850116031178fa7429b63d3f37d74d588e9b6179e
-DIST tor-0.2.1.26.tar.gz 2405749 RMD160 6fe03ec4a8f72c9eda4a47370ebb240db78a4a39 SHA1 87af7aa658774031d181340848a875e4fd8e27bf SHA256 6cdc60ed0b2e3eb790cbf37741a3c86a004f4f7c6678e25b9b936d6a340c7fa2
-DIST tor-0.2.1.27.tar.gz 2484332 RMD160 f8d3a27afd679ce67787624cc8b6752740e1c09b SHA1 1a1788cc3b38f333e513a43325e9db0bb1b2a8cf SHA256 ec4d5c67231551d5ee3bf6cbccb87fccac3491fbe80f1d3fb778ad6b3d3f661c
DIST tor-0.2.1.28.tar.gz 2471741 RMD160 71cf9f3cfb0cf89de573869a694bf31059331811 SHA1 31c6995314a7a205a5d685bffbe966a766c84d7b SHA256 fe9756bee3228bf01334f743b7c74dd1edc83e5489f032737ce24eb6bdb19cbf
-EBUILD tor-0.2.1.25.ebuild 2407 RMD160 81b99e5685559a802f62efe0125e2171a87b796b SHA1 39530b4c47568aa6d47e0650df096397ed3d4fbf SHA256 1f3cb42aa7ab77d86e416b751332824961c094f9fce59491526f1213a4de046b
-EBUILD tor-0.2.1.26.ebuild 2408 RMD160 54a7182ece59c2b574ea90e4857e106bd6c9ddca SHA1 be42281353df84052324779ec3389fd793a374f2 SHA256 8732843adcee7f62b9aea28be5d84a61843d797568d479fa71e8c9e196a929f2
-EBUILD tor-0.2.1.27.ebuild 2506 RMD160 89c171e99a6f4c56f00804cf6f431cdf58ee4cac SHA1 ed40539cb52b428f38eb8e1cc24fd3400c2022e4 SHA256 69302a623c0d850a3ef4f1567bba129e412e4107c78f2585453b3972572352d5
EBUILD tor-0.2.1.28.ebuild 2503 RMD160 f3c32578599c4a886c048aa09db915631f736891 SHA1 6c46cda658c3b7835673c3d8cee218395764cf2d SHA256 cd547b5da42b5e2d7b6e3f2d76844837a863f4ed1e1db1ad8b6cf762e9bb8872
-MISC ChangeLog 32353 RMD160 df5b8e5f62e467a5dae00f1a3fca4561ba490e0b SHA1 4ee2a746412a983341890e1232032743d175fc87 SHA256 dfaaf8e2ba1be5a9377594189a75475175aa771ce5f95c9aee2251899b8f2356
+MISC ChangeLog 32507 RMD160 a7b5f1b4862bdbaa2dc4a02d12a202ba4cbae910 SHA1 633ba00540fd14123dbc67e9109df842940babb4 SHA256 c251070cdde823c3ff0699deffaad53931a907dac9a23479d9630435409ef743
MISC metadata.xml 363 RMD160 b21bb38c95a109d36b252b8e48b9c6724f75721c SHA1 6354a0d53fa168ddcd650f87872124f1edb345ef SHA256 650857d8f3d615ee0d0bcdb3d600d98eb58bae0d98c021dc6ff5ec774d77a142
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.0.16 (GNU/Linux)
+
+iEYEARECAAYFAk0nqIoACgkQNQqtfCuFneO7UwCfRkLD0VQoBOmrNx23WVAIy2V1
+UA8An1OAVtFWlaY0pwiDiFaLqwtP4lIg
+=RwfV
+-----END PGP SIGNATURE-----
diff --git a/net-misc/tor/tor-0.2.1.25.ebuild b/net-misc/tor/tor-0.2.1.25.ebuild
deleted file mode 100644
index 9f5c2285e215..000000000000
--- a/net-misc/tor/tor-0.2.1.25.ebuild
+++ /dev/null
@@ -1,78 +0,0 @@
-# Copyright 1999-2010 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/tor-0.2.1.25.ebuild,v 1.8 2010/09/30 20:41:30 ranger Exp $
-
-EAPI=2
-
-inherit eutils
-
-DESCRIPTION="Anonymizing overlay network for TCP"
-HOMEPAGE="http://www.torproject.org/"
-MY_PV=${PV/_/-}
-SRC_URI="http://www.torproject.org/dist/${PN}-${MY_PV}.tar.gz"
-S="${WORKDIR}/${PN}-${MY_PV}"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="amd64 arm ppc ppc64 sparc x86 ~x86-fbsd"
-IUSE="debug"
-
-DEPEND="dev-libs/openssl
- >=dev-libs/libevent-1.2"
-RDEPEND="${DEPEND}
- net-proxy/tsocks"
-
-pkg_setup() {
- enewgroup tor
- enewuser tor -1 -1 /var/lib/tor tor
-}
-
-src_prepare() {
- epatch "${FILESDIR}"/torrc.sample-0.1.2.6.patch
- epatch "${FILESDIR}"/${PN}-0.2.1.19-logrotate.patch
- # Normally tor uses a bundled libevent fragment to provide
- # asynchronous DNS requests. This is generally a bad idea, but at
- # the moment the official libevent does not have the 0x20 hack, so
- # anonymity is higher with the bundled variant. Remove patch as
- # soon as upstream has installed the autoconf option to use
- # system's libevent. This hasn't happened, so we
- # have to live with the bundled libevent for this release, as the
- # current version in tree won't suffice for tor to build
- # See http://bugs.noreply.org/flyspray/index.php?do=details&id=920
- # for upstream's report
- # Let's revisit this when libevent-2* is unmasked
- # use bundledlibevent || epatch "${FILESDIR}"/${PN}-0.2.1.5-no-internal-libevent.patch
-}
-
-src_configure() {
- econf $(use_enable debug)
-}
-
-src_install() {
- newinitd "${FILESDIR}"/tor.initd-r4 tor
- emake DESTDIR="${D}" install || die
- keepdir /var/{lib,log,run}/tor
-
- dodoc README ChangeLog AUTHORS ReleaseNotes \
- doc/{HACKING,TODO} \
- doc/spec/*.txt
-
- fperms 750 /var/lib/tor /var/log/tor
- fperms 755 /var/run/tor
- fowners tor:tor /var/lib/tor /var/log/tor /var/run/tor
-
- insinto /etc/logrotate.d
- newins contrib/tor.logrotate tor
-
- # allow the tor user more open files to avoid errors, see bug 251171
- insinto /etc/security/limits.d/
- doins "${FILESDIR}"/tor.conf
-}
-
-pkg_postinst() {
- elog "You must create /etc/tor/torrc, you can use the sample that is in that directory"
- elog "To have privoxy and tor working together you must add:"
- elog "forward-socks4a / localhost:9050 ."
- elog "(notice the . at the end of the line)"
- elog "to /etc/privoxy/config"
-}
diff --git a/net-misc/tor/tor-0.2.1.26.ebuild b/net-misc/tor/tor-0.2.1.26.ebuild
deleted file mode 100644
index 2797b0853447..000000000000
--- a/net-misc/tor/tor-0.2.1.26.ebuild
+++ /dev/null
@@ -1,78 +0,0 @@
-# Copyright 1999-2010 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/tor-0.2.1.26.ebuild,v 1.6 2010/10/14 16:58:05 ranger Exp $
-
-EAPI=2
-
-inherit eutils
-
-DESCRIPTION="Anonymizing overlay network for TCP"
-HOMEPAGE="http://www.torproject.org/"
-MY_PV=${PV/_/-}
-SRC_URI="http://www.torproject.org/dist/${PN}-${MY_PV}.tar.gz"
-S="${WORKDIR}/${PN}-${MY_PV}"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="amd64 arm ppc ~ppc64 sparc x86 ~x86-fbsd"
-IUSE="debug"
-
-DEPEND="dev-libs/openssl
- >=dev-libs/libevent-1.2"
-RDEPEND="${DEPEND}
- net-proxy/tsocks"
-
-pkg_setup() {
- enewgroup tor
- enewuser tor -1 -1 /var/lib/tor tor
-}
-
-src_prepare() {
- epatch "${FILESDIR}"/torrc.sample-0.1.2.6.patch
- epatch "${FILESDIR}"/${PN}-0.2.1.19-logrotate.patch
- # Normally tor uses a bundled libevent fragment to provide
- # asynchronous DNS requests. This is generally a bad idea, but at
- # the moment the official libevent does not have the 0x20 hack, so
- # anonymity is higher with the bundled variant. Remove patch as
- # soon as upstream has installed the autoconf option to use
- # system's libevent. This hasn't happened, so we
- # have to live with the bundled libevent for this release, as the
- # current version in tree won't suffice for tor to build
- # See http://bugs.noreply.org/flyspray/index.php?do=details&id=920
- # for upstream's report
- # Let's revisit this when libevent-2* is unmasked
- # use bundledlibevent || epatch "${FILESDIR}"/${PN}-0.2.1.5-no-internal-libevent.patch
-}
-
-src_configure() {
- econf $(use_enable debug)
-}
-
-src_install() {
- newinitd "${FILESDIR}"/tor.initd-r4 tor
- emake DESTDIR="${D}" install || die
- keepdir /var/{lib,log,run}/tor
-
- dodoc README ChangeLog AUTHORS ReleaseNotes \
- doc/{HACKING,TODO} \
- doc/spec/*.txt
-
- fperms 750 /var/lib/tor /var/log/tor
- fperms 755 /var/run/tor
- fowners tor:tor /var/lib/tor /var/log/tor /var/run/tor
-
- insinto /etc/logrotate.d
- newins contrib/tor.logrotate tor
-
- # allow the tor user more open files to avoid errors, see bug 251171
- insinto /etc/security/limits.d/
- doins "${FILESDIR}"/tor.conf
-}
-
-pkg_postinst() {
- elog "You must create /etc/tor/torrc, you can use the sample that is in that directory"
- elog "To have privoxy and tor working together you must add:"
- elog "forward-socks4a / localhost:9050 ."
- elog "(notice the . at the end of the line)"
- elog "to /etc/privoxy/config"
-}
diff --git a/net-misc/tor/tor-0.2.1.27.ebuild b/net-misc/tor/tor-0.2.1.27.ebuild
deleted file mode 100644
index 1c12a3f5c342..000000000000
--- a/net-misc/tor/tor-0.2.1.27.ebuild
+++ /dev/null
@@ -1,79 +0,0 @@
-# Copyright 1999-2010 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/tor-0.2.1.27.ebuild,v 1.4 2010/12/08 20:30:41 maekke Exp $
-
-EAPI=2
-
-inherit eutils
-
-DESCRIPTION="Anonymizing overlay network for TCP"
-HOMEPAGE="http://www.torproject.org/"
-MY_PV=${PV/_/-}
-SRC_URI="http://www.torproject.org/dist/${PN}-${MY_PV}.tar.gz"
-S="${WORKDIR}/${PN}-${MY_PV}"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="amd64 arm ~ppc ~ppc64 ~sparc x86 ~x86-fbsd"
-IUSE="debug"
-
-DEPEND="dev-libs/openssl
- >=dev-libs/libevent-1.2"
-# The tordns patch for tsocks avoids some leakage of information thus raising anonymity
-RDEPEND="${DEPEND}
- net-proxy/tsocks[tordns]"
-
-pkg_setup() {
- enewgroup tor
- enewuser tor -1 -1 /var/lib/tor tor
-}
-
-src_prepare() {
- epatch "${FILESDIR}"/torrc.sample-0.1.2.6.patch
- epatch "${FILESDIR}"/${PN}-0.2.1.19-logrotate.patch
- # Normally tor uses a bundled libevent fragment to provide
- # asynchronous DNS requests. This is generally a bad idea, but at
- # the moment the official libevent does not have the 0x20 hack, so
- # anonymity is higher with the bundled variant. Remove patch as
- # soon as upstream has installed the autoconf option to use
- # system's libevent. This hasn't happened, so we
- # have to live with the bundled libevent for this release, as the
- # current version in tree won't suffice for tor to build
- # See http://bugs.noreply.org/flyspray/index.php?do=details&id=920
- # for upstream's report
- # Let's revisit this when libevent-2* is unmasked
- # use bundledlibevent || epatch "${FILESDIR}"/${PN}-0.2.1.5-no-internal-libevent.patch
-}
-
-src_configure() {
- econf $(use_enable debug)
-}
-
-src_install() {
- newinitd "${FILESDIR}"/tor.initd-r4 tor
- emake DESTDIR="${D}" install || die
- keepdir /var/{lib,log,run}/tor
-
- dodoc README ChangeLog AUTHORS ReleaseNotes \
- doc/{HACKING,TODO} \
- doc/spec/*.txt
-
- fperms 750 /var/lib/tor /var/log/tor
- fperms 755 /var/run/tor
- fowners tor:tor /var/lib/tor /var/log/tor /var/run/tor
-
- insinto /etc/logrotate.d
- newins contrib/tor.logrotate tor
-
- # allow the tor user more open files to avoid errors, see bug 251171
- insinto /etc/security/limits.d/
- doins "${FILESDIR}"/tor.conf
-}
-
-pkg_postinst() {
- elog "You must create /etc/tor/torrc, you can use the sample that is in that directory"
- elog "To have privoxy and tor working together you must add:"
- elog "forward-socks4a / localhost:9050 ."
- elog "(notice the . at the end of the line)"
- elog "to /etc/privoxy/config"
-}