[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-dev] txtorcon 0.15.0
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I'm happy to announce txtorcon 0.15.0:
* added support for NULL control-port-authentication which is often
appropriate when used with a UNIX domain socket
* switched to https://docs.python.org/3/library/ipaddress.html instead
of
Google's ipaddr; the API should be the same from a user
perspective but **packagers and tutorials** will want to change
their instructions slightly (``pip install ipaddress`` or ``apt-get
install python-ipaddress`` are the new ways).
* support the new ADD_ONION and DEL_ONION "ephemeral hidden services"
commands in TorConfig
* a first stealth-authentication implementation (for "normal" hidden
services, not ephemeral)
* bug-fix from https://github.com/david415 to raise
ConnectionRefusedError instead of StopIteration when running out of
SOCKS ports.
* new feature from https://github.com/david415 adding a
``build_timeout_circuit`` method which provides a Deferred that
callbacks only when the circuit is completely built and errbacks if
the provided timeout expires. This is useful because
:doc:`TorState.build_circuit` callbacks as soon as a Circuit
instance can be provided (and then you'd use
:doc:`Circuit.when_built` to find out when it's done building).
* new feature from https://github.com/coffeemakr
falling back to password authentication if cookie authentication
isn't available (or fails, e.g. because the file isn't readable).
* both TorState and TorConfig now have a ``.from_protocol``
class-method.
* spec-compliant string-un-escaping from https://github.com/coffeemakr
* fix https://github.com/meejah/txtorcon/issues/176
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.15.0
https://github.com/meejah/txtorcon/releases/tag/v0.15.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-0.15.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-0.15.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
f2e8cdb130aa48d63c39603c2404d9496c669fa8b4c724497ca6bfa7752a9475
dist/txtorcon-0.15.0.tar.gz
a359fb5e560263499400018262494378b3d347cd04a361adb08939df95ecedf6
dist/txtorcon-0.15.0-py2-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQEcBAEBAgAGBQJXl/KEAAoJEMJgKAMSgGmn76gH/1du7i9dmkMpr2PJrexVeXSo
9mSaeX/7KKaW71pEMmaCXfvhDJ6dMZDQpZ7saTM31zJZTp+MXjtHf0DZI2QTwgDw
NYEBH+LO8PINN1ezPomgeZE6E4eJYlaDCyO6c7j3cOsEmohST+GPpvvdWdft+Sw2
hWvVf2+I4BV7vcIx6WQx4jKBS2gmlHbxuUv3LAnjj/Tn6oSYpft1IUK39pM66DX4
FzdYeBTloC6nzyH4sRTxnax+l9MfQJ2ZR+5alJi8uEvGlk580ciFASQNCVLaBY9r
4YALoipEg2Fm4BFA7qLsH0aFoLgx0lv7ng8lmpaP7XlPjUCuA7OcDp5jSqhGt2A=
=hWml
-----END PGP SIGNATURE-----
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev