[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-dev] txtorcon 0.15.0



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm happy to announce txtorcon 0.15.0:

 * added support for NULL control-port-authentication which is often
   appropriate when used with a UNIX domain socket
 * switched to https://docs.python.org/3/library/ipaddress.html instead
   of
   Google's ipaddr; the API should be the same from a user
   perspective but **packagers and tutorials** will want to change
   their instructions slightly (``pip install ipaddress`` or ``apt-get
   install python-ipaddress`` are the new ways).
 * support the new ADD_ONION and DEL_ONION "ephemeral hidden services"
   commands in TorConfig
 * a first stealth-authentication implementation (for "normal" hidden
   services, not ephemeral)
 * bug-fix from https://github.com/david415 to raise
   ConnectionRefusedError instead of StopIteration when running out of
   SOCKS ports.
 * new feature from https://github.com/david415 adding a
   ``build_timeout_circuit`` method which provides a Deferred that
   callbacks only when the circuit is completely built and errbacks if
   the provided timeout expires. This is useful because
   :doc:`TorState.build_circuit` callbacks as soon as a Circuit
   instance can be provided (and then you'd use
   :doc:`Circuit.when_built` to find out when it's done building).
 * new feature from https://github.com/coffeemakr
   falling back to password authentication if cookie authentication
   isn't available (or fails, e.g. because the file isn't readable).
 * both TorState and TorConfig now have a ``.from_protocol``
   class-method.
 * spec-compliant string-un-escaping from https://github.com/coffeemakr
 * fix https://github.com/meejah/txtorcon/issues/176

You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):

   https://pypi.python.org/pypi/txtorcon/0.15.0
   https://github.com/meejah/txtorcon/releases/tag/v0.15.0

Releases are also available from the hidden service:

   http://timaq4ygg2iegci7.onion/txtorcon-0.15.0.tar.gz
   http://timaq4ygg2iegci7.onion/txtorcon-0.15.0.tar.gz.asc

You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:

cat <<EOF | sha256sum --check
f2e8cdb130aa48d63c39603c2404d9496c669fa8b4c724497ca6bfa7752a9475
dist/txtorcon-0.15.0.tar.gz
a359fb5e560263499400018262494378b3d347cd04a361adb08939df95ecedf6
dist/txtorcon-0.15.0-py2-none-any.whl
EOF

thanks,
meejah
-----BEGIN PGP SIGNATURE-----

iQEcBAEBAgAGBQJXl/KEAAoJEMJgKAMSgGmn76gH/1du7i9dmkMpr2PJrexVeXSo
9mSaeX/7KKaW71pEMmaCXfvhDJ6dMZDQpZ7saTM31zJZTp+MXjtHf0DZI2QTwgDw
NYEBH+LO8PINN1ezPomgeZE6E4eJYlaDCyO6c7j3cOsEmohST+GPpvvdWdft+Sw2
hWvVf2+I4BV7vcIx6WQx4jKBS2gmlHbxuUv3LAnjj/Tn6oSYpft1IUK39pM66DX4
FzdYeBTloC6nzyH4sRTxnax+l9MfQJ2ZR+5alJi8uEvGlk580ciFASQNCVLaBY9r
4YALoipEg2Fm4BFA7qLsH0aFoLgx0lv7ng8lmpaP7XlPjUCuA7OcDp5jSqhGt2A=
=hWml
-----END PGP SIGNATURE-----
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev