meejah
2016-07-26 23:31:24 UTC
I'm happy to announce txtorcon 0.15.0:
* added support for NULL control-port-authentication which is often
appropriate when used with a UNIX domain socket
* switched to https://docs.python.org/3/library/ipaddress.html instead
of
Google's ipaddr; the API should be the same from a user
perspective but **packagers and tutorials** will want to change
their instructions slightly (``pip install ipaddress`` or ``apt-get
install python-ipaddress`` are the new ways).
* support the new ADD_ONION and DEL_ONION "ephemeral hidden services"
commands in TorConfig
* a first stealth-authentication implementation (for "normal" hidden
services, not ephemeral)
* bug-fix from https://github.com/david415 to raise
ConnectionRefusedError instead of StopIteration when running out of
SOCKS ports.
* new feature from https://github.com/david415 adding a
``build_timeout_circuit`` method which provides a Deferred that
callbacks only when the circuit is completely built and errbacks if
the provided timeout expires. This is useful because
:doc:`TorState.build_circuit` callbacks as soon as a Circuit
instance can be provided (and then you'd use
:doc:`Circuit.when_built` to find out when it's done building).
* new feature from https://github.com/coffeemakr
falling back to password authentication if cookie authentication
isn't available (or fails, e.g. because the file isn't readable).
* both TorState and TorConfig now have a ``.from_protocol``
class-method.
* spec-compliant string-un-escaping from https://github.com/coffeemakr
* fix https://github.com/meejah/txtorcon/issues/176
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.15.0
https://github.com/meejah/txtorcon/releases/tag/v0.15.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-0.15.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-0.15.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
f2e8cdb130aa48d63c39603c2404d9496c669fa8b4c724497ca6bfa7752a9475
dist/txtorcon-0.15.0.tar.gz
a359fb5e560263499400018262494378b3d347cd04a361adb08939df95ecedf6
dist/txtorcon-0.15.0-py2-none-any.whl
EOF
thanks,
meejah
* added support for NULL control-port-authentication which is often
appropriate when used with a UNIX domain socket
* switched to https://docs.python.org/3/library/ipaddress.html instead
of
Google's ipaddr; the API should be the same from a user
perspective but **packagers and tutorials** will want to change
their instructions slightly (``pip install ipaddress`` or ``apt-get
install python-ipaddress`` are the new ways).
* support the new ADD_ONION and DEL_ONION "ephemeral hidden services"
commands in TorConfig
* a first stealth-authentication implementation (for "normal" hidden
services, not ephemeral)
* bug-fix from https://github.com/david415 to raise
ConnectionRefusedError instead of StopIteration when running out of
SOCKS ports.
* new feature from https://github.com/david415 adding a
``build_timeout_circuit`` method which provides a Deferred that
callbacks only when the circuit is completely built and errbacks if
the provided timeout expires. This is useful because
:doc:`TorState.build_circuit` callbacks as soon as a Circuit
instance can be provided (and then you'd use
:doc:`Circuit.when_built` to find out when it's done building).
* new feature from https://github.com/coffeemakr
falling back to password authentication if cookie authentication
isn't available (or fails, e.g. because the file isn't readable).
* both TorState and TorConfig now have a ``.from_protocol``
class-method.
* spec-compliant string-un-escaping from https://github.com/coffeemakr
* fix https://github.com/meejah/txtorcon/issues/176
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.15.0
https://github.com/meejah/txtorcon/releases/tag/v0.15.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-0.15.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-0.15.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
f2e8cdb130aa48d63c39603c2404d9496c669fa8b4c724497ca6bfa7752a9475
dist/txtorcon-0.15.0.tar.gz
a359fb5e560263499400018262494378b3d347cd04a361adb08939df95ecedf6
dist/txtorcon-0.15.0-py2-none-any.whl
EOF
thanks,
meejah