meejah
2018-02-23 00:31:09 UTC
I'm very happy to release txtorcon 0.20.0. This includes a few minor
new features and an important bug fix if you're using a Tor new enough
to have all the *PortLines changes (anything after 0.3.0.6; see Tor
issue #20956). Full list of changes:
* doc fixes (from hotelzululima)
* Issue 246: fix endpoints so .connect on them works properly more than once
(from Brian Warner)
* allow a CertificateOptions to be passed as tls= to endpoints
* PR 252: add method txtorcon.Tor.is_ready
* PR 252: add method txtorcon.Tor.become_ready
* PR 253: fix handling of certain defaults (*PortLines and friends)
* fix last router (usually) missing with (new) `MicroDescriptorParser`
* use OnionOO via Onion service tgel7v4rpcllsrk2.onion for txtorcon.Router.get_onionoo_details
* fix parsing of Router started-times
* Issue 255: removed routers always deleted following NEWCONSENSUS
* Issue 279: remember proxy endpoint if it was Deferred
You can download the release from PyPI or GitHub (or of course "pip
install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.20.0
https://github.com/meejah/txtorcon/releases/tag/v0.20.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-0.20.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-0.20.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
dc80cb76b3ddacef6d671c0a088cb1a45274c0858554c32ce55d0f41421c740e txtorcon-0.20.0.tar.gz
a957b3dc10f0b2b882ef6ad46d2932fa7731d5eeee6d52ba9d736d2bc4f1385f txtorcon-0.20.0-py2.py3-none-any.whl
EOF
thanks,
meejah
new features and an important bug fix if you're using a Tor new enough
to have all the *PortLines changes (anything after 0.3.0.6; see Tor
issue #20956). Full list of changes:
* doc fixes (from hotelzululima)
* Issue 246: fix endpoints so .connect on them works properly more than once
(from Brian Warner)
* allow a CertificateOptions to be passed as tls= to endpoints
* PR 252: add method txtorcon.Tor.is_ready
* PR 252: add method txtorcon.Tor.become_ready
* PR 253: fix handling of certain defaults (*PortLines and friends)
* fix last router (usually) missing with (new) `MicroDescriptorParser`
* use OnionOO via Onion service tgel7v4rpcllsrk2.onion for txtorcon.Router.get_onionoo_details
* fix parsing of Router started-times
* Issue 255: removed routers always deleted following NEWCONSENSUS
* Issue 279: remember proxy endpoint if it was Deferred
You can download the release from PyPI or GitHub (or of course "pip
install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.20.0
https://github.com/meejah/txtorcon/releases/tag/v0.20.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-0.20.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-0.20.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
dc80cb76b3ddacef6d671c0a088cb1a45274c0858554c32ce55d0f41421c740e txtorcon-0.20.0.tar.gz
a957b3dc10f0b2b882ef6ad46d2932fa7731d5eeee6d52ba9d736d2bc4f1385f txtorcon-0.20.0-py2.py3-none-any.whl
EOF
thanks,
meejah