http://www.open-source-security-software.net/project/txtorcon/releases.atomRecent releases for txtorcon2025-05-03T14:58:14.578329+00:00python-feedgentxtorcon v0.8.1txtorcon v0.8.12013-07-04T21:30:36+00:00Fix import in setup.py preventing 0.8.0 installs and a couple small fixes from Lukas Lueg and Isis Lovecruft
2013-07-04T21:30:36+00:00txtorcon v0.9.1txtorcon v0.9.12014-01-20T19:32:24+00:00I am pleased to announce that txtorcon v0.9.1 is now available.
This release adds quite a few minor bug-fixes, simplifies GeoIP
handling (with support for both pre- and post 0.3 pygeoip APIs), a
tutorial-style walkthrough, the availability of a "wheel" distribution
and uses "twine" to do the uploads (allowing me to actually test the
signed tarball and whl files before uploading).
Full list of improvements:
- put test/ directory at the top level
- using http://nedbatchelder.com/code/coverage tool instead of custom script
- using coveralls.io and travis-ci.org for test coverage and continuous integration
- issue #56: added Circuit.close() and Stream.close() starting from aagbsn's patch
- parsing issues with multi-line keyword discovered and resolved
- preserve router nicks from long-names if consensus lacks an entry (e.g. bridges)
- using https://github.com/dstufft/twine for releases
- "Wheel" release now also available
- issue #57: "python setup.py develop" now supported
- issue #59: if tor_launch() times out, Tor is properly killed (starting with pull-request from Ryman)
- experimental docker.io-based tests (for HS listening, and tor_launch() timeouts)
- issue #55: pubkey link on readthedocs
- issue #63
- clean up GeoIP handling, and support pygeoip both pre and post 0.3
- slightly improve unit-test coverage (now at 97%, 61 lines out of 2031 missing)
- added a walkthrough to the documentation
sha256 sums for the distribution files:
68e21f719f6541448c0ec8e4a95787a0fe13452dd4086631ffdce79b47134e37 txtorcon-0.9.1.tar.gz
b92fb5a767eeb3c3d1ec7626fb992d76c73f068e00e69bda51cdbbfc8868eba7 txtorcon-0.9.1-py27-none-any.whl
Note that there are cryptographic signatures in the github repository,
linked and hosted on readthedocs as well as via the hidden
service.
Also note that you did not miss out on 0.9.0; I screwed up the tarball
upload to PyPI resulting in a signature mismatch and pypi doesn't let
you re-upload a tarball.
Thanks,
meejah
2014-01-20T19:32:24+00:00txtorcon v0.9.2txtorcon v0.9.22014-04-24T19:25:30+00:00-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I am happy to announce that txtorcon v0.9.2 is now available.
This release adds a few minor bug-fixes and a few API
enhancements. Full details:
- add on_disconnect callback for TorControlProtocol (no more monkey-patching Protocol API)
- add age() method to Circuit
- add time_created property to Circuit
- don't incorrectly listen for NEWDESC events in TorState
- add .flags dict to track flags in Circuit, Stream
- build_circuit() can now take hex IDs (as well as Router instances)
- add unique_name property to Router (returns the hex id, unless Named then return name)
- add location property to Router
- TorState.close_circuit now takes either a Circuit ID or Circuit instance
- TorState.close_stream now takes either a Stream ID or Stream instance
- support both GeoIP API versions
- more test-coverage
- small patch from enriquefynn improving tor binary locating
- strip OK lines in TorControlProtocol (https://github.com/meejah/txtorcon/issues/8)
- use TERM not KILL when Tor launch times out (https://github.com/meejah/txtorcon/pull/68>) from hellais
- Unit-test coverage now at 98%
sha256 sums for the distribution files:
93e934f83e3fc6fcf40e76f7c9c28459af04205fb912d384aaacb7ac5269bb8f dist/txtorcon-0.9.2-py2-none-any.whl
fe90743cdc453002ad046aa6556b611b4e85b813ff92865769d3d27712c2ca47 dist/txtorcon-0.9.2.tar.gz
There are also signatures on github and txtorcon.readthedocs.org
You may download from github or the hidden service:
https://github.com/meejah/txtorcon/releases/tag/v0.9.2
https://github.com/meejah/txtorcon/releases/download/v0.9.2/txtorcon-0.9.2-py2-none-any.whl
https://github.com/meejah/txtorcon/releases/download/v0.9.2/txtorcon-0.9.2-py2-none-any.whl.asc
https://github.com/meejah/txtorcon/releases/download/v0.9.2/txtorcon-0.9.2.tar.gz
https://github.com/meejah/txtorcon/releases/download/v0.9.2/txtorcon-0.9.2.tar.gz.asc
http://timaq4ygg2iegci7.onion/txtorcon-0.9.2.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-0.9.2.tar.gz.asc
Source code:
https://github.com/meejah/txtorcon/archive/v0.9.2.tar.gz
Thanks,
meejah
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iQEcBAEBAgAGBQJTWVf5AAoJEMJgKAMSgGmn07kIAKSwjBck76dyN1lWJj0fRl/f
BevLpnp+rb+ge5hBAeKfsVTYciDBZeSo8/fE44wTNh5Qj9HEhFopVC4WF61rIFU+
4IkpnFvfmVEd8Iu1vqQ/hFmP1jrvT8T+nTbaTGkcoCSPI+GyXkbxLqcl0Fncq51M
M0OIRphyWA7EK3YoZ2Q1BOEIwsN0pwERYUhU0CGS45L7OZmyw86RXTMBZpBnNXrD
5VjQdpx8fvrV2iCRXi/k/e2Jy/xqs8o0I2+o9M6WrBiGCs5S9YbjsAKzRb7dsaBZ
RlRAdKUjyzkquPl4K8E5ocDToB1hIGvqCSp7s11a5rq5T/jUiDMYrjkxIXH1Yg4=
=W7+f
-----END PGP SIGNATURE-----
2014-04-24T19:25:30+00:00txtorcon v0.10.0txtorcon v0.10.02014-06-15T16:21:09+00:00-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I'm excited to announce txtorcon 0.10.0 which adds support for
Twisted's endpoint strings.
This means that ANY Twisted program that uses endpoints can accept
"onion:" strings to bring up a hidden services easily (by launching a
new Tor instance). Typically, no code changes to the application
should be needed (just "pip install txtorcon").
"twistd" supports endpoints, so for example to serve some Web content
from ~/public_html as a hidden-serivce, we can do this (with txtorcon
installed):
twistd web --port onion:80 --path ~/public_html
Some examples of other valid "onion:" endpoint strings:
onion:80:hiddenServiceDir=/dev/shm/hidsrv
onion:80:controlPort=9050:hiddenServiceDir=/srv/hidden
The first allows specifying existing hidden service keys and the
second says to connect to an already-running Tor instance.
Thanks to David Stainton (dawuud) for the initial pull-request (and
continued collaboration) that made this happen. There is a complete
demonstration of the power of this Fully Operational endpoint-station
here:
https://txtorcon.readthedocs.org/en/latest/howtos.html#endpoints-enable-tor-with-any-twisted-service
You can download the release from PyPI or GitHub (or of course use
"pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.10.0
https://github.com/meejah/txtorcon/releases/tag/v0.10.0
sha256sum reports:
910ff3216035de0a779cfc167c0545266ff1f26687b163fc4655f298aca52d74 txtorcon-0.10.0-py2-none-any.whl
c93f3d0f21d53c6b4c1521fc8d9dc2c9aff4a9f60497becea207d1738fa78279 txtorcon-0.10.0.tar.gz
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iQEcBAEBAgAGBQJTnTM5AAoJEMJgKAMSgGmnB5EIAIJACHhd7PEWYfCZmB8lL1pr
J4rrhUuXD1iI7zJJL/rmS/SZLL+34JoKke6iQsBRGYzU0GRK2JQkFAeMq++AMdMu
QvoTg745OhnMSbZyCyS6buN/NhAVcmD3GYI9h8TK60jfUPEFn7+sDstMG4OePdgq
X0QQHBuJq9XtDwEmRWFHq2Aht//7J2DUliPPjtwT3C4FhPT5pXxasvfQA4jOYxsO
jTja6UE4/4TnonV5gB/chijp60cKvVxFQi86mKuNnVaKTZu+QCZFJtXkr/DbRSxv
CJ+z7jJ9s8xhfQ5Nkv9pkVAreH6w9bemc/iijKlZmQGYvLBTsvISPATyWGtn1f4=
=wIVZ
-----END PGP SIGNATURE-----
2014-06-15T16:21:09+00:00txtorcon v0.10.1txtorcon v0.10.12014-07-20T22:24:50+00:00-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello,
A new minor release of txtorcon exists, fixing a couple bugs
introduced along with the endpoints feature in 0.10.0:
- issue #78: Add tox tests and fix for Twisted 12.0.0 (and prior), as
this is what Debian squeeze ships
- issue #77: properly expand relative and tilde paths for
hiddenServiceDir via endpoints
- fix bug incorrectly issuing RuntimeError in brief window of time on
event-listeners
You can download the release from PyPI or GitHub (or of course "pip
install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.10.1
https://github.com/meejah/txtorcon/releases/tag/v0.10.1
sha256sum reports:
33f04523329b14accb2054b81c5da887c28b402c797ba895dc1ee58824e107f1 txtorcon-0.10.1-py2-none-any.whl
7a6e8fab71fd05c223d866b60b998cf308661ef1fc87d94e06c3b51f4ada4a6a txtorcon-0.10.1.tar.gz
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iQEbBAEBAgAGBQJTzD25AAoJEMJgKAMSgGmnB8IH+MnRyCCKMgPJ2GjV01K+PVaU
UgvUXhaqLdQUbViKeYy7KNst9d8Dm3ejHr21kedE8oeY/ztHlLdvtJtgWWvTOrTI
qqh4wWfBVHeibSgsEzwNVdeJ3MtERPWuCrIkIWnathbVjfnkRW+cLPOtJUWtSi/d
pdN4ZC+K1jBvSeHPCDhf8sXSqdzsOxXOWn/9SUaa70c7kMrbxjMxO1Jw/miqftMq
/wo0vyXn4EeEdURa9hYFpUqgUbUFl6C1KiELNeHWtwGbGWku17bNgQn5HH7uY4/6
RODYBaAT327062m81ig7zQ6MmxKcngIG4Ic3qvJYeLerO/EnnNvzSs3Q+EGQeg==
=nsEx
-----END PGP SIGNATURE-----
2014-07-20T22:24:50+00:00txtorcon v0.11.0txtorcon v0.11.02014-08-16T15:19:48+00:00-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
txtorcon 0.11.0 is now released. This adds a few API improvements:
- launch_tor() allows access to stdout, stderr in real-time
and control whether we kill Tor on and stderr output. See issue #79.
- Warning about `build_circuit` being called without a guard first
is now optional (default is still warn) (from arlolra)
- available_tcp_port() now in util (from arlolra)
- TorState now has a .routers_by_hash member (from arlolra)
You can download the release from PyPI or GitHub (or of course "pip
install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.11.0
https://github.com/meejah/txtorcon/releases/tag/v0.11.0
sha256sum reports:
5efb7ba4faf698e68daea3d8711ce0ecfd8b95501cbec00b2093dd99f72dc8cc txtorcon-0.11.0-py2-none-any.whl
aa206ab8a31053fd34798659c3d4cd7354a3e6872a86065c55098866df3dcaca txtorcon-0.11.0-py2-none-any.whl.asc
ecb7cc8ee002ead5481c17fd62576521862e93081c58d7118f53cf3c8817f857 txtorcon-0.11.0.tar.gz
76ee6983269347d475ff4df9aefb7c43ddd25d24dd67c4e3293f5c8557377652 txtorcon-0.11.0.tar.gz.asc
txtorcon 0.10.1 is in Debian, and no doubt this release will migrate
there quickly as usual (thanks to Lunar^)
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iQEcBAEBAgAGBQJT7vo4AAoJEMJgKAMSgGmnzjsH/36wtSA2Cb1coSuK+5hGNIGa
flmGETgEOo4mHRCnSLQdO5JrXAKR9zeEt9tT9IfCTO1kRy4Q5cqzE569RhPsciBn
1g3fMlgXewjJuXx1atefO1sbqQgK74TsIqxkGnK85LEUOcqIcW71JT8lI6CDn3xg
LymqLLhbC28uYLot+Y0/KPAME7MAlgugny5Me2sGzey1aKfjZhPXQ6gRJsGVlPjQ
qhMD6ck9Xe+QZNkE4udzEzNkvA7Og/HJdwwi3yC/ENKcWKit/9PeKvmttVjyQ9Aj
KGeN2CMA5jTHHznvohvAKgeUnkDDR4tqpcoKdJZjCVg9yAaaiNoPw2wj/3O3tTw=
=elqw
-----END PGP SIGNATURE-----
2014-08-16T15:19:48+00:00txtorcon v0.12.0txtorcon v0.12.02015-02-03T21:16:06+00:00-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I'm pleased to announce txtorcon 0.12.0. Full list of improvements:
- doc, code and import cleanups from Kali Kaneko
- HiddenServiceDirGroupReadable support
- Issue #80: honour "ControlPort 0" in incoming TorConfig
instance. The caller owns both pieces: you have to figure out when
it's bootstraped, and are responsible for killing it off.
- Issue #88: clarify documentation and fix appending to some config lists
- If GeoIP data isn't loaded in Tor, it sends protocol errors; if
txtorcon also hasn't got GeoIP data, the queries for country-code
fail; this error is now ignored.
- 100% unit-test coverage!
- PyPy support (as in: all tests pass)
- TCP4HiddenServiceEndpoint now waits for descriptor upload before
the listen() call does its callback (this means when using "onion:"
endpoint strings, or any of the endpoints APIs your hidden service
is 100% ready for action when you receive the callback)
- "TorControlProtocol now has an ".all_routers" member, which is a set() of all Routers
- TimeIntervalCommaList from Tor config supported
- documentation fix from "sammyshj"
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.12.0
https://github.com/meejah/txtorcon/releases/tag/v0.12.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-0.12.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-0.12.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
206b1bd8a840119c12d9b85d638ab9defec5b376436fa36be9139ab1ebc8cd78 txtorcon-0.12.0.tar.gz
4e4f6aa2ec677f6c27bff41d17888d31a979f6b831a20501101b39ca93ede9da txtorcon-0.12.0-py2-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iQEcBAEBAgAGBQJU0TWHAAoJEMJgKAMSgGmnDEoH/AriLbAyImmcfmRy5C2YcVth
eJyXRhHTXc6WBh0tBgryt88o5n55XAwiqNoAwslLvS4RS6w9NEzA9zusimuVYEZs
CV10NeC5PiXHJ6qDlcJ+FPsHhWk4zt49wGtaqyfGK/8aZm9enQwiMH6j9Iwx6il0
rLFwm7RoukPTW8dn3oR67QFYwdpHD7cCQW8e6uajpQuBCeNr2nljRpVLFM/6hueh
shIAAmPGfBQ2vR16QOQDyJMCLk7oKj0xtzok8O4fWBof1+h3JvMQqphEYlgtE5Lh
9W0XgG/ugrrhjIIoKc29+4Io5vaqKjHcGfqEyJyEimppgGB/6YTX2fJNw2R3Op4=
=vaqH
-----END PGP SIGNATURE-----
2015-02-03T21:16:06+00:00txtorcon v0.13.0txtorcon v0.13.02015-05-10T07:48:00+00:00I'm pleased to announce txtorcon 0.13.0. This adds several amazing
features, including levitation. Full list of improvements:
- support basic and stealth hidden service authorization, and parse client_keys files.
- 2x speedup for TorState parsing (mostly by lazy-parsing timestamps)
- can now parse ~75000 microdescriptors/second per core of 3.4GHz Xeon E3
- launch_tor now doesn't use a temporary torrc (command-line options instead)
- tons of pep8 cleanups
- several improvements to hidden-service configuration from sambuddhabasu1
- populate valid signals from GETINFO signals/names from sambuddhabasu1
You can download the release from PyPI or GitHub (or of course "pip
install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.13.0
https://github.com/meejah/txtorcon/releases/tag/v0.13.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-0.13.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-0.13.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
3218d0fa0c22f49eee9324a5862b2d53ef77d5cb8e555e2bcffc24070aaeca7d txtorcon-0.13.0.tar.gz
de266cd1b35cc2d9f4600e510d9d3a5645771d36ce36a5888a2828594feb1ef0 txtorcon-0.13.0-py2-none-any.whl
EOF
thanks,
meejah
2015-05-10T07:48:00+00:00txtorcon 2.1.1txtorcon 2.1.12016-06-28T14:59:16+00:00See changelog
2016-06-28T14:59:16+00:00txtorcon 2.1.2txtorcon 2.1.22016-06-29T15:14:17+00:002016-06-29T15:14:17+00:00txtorcon v0.15.0txtorcon v0.15.02016-07-26T23:24:03+00:00I'm happy to announce txtorcon 0.15.0:
- added support for NULL control-port-authentication which is often
appropriate when used with a UNIX domain socket
- switched to https://docs.python.org/3/library/ipaddress.html instead of
Google's ipaddr; the API should be the same from a user
perspective but **packagers and tutorials** will want to change
their instructions slightly (`pip install ipaddress` or `apt-get
install python-ipaddress` are the new ways).
- support the new ADD_ONION and DEL_ONION "ephemeral hidden services"
commands in TorConfig
- a first stealth-authentication implementation (for "normal" hidden
services, not ephemeral)
- bug-fix from https://github.com/david415 to raise
ConnectionRefusedError instead of StopIteration when running out of
SOCKS ports.
- new feature from https://github.com/david415 adding a
`build_timeout_circuit` method which provides a Deferred that
callbacks only when the circuit is completely built and errbacks if
the provided timeout expires. This is useful because
:doc:`TorState.build_circuit` callbacks as soon as a Circuit
instance can be provided (and then you'd use
:doc:`Circuit.when_built` to find out when it's done building).
- new feature from https://github.com/coffeemakr
falling back to password authentication if cookie authentication
isn't available (or fails, e.g. because the file isn't readable).
- both TorState and TorConfig now have a `.from_protocol` class-method.
- spec-compliant string-un-escaping from https://github.com/coffeemakr
- fix https://github.com/meejah/txtorcon/issues/176
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.15.0
https://github.com/meejah/txtorcon/releases/tag/v0.15.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-0.15.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-0.15.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
f2e8cdb130aa48d63c39603c2404d9496c669fa8b4c724497ca6bfa7752a9475 dist/txtorcon-0.15.0.tar.gz
a359fb5e560263499400018262494378b3d347cd04a361adb08939df95ecedf6 dist/txtorcon-0.15.0-py2-none-any.whl
EOF
thanks,
meejah
2016-07-26T23:24:03+00:00txtorcon v0.16.1txtorcon v0.16.12016-09-01T00:32:36+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I'm very happy to announce txtorcon 0.16.1 which adds a couple minor
features to help support using Foolscap and Tahoe-LAFS over Tor.
* issue 172: give TorProcessProtocol a .quit method
* issue 181: enable SOCKS5-over-unix-sockets for TorClientEndpoint
(thanks to "dawuud"). Also adds TLS support over SOCKS5.
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.16.1
https://github.com/meejah/txtorcon/releases/tag/v0.16.1
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-0.16.1.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-0.16.1.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
d551837025bb9f4fdded58cd11025c6e42924b6eb20dcb2a49f182b3fd85f377 dist/txtorcon-0.16.1.tar.gz
e89a785f64f3544b19f7b1e6cebdbd6914475e0c60f508d9f0b6ce4a840769a7 dist/txtorcon-0.16.1-py2-none-any.whl
EOF
thanks,
meejah
p.s. There is no 0.16.0 because I tagged the wrong thing and noticed
when pushing to PyPI.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJXx3TOAAoJEMJgKAMSgGmn7AEIAN5BQNqisxefMyKnHA8BCSZW
UJpXPagnftg33HF2v4ZG/2yQUh8sYMqEn/OI99g8yA++bZmG9H0lJixg0zs6V2XV
bX63zJ7d9lr+uu3D+crQNnmofcoUbLRX+Z7n5SWhgGtlsVqemIJton/cuedtnrXm
1E5VdjhxYIZ/2Qv0gTz7ZBYw0Hmkr24qwVufdblQHDov2SdM0kknInWqxFqVMLQd
/p0+PTEF6SMdemHFkOJ73sCbINg6qLB4cErKaFY14U2cnS3Y1pZLhlEKFTzbd8TU
SWtg1b9pn5s4Euq5ruYhNNIqVtQz/lrq0/ZQ+NKiLZ/L2rtw9xFY0nF1KhFTgLc=
=IMj2
-----END PGP SIGNATURE-----
```
2016-09-01T00:32:36+00:00txtorcon v0.17.0txtorcon v0.17.02016-10-04T21:50:00+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I'm pleased to announce txtorcon 0.17.0, largely to fix a bug with
Unix-socket control-ports:
* issue 187: fix unix-socket control endpoints
* sometimes mapping streams to hostnames wasn't working properly
* backwards-compatibility API for `socks_hostname` was incorrectly named
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.17.0
https://github.com/meejah/txtorcon/releases/tag/v0.17.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-0.17.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-0.17.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
5e321387ab56f22d184b18d91a60c30dd1f72575d9e32ff3614ef911bce49daa txtorcon-0.17.0.tar.gz
e1da13cc43328e040335d091e2ef15717a2b836b48fbede31fc6a7e332b699b4 txtorcon-0.17.0-py2-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJX9B8gAAoJEMJgKAMSgGmnCLoH/jZNzTG4QRRKk54XkFCbSmBh
Qg0YAmWVa4iFMkjidawyfZ8Cocje+yROMiuvH2VWNCcI809q96TB06caNJS0w5c3
I10i9N9xY2S13/yVzW/izW3HMPR+Sdi0Hod9UGTQ0F2Vpcs+g8bpPyKvMK+mPm+L
P0QwyejOAO/FzTndA73T5o2bVKdR3NkK1EfY0FRTjQsD71UZlVJa4AK828v1EMi3
0oNXDny+H9xzJu/i03zFX3zSL1jb69KCxkLyUBIuj5Vg+3by8FwbBa1G3Ehcs70C
RV6ew6WLa0Ty7fnUBy18Z3gFx9+4Ew/Eq/t7weVgRiW0VCAHwgOKx0D4wqSMeH8=
=nyB6
-----END PGP SIGNATURE-----
```
2016-10-04T21:50:00+00:00txtorcon v0.18.0txtorcon v0.18.02017-01-11T21:31:44+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
txtorcon 0.18.0 is released, improving error-reporting when you have
SAFECOOKIE or COOKIE authentication turned on but can't read the file.
* https://github.com/meejah/txtorcon/issues/200
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.18.0
https://github.com/meejah/txtorcon/releases/tag/v0.18.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-0.18.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-0.18.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
12be80f1d5e2893378c6e8c752cf159479f868f8424e16b34b75cd679a0ab171 dist/txtorcon-0.18.0.tar.gz
cffe063dbcedd9d344e88a572c0de39b0390562165a865efa27019260c2119f6 dist/txtorcon-0.18.0-py2-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJYdp4sAAoJEMJgKAMSgGmnxCIH/iiFJdYtbSnShAktDrwMuL6K
tJN+AALrr6zIydjIVG4pNuGydoxqtmrpb/12xNn/c7noEWZpuuHd+hn/PRn+XNaA
Gh+q4922VKs3ZCFYFClVAkZFtT5iug7EKnB6n0IKt4Z+rVAzRTCpHqgnCmmavHP1
s55jkYc+emC/jzGag22sD7HnPYHjkuKV+qy1Y6mF1//oD9FFhJUXvn5FVjf9cNb/
xta7HB3AMXp/8qdpURPJaJBjWOg1BxSVBngZXYiUJkkoOReOJU1ngDoU0J7VjQJq
Uyi2ijwylUnK6/7qLLS8pwyX/UmWgV7NeQgIr00Shsm7Jv+zkk0QhXbnwJo8pRQ=
=oJqn
-----END PGP SIGNATURE-----
```
2017-01-11T21:31:44+00:00txtorcon v0.19.0txtorcon v0.19.02017-04-21T06:27:19+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I'm very happy to release txtorcon 0.19.0. This merges most of the
development that happened over the last several months on the
release-1.x branch. Featuring:
* Full Python3 support (and universal wheels)
* Drop txsocksx and use a custom implementation (this also implements
the custom Tor SOCKS5 methods RESOLVE and RESOLVE_PTR). Uses
Automat for the state-machine.
* Drop support for older Twisted releases (12, 13 and 14 are no
longer supported).
* Add a top-level API object (txtorcon.Tor) that abstracts a running
Tor. Instances of this class are created with txtorcon.connect or
txtorcon.launch. These instances are intended to be "the"
high-level API and most users shouldn't need anything else.
* Integrated support for twisted.web.client.Agent, baked into
txtorcon.Tor. This allows simple, straightforward use of treq or
"raw" twisted.web.client for making client-type Web requests via
Tor. Automatically handles configuration of SOCKS ports.
* new high-level API for putting streams on specific Circuits. This
adds txtorcon.Circuit.stream_via and txtorcon.Circuit.web_agent
methods that work the same as the "Tor" equivalent methods except
they use a specific circuit. This makes
txtorcon.TorState.set_attacher the "low-level" / "expert"
interface. Most users should only need the new API.
* big revamp / re-write of the documentation, including the new
Programming Guide:
https://txtorcon.readthedocs.io/en/latest/guide.html
* Issue 203: https://github.com/meejah/txtorcon/issues/203
* new helper: txtorcon.Router.get_onionoo_details which downloads
JSON for a particular relay from OnionOO
* new helper: txtorcon.util.create_tbb_web_headers which returns
headers resembling a recent Tor Browser suitable for use with
Twisted or treq web agents.
* Issue 72: https://github.com/meejah/txtorcon/issues/72
* Specific SocksError subclasses for all the available SOCKS5 errors
added by https://github.com/felipedau
* (more) Python3 fixes from https://github.com/rodrigc
You can download the release from PyPI or GitHub (or of course "pip
install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.19.0
https://github.com/meejah/txtorcon/releases/tag/v0.19.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-0.19.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-0.19.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
09d56fbd6e33eef7405c8ca354bbba06da2cefa02763d15c4bc9ac274c5daeeb dist/txtorcon-0.19.0.tar.gz
cc51b4249ad126c31ea2746ec5ef1bcb7f6b0c34ced070913ed7772c0e48edf5 dist/txtorcon-0.19.0-py2.py3-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQEcBAEBAgAGBQJY+ZjOAAoJEMJgKAMSgGmnadEH/R0YCoID3xTkbFL7mVhtqY2e
p7sPcFT50jUGDASaER2YoQ4syzptnQcLid5/pCf+F2xMwCVgayqaipNXtugNHZIl
9cCOnI09+IntCFLkVXQqMGnEzSSzcM0Ln87Qa9MMjNNZM+aj2WshmFnObdqsWNRo
tIhnuKgMDgqoO9OgiXCsUXFQeooDDidnrnJgl5U7AA0+13nIar+/q9vCxMtDqSV9
kfh5IkB4RaeJTzDtTMYQKKHTIltdn7o0LrCyp1QsMhX+iHU4xZVOi7etgFnACqsP
S1u2LMT1FggvyEAzIwn45ADhKpuPBrR35N5C21vQklHVEb9nQxI9LXTHCi0Fv5g=
=mGZj
-----END PGP SIGNATURE-----
```2017-04-21T06:27:19+00:00txtorcon v0.19.1txtorcon v0.19.12017-04-27T05:36:26+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Unfortunately, there was a regression in launch_tor() in 0.19.0 which
is fixed by releasing 0.19.1
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.19.1
https://github.com/meejah/txtorcon/releases/tag/v0.19.1
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-0.19.1.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-0.19.1.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
cfc390a37bba1cbd3cff0b86a8e9b7033df143d54ad7389305ba02848eafa198 txtorcon-0.19.1.tar.gz
c2071f55239cb657469aeec06b8095b63bdaf4c3124c3438ff9107984d844c87 txtorcon-0.19.1-py2.py3-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQEcBAEBAgAGBQJZAQWyAAoJEMJgKAMSgGmnJmEH/2ZS22CaggHR+LsNk87Ef6Fo
Sp+fKnqZD+ZqANdZspyK4lBhU+gY7V6uIbsz9yVoa1XI6AE0losRGfSSy3Z2+Xwf
sVShf+3qz7q37ERp2Kdgrko+ZdT9Nlel82s/O7a1nUamt9XtWqTb0QKePM4GnUEg
TglE9sMnonhLu1TK2SuPgfjZAU7/502pYHi/xU0cWWWTxMW8OHH3jNwN/sEG3f3j
/fDKURoisvfzvZ2AbE9eSE6OnNK0jeUC8lP66J8S27GQBM4ZvVy6HeuQtOVd/ur1
f6OlDSocmuiONrgvIieMrVfKXKhHz7JfbJ/yJ27uJnAKxJqDeJd71B95Dh03WwY=
=meTs
-----END PGP SIGNATURE-----
```2017-04-27T05:36:26+00:00txtorcon v0.19.3txtorcon v0.19.32017-05-24T07:19:28+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Fixing another regression, 0.19.3 causes txtorcon to (once again)
correctly work with SocksPort lines containing unix socket options
when used with txtorcon.connect(). Thas bug was introduced in 0.19.0
which reduced the number of GETINFO and GETCONF calls (to help
filtering-proxies).
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.19.3
https://github.com/meejah/txtorcon/releases/tag/v0.19.3
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-0.19.3.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-0.19.3.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
f73396667909a3c7a98f4dd865edf4ed6a2518ee5a935d92e18b8a479ec244fd txtorcon-0.19.3.tar.gz
e0901f7743a43ed6389f0de31c1f547d89b32723a5ae9316d6cae9ad8eacdbea txtorcon-0.19.3-py2.py3-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQEcBAEBAgAGBQJZJTJVAAoJEMJgKAMSgGmn5woIAIyFRa7NhSNm/zMMJE92jtgA
C3UY55q3FF4VycC7K77EkaudHPMqlr9MA3EeGkx4NVu0KAX7lIT4GFCsZTlnOdXm
rglZ7FFYh49KoAWSMGCMJ7LlauYUitXptynte3lWcqbvjGJkCqMd6WuXslTooSI2
68gq/aoTbXoHWNg1C6DtBhR0JqvN+Vq7ARHyqc4bDloh1LXAvEUwsbKvDtrpXTbe
eRwMlKTKoUXhXjxO37NtoNSxT6HUFNcOFOYcLnWtBMPty9W90xY2wC1LbWwYymbY
Pk97OUceSyoHxAGsBYjKCdTXEWB6TO5lmHE3+t48OqiYt4ELAWkJFUBf5d6Mnto=
=ZRcE
-----END PGP SIGNATURE-----
```2017-05-24T07:19:28+00:00txtorcon v0.20.0txtorcon v0.20.02018-02-23T00:29:44+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I'm very happy to release txtorcon 0.20.0. This includes a few minor
new features and an important bug fix if you're using a Tor new enough
to have all the *PortLines changes (anything after 0.3.0.6; see Tor
issue #20956). Full list of changes:
* doc fixes (from hotelzululima)
* Issue 246: fix endpoints so .connect on them works properly more than once
(from Brian Warner)
* allow a CertificateOptions to be passed as tls= to endpoints
* PR 252: add method txtorcon.Tor.is_ready
* PR 252: add method txtorcon.Tor.become_ready
* PR 253: fix handling of certain defaults (*PortLines and friends)
* fix last router (usually) missing with (new) `MicroDescriptorParser`
* use OnionOO via Onion service tgel7v4rpcllsrk2.onion for txtorcon.Router.get_onionoo_details
* fix parsing of Router started-times
* Issue 255: removed routers always deleted following NEWCONSENSUS
* Issue 279: remember proxy endpoint if it was Deferred
You can download the release from PyPI or GitHub (or of course "pip
install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.20.0
https://github.com/meejah/txtorcon/releases/tag/v0.20.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-0.20.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-0.20.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
dc80cb76b3ddacef6d671c0a088cb1a45274c0858554c32ce55d0f41421c740e txtorcon-0.20.0.tar.gz
a957b3dc10f0b2b882ef6ad46d2932fa7731d5eeee6d52ba9d736d2bc4f1385f txtorcon-0.20.0-py2.py3-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQEcBAEBAgAGBQJaj2AIAAoJEMJgKAMSgGmnnGUIANXkNIF8c98nwCa4Q9Xws3Hv
9zAJSWsDst/58lHka6bE5d1JWYz78fTubTC2ofOFH0MOkjeSyEtgTO58xlKY9wTC
w7ohePwcV+md1wPOpciHVZMBVhqUhKGqNhMYehTXjcCEwppgXhiINgGFLaF0XSUM
aJzY7laEvg2E/1p+gH0e4tkJuSVKVOK+5MWBali8YlOZY28R6w/X0Q0n8su1ntl2
bKsxpTrv+p8J+K7WvpeaXIuZnC/fRwVFZ0vtwzKtrTKimAE60yPfOi5hLUyW2PGx
FkpH6B0bgl5FMiY+Y0PV8rP2DXikCibpwsipBh4AHpTYGSdMkSogjiRupkJxeeQ=
=GsVt
-----END PGP SIGNATURE-----
```2018-02-23T00:29:44+00:00txtorcon 2.2.0txtorcon 2.2.02018-04-18T13:10:25+00:00- Minor updates since the last release
- Altered the database file format to use JSON instead of python dicts.2018-04-18T13:10:25+00:00txtorcon 3.0.0txtorcon 3.0.02018-04-20T20:31:50+00:00Modernized Tachyon now based on asyncio through HammerTime.2018-04-20T20:31:50+00:00txtorcon 3.0.1txtorcon 3.0.12018-05-08T19:52:56+00:00- Added redirect limiter to match the behavior for Tachyon 2.
- Improved soft404 handling on redirects.2018-05-08T19:52:56+00:00txtorcon 3.0.2txtorcon 3.0.22018-06-11T19:07:19+00:00- Reject all 503 responses
- Clean-up HTML prior to soft 404 detection.
- Add apache status pages2018-06-11T19:07:19+00:00txtorcon 3.0.3txtorcon 3.0.32018-06-22T18:46:26+00:00- Handle 503 and 508 as timeouts.
- Make sure the custom headers are sent on all requests.2018-06-22T18:46:26+00:00txtorcon v18.0.0txtorcon v18.0.02018-06-26T03:39:18+00:00I'm very pleased to announce txtorcon 18.0.0. This introduces a new
Onion services API (including v3 support) and a bunch of other changes
(including a new versioning scheme).
Starting now, versioning is more Twisted-like: the first number is the
year, the second is the "release in that year" and the minor number is
for bug-fixes. No backwards-incompatible changes will occur without
first being deprecated for at least one full release (this has been my
practice anyway, so using "SemVer" no longer made sense).
The documentation is updated with all the new Onion APIs, and a full
list of changes follows:
* await_all_uploads= option when creating Onions
* properly re-map progress percentages (including descriptor uploads)
* properly wait for all event-listeners during startup
* re-work how TorState.event_map works, hopefully reducing
reproducible-builds issues
* TorControlProtocol.add_event_listener and
TorControlProtocol.remove_event_listener are now async methods
returning Deferred -- they always should have been; new code can
now be assured that the event-listener change is known to Tor by
awaiting this Deferred.
* TorControlProtocol.get_conf_single method added, which gets and returns
(asynchronously) a single GETCONF key (instead of a dict)
* also TorControlProtocol.get_info_single similar to above
* if Tor disconnects while a command is in-progress or pending, the
.errback() for the corresponding Deferred is now correctly fired
(with a TorDisconnectError)
* tired: get_global_tor() (now deprecated)
wired: txtorcon.get_global_tor_instance
* Adds a comprehensive set of Onion Services APIs (for all six
variations). For non-authenticated services, instances of
IOnionService represent services; for authenticated services,
instances of IAuthenticatedOnionClients encapsulated named lists of
clients (each client is an instance implementing IOnionService).
* Version 3 ("Proposition 279") Onion service support (same APIs) as
released in latest Tor
* Four new methods to handle creating endpoints for Onion services
(either ephemeral or not and authenticated or not):
* Tor.create_authenticated_onion_endpoint
* Tor.create_authenticated_filesystem_onion_endpoint
* Tor.create_onion_endpoint
* Tor.create_filesystem_onion_endpoint
* see create_onion for information on how to choose an
appropriate type of Onion Service.
* Tor.create_onion_service to add a new ephemeral Onion service to
Tor. This uses the ADD_ONION command under the hood and can be
version 2 or version 3. Note that there is an endpoint-style API as
well so you don't have to worry about mapping ports yourself (see
below).
* Tor.create_filesystem_onion_service to add a new Onion service to
Tor with configuration (private keys) stored in a provided
directory. These can be version 2 or version 3 services. Note that
there is an endpoint-style API as well so you don't have to worry
about mapping ports yourself (see below).
* Additional APIs to make visiting authenticated Onion services as a
client easier:
* Tor.add_onion_authentication will add a client-side Onion service
authentication token. If you add a token for a service which
already has a token, it is an error if they don't match. This
corresponds to HidServAuth lines in torrc.
* Tor.remove_onion_authentication will remove a previously added
client-side Onion service authentication token. Fires with True if
such a token existed and was removed or False if no existing token
was found.
* Tor.onion_authentication (Python3 only) an async context-manager
that adds and removes an Onion authentication token (i.e. adds in
on __aenter__ and removes it on __aexit__). Allows code like:
* onion services support listening on Unix paths.
* make sure README renders on Warehouse/PyPI
You can download the release from PyPI or GitHub (or of course "pip
install txtorcon"):
https://pypi.python.org/pypi/txtorcon/18.0.0
https://github.com/meejah/txtorcon/releases/tag/v18.0.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-18.0.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-18.0.0.tar.gz.asc
...and now also available via a "version 3" service:
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-18.0.0.tar.gz
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-18.0.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
818f6ec96a9d60cb4cb47d98f2c843c7a83004c25be07daafeb9eb9aaed74f7c dist/txtorcon-18.0.0.tar.gz
d2f91a3770d7fd8c46372e5573bb23ab65c1be33f12e9ff4ac4af24e6f5f6069 dist/txtorcon-18.0.0-py2.py3-none-any.whl
EOF
thanks,
meejah
2018-06-26T03:39:18+00:00txtorcon v18.0.1txtorcon v18.0.12018-07-02T05:37:18+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Unfortunately there was a problem when parsing onion services on
Python2, which is fixed by txtorcon 18.0.1
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/18.0.1
https://github.com/meejah/txtorcon/releases/tag/v18.0.1
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-18.0.1.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-18.0.1.tar.gz.asc
Or via a "version 3" service:
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-18.0.1.tar.gz
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-18.0.1.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
4c158ee5cfc294a0e20c00dde2a146f04ebe6c6d1c3d7c164c0bd1c56e3d1bc6 dist/txtorcon-18.0.1.tar.gz
2c3f7c768bebf081d0742cdce023b4496bf3b44c423ed7f06bd8d6254e07273e dist/txtorcon-18.0.1-py2.py3-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQFFBAEBCAAvFiEEnVor1WiOy4id680/wmAoAxKAaacFAls3D3ARHG1lZWphaEBt
ZWVqYWguY2EACgkQwmAoAxKAaadixQgA2rB6Hhx+0wDFxPDA+CubQon2wUxeszDv
Q7HGWwqrq/0HhtkaxPgxMxa3TBGumhIlAI1LMhUIGQEl4b4gEPPJddoF8FE7EJKM
yECemsJhPcznWEciK/uAIUNXYoT1Np5YwcaMgr8jhrBjYWU4054QJo1U9dtwJfwK
3XI7vItcqtE2x9itF5ggbzOE2tc5v2nh3yyk1DMwNl7+C+LhMBsz26Dqx1ODvl5y
e21eFc/2S0IU77S4qx/waSsjAJJBorJGI6HxYeQwLWF4nqE6pHIbePldqJyWAaJH
dI+akz5oyFR56/ddzikL1HY4L2xMqJ37c5ISEqzZSU5+3DT3wGTmow==
=mZu3
-----END PGP SIGNATURE-----
2018-07-02T05:37:18+00:00txtorcon v18.0.2txtorcon v18.0.22018-07-02T18:50:41+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Python3.4 doesn't support async-def or await, but the guards being
used only accounted for Python2 -- this is fixed by txtorcon 18.0.2
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/18.0.2
https://github.com/meejah/txtorcon/releases/tag/v18.0.2
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-18.0.2.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-18.0.2.tar.gz.asc
Or via a "version 3" service:
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-18.0.2.tar.gz
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-18.0.2.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
ce50fdd00abb8b490b72809a2c664684f67f3c9467f392642d36f58309395a87 dist/txtorcon-18.0.2.tar.gz
cb1a681e424744c50eefb02b7b777cce80a505da1e89ee4886fe62013afaf858 dist/txtorcon-18.0.2-py2.py3-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQFFBAEBCAAvFiEEnVor1WiOy4id680/wmAoAxKAaacFAls6cqwRHG1lZWphaEBt
ZWVqYWguY2EACgkQwmAoAxKAaaeltQf/QoBXZhLudXUVlvAGCyxcLBuz4IEWarW6
NANpFpO4xrmi192o50RcKhplG16j5ooBRinFq52eLosPkkEQibl8BQYQYilO3Qup
wTRFRDJKlz390rzCUhokRs+VcUSrbysFOfoUgXcOLJXU1WRLkLqJAAlOS/+v9iHy
6fH2Yq/OH/f982wSKLaJ+dfIInJAGEdQbqcVaCsCHRhViC82ZDbSmHBGBDG4LKXX
FEfXXpwUkDTI4qTyWuW9WkNKwRDevthCKZwsc5UGm1wkuRY8/LRu2FJxmeCUjKE2
R914p59xgoIH7qxpxUZmI9aW2vPEdG/c02uH4Ry72Ndgqtd422Bg4w==
=qzyc
-----END PGP SIGNATURE-----
```
2018-07-02T18:50:41+00:00txtorcon 3.1.0txtorcon 3.1.02018-07-31T14:42:55+00:00* Upgraded to HammerTime 0.5
* Improved behavior change detection, adding a re-validation step at the end of the scan
* Re-instated the live result publishing as the scan progresses for interactive output
* Directory lookup is now performed after the root file lookup to train the heuristics, leaving fewer false positives on directory detection and faster scans2018-07-31T14:42:55+00:00txtorcon 3.1.1txtorcon 3.1.12018-08-01T15:07:58+00:00Upgrade to hammertime 0.5.12018-08-01T15:07:58+00:00txtorcon 3.1.2txtorcon 3.1.22018-08-09T17:03:01+00:00* Fix encoding issue on non-utf8 responses when matching strings for evidence.
* Include optional evidence collection as HAR
* Print stats on return key2018-08-09T17:03:01+00:00txtorcon 3.1.3txtorcon 3.1.32018-08-10T14:16:20+00:00- Documentation update
- Improved interactive experience
- Added indentation to the HAR output, ensured writing does not block the async loop.2018-08-10T14:16:20+00:00txtorcon 3.1.4txtorcon 3.1.42018-08-20T20:38:43+00:00- Added a few more paths to discover2018-08-20T20:38:43+00:00txtorcon v18.1.0txtorcon v18.1.02018-09-27T02:40:41+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
I'm very pleased to announce txtorcon 18.1.0. This adds or fixes the
following:
* better error-reporting (include REASON and REMOTE_REASON if
available) when circuit-builds fail (thanks David Stainton)
* more-robust detection of "do we have Python3" (thanks Balint
Reczey)
* fix parsing of Unix-sockets for SOCKS
* better handling of concurrent Web agent requests before SOCKS ports
are known
* allow fowarding to ip:port pairs for Onion services when using the
"list of 2-tuples" method of specifying the remote vs local
connections.
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/18.1.0
https://github.com/meejah/txtorcon/releases/tag/v18.1.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-18.1.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-18.1.0.tar.gz.asc
Or via a "version 3" service:
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-18.1.0.tar.gz
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-18.1.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
b61cf175a5f1d4092609caf05d178fcdcabf513928eec98d38125c501afea43c dist/txtorcon-18.1.0.tar.gz
98aba4a96c355c55ee5d8290b67a09380b02e1044fb2e76737f47f5a33659dce dist/txtorcon-18.1.0-py2.py3-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQFFBAEBCAAvFiEEnVor1WiOy4id680/wmAoAxKAaacFAlusMDQRHG1lZWphaEBt
ZWVqYWguY2EACgkQwmAoAxKAaadz3wgAk+UbYuw0lIwEqQZbhQ6oTk0cTu5GrB5q
WkSbqPkj5Ph+y1iYMQoEgAZdD97zjpfGR+/JcyXbPyh4ZDcqkL8Hhay9yF2/PAkd
agu1LBuBjVXOFvcw3D8Xi91miFwjmMKznAuR1Jv9gp66emw3qbZRZE9g1S9o1lCX
3Cx6o3kLiq8h7UmOiqFfCFGjNBFsaiDqf35P7FH7Btg4FYIGtI5/uQ3qgDtyqlhD
YKA91KxZQoZFGiAhp5h84WXrvtuQ5tDjRNiIfh76xRFiFRnWe9ofELidKqEgnyzF
shBqdGpaIT0g0NTQRhCnzBM7m3u0RHxkRblJWBLa6t4KYNFTMJ8Pag==
=z+Lo
-----END PGP SIGNATURE-----
```2018-09-27T02:40:41+00:00txtorcon v18.2.0txtorcon v18.2.02018-10-05T00:15:53+00:00```
I'm glad to announce txtorcon 18.2.0. This adds or fixes the
following:
* add `privateKeyFile=` option to endpoint parser (ticket 313)
* use `privateKey=` option properly in endpoint parser
* support `NonAnonymous` mode for `ADD_ONION` via `single_hop=` kwarg
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/18.2.0
https://github.com/meejah/txtorcon/releases/tag/v18.2.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-18.2.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-18.2.0.tar.gz.asc
Or via a "version 3" service:
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-18.2.0.tar.gz
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-18.2.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
b1714dfa633cb4097c9ea649c8c49657d9d22a990cc465bb904620428c5e684e dist/txtorcon-18.2.0.tar.gz
9d05f2b1144dfbc63844e78fbc51a195e3b39a79f280db50a81b346476c47e7b dist/txtorcon-18.2.0-py2.py3-none-any.whl
EOF
thanks,
meejah
```2018-10-05T00:15:53+00:00txtorcon v18.3.0txtorcon v18.3.02018-10-05T23:13:38+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Hot on the heels of 18.2.0 comes 18.3.0 because I forgot to add the
"single_hop=" feature to endpoint-strings:
* add `singleHop={true,false}` for endpoint-strings as well
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/18.3.0
https://github.com/meejah/txtorcon/releases/tag/v18.3.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-18.3.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-18.3.0.tar.gz.asc
Or via a "version 3" service:
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-18.3.0.tar.gz
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-18.3.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
5601956b3a2452526cd1ea31662696a51ddbf8ed6452633ee464fc1ff275f8b0 dist/txtorcon-18.3.0.tar.gz
8edac3b6d9c633b9182b4e5a2ed3ac86953ed44b9ea230aac3e0708c30b73861 dist/txtorcon-18.3.0-py2.py3-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQFFBAEBCAAvFiEEnVor1WiOy4id680/wmAoAxKAaacFAlu37ycRHG1lZWphaEBt
ZWVqYWguY2EACgkQwmAoAxKAaafaFAf/e4pVR7bL+gDMq2sJVaFVFzsQqPTV2RLi
9e5A7RRfCPfDSPMyJg71I5qnXXY7aXMP5kBOmK1WF7hN06NRrYGuVifWzijogosP
l/2KIGp1I6nK77JTNdjPqnSfQ9N+/ZXaXK3ILzlmSiyI3PMaLgPjB0x2JM6NhcfQ
pPPKuL9K0bw94slGSTJa29py4yBV4VhAG0qwHEigw3Zwie2iAejk1GwSW9UEhJnp
GBDECiaBdgDZZozn43Q9WXoVIcTnsjTBIN9Km3gNgIcn+ZbwH461HKDXvW7yDfsV
oZ7thGr5xD9ENErOzWgU52kMOOuo/pM50vAlzJC518iV39deCD1GQA==
=6d14
-----END PGP SIGNATURE-----
```2018-10-05T23:13:38+00:00txtorcon 3.2.0txtorcon 3.2.02018-10-10T17:36:19+00:00* Upgraded to hammertime-http 0.6.0
* Improved compatibility with python 3.5 to 3.72018-10-10T17:36:19+00:00txtorcon 3.2.1txtorcon 3.2.12018-10-24T17:11:34+00:00* Added file file checks for Spring Boot Actuator2018-10-24T17:11:34+00:00txtorcon v19.0.0txtorcon v19.0.02019-01-16T05:17:08+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
I'm happy to announce txtorcon 19.0.0, containing the following
changes:
* add TorControlProtocol.when_disconnected (will replace .on_disconnect)
* add detach= kwarg to Tor.create_onion_service
* add purpose= kwarg to TorState.build_circuit
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/19.0.0
https://github.com/meejah/txtorcon/releases/tag/v19.0.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-19.0.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-19.0.0.tar.gz.asc
Or via a "version 3" service:
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-19.0.0.tar.gz
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-19.0.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
3731b740653e3f551412744f1fcd7fa6f04aa9fa37c90dc6c9152e619886bf3b txtorcon-19.0.0.tar.gz
196b7b5726e3c69a602071295368da9205c0cd1e26aba37536d3b8fb3b08ac9d txtorcon-19.0.0-py2.py3-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQFFBAEBCAAvFiEEnVor1WiOy4id680/wmAoAxKAaacFAlw+vRERHG1lZWphaEBt
ZWVqYWguY2EACgkQwmAoAxKAaacquQgAwJwyhfEhnH2DK9Zqy6pG6oFQzhHUJFgA
BehabihiHzJmiUpdVPtZwJ8KkkFbkvkA4AtHy2yF7tP1kCO2k1684IMGtgXOeVC2
hRJpqVqxZlXkOehUmQ87nUTJLYMbVabI5DxIUM9PltvJJj65fIhs0Daq8Kkj5jQT
vKgsLo1WNmUJ2JwiO+JYLd3Aet2NIxXl52WA+GyPYFEm5TwHNDL2vCYyT21a8aCB
VV4btprjfUd5mb+jFXBvf6cxHrWNFLFMLvoJZruQKVSr0C5AV+7zLWNtanPdSAf6
VxKUpDAZf23iNq4yjDwWgUg8W/pNwO2bZCJB9xQJN7IyRgdd+ubDyQ==
=aXJK
-----END PGP SIGNATURE-----
```2019-01-16T05:17:08+00:00txtorcon v19.1.0txtorcon v19.1.02019-09-10T06:56:52+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
I'm pleased to announce txtorcon 19.1.0, containing the following
changes:
* TorControlProtocol.on_disconnect is deprecated in favour of
TorControlProtocol.when_disconnected
* introduce non_anonymous_mode= kwarg in txtorcon.launch()
enabling Tor options making Onion Services non-anonymous for the
server (but they use a single hop instead of three to the
Introduction Point so they're slightly faster).
* add an API to listen to individual circuit and stream events
(without subclassing anything). Can be used as decorators too.
See e.g. TorState.on_circuit_new()
* fixes to the CI setup to properly test Twisted versions
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/19.1.0
https://github.com/meejah/txtorcon/releases/tag/v19.1.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-19.1.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-19.1.0.tar.gz.asc
Or via a "version 3" service:
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-19.1.0.tar.gz
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-19.1.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
25d8e52c3eac45bb90ff958ca7cdd7674fb3284e3a50826a58ab7b9578b15ea5 dist/txtorcon-19.1.0.tar.gz
e93aef50f339b537ed969a4d83a704a2870658bb49cdfa95495ba5a740548d32 dist/txtorcon-19.1.0-py2.py3-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQFFBAEBCAAvFiEEnVor1WiOy4id680/wmAoAxKAaacFAl13SBcRHG1lZWphaEBt
ZWVqYWguY2EACgkQwmAoAxKAaad/DwgA5r1XbcoPuzw2FSoDNwJNNzDSEFBT+W7Z
Ej0Wp27B7KuUgCp83u08DWpCbuz1iOLiYveWtKil+CrXFpmxH2M9itF4pd3U71dt
o/PfEnPy3OxWD1cka2bnuFO3HlmCs7LOy5KndRlWBSzqDXfqnwTLqNSHB94TMoh3
YEhyKmyo30DwLMeNdeayuJ18c24+U15kxt5+O7TPKSeNw88emizDMX3ZQFnuIUyJ
6ybZxIwkJxXLOlO+cqnLH26eSIFqHrvILTXPvZ3ie2cwNYOgNS4IpkmVUlrF41Zq
xQgMdR1pzLWrEVMSPOYKicAnPW/drd8urwXMq5y2/dVuUhQmhHxBxg==
=7R7N
-----END PGP SIGNATURE-----
```2019-09-10T06:56:52+00:00txtorcon v20.0.0txtorcon v20.0.02020-04-01T03:46:54+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
I'm pleased to announce txtorcon 20.0.0. This fixes a few bugs and
officially deprecates Python 2 support.
* Use real GeoIP database or nothing (https://github.com/meejah/txtorcon/issues/250)
* Change abstract base classes import in preperation for Python 3.8 (thanks @glowatsk)
* Python 3.4 is no longer supported
* Python 2 is deprecated; all new code should be Python 3. Support
for Python 2 will be removed in a future release.
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/20.0.0
https://github.com/meejah/txtorcon/releases/tag/v20.0.0
Releases are also available from the hidden service:
http://timaq4ygg2iegci7.onion/txtorcon-20.0.0.tar.gz
http://timaq4ygg2iegci7.onion/txtorcon-20.0.0.tar.gz.asc
Or via a "version 3" service:
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-20.0.0.tar.gz
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-20.0.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
122cd081786396f57718adda1c1a5eb01b8e9a4832fcd140918b45c10359377a txtorcon-20.0.0.tar.gz
5c1145566a8733105da851b794e7b15cb56cea48693635b55c4bddfb79fe629d txtorcon-20.0.0-py2.py3-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQFFBAEBCgAvFiEEnVor1WiOy4id680/wmAoAxKAaacFAl6EDnURHG1lZWphaEBt
ZWVqYWguY2EACgkQwmAoAxKAaadv4AgAkIny/Pt55kEppkxlqu4/B4ddfU7oQNLD
8lwoYyUZbYtS8XwiBaqY6SR/UU9MhhswdoPU50WBq3h4Im+3jrmm7MbVD4uR6Uvt
BnZIMzCJlQNcGpfbaGmtyrtbBNazQLTDOAxxQ7WM/MD8rip1zlP8MeL7yBgE3VEC
JInw9DWN+fbQhbsTQgdiLLLhBXOFqZuXgz7auPnGzu+5LsIeJd6ZnWzuQ6TlzL3R
rLgrMAasxTMzKoJB51jmDpCOeaj4b68XK+MY130/xSdENb2ZyGbuSF4LpZUjs4RU
Sqiwtevu/bT/th0XBqcg79RHnwGLK/g1pJRB27RaOVbuh6f+lENc4Q==
=4q9v
-----END PGP SIGNATURE-----
```2020-04-01T03:46:54+00:00txtorcon v21.0.0txtorcon v21.0.02021-08-07T18:43:01+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
I'm pleased to announce txtorcon 21.0.0. This fixes a Python3 bug in 20.0.0
* Use GitHub Actions instead of Travis for CI
* fix Python 3.x+ bug with TorInfo and .__class__ access (https://github.com/meejah/txtorcon/issues/350)
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/21.0.0
https://github.com/meejah/txtorcon/releases/tag/v21.0.0
Releases are also available from the hidden service:
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-21.0.0.tar.gz
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-21.0.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
68c047064018aa861c480607b133c6944e19e4d3da9f09100cfc413f25831444 dist/txtorcon-21.0.0.tar.gz
4e1f51f95168a730959bfd5decc2a2618d575d482e28c6a738fcd897a80f9eff dist/txtorcon-21.0.0-py2.py3-none-any.w\
hl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQFFBAEBCgAvFiEEnVor1WiOy4id680/wmAoAxKAaacFAmEO0PQRHG1lZWphaEBt
ZWVqYWguY2EACgkQwmAoAxKAaachEAgAirR1Ze5WZFvXQMpVtOS//jxjLNUQWhy9
OIaRIFBuMIackB/4htpZow5V2H7WdnANsFrsZQ7/7uHap1D62tHTzvXqtsQUmnFl
SKDv8glcEvzhj3aCHQB/rX8yU01AXT4LbE3gjh+JAH7dkoaZ7eiWweDTenVS73nx
MA3Mb2bMlMpaDNeZpC6A3WOIpfZ5aPxk4LJluCB2CDDSAIUtSWyEdBP2+85ZnyV5
Pqg5ZRbNR5bdE0E6kmNfRhUlaCJ4eIjf/6OZpFXNw19E4ZFEUpPZPiOa2zEQsSJi
djovLX3cs5cu9yxhPGTe3vVfMjC1xqltwuR3taXxjPRqcB05ewrIqg==
=7DJe
-----END PGP SIGNATURE-----
```2021-08-07T18:43:01+00:00txtorcon v21.1.0txtorcon v21.1.02021-08-16T21:19:47+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
I'm pleased to announce txtorcon 21.1.0. This fixes some incorrectly-skipped tests in 21.0.0
* Fix some incorrect unit-test skipping logic (thanks Jean-Paul Calderone)
https://github.com/meejah/txtorcon/issues/354 and https://github.com/meejah/txtorcon/issues/352
* Fix broken tests revealed by previous fixes (thanks Jean-Paul Calderone)
https://github.com/meejah/txtorcon/issues/356
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/21.1.0
https://github.com/meejah/txtorcon/releases/tag/v21.1.0
Releases are also available from the hidden service:
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-21.1.0.tar.gz
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-21.1.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
aebf0b9ec6c69a029f6b61fd534e785692e28fdcd2fd003ce3cc132b9393b7d6 dist/txtorcon-21.1.0.tar.gz
bcc54299e5119d6a9ace889bbefc1ff93108a204824b738e9c77bdb71f61661f dist/txtorcon-21.1.0-py2.py3-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQFFBAEBCgAvFiEEnVor1WiOy4id680/wmAoAxKAaacFAmEa1UoRHG1lZWphaEBt
ZWVqYWguY2EACgkQwmAoAxKAaad3/gf/S0mneFfvY0CdqR3DyIOgjX29lIotkDzf
1SeTnLdSU2SYXj89d8TnCUONkQiFZvruGcQufASA+mbIFKC+2KwZ7BVJLlYJ9MGu
Cyjt+1jr2xXGmAEVqLcDwCZM7v4BknD/W2jxZqLx3CjDuU3U1abjcJUBlt2Pq/uA
B5wWK6PAxIE1rksGtk+ftMf+jMIRwTb5hNj9HynDuGzW3MFbmanyQh2eBfQPlrve
1FqmQUEaOKMM6S34mvExRIjB5/q1SNs8+zX9oAR5wrLh3NVCsiVyXtVOvU949sLy
HKVm9nHzgemRrj/nsKetLahM5MYpRYFMhZVYTK+nyotK+I5tRfrXGQ==
=e+mc
-----END PGP SIGNATURE-----
```2021-08-16T21:19:47+00:00txtorcon v22.0.0txtorcon v22.0.02022-03-16T21:38:02+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
I'm pleased to announce txtorcon 22.0.0. This fixes some broken infrastructure.
* Use GitHub Actions (not Travis)
* Update method to upload coverage to coveralls
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/22.0.0
https://github.com/meejah/txtorcon/releases/tag/v22.0.0
Releases are also available from the hidden service:
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-22.0.0.tar.gz
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-22.0.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
89a1b65e32a4b369d67e6c166387fbc468cc5d05227448d239a5e7e9718aa053 dist/txtorcon-22.0.0.tar.gz
824b5df1977bedabfc1c49c9523b8fa1b7cff11d6fee78015df1ce133685779c dist/txtorcon-22.0.0-py2.py3-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQFFBAEBCgAvFiEEnVor1WiOy4id680/wmAoAxKAaacFAmIyVzMRHG1lZWphaEBt
ZWVqYWguY2EACgkQwmAoAxKAaaeNYQf/XBYfAvqqvT/jU+z8EUwgj0EJbFusNAls
8W37RE8fRkxTCYBOnfmK2IlQouHLBVgjzS2H0ZGyAzczxZb/kfY7uRbAm7N63eMx
rc7urZtDeHS4K7+cUPf03KlqYdKmbIGEezPVQSNRT1/UZ/kTB6CxMqteyXxfYkvY
+pkfIvOJ49Yw6KuMt+iWKRNnfVsMNYX+gV6PNYBHoWGRTWxANReaXRSowe+5Cgus
4O51I3+1QH1slLIH77Dvpktmqka+Fbs3mDWm1ICzf4rB0z+aJRxt7xYjNnhaLCPQ
5xeY1IdmmJAxg/WouMQh1Kus8eEWgIhFLeigPN+ABwt2VziL1lL8XQ==
=HKmX
-----END PGP SIGNATURE-----
```2022-03-16T21:38:02+00:00txtorcon v23.0.0txtorcon v23.0.02023-02-16T06:12:59+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
I'm pleased to announce txtorcon 23.0.0.
* Drop Python2 support
* Fix a bug with stream updates (and CONTROLLER_WAIT)
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/23.0.0
https://github.com/meejah/txtorcon/releases/tag/v23.0.0
Releases are also available from the hidden service:
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-23.0.0.tar.gz
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-23.0.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
0225ffad67689137849ad9ad34adb569b0d88f9af0450300067a5f901e994325 dist/txtorcon-23.0.0.tar.gz
bd7739573cf159b2ac0ac314329f45dd91a7245a4f141258aa5fa23117421869 dist/txtorcon-23.0.0-py3-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQFFBAEBCgAvFiEEnVor1WiOy4id680/wmAoAxKAaacFAmPtxukRHG1lZWphaEBt
ZWVqYWguY2EACgkQwmAoAxKAaafV3gf+NGVKihOemnkg0jLmQSQbo2dWC8zYleLT
TOHHw8XMS6d036fGBBTOlmxt49Ndo+Ac3076UUPRek6mY9Y+6rkCy9g5FjTiX6DH
va2bfMN6yu4fm6mxDBxymVzA0n/QEQCeYFZSEAoAAbnAq9CQul135kYUUqZoNFYw
vrCc5XYi9zOOu7kRh7DTBQu+f5QOg0qRTa0OPr3V0tbBhy/ZAZJh6gXoLi4oezKy
u3lcBZAExwF1i14LfexmOQiAP4ax+pusBTnkCIXZ++cWsM78N38xDGs5m2oJUyTA
iooJqLUEDW1+4/YmsEzgPeQs8yP22jMMiq/zeVj8W8bO4lstwRF8Ew==
=0wIC
-----END PGP SIGNATURE-----
```2023-02-16T06:12:59+00:00txtorcon v23.5.0txtorcon v23.5.02023-05-19T01:32:52+00:00-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
I'm happy to announce txtorcon 23.5.0 with the following changes:
* twisted.web.client.Agent instances now use the same HTTPS policy
by default as twisted.web.client.Agent. It is possible to
override this policy with the tls_context_factory= argument, the
equivalent to Agent's contextFactory=
(Thanks to Itamar Turner-Trauring)
* Added support + testing for Python 3.11.
* No more ipaddress dependency
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/23.5.0
https://github.com/meejah/txtorcon/releases/tag/v23.5.0
Releases are also available from the hidden service:
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-23.5.0.tar.gz
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-23.5.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
93fd80a9dd505f698d0864fe93db8b6a9c1144b5feb91530820b70ed8982651c dist/txtorcon-23.5.0.tar.gz
987f0a91184f98cc3f0a7eccaa42f5054063744d6ac15e325cfa666403214208 dist/txtorcon-23.5.0-py3-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQFFBAEBCgAvFiEEnVor1WiOy4id680/wmAoAxKAaacFAmRm0DoRHG1lZWphaEBt
ZWVqYWguY2EACgkQwmAoAxKAaae/+wgAw3gAm65npc7+yMdGFixNmCd+RUXorJq9
Hy76hK3BWdtNIA6TZF20QFYs3CX5Vepa0vCJOK1N40fYgxoZTb1/828Zp6Zq2+Gn
piJGvQ0Z1S95ww7lwSV77o67Xf7PozhLR+k7DaOdY8ugvLb/0Rdp15BykF5DWIo8
PRgqB8uZ418ebmDLLrYtqYTdlcUMxFTji4CHXc4N55/2hVHiFiuFt59os6kJ3iG1
u90lmQH8vbDyVF7N6tpgEAdWeb7OdgDbtzhVBdBWHrPg+vDO+UL7WZU8ZjDAcdEr
YzzmK3fIiCH7ngG2E/VIebiJfrjAA9G4eZXltIm7VcWh5css9MXY1Q==
=TeQp
-----END PGP SIGNATURE-----
2023-05-19T01:32:52+00:00txtorcon v23.11.0txtorcon v23.11.02023-11-20T09:22:58+00:00```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
I'm energized to announce txtorcon 23.11.0 with the following changes:
* Fix test-failures on Python 3.12
* Particular GETINFO hanging (https://github.com/meejah/txtorcon/issues/389)
(ultra-long lines over 16KiB caused problems in the protocol)
* Use built-in `mock` only (https://github.com/jelly)
* Remove `incremental` (https://github.com/gdrosos)
txtorcon is an implementation of the "control-spec" for Tor using the
"Twisted" networking library. This is the library to use if you want
to write event-based software (including asyncio; interop is possible)
in Python that uses the Tor network as a client or a service (or to
integrate Tor support into existing Twisted-using applications).
You can download the release from PyPI or GitHub (or of
course "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/23.11.0
https://github.com/meejah/txtorcon/releases/tag/v23.11.0
Releases are also available from the hidden service:
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-23.11.0.tar.gz
http://fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion/txtorcon-23.11.0.tar.gz.asc
You can verify the sha256sum of both by running the following 4 lines
in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check
c6c4f5ca5e94ed58be70de0f06d06153b7025cf4c6956b3724194a7cd8736904 dist/txtorcon-23.11.0.tar.gz
59ec801a38d6ea3cedc544cfcdb8e6f180b55d51bf9a01224b09f4bf48262f6b dist/txtorcon-23.11.0-py3-none-any.whl
EOF
thanks,
meejah
-----BEGIN PGP SIGNATURE-----
iQFFBAEBCgAvFiEEnVor1WiOy4id680/wmAoAxKAaacFAmVbDTcRHG1lZWphaEBt
ZWVqYWguY2EACgkQwmAoAxKAaafM/wgA4VdkdG6UgY7XiWQSfrjZZby5sszLJWUa
6T2x4PlHMnI6H2GvspU76n8rHwIfoi5MUIpZvqA17YnN2roPvBZYYwThczh9rhs1
2iTh4geeoBoLJyv8yokfy8gkv0AZ4tdfWa4b3AKA7yqoQ5YSK0hCji+m1jfqyY0q
P1FCTDZ2cMl8nQ0/KMxtY1Ifg2tXpQi0OXRujPIHCdqQkA5u94WS1pZZBK3qSNJE
1/20vBI38938wDk/oNapHIeyXYVoVL4DAGq0ADMwYm0syoMZx7NES0a6T3UThKMt
szmNj8YR+gwifu3/7UAEZbnAyosSgByqHPaFUu40+Z5LzlXaEnwiaA==
=bHsG
-----END PGP SIGNATURE-----
```
2023-11-20T09:22:58+00:00