-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
I'm very happy to release txtorcon 0.19.0. This merges most of the development that happened over the last several months on the release-1.x branch. Featuring:
* Full Python3 support (and universal wheels)
* Drop txsocksx and use a custom implementation (this also implements the custom Tor SOCKS5 methods RESOLVE and RESOLVE_PTR). Uses Automat for the state-machine.
* Drop support for older Twisted releases (12, 13 and 14 are no longer supported).
* Add a top-level API object (txtorcon.Tor) that abstracts a running Tor. Instances of this class are created with txtorcon.connect or txtorcon.launch. These instances are intended to be "the" high-level API and most users shouldn't need anything else.
* Integrated support for twisted.web.client.Agent, baked into txtorcon.Tor. This allows simple, straightforward use of treq or "raw" twisted.web.client for making client-type Web requests via Tor. Automatically handles configuration of SOCKS ports.
* new high-level API for putting streams on specific Circuits. This adds txtorcon.Circuit.stream_via and txtorcon.Circuit.web_agent methods that work the same as the "Tor" equivalent methods except they use a specific circuit. This makes txtorcon.TorState.set_attacher the "low-level" / "expert" interface. Most users should only need the new API.
* big revamp / re-write of the documentation, including the new Programming Guide: https://txtorcon.readthedocs.io/en/latest/guide.html
* Issue 203: https://github.com/meejah/txtorcon/issues/203
* new helper: txtorcon.Router.get_onionoo_details which downloads JSON for a particular relay from OnionOO
* new helper: txtorcon.util.create_tbb_web_headers which returns headers resembling a recent Tor Browser suitable for use with Twisted or treq web agents.
* Issue 72: https://github.com/meejah/txtorcon/issues/72
* Specific SocksError subclasses for all the available SOCKS5 errors added by https://github.com/felipedau
* (more) Python3 fixes from https://github.com/rodrigc
You can download the release from PyPI or GitHub (or of course "pip install txtorcon"):
Releases are also available from the hidden service:
You can verify the sha256sum of both by running the following 4 lines in a shell wherever you have the files downloaded:
cat <<EOF | sha256sum --check 09d56fbd6e33eef7405c8ca354bbba06da2cefa02763d15c4bc9ac274c5daeeb dist/txtorcon-0.19.0.tar.gz cc51b4249ad126c31ea2746ec5ef1bcb7f6b0c34ced070913ed7772c0e48edf5 dist/txtorcon-0.19.0-py2.py3-none-any.whl EOF