-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
I'm excited to announce txtorcon 0.10.0 which adds support for Twisted's endpoint strings.
This means that ANY Twisted program that uses endpoints can accept "onion:" strings to bring up a hidden services easily (by launching a new Tor instance). Typically, no code changes to the application should be needed (just "pip install txtorcon").
"twistd" supports endpoints, so for example to serve some Web content from ~/public_html as a hidden-serivce, we can do this (with txtorcon installed):
twistd web --port onion:80 --path ~/public_html
Some examples of other valid "onion:" endpoint strings:
onion:80:hiddenServiceDir=/dev/shm/hidsrv onion:80:controlPort=9050:hiddenServiceDir=/srv/hidden
The first allows specifying existing hidden service keys and the second says to connect to an already-running Tor instance.
Thanks to David Stainton (dawuud) for the initial pull-request (and continued collaboration) that made this happen. There is a complete demonstration of the power of this Fully Operational endpoint-station here:
https://txtorcon.readthedocs.org/en/latest/howtos.html#endpoints-enable-tor-...
You can download the release from PyPI or GitHub (or of course use "pip install txtorcon"):
https://pypi.python.org/pypi/txtorcon/0.10.0 https://github.com/meejah/txtorcon/releases/tag/v0.10.0
sha256sum reports:
910ff3216035de0a779cfc167c0545266ff1f26687b163fc4655f298aca52d74 txtorcon-0.10.0-py2-none-any.whl c93f3d0f21d53c6b4c1521fc8d9dc2c9aff4a9f60497becea207d1738fa78279 txtorcon-0.10.0.tar.gz
thanks, meejah