NEWS: update for 0.10.0 release

This commit is contained in:
Brian Warner 2017-06-24 15:59:48 +01:00
parent 1345514c77
commit 572f6e3c16
2 changed files with 10 additions and 4 deletions

12
NEWS.md
View File

@ -1,7 +1,7 @@
User-visible changes in "magic-wormhole":
## Release 0.10.0 (???)
## Release 0.10.0 (24-Jun-2017)
The client-side code was completely rewritten, with proper Automat state
machines. The only immediately user-visible consequence is that
@ -11,7 +11,8 @@ this will also support "Journaled Mode" (see docs/journal.md for
details). (#42, #68)
The programmatic API has changed (see docs/api.md). Stability is not
promised until we reach 1.0, but this should be close.
promised until we reach 1.0, but this should be close, at least for the
non-Transit portions.
`wormhole send DIRECTORY` can now handle larger (>2GB) directories.
However the entire zipfile is built in-RAM before transmission, so the
@ -37,10 +38,15 @@ read permission, but possibly also unix-domain sockets, device nodes,
and pipes). (#112, #161)
`txtorcon` is now required by default, so the `magic-wormhole[tor]`
"extra" was removed. Tor works on py3 now. (#136, #174)
"extra" was removed, and a simple `pip install magic-wormhole` should
provide tor-based transport as long as Tor itself is available. Also,
Tor works on py3 now. (#136, #174)
`python -m wormhole` is an alternative way to run the CLI tool. (#159)
`wormhole send` might handle non-ascii (unicode) filenames better now.
(#157)
Thanks to Alex Gaynor, Atul Varma, dkg, JP Calderone, Kenneth Reitz,
Kurt Rose, maxalbert, meejah, midnightmagic, Robert Foss, Shannon
Mulloy, and Shirley Kotian, for patches and bug reports in this release

View File

@ -5,7 +5,7 @@
Get things from one computer to another, safely.
This package provides a library and a command-line tool named `wormhole`,
which makes it possible to get arbitrary-sized files and directories
which makes it possible to get arbitrary-sized files and directories
(or short pieces of text) from one computer to another. The two endpoints are
identified by using identical "wormhole codes": in general, the sending
machine generates and displays the code, which must then be typed into the