Skip to content

Releases: input-output-hk/mithril

Mithril v2450.0-pre

11 Dec 09:31
2450.0-pre
c6c7eba
Compare
Choose a tag to compare
Mithril v2450.0-pre Pre-release
Pre-release

Highlights:

  • 🔥 BREAKING changes in Mithril client library, CLI, and WASM:
    • Remove deprecated network field from the internal CardanoDbBeacon.
    • The Mithril certificates of type CardanoImmutableFilesFull can't be verified anymore with the previous clients.
    • Clients from distribution 2445 and earlier must be updated.
  • Stable support for Cardano node 10.1.3 in the signer and the aggregator.
  • Stable support for one line shell installation script of the Mithril nodes pre-built binaries.
  • Bug fixes and performance improvements.

What's Changed

  • Feat: custom signed entity types in backward compatibility test in CI by @jpraynaud in #2087
  • Do not add unfollow files when commit with upgrade_crates_and_openapi_versions.sh by @sfauvel in #2088
  • Simplify tests by @Alenar in #2090
  • Refactor event message creation by @sfauvel in #2089
  • Feat: add Cardano era retrieval in chain observer implementations by @dlachaume in #2094
  • Docs: rotate documentation for 2445 distribution by @jpraynaud in #2079
  • Docs: final CHANGELOG for '2445.0' distribution by @jpraynaud in #2096
  • Docs: dev blog post for aggregator prometheus endpoint by @jpraynaud in #2095
  • chore: add build target nodejs by @fabianbormann in #2082
  • Prepare network removal from CardanoDbBeacon by @Alenar in #2097
  • Feat: enhance certificate chain verification by @jpraynaud in #2098
  • Docs: enhance runbook for aggregator metrics and signer registrations by @jpraynaud in #2099
  • Feat: record informations in epoch service for status route by @dlachaume in #2100
  • Docs: reorganize user manual section in docs website by @jpraynaud in #2102
  • Refactor aggregator pruning with upkeep service by @sfauvel in #2103
  • Refactor signer pruning with upkeep service by @sfauvel in #2108
  • Feat: add genesis generate-keypair command in aggregator by @jpraynaud in #2106
  • Feat: implement /status route to expose aggregator information by @dlachaume in #2107
  • Remove network from CardanoDbBeacon by @Alenar in #2110
  • Fix: adjust era offset in PallasChainObserver for correct display name by @dlachaume in #2112
  • Add a database migration to remove network from cardano immutable files full beacons by @Alenar in #2113
  • Docs: update Protocol Insights Dashboard links by @jpraynaud in #2119
  • Display aggregator status information in explorer by @Alenar in #2128
  • Fix for Failing STM Proptests by @curiecrypt in #2125
  • fix(aggregator): properly handle 404 errors in http server by @Alenar in #2130
  • Docs: dev blog post about new Protocol Insights Dashboard by @jpraynaud in #2127
  • Explorer: Easier, more cohesive, aggregator controls by @Alenar in #2132
  • CI: add workflow dispatcher for nightly GitHub workflows by @dlachaume in #2131
  • Get rid of store adapter in signer by @sfauvel in #2126
  • Docs: protocol security page on documentation website by @jpraynaud in #2133
  • Feat: one line installation script for Mithril nodes by @jpraynaud in #2136
  • Client wasm multiple targets by @Alenar in #2135
  • Docs: dev blog post for one line installer by @jpraynaud in #2139
  • Also bump versions of js packages in upgrade version script by @Alenar in #2137
  • fix(ci): fix generation of swagger-ui page by @Alenar in #2141
  • Feat: create new signed entity type for Incremental Cardano DB by @dlachaume in #2142
  • Get rid of store adapter in aggregator by @sfauvel in #2143
  • Fix Rust 1.83 clippy warnings by @Alenar in #2148
  • Cardano network on aggregator status and explorer by @Alenar in #2149
  • Chore: update aggregator in examples by @dlachaume in #2150
  • Feat: support retries in e2e tests in CI by @jpraynaud in #2145
  • Feat: implement signable builder for incremental Cardano DB by @dlachaume in #2146
  • Fix: GPG verification command of released artifact by @jpraynaud in #2155
  • Chore: upgrade to cardano node 10.1.3 by @jpraynaud in #2158
  • Feat: add execute rights on pre-built binaries in CI by @jpraynaud in #2156
  • Feat: implement artifact builder for CardanoDatabase by @dlachaume in #2159
  • Docs: reorganize About Mithril section in docs website by @jpraynaud in #2160
  • Chore: update dependencies for distribution 2450 by @jpraynaud in #2157
  • Accelerate signer fixtures creation in tests by @sfauvel in #2161
  • Chore: update dependencies for distribution 2450 by @jpraynaud in #2164
  • Docs: update CHANGELOG for 2450.0 distribution release by @jpraynaud in #2163

New Contributors

Full Changelog: 2445.0...2450.0-pre

Crates Versions

Crate Version
mithril-aggregator 0.6.0
mithril-client 0.10.4
mithril-client-cli 0.10.5
mithril-client-wasm 0.7.2
mithril-common 0.4.96
mithril-signer 0.2.221
mithril-stm 0.3.34

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview
testing-sanchonet

Distributions Compatibility ⚠️

Compatibility mithril-signer mithril-client
2445.0 ✔️
2442.0 ✔️
2437.1 ✔️

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with `gpg: Good signature...
Read more

Unstable Development Builds

11 Dec 16:05
404212a
Compare
Choose a tag to compare
Pre-release

Crates Versions

Crate Version
mithril-aggregator 0.6.2
mithril-client 0.10.4
mithril-client-cli 0.10.5
mithril-client-wasm 0.7.2
mithril-common 0.4.96
mithril-signer 0.2.221
mithril-stm 0.3.34

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview
testing-sanchonet

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Fetch the latest version of the unstable tag

The unstable tag is updated with a new commit id when a new unstable release is published.
To fetch the latest version of the unstable tag, execute the command:
git tag -d unstable && git fetch origin tag unstable

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 73FC 4C3D FD55 DBDC 428A D2B5 BE04 3B79 FDA4 C2EE
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

What's Changed

  • feat(ci): include explorer in packaged releases by @Alenar in #2167
  • Fix: recompute certificate chain hash by @jpraynaud in #2168
  • Refactor: rework snapshot_uploaders module to improve genericity by @dlachaume in #2165

Full Changelog: 2450.0-pre...unstable

Mithril v2445.0

07 Nov 13:38
2445.0
67dc6e4
Compare
Choose a tag to compare

Highlights:

  • 🔥 BREAKING changes in Mithril client library, CLI, and WASM:
    • Remove deprecated beacon field from Mithril certificates.
    • Clients from distribution 2430 and above are compatible with this change.
  • Stable support for Cardano node 10.1.2 in the signer and the aggregator.
  • Stable support for Cardano stake distribution client library, CLI and WASM.
  • Stable support for Prometheus metrics endpoint in aggregator.
  • Bug fixes and performance improvements.

What's Changed

  • Fix: add missing automatically generated release note section for unstable releases by @dlachaume in #2011
  • Standardize logs in common, signer, and persistence by @Alenar in #2010
  • Sfauvel/1990/refactor prometheus metrics using struct by @sfauvel in #1998
  • Feat: implement certificate chain builder for tests by @jpraynaud in #1999
  • Refactor client cli command parameters by @Alenar in #2012
  • Enhance logs in client and client-cli by @Alenar in #2013
  • Fix clippy warnings from Rust 1.82 by @Alenar in #2015
  • Enhance logs in mithril-relay by @Alenar in #2014
  • Upgrade mac runner + Fix incorrect param by @Alenar in #2019
  • Upgrade actions to latest by @Alenar in #2020
  • Docs: rotate documentation for 2442 distribution by @jpraynaud in #2005
  • Docs: final CHANGELOG for '2442.0' distribution by @jpraynaud in #2031
  • Create dev blog post for certification of Cardano stake distribution by @dlachaume in #1892
  • Activate metrics endpoint on aggregator by @dlachaume in #2022
  • Fix: clap arguments are always overriding configuration by @dlachaume in #2038
  • Docs: enhance era markers runbook by @jpraynaud in #2033
  • Fix: monitoring configuration in infra by @jpraynaud in #2039
  • Fix: rename certificate_total_produced_since_startup metric name in aggregator by @dlachaume in #2040
  • Fix unneeded rescan when importing transactions in chunk by @Alenar in #2035
  • Fix: remove _counter suffix from aggregator metrics by @dlachaume in #2041
  • Fix: computation of the chaining of the certificates in tests by @jpraynaud in #2032
  • Devbook: upgrade crates and openapi script by @Alenar in #2042
  • Fix: ensure epoch consistency during epoch changes when signer is signing by @dlachaume in #2046
  • Respin testing-sanchonet with Cardano 10.1.0-pre by @jpraynaud in #2048
  • Refactor event store to use migration mechanism by @sfauvel in #2043
  • Enhance end-to-end tests termination by @Alenar in #2050
  • Refactor ChainPoint conversion from pallas Point by @Alenar in #2049
  • Feat: Make Cardano stake distribution stable in client by @dlachaume in #2052
  • Fix: era markers and pool tools for Cardano 10.1 by @jpraynaud in #2053
  • Remove beacon from certificate by @Alenar in #2055
  • Ensemble/1958/fix explorer by @Alenar in #2056
  • Feat: add aggregator metric to record the number of restoration of the Cardano database by @dlachaume in #2057
  • Refactor: rename protocol parameters for consistency in signer and aggregator by @dlachaume in #2058
  • CI: add scheduled Docker builds workflow by @dlachaume in #2060
  • ci: add nightly backward compatibility testing with e2e tests by @dlachaume in #2063
  • Record aggregator metrics in event store by @sfauvel in #2059
  • Remove pending certificate from explorer by @Alenar in #2061
  • Access registered signers for latest epoch in explorer by @Alenar in #2062
  • Upgrade mithril explorer to Next 15 by @Alenar in #2065
  • Fix metrics_per_day view and improve test by building the real Metric… by @sfauvel in #2068
  • ci: update cron schedule expression with co-authors to enable notifications by @dlachaume in #2066
  • Feat: Support Cardano node 10.1.1 by @jpraynaud in #2070
  • Streamline configurations usage in aggregator by @Alenar in #2081
  • Chore: update dependencies for distribution 2445 by @jpraynaud in #2078
  • CI: enhance nightly backward compatibility testing workflow by @dlachaume in #2083
  • Chore: upgrade to Cardano '10.1.2' by @jpraynaud in #2084
  • Feat: add latest shortcut as targeted era for Cardano CLI commands by @dlachaume in #2085
  • Create view for registrations monitoring by @sfauvel in #2086
  • Docs: update CHANGELOG for 2445.0 distribution release by @jpraynaud in #2080

Full Changelog: 2442.0...2445.0

Crates Versions

Crate Version
mithril-aggregator 0.5.102
mithril-client 0.10.1
mithril-client-cli 0.10.1
mithril-client-wasm 0.6.1
mithril-common 0.4.79
mithril-signer 0.2.209
mithril-stm 0.3.31

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview
testing-sanchonet

Distributions Compatibility ⚠️

Compatibility mithril-signer mithril-client
2442.0
2437.1
2430.0
2428.0
2423.0

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of...
Read more

Mithril v2445.0-pre

05 Nov 15:16
2445.0-pre
67dc6e4
Compare
Choose a tag to compare
Mithril v2445.0-pre Pre-release
Pre-release

Highlights:

  • 🔥 BREAKING changes in Mithril client library, CLI, and WASM:
    • Remove deprecated beacon field from Mithril certificates.
    • Clients from distribution 2430 and above are compatible with this change.
  • Stable support for Cardano node 10.1.2 in the signer and the aggregator.
  • Stable support for Cardano stake distribution client library, CLI and WASM.
  • Stable support for Prometheus metrics endpoint in aggregator.
  • Bug fixes and performance improvements.

What's Changed

  • Fix: add missing automatically generated release note section for unstable releases by @dlachaume in #2011
  • Standardize logs in common, signer, and persistence by @Alenar in #2010
  • Sfauvel/1990/refactor prometheus metrics using struct by @sfauvel in #1998
  • Feat: implement certificate chain builder for tests by @jpraynaud in #1999
  • Refactor client cli command parameters by @Alenar in #2012
  • Enhance logs in client and client-cli by @Alenar in #2013
  • Fix clippy warnings from Rust 1.82 by @Alenar in #2015
  • Enhance logs in mithril-relay by @Alenar in #2014
  • Upgrade mac runner + Fix incorrect param by @Alenar in #2019
  • Upgrade actions to latest by @Alenar in #2020
  • Docs: rotate documentation for 2442 distribution by @jpraynaud in #2005
  • Docs: final CHANGELOG for '2442.0' distribution by @jpraynaud in #2031
  • Create dev blog post for certification of Cardano stake distribution by @dlachaume in #1892
  • Activate metrics endpoint on aggregator by @dlachaume in #2022
  • Fix: clap arguments are always overriding configuration by @dlachaume in #2038
  • Docs: enhance era markers runbook by @jpraynaud in #2033
  • Fix: monitoring configuration in infra by @jpraynaud in #2039
  • Fix: rename certificate_total_produced_since_startup metric name in aggregator by @dlachaume in #2040
  • Fix unneeded rescan when importing transactions in chunk by @Alenar in #2035
  • Fix: remove _counter suffix from aggregator metrics by @dlachaume in #2041
  • Fix: computation of the chaining of the certificates in tests by @jpraynaud in #2032
  • Devbook: upgrade crates and openapi script by @Alenar in #2042
  • Fix: ensure epoch consistency during epoch changes when signer is signing by @dlachaume in #2046
  • Respin testing-sanchonet with Cardano 10.1.0-pre by @jpraynaud in #2048
  • Refactor event store to use migration mechanism by @sfauvel in #2043
  • Enhance end-to-end tests termination by @Alenar in #2050
  • Refactor ChainPoint conversion from pallas Point by @Alenar in #2049
  • Feat: Make Cardano stake distribution stable in client by @dlachaume in #2052
  • Fix: era markers and pool tools for Cardano 10.1 by @jpraynaud in #2053
  • Remove beacon from certificate by @Alenar in #2055
  • Ensemble/1958/fix explorer by @Alenar in #2056
  • Feat: add aggregator metric to record the number of restoration of the Cardano database by @dlachaume in #2057
  • Refactor: rename protocol parameters for consistency in signer and aggregator by @dlachaume in #2058
  • CI: add scheduled Docker builds workflow by @dlachaume in #2060
  • ci: add nightly backward compatibility testing with e2e tests by @dlachaume in #2063
  • Record aggregator metrics in event store by @sfauvel in #2059
  • Remove pending certificate from explorer by @Alenar in #2061
  • Access registered signers for latest epoch in explorer by @Alenar in #2062
  • Upgrade mithril explorer to Next 15 by @Alenar in #2065
  • Fix metrics_per_day view and improve test by building the real Metric… by @sfauvel in #2068
  • ci: update cron schedule expression with co-authors to enable notifications by @dlachaume in #2066
  • Feat: Support Cardano node 10.1.1 by @jpraynaud in #2070
  • Streamline configurations usage in aggregator by @Alenar in #2081
  • Chore: update dependencies for distribution 2445 by @jpraynaud in #2078
  • CI: enhance nightly backward compatibility testing workflow by @dlachaume in #2083
  • Chore: upgrade to Cardano '10.1.2' by @jpraynaud in #2084
  • Feat: add latest shortcut as targeted era for Cardano CLI commands by @dlachaume in #2085
  • Create view for registrations monitoring by @sfauvel in #2086
  • Docs: update CHANGELOG for 2445.0 distribution release by @jpraynaud in #2080

Full Changelog: 2442.0...2445.0-pre

Crates Versions

Crate Version
mithril-aggregator 0.5.102
mithril-client 0.10.1
mithril-client-cli 0.10.1
mithril-client-wasm 0.6.1
mithril-common 0.4.79
mithril-signer 0.2.209
mithril-stm 0.3.31

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview
testing-sanchonet

Distributions Compatibility ⚠️

Compatibility mithril-signer mithril-client
2442.0
2437.1
2430.0
2428.0
2423.0

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and le...
Read more

Mithril v2442.0

21 Oct 13:26
2442.0
0d4d6bc
Compare
Choose a tag to compare

Highlights

  • Stable support for decentralized signature orchestration (the signer node computes autonomously the messages to sign).
  • Stable support for Cardano transaction client library, CLI and WASM.
  • Stable support for new Pythagoras Mithril era.
  • Bug fixes and performance improvements.

What's Changed

  • Refactor signer state machine by @dlachaume in #1931
  • Aggregator single signatures buffer by @Alenar in #1934
  • Retrieve custom signing configuration with epoch settings in Signer by @dlachaume in #1939
  • Enhance mithril-common logging by @Alenar in #1940
  • Docs: rotate documentation for 2437 distribution by @jpraynaud in #1930
  • Docs: final CHANGELOG for '2437.1' distribution by @jpraynaud in #1947
  • Feat: create new 'Pythagoras' Mithril era by @jpraynaud in #1948
  • Update websites dependencies by @jpraynaud in #1937
  • Refactor: standardize epoch settings naming by @dlachaume in #1949
  • Feat: sign protocol parameters in Genesis certificate by @jpraynaud in #1950
  • Refactor: signable builder services compute full protocol message by @jpraynaud in #1942
  • Docs: dev blog posts for 2437 distribution by @jpraynaud in #1953
  • Fix: hydra CI error when allow lint attribute specifies a reason by @dlachaume in #1960
  • docs: improve clarity in "Verify your signer is registered" section by @dlachaume in #1962
  • crane fix by @locallycompact in #1959
  • Fix: swagger build step failing in CI by @jpraynaud in #1965
  • Feat: sign protocol parameters and epoch in certificate by @jpraynaud in #1954
  • Fix: discrepancy protocol parameters by @jpraynaud in #1967
  • Make aggregator advertises constant signing configurations for an epoch by @dlachaume in #1964
  • Fix: add migration to resolve deserialization issue with cardano_transactions_signing_config by @dlachaume in #1971
  • Docs: dev blog post for activation of the Cardano transaction certification by @jpraynaud in #1973
  • Signer self compute signed entity by @Alenar in #1970
  • Deprecate certificate pending by @Alenar in #1972
  • Feat: Support Cardano node 9.2.1 by @jpraynaud in #1969
  • Fix signer stuck if signature already aggregated by @Alenar in #1977
  • docs: update since signers now compute what to sign independently by @Alenar in #1975
  • Chore: decommission testing-mainnet network by @jpraynaud in #1978
  • Fix: topology computation of the Cardano nodes of the signers in infra by @jpraynaud in #1985
  • Signer certifier service sign & send signatures by @Alenar in #1979
  • Make epoch mandatory in RegisterSignerMessage by @Alenar in #1986
  • Feat: sign epoch in genesis certificate by @jpraynaud in #1987
  • Make Cardano transaction client stable by @dlachaume in #1989
  • Optimize /register-signer route by replacing ticker service with epoch service by @dlachaume in #1991
  • Feat: use stored signing configuration in aggregator when creating signed entity type by @dlachaume in #1988
  • Feat: implement era switch in e2e tests by @jpraynaud in #1974
  • Enhance logs in mithril-signer and mithril-persistence by @Alenar in #1992
  • Better folder structure for End to End test by @Alenar in #1994
  • Docs: add timeout troubleshooting macOS section in E2E README by @dlachaume in #1993
  • Fix: aggregator panics in CI by @dlachaume in #1995
  • Refactor(aggregator): simplify http server dependencies by @Alenar in #1996
  • Use new GitHub action for creating releases by @dlachaume in #2000
  • Enhance logs construction and usage in aggregator by @Alenar in #2002
  • Chore: update signer preloader refresh interval by @jpraynaud in #2003
  • Chore: update dependencies for distribution 2442 by @jpraynaud in #2004
  • Docs: update CHANGELOG for 2442.0 distribution release by @jpraynaud in #2006
  • setting benchmark path by @Fuma419 in #1951
  • Fix: update dependencies runbook and script by @dlachaume in #2008
  • Use new GitHub action for creating unstable release by @dlachaume in #2007
  • Rework & harmonize aggregator log messages by @Alenar in #2009

New Contributors

Full Changelog: 2437.1...2442.0

Crates Versions

Crate Version
mithril-aggregator 0.5.83
mithril-client 0.9.2
mithril-client-cli 0.9.15
mithril-client-wasm 0.5.2
mithril-common 0.4.69
mithril-signer 0.2.200
mithril-stm 0.3.30

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview
testing-sanchonet

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2442.0-pre

15 Oct 14:31
2442.0-pre
0d4d6bc
Compare
Choose a tag to compare
Mithril v2442.0-pre Pre-release
Pre-release

Highlights

  • Stable support for decentralized signature orchestration (the signer node computes autonomously the messages to sign).
  • Stable support for Cardano transaction client library, CLI and WASM.
  • Stable support for new Pythagoras Mithril era.
  • Bug fixes and performance improvements.

What's Changed

  • Refactor signer state machine by @dlachaume in #1931
  • Aggregator single signatures buffer by @Alenar in #1934
  • Retrieve custom signing configuration with epoch settings in Signer by @dlachaume in #1939
  • Enhance mithril-common logging by @Alenar in #1940
  • Docs: rotate documentation for 2437 distribution by @jpraynaud in #1930
  • Docs: final CHANGELOG for '2437.1' distribution by @jpraynaud in #1947
  • Feat: create new 'Pythagoras' Mithril era by @jpraynaud in #1948
  • Update websites dependencies by @jpraynaud in #1937
  • Refactor: standardize epoch settings naming by @dlachaume in #1949
  • Feat: sign protocol parameters in Genesis certificate by @jpraynaud in #1950
  • Refactor: signable builder services compute full protocol message by @jpraynaud in #1942
  • Docs: dev blog posts for 2437 distribution by @jpraynaud in #1953
  • Fix: hydra CI error when allow lint attribute specifies a reason by @dlachaume in #1960
  • docs: improve clarity in "Verify your signer is registered" section by @dlachaume in #1962
  • crane fix by @locallycompact in #1959
  • Fix: swagger build step failing in CI by @jpraynaud in #1965
  • Feat: sign protocol parameters and epoch in certificate by @jpraynaud in #1954
  • Fix: discrepancy protocol parameters by @jpraynaud in #1967
  • Make aggregator advertises constant signing configurations for an epoch by @dlachaume in #1964
  • Fix: add migration to resolve deserialization issue with cardano_transactions_signing_config by @dlachaume in #1971
  • Docs: dev blog post for activation of the Cardano transaction certification by @jpraynaud in #1973
  • Signer self compute signed entity by @Alenar in #1970
  • Deprecate certificate pending by @Alenar in #1972
  • Feat: Support Cardano node 9.2.1 by @jpraynaud in #1969
  • Fix signer stuck if signature already aggregated by @Alenar in #1977
  • docs: update since signers now compute what to sign independently by @Alenar in #1975
  • Chore: decommission testing-mainnet network by @jpraynaud in #1978
  • Fix: topology computation of the Cardano nodes of the signers in infra by @jpraynaud in #1985
  • Signer certifier service sign & send signatures by @Alenar in #1979
  • Make epoch mandatory in RegisterSignerMessage by @Alenar in #1986
  • Feat: sign epoch in genesis certificate by @jpraynaud in #1987
  • Make Cardano transaction client stable by @dlachaume in #1989
  • Optimize /register-signer route by replacing ticker service with epoch service by @dlachaume in #1991
  • Feat: use stored signing configuration in aggregator when creating signed entity type by @dlachaume in #1988
  • Feat: implement era switch in e2e tests by @jpraynaud in #1974
  • Enhance logs in mithril-signer and mithril-persistence by @Alenar in #1992
  • Better folder structure for End to End test by @Alenar in #1994
  • Docs: add timeout troubleshooting macOS section in E2E README by @dlachaume in #1993
  • Fix: aggregator panics in CI by @dlachaume in #1995
  • Refactor(aggregator): simplify http server dependencies by @Alenar in #1996
  • Use new GitHub action for creating releases by @dlachaume in #2000
  • Enhance logs construction and usage in aggregator by @Alenar in #2002
  • Chore: update signer preloader refresh interval by @jpraynaud in #2003
  • Chore: update dependencies for distribution 2442 by @jpraynaud in #2004
  • Docs: update CHANGELOG for 2442.0 distribution release by @jpraynaud in #2006
  • setting benchmark path by @Fuma419 in #1951
  • Fix: update dependencies runbook and script by @dlachaume in #2008
  • Use new GitHub action for creating unstable release by @dlachaume in #2007
  • Rework & harmonize aggregator log messages by @Alenar in #2009

New Contributors

Full Changelog: 2437.1...2442.0-pre

Crates Versions

Crate Version
mithril-aggregator 0.5.83
mithril-client 0.9.2
mithril-client-cli 0.9.15
mithril-client-wasm 0.5.2
mithril-common 0.4.69
mithril-signer 0.2.200
mithril-stm 0.3.30

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview
testing-sanchonet

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2437.1

23 Sep 12:44
9fd9ae8
Compare
Choose a tag to compare

Highlights:

  • 🔥 BREAKING changes in Mithril client WASM:
    • Implementation of seamless transition from unstable to stable features.
    • A new unstable option in the client allows the usage of unstable features.
    • The previous client.unstable implementation is not supported anymore and must be replaced with client.
  • Stable support for Cardano transactions certification in signer and aggregator.
  • Stable support for Cardano stake distribution certification in signer and aggregator.
  • Bug fixes and performance improvements.

What's Changed

  • Implement signable and artifact builders for Cardano Stake Distribution by @dlachaume in #1847
  • Increase timeout for client WASM headless browser tests by @dlachaume in #1864
  • Fix typos by @sfauvel in #1865
  • Update CHANGELOG for 2430.0 distribution release by @jpraynaud in #1866
  • Dev blog post for Cardano transaction certification feature roll-out by @jpraynaud in #1868
  • Make signed_entity_type non optional in RegisterSignatureMessage by @sfauvel in #1870
  • Monitor Mithril nodes footprint by @jpraynaud in #1871
  • Add a redirection on index.html to clean url by @sfauvel in #1869
  • Escape slashes in sed command by @sfauvel in #1873
  • Update Mithril signer footprint with Cardano transactions by @jpraynaud in #1874
  • Fix: ChainReaderBlockStreamer skips RollForward blocks at the tip by @jpraynaud in #1877
  • Implement Cardano stake distribution HTTP routes by @dlachaume in #1872
  • Update Mithril signer footprint in SPO guide by @jpraynaud in #1879
  • Implement Cardano stake distribution in mithril-client library by @dlachaume in #1882
  • Implement Cardano stake distribution commands in mithril-client CLI by @dlachaume in #1883
  • Implement Cardano stake distribution in mithril-client WASM by @dlachaume in #1887
  • Add new tab Cardano Stake Distribution in the explorer by @dlachaume in #1888
  • Document Cardano Stake Distribution by @dlachaume in #1889
  • Add missing Cardano stake distribution example in developer documentation by @dlachaume in #1891
  • fix: macOS e2e local tests fails on M3 silicon processors by @falcucci in #1767
  • Add support for custom HTTP Headers in Mithril client WASM library by @dlachaume in #1890
  • Create repository dependencies upgrade runbook by @dlachaume in #1893
  • feat: support file:// URLs for snapshot locations by @michalrus in #1885
  • Fix: Cardano stake distribution certification epoch discrepancy by @jpraynaud in #1896
  • Optimize memory usage of signer for Cardano transactions by @jpraynaud in #1904
  • Add Cardano transactions signing configuration in Aggregator '/' route by @Alenar in #1905
  • Reorganize signer dependencies by @Alenar in #1908
  • docs: update signer footprint in SPO setup guide by @jpraynaud in #1907
  • Optional signed message in registered signatures by @Alenar in #1909
  • feat: Make rug-backend optional for mithril-client crate by @Mr-Leshiy in #1884
  • Chore: post Chang hard fork cleanup by @jpraynaud in #1912
  • Refactor: seamless unstable to stable transition in WASM client by @jpraynaud in #1914
  • Fix clippy warnings from Rust 1.81 by @Alenar in #1918
  • Add a script to update all dependencies by @sfauvel in #1916
  • Feat: add infinite Cardano transactions preloader in signer by @jpraynaud in #1921
  • Update dependencies for release 2437 by @Alenar in #1919
  • Enhance upgrade dependency runbook by @Alenar in #1926
  • Fix: preloading configuration makes signer panic at startup by @jpraynaud in #1927
  • signer retrieves registrations with epoch settings route by @sfauvel in #1913
  • Enhance Cardano transactions rollbacks by @jpraynaud in #1917
  • Update CHANGELOG for 2437.0 distribution release by @jpraynaud in #1932
  • Enhance Cardano transaction prover benchmark by @jpraynaud in #1933
  • Fix: data inconsistency in Cardano transactions stores by @jpraynaud in #1936

New Contributors

Full Changelog: 2430.0...2437.1

Crates Versions

Crate Version
mithril-aggregator 0.5.63
mithril-client 0.8.18
mithril-client-cli 0.9.12
mithril-client-wasm 0.4.1
mithril-common 0.4.51
mithril-signer 0.2.182
mithril-stm 0.3.29

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview
testing-sanchonet

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2437.1-pre

19 Sep 07:51
9fd9ae8
Compare
Choose a tag to compare
Mithril v2437.1-pre Pre-release
Pre-release

Highlights:

  • 🔥 BREAKING changes in Mithril client WASM:
    • Implementation of seamless transition from unstable to stable features.
    • A new unstable option in the client allows the usage of unstable features.
    • The previous client.unstable implementation is not supported anymore and must be replaced with client.
  • Stable support for Cardano transactions certification in signer and aggregator.
  • Stable support for Cardano stake distribution certification in signer and aggregator.
  • Bug fixes and performance improvements.

What's Changed

  • Implement signable and artifact builders for Cardano Stake Distribution by @dlachaume in #1847
  • Increase timeout for client WASM headless browser tests by @dlachaume in #1864
  • Fix typos by @sfauvel in #1865
  • Update CHANGELOG for 2430.0 distribution release by @jpraynaud in #1866
  • Dev blog post for Cardano transaction certification feature roll-out by @jpraynaud in #1868
  • Make signed_entity_type non optional in RegisterSignatureMessage by @sfauvel in #1870
  • Monitor Mithril nodes footprint by @jpraynaud in #1871
  • Add a redirection on index.html to clean url by @sfauvel in #1869
  • Escape slashes in sed command by @sfauvel in #1873
  • Update Mithril signer footprint with Cardano transactions by @jpraynaud in #1874
  • Fix: ChainReaderBlockStreamer skips RollForward blocks at the tip by @jpraynaud in #1877
  • Implement Cardano stake distribution HTTP routes by @dlachaume in #1872
  • Update Mithril signer footprint in SPO guide by @jpraynaud in #1879
  • Implement Cardano stake distribution in mithril-client library by @dlachaume in #1882
  • Implement Cardano stake distribution commands in mithril-client CLI by @dlachaume in #1883
  • Implement Cardano stake distribution in mithril-client WASM by @dlachaume in #1887
  • Add new tab Cardano Stake Distribution in the explorer by @dlachaume in #1888
  • Document Cardano Stake Distribution by @dlachaume in #1889
  • Add missing Cardano stake distribution example in developer documentation by @dlachaume in #1891
  • fix: macOS e2e local tests fails on M3 silicon processors by @falcucci in #1767
  • Add support for custom HTTP Headers in Mithril client WASM library by @dlachaume in #1890
  • Create repository dependencies upgrade runbook by @dlachaume in #1893
  • feat: support file:// URLs for snapshot locations by @michalrus in #1885
  • Fix: Cardano stake distribution certification epoch discrepancy by @jpraynaud in #1896
  • Optimize memory usage of signer for Cardano transactions by @jpraynaud in #1904
  • Add Cardano transactions signing configuration in Aggregator '/' route by @Alenar in #1905
  • Reorganize signer dependencies by @Alenar in #1908
  • docs: update signer footprint in SPO setup guide by @jpraynaud in #1907
  • Optional signed message in registered signatures by @Alenar in #1909
  • feat: Make rug-backend optional for mithril-client crate by @Mr-Leshiy in #1884
  • Chore: post Chang hard fork cleanup by @jpraynaud in #1912
  • Refactor: seamless unstable to stable transition in WASM client by @jpraynaud in #1914
  • Fix clippy warnings from Rust 1.81 by @Alenar in #1918
  • Add a script to update all dependencies by @sfauvel in #1916
  • Feat: add infinite Cardano transactions preloader in signer by @jpraynaud in #1921
  • Update dependencies for release 2437 by @Alenar in #1919
  • Enhance upgrade dependency runbook by @Alenar in #1926
  • Fix: preloading configuration makes signer panic at startup by @jpraynaud in #1927
  • signer retrieves registrations with epoch settings route by @sfauvel in #1913
  • Enhance Cardano transactions rollbacks by @jpraynaud in #1917
  • Update CHANGELOG for 2437.0 distribution release by @jpraynaud in #1932
  • Enhance Cardano transaction prover benchmark by @jpraynaud in #1933
  • Fix: data inconsistency in Cardano transactions stores by @jpraynaud in #1936

New Contributors

Full Changelog: 2430.0...2437.1-pre

Crates Versions

Crate Version
mithril-aggregator 0.5.63
mithril-client 0.8.18
mithril-client-cli 0.9.12
mithril-client-wasm 0.4.1
mithril-common 0.4.51
mithril-signer 0.2.182
mithril-stm 0.3.29

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview
testing-sanchonet

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2437.0-pre

12 Sep 08:22
a248dd9
Compare
Choose a tag to compare
Mithril v2437.0-pre Pre-release
Pre-release

Highlights:

  • 🔥 BREAKING changes in Mithril client WASM:
    • Implementation of seamless transition from unstable to stable features.
    • A new unstable option in the client allows the usage of unstable features.
    • The previous client.unstable implementation is not supported anymore and must be replaced with client.
  • Stable support for Cardano transactions certification in signer and aggregator.
  • Stable support for Cardano stake distribution certification in signer and aggregator.
  • Bug fixes and performance improvements.

What's Changed

  • Implement signable and artifact builders for Cardano Stake Distribution by @dlachaume in #1847
  • Increase timeout for client WASM headless browser tests by @dlachaume in #1864
  • Fix typos by @sfauvel in #1865
  • Update CHANGELOG for 2430.0 distribution release by @jpraynaud in #1866
  • Dev blog post for Cardano transaction certification feature roll-out by @jpraynaud in #1868
  • Make signed_entity_type non optional in RegisterSignatureMessage by @sfauvel in #1870
  • Monitor Mithril nodes footprint by @jpraynaud in #1871
  • Add a redirection on index.html to clean url by @sfauvel in #1869
  • Escape slashes in sed command by @sfauvel in #1873
  • Update Mithril signer footprint with Cardano transactions by @jpraynaud in #1874
  • Fix: ChainReaderBlockStreamer skips RollForward blocks at the tip by @jpraynaud in #1877
  • Implement Cardano stake distribution HTTP routes by @dlachaume in #1872
  • Update Mithril signer footprint in SPO guide by @jpraynaud in #1879
  • Implement Cardano stake distribution in mithril-client library by @dlachaume in #1882
  • Implement Cardano stake distribution commands in mithril-client CLI by @dlachaume in #1883
  • Implement Cardano stake distribution in mithril-client WASM by @dlachaume in #1887
  • Add new tab Cardano Stake Distribution in the explorer by @dlachaume in #1888
  • Document Cardano Stake Distribution by @dlachaume in #1889
  • Add missing Cardano stake distribution example in developer documentation by @dlachaume in #1891
  • fix: macOS e2e local tests fails on M3 silicon processors by @falcucci in #1767
  • Add support for custom HTTP Headers in Mithril client WASM library by @dlachaume in #1890
  • Create repository dependencies upgrade runbook by @dlachaume in #1893
  • feat: support file:// URLs for snapshot locations by @michalrus in #1885
  • Fix: Cardano stake distribution certification epoch discrepancy by @jpraynaud in #1896
  • Optimize memory usage of signer for Cardano transactions by @jpraynaud in #1904
  • Add Cardano transactions signing configuration in Aggregator '/' route by @Alenar in #1905
  • Reorganize signer dependencies by @Alenar in #1908
  • docs: update signer footprint in SPO setup guide by @jpraynaud in #1907
  • Optional signed message in registered signatures by @Alenar in #1909
  • feat: Make rug-backend optional for mithril-client crate by @Mr-Leshiy in #1884
  • Chore: post Chang hard fork cleanup by @jpraynaud in #1912
  • Refactor: seamless unstable to stable transition in WASM client by @jpraynaud in #1914
  • Fix clippy warnings from Rust 1.81 by @Alenar in #1918
  • Add a script to update all dependencies by @sfauvel in #1916
  • Feat: add infinite Cardano transactions preloader in signer by @jpraynaud in #1921
  • Update dependencies for release 2437 by @Alenar in #1919
  • Enhance upgrade dependency runbook by @Alenar in #1926
  • Fix: preloading configuration makes signer panic at startup by @jpraynaud in #1927
  • signer retrieves registrations with epoch settings route by @sfauvel in #1913
  • Enhance Cardano transactions rollbacks by @jpraynaud in #1917
  • Update CHANGELOG for 2437.0 distribution release by @jpraynaud in #1932

New Contributors

Full Changelog: 2430.0...2437.0-pre

Crates Versions

Crate Version
mithril-aggregator 0.5.62
mithril-client 0.8.18
mithril-client-cli 0.9.12
mithril-client-wasm 0.4.1
mithril-common 0.4.51
mithril-signer 0.2.181
mithril-stm 0.3.29

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview
testing-sanchonet

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2430.0

30 Jul 08:07
52a7beb
Compare
Choose a tag to compare

Highlights:

  • Support for Cardano node 9.1.0.
  • Support for Cardano transactions certification in release-preprod and pre-release-preview.
  • Bug fixes and performance improvements.

What's Changed

  • Configure Cardano transaction signing parameters with CI/CD by @jpraynaud in #1815
  • Fix Signer make test command errors by @dlachaume in #1817
  • Fix: Explorer keep previous error until refresh in cardano transaction certification modal by @Alenar in #1824
  • Fix: missing configuration in terraform deployment action in CI/CD by @jpraynaud in #1821
  • Rotate documentation for 2428 distribution by @jpraynaud in #1823
  • Update CHANGELOG for 2428.0 distribution release by @jpraynaud in #1827
  • Respin testing-sanchonet with Cardano 9.0.0 by @jpraynaud in #1829
  • Bugfix: Block range computation ignored last block range & last block range if it finished with empty blocks by @Alenar in #1820
  • Fix formatting error in Mithril Signer node documentation by @dlachaume in #1831
  • Remove task::block_in_place in transaction importer by @Alenar in #1805
  • Ensemble/1792/non blocking artifact production in aggregator by @sfauvel in #1828
  • Add metrics table in the "Activate Prometheus endpoint" section by @dlachaume in #1833
  • Make upper bound of ChainReaderBlockStreamer inclusive by @Alenar in #1835
  • Ensemble/1825/cleanup immutable file in cardano transation by @sfauvel in #1838
  • Make deprecated beacon field optional in Certificate & CertificateList messages by @Alenar in #1839
  • fix: Resource not Reset when given back to Pool by @jpraynaud in #1848
  • Replace BlockNumber alias with dedicated structure by @Alenar in #1846
  • fix: ChainReader fails on find_intersect_point without agency by @jpraynaud in #1852
  • fix: clippy warnings with Rust 1.80.0 by @jpraynaud in #1857
  • Support Cardano node 9.1.0 by @jpraynaud in #1856
  • Replace SlotNumber alias with dedicated structure by @sfauvel in #1854
  • Upgrade infrastructure deployment with disk configurations by @jpraynaud in #1850
  • Upgrade release-mainnet aggregator VM data disk by @jpraynaud in #1859
  • Upgrade Rust dependencies by @jpraynaud in #1858
  • Update CHANGELOG for 2430 distribution release by @jpraynaud in #1860

Full Changelog: 2428.0...2430.0

Crates Versions

Crate Version
mithril-aggregator 0.5.50
mithril-client 0.8.10
mithril-client-cli 0.9.9
mithril-client-wasm 0.3.8
mithril-common 0.4.38
mithril-signer 0.2.170
mithril-stm 0.3.26

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview
testing-sanchonet

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️