Skip to content

Mithril v2524.0

Latest
Compare
Choose a tag to compare
@github-actions github-actions released this 16 Jun 13:06
· 221 commits to main since this release
2524.0
7bf7033

Highlights

  • Support for Cardano node 10.4.1 in the signer and the aggregator
  • Support for recording client types origin (library, CLI and WASM) in the aggregator metrics.
  • Unstable support for UTxO-HD snapshot converter tools utxo-hd snapshot-converter command in client CLI.
  • Unstable support for partial cardano database restoration in cardano-database command with --backend v2 parameter.
  • Bug fixes and performance improvements.

What's Changed

  • Fix: websites vulnerabilities by @jpraynaud in #2453
  • test(ci): add ancillary verification key and include ancillary option in Mithril Client multi-platform test workflow by @dlachaume in #2457
  • Chore: cleanup snapshot_store_type by @dlachaume in #2456
  • Optimize signer and aggregator state machines run interval by @Alenar in #2454
  • Fix: better error handling for era reader adapter parameters in infra by @jpraynaud in #2452
  • Docs: rotate documentation for 2517 distribution by @jpraynaud in #2445
  • Docs: final CHANGELOG for 2517.0 distribution by @jpraynaud in #2462
  • Docs: add dev blog post for distribution 2517 by @jpraynaud in #2463
  • Update examples with separate ancillary download & fix post cdbv2 immutables restored statistic by @Alenar in #2449
  • Feat: extend documentation tool for subcommand configurations by @dlachaume in #2455
  • Fix: Apply hot fix for client restoration by @dlachaume in #2466
  • Set correct package name for mithril-client-cli by @noonio in #2465
  • Docs: add dev blog post for client breaking changes in 2517 by @jpraynaud in #2467
  • Docs: add dev blog post for client security advisory by @jpraynaud in #2469
  • Feat: implement signature publisher decorators in signer by @dlachaume in #2468
  • Aggregator: Re-implement the CloudBackendUploader with gcloud-storage crate by @Alenar in #2475
  • Add warning in client about ancillary files by @turmelclem in #2473
  • Chore: update testing ssh keys by @jpraynaud in #2479
  • aggregator: fix setting public access to files uploaded to GCP storage by @Alenar in #2480
  • Docs: update dev blog post for Cardano DB v2 activation by @jpraynaud in #2482
  • Test: add Cardano node startup check to Mithril Client multi-platform test workflow by @dlachaume in #2476
  • Fix: improve error handling in mithril-install script by @dlachaume in #2481
  • chore: anticipate rust 1.87 by @Alenar in #2483
  • Feat: implement a signature processor for DMQ by @jpraynaud in #2477
  • Fix: include the two latest ledger state snapshots in the ancillary archive by @dlachaume in #2484
  • Organize STM - Module participant by @curiecrypt in #2412
  • Test: execute full workspace tests on macOS/Windows excluding unsupported packages by @dlachaume in #2485
  • Docs: clarify networks supported Cardano node versions by @jpraynaud in #2496
  • Record signatures origin in the signature processor by @turmelclem in #2489
  • Fix: Simplify TestHttpServer Drop logic to prevent test flakiness by @dlachaume in #2495
  • Fix: chain reader client cache drop on error by @jpraynaud in #2501
  • feat: read ancillary verification key from both clap arguments and configuration files by @turmelclem in #2499
  • feat: add ancillary verification key in client-cli configuration files by @turmelclem in #2512
  • feat: cleanup unexpected files in immutable folder after download by @Alenar in #2502
  • Fix: display missing logs in Mithril Client multi-platform test by @dlachaume in #2513
  • fix(client-cli): improve message format about fast boostrap by @turmelclem in #2514
  • fix: check of unexpected file too eager on all network except devnet by @Alenar in #2517
  • fix: missing 00000 immutable files with Cardano DB v2 by @jpraynaud in #2520
  • feat: support in memory UTxO-HD ledger state snapshots by @Alenar in #2521
  • Feat: support Cardano node 10.4 by @jpraynaud in #2498
  • fix(ci): reactivate Darwin x86_64 build in Hydra CI by @jpraynaud in #2538
  • Chore: update dependencies for distribution 2524 by @jpraynaud in #2544
  • Organize STM - Module Single Signature by @curiecrypt in #2545
  • Organize STM - Module Aggregate Signature by @curiecrypt in #2548
  • Feat: add mithril-client CLI command for UTxO-HD ledger state snapshot conversion by @dlachaume in #2518
  • Record usage of client type in metrics by @turmelclem in #2546
  • chore(infra): update ssh key for 'testing' by @turmelclem in #2555
  • client-cli: merge cardano-database-v2 command into 'v1' command by @Alenar in #2547
  • fix(ci): temporary enforce softprops/action-gh-release v2.2.2 by @Alenar in #2559
  • Allow new header client type by @turmelclem in #2558
  • Feat: documentation and CI tests for UTxO-HD ledger state snapshot conversion mithril-client CLI command by @dlachaume in #2554
  • client-lib/client-cli: calibrate max parallel dl by @Alenar in #2561
  • docs: update CHANGELOG for 2524.0 distribution release by @jpraynaud in #2562

New Contributors

Full Changelog: 2517.1...2524.0

Crates Versions

Crate Version
mithril-aggregator 0.7.58
mithril-client 0.12.11
mithril-client-cli 0.12.11
mithril-client-wasm 0.9.1
mithril-common 0.5.35
mithril-signer 0.2.249
mithril-stm 0.4.2

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Distributions Compatibility ⚠️

Compatibility mithril-signer mithril-client
2517.1 ✔️ ✔️
2517.0 ✔️ ✔️
2513.0 ✔️
2506.0 ✔️
2450.0 ✔️

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.35+ installed.
Compatible systems include, but are not limited to, Ubuntu 22.04+ or Debian 12+ (Bookworm)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 73FC 4C3D FD55 DBDC 428A D2B5 BE04 3B79 FDA4 C2EE
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️