Releases: input-output-hk/mithril
Mithril v2403.1
Highlights:
- Public release of Mithril client library in WASM available for developers on npmjs.com.
- Rollout of new
pallasbased chain observer in signer and aggregator. - Support for Cardano
8.7.3in the signer and the aggregator.
What's Changed
- Deploy P2P network infrastructure by @jpraynaud in #1363
- Add goodbye message for signer node by @dlachaumepalo in #1362
- Fix
dev-previewnetwork protocol parameters by @jpraynaud in #1369 - Update current documentation for
2347distribution by @jpraynaud in #1367 - Fix crates.io release credentials by @jpraynaud in #1370
- Announce Mithril client library is released by @jpraynaud in #1371
- Fix
mithril-commonpublication on crates.io by @jpraynaud in #1372 - enhance mithril/cardano node communication by @falcucci in #1348
- Fix verbosity log levels by @dlachaumepalo in #1373
- Add timeout on signer node HTTP requests by @dlachaumepalo in #1374
- HTTP message service handles signed entities by @ghubertpalo in #1366
- Upgrade dependencies by @jpraynaud in #1376
- Fix explorer switch aggregator infinite loop by @jpraynaud in #1378
- Implement manual crates publication workflow by @jpraynaud in #1382
- Add
fullfeature tomithril-commonby @jpraynaud in #1383 - Adapt
mithril-clientandmithril-commonto compile in WASM by @jpraynaud in #1368 - Make mithril-client examples full crates by @dlachaumepalo in #1379
- Create dummies for SignedEntities by @dlachaumepalo in #1386
- Fix
mithril-clientdependencies by @jpraynaud in #1391 - Greg/1357/upgrade sqlite by @ghubertpalo in #1392
- Fix broken links in documentation by @sfauvel in #1394
- Implement Mithril client WASM API by @jpraynaud in #1389
- Refactor
mithril-client-cliusingmithril-clientlibrary by @dlachaumepalo in #1395 - Fix breaking change introduced with
mithril-client-cliusingmithril-clientlibrary by @dlachaumepalo in #1398 - Upgrade dependencies by @jpraynaud in #1399
- Add toggle for network deployment in CI by @jpraynaud in #1402
- Implement
open_messagetimeout in aggregator by @jpraynaud in #1401 - Enhance machine readable logs in client by @dlachaumepalo in #1400
- Support for configurable signed entity types in aggregator by @jpraynaud in #1412
- Add toggle for unstable release publication in CI by @jpraynaud in #1415
- Implement manual
npmpublication workflow by @jpraynaud in #1414 - Fix toggle for unstable release publication in CI by @jpraynaud in #1416
- Simplify
mithril-clientCLI by @dlachaumepalo in #1413 - Rust version 1.75.0: fix cargo clippy warning & update dependencies by @dlachaumepalo in #1420
- Activate Cardano node P2P mode in infrastructure by @jpraynaud in #1417
- Fix signer service recommended configuration by @dlachaumepalo in #1419
- Implement tests for WASM library by @dlachaumepalo in #1418
- Update new signer configuration blog post by @dlachaumepalo in #1421
- Implement configurable Chain Observer in aggregator by @jpraynaud in #1423
- Implement mithril client wasm in explorer by @dlachaumepalo in #1426
- Activate
babbage/conwayeras indevnetby @jpraynaud in #1427 - Upgrade
testing-previewVM in infra by @jpraynaud in #1429 - Update
ci.ymlafter the deletion ofdoc.ymlby @dlachaumepalo in #1432 - Upgrade Cardano node to
8.7.3by @jpraynaud in #1430 - Fix
devnetto run consistently on mac OS by @jpraynaud in #1433 - Use
CardanoChainera reader in end to end test by @jpraynaud in #1431 - Fix Docker registry for Cardano node by @jpraynaud in #1440
- Fix Cardano configuration in infrastructure by @jpraynaud in #1442
- Fix path on command by @albertodvp in #1438
- Remove contact form in the documentation website by @jpraynaud in #1443
- Support
CardanoTransactionssigned entity type by @jpraynaud in #1437 - Warn missing docs directive missing in Mithril Client Cli by @Alenar in #1444
- Greg/1397/fake aggregator by @ghubertpalo in #1422
- Upgrade dependencies by @jpraynaud in #1445
- Implement fake aggregator in wasm tests by @dlachaumepalo in #1441
- Fix
2803pre-release distribution by @jpraynaud in #1447
New Contributors
- @falcucci made their first contribution in #1348
- @sfauvel made their first contribution in #1394
- @albertodvp made their first contribution in #1438
Full Changelog: 2347.0...2403.1
Crates Versions
| Crate | Version |
|---|---|
| mithril-aggregator | 0.4.27 |
| mithril-aggregator-fake | 0.1.1 |
| mithril-client | 0.5.17 |
| mithril-client-cli | 0.5.17 |
| mithril-client-wasm | 0.1.6 |
| mithril-common | 0.2.152 |
| mithril-signer | 0.2.103 |
| mithril-stm | 0.3.14 |
Networks Compatibility ⚠️
| Network | Compatible |
|---|---|
| release-mainnet | ✔ |
| release-preprod | ✔ |
| pre-release-preview | ✔ |
| testing-preview | ✔ |
Linux Requirements
The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>" - there is a li...
Mithril v2403.1-pre
Highlights:
- Release of client library in WASM.
- Rollout of new
pallasbased chain observer in signer and aggregator. - Support for Cardano
8.7.3in the signer and the aggregator.
What's Changed
- Deploy P2P network infrastructure by @jpraynaud in #1363
- Add goodbye message for signer node by @dlachaumepalo in #1362
- Fix
dev-previewnetwork protocol parameters by @jpraynaud in #1369 - Update current documentation for
2347distribution by @jpraynaud in #1367 - Fix crates.io release credentials by @jpraynaud in #1370
- Announce Mithril client library is released by @jpraynaud in #1371
- Fix
mithril-commonpublication on crates.io by @jpraynaud in #1372 - enhance mithril/cardano node communication by @falcucci in #1348
- Fix verbosity log levels by @dlachaumepalo in #1373
- Add timeout on signer node HTTP requests by @dlachaumepalo in #1374
- HTTP message service handles signed entities by @ghubertpalo in #1366
- Upgrade dependencies by @jpraynaud in #1376
- Fix explorer switch aggregator infinite loop by @jpraynaud in #1378
- Implement manual crates publication workflow by @jpraynaud in #1382
- Add
fullfeature tomithril-commonby @jpraynaud in #1383 - Adapt
mithril-clientandmithril-commonto compile in WASM by @jpraynaud in #1368 - Make mithril-client examples full crates by @dlachaumepalo in #1379
- Create dummies for SignedEntities by @dlachaumepalo in #1386
- Fix
mithril-clientdependencies by @jpraynaud in #1391 - Greg/1357/upgrade sqlite by @ghubertpalo in #1392
- Fix broken links in documentation by @sfauvel in #1394
- Implement Mithril client WASM API by @jpraynaud in #1389
- Refactor
mithril-client-cliusingmithril-clientlibrary by @dlachaumepalo in #1395 - Fix breaking change introduced with
mithril-client-cliusingmithril-clientlibrary by @dlachaumepalo in #1398 - Upgrade dependencies by @jpraynaud in #1399
- Add toggle for network deployment in CI by @jpraynaud in #1402
- Implement
open_messagetimeout in aggregator by @jpraynaud in #1401 - Enhance machine readable logs in client by @dlachaumepalo in #1400
- Support for configurable signed entity types in aggregator by @jpraynaud in #1412
- Add toggle for unstable release publication in CI by @jpraynaud in #1415
- Implement manual
npmpublication workflow by @jpraynaud in #1414 - Fix toggle for unstable release publication in CI by @jpraynaud in #1416
- Simplify
mithril-clientCLI by @dlachaumepalo in #1413 - Rust version 1.75.0: fix cargo clippy warning & update dependencies by @dlachaumepalo in #1420
- Activate Cardano node P2P mode in infrastructure by @jpraynaud in #1417
- Fix signer service recommended configuration by @dlachaumepalo in #1419
- Implement tests for WASM library by @dlachaumepalo in #1418
- Update new signer configuration blog post by @dlachaumepalo in #1421
- Implement configurable Chain Observer in aggregator by @jpraynaud in #1423
- Implement mithril client wasm in explorer by @dlachaumepalo in #1426
- Activate
babbage/conwayeras indevnetby @jpraynaud in #1427 - Upgrade
testing-previewVM in infra by @jpraynaud in #1429 - Update
ci.ymlafter the deletion ofdoc.ymlby @dlachaumepalo in #1432 - Upgrade Cardano node to
8.7.3by @jpraynaud in #1430 - Fix
devnetto run consistently on mac OS by @jpraynaud in #1433 - Use
CardanoChainera reader in end to end test by @jpraynaud in #1431 - Fix Docker registry for Cardano node by @jpraynaud in #1440
- Fix Cardano configuration in infrastructure by @jpraynaud in #1442
- Fix path on command by @albertodvp in #1438
- Remove contact form in the documentation website by @jpraynaud in #1443
- Support
CardanoTransactionssigned entity type by @jpraynaud in #1437 - Warn missing docs directive missing in Mithril Client Cli by @Alenar in #1444
- Greg/1397/fake aggregator by @ghubertpalo in #1422
- Upgrade dependencies by @jpraynaud in #1445
- Implement fake aggregator in wasm tests by @dlachaumepalo in #1441
- Fix
2803pre-release distribution by @jpraynaud in #1447
New Contributors
- @falcucci made their first contribution in #1348
- @sfauvel made their first contribution in #1394
- @albertodvp made their first contribution in #1438
Full Changelog: 2347.0...2403.1-pre
Crates Versions
| Crate | Version |
|---|---|
| mithril-aggregator | 0.4.27 |
| mithril-aggregator-fake | 0.1.1 |
| mithril-client | 0.5.17 |
| mithril-client-cli | 0.5.17 |
| mithril-client-wasm | 0.1.6 |
| mithril-common | 0.2.152 |
| mithril-signer | 0.2.103 |
| mithril-stm | 0.3.14 |
Networks Compatibility ⚠️
| Network | Compatible |
|---|---|
| release-mainnet | ⛔ |
| release-preprod | ⛔ |
| pre-release-preview | ✔ |
| testing-preview | ✔ |
Linux Requirements
The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>" - there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you...
Mithril v2403.0-pre
Highlights:
- Release of client library in WASM.
- Rollout of new
pallasbased chain observer in signer and aggregator. - Support for Cardano
8.7.3in the signer and the aggregator.
What's Changed
- Deploy P2P network infrastructure by @jpraynaud in #1363
- Add goodbye message for signer node by @dlachaumepalo in #1362
- Fix
dev-previewnetwork protocol parameters by @jpraynaud in #1369 - Update current documentation for
2347distribution by @jpraynaud in #1367 - Fix crates.io release credentials by @jpraynaud in #1370
- Announce Mithril client library is released by @jpraynaud in #1371
- Fix
mithril-commonpublication on crates.io by @jpraynaud in #1372 - enhance mithril/cardano node communication by @falcucci in #1348
- Fix verbosity log levels by @dlachaumepalo in #1373
- Add timeout on signer node HTTP requests by @dlachaumepalo in #1374
- HTTP message service handles signed entities by @ghubertpalo in #1366
- Upgrade dependencies by @jpraynaud in #1376
- Fix explorer switch aggregator infinite loop by @jpraynaud in #1378
- Implement manual crates publication workflow by @jpraynaud in #1382
- Add
fullfeature tomithril-commonby @jpraynaud in #1383 - Adapt
mithril-clientandmithril-commonto compile in WASM by @jpraynaud in #1368 - Make mithril-client examples full crates by @dlachaumepalo in #1379
- Create dummies for SignedEntities by @dlachaumepalo in #1386
- Fix
mithril-clientdependencies by @jpraynaud in #1391 - Greg/1357/upgrade sqlite by @ghubertpalo in #1392
- Fix broken links in documentation by @sfauvel in #1394
- Implement Mithril client WASM API by @jpraynaud in #1389
- Refactor
mithril-client-cliusingmithril-clientlibrary by @dlachaumepalo in #1395 - Fix breaking change introduced with
mithril-client-cliusingmithril-clientlibrary by @dlachaumepalo in #1398 - Upgrade dependencies by @jpraynaud in #1399
- Add toggle for network deployment in CI by @jpraynaud in #1402
- Implement
open_messagetimeout in aggregator by @jpraynaud in #1401 - Enhance machine readable logs in client by @dlachaumepalo in #1400
- Support for configurable signed entity types in aggregator by @jpraynaud in #1412
- Add toggle for unstable release publication in CI by @jpraynaud in #1415
- Implement manual
npmpublication workflow by @jpraynaud in #1414 - Fix toggle for unstable release publication in CI by @jpraynaud in #1416
- Simplify
mithril-clientCLI by @dlachaumepalo in #1413 - Rust version 1.75.0: fix cargo clippy warning & update dependencies by @dlachaumepalo in #1420
- Activate Cardano node P2P mode in infrastructure by @jpraynaud in #1417
- Fix signer service recommended configuration by @dlachaumepalo in #1419
- Implement tests for WASM library by @dlachaumepalo in #1418
- Update new signer configuration blog post by @dlachaumepalo in #1421
- Implement configurable Chain Observer in aggregator by @jpraynaud in #1423
- Implement mithril client wasm in explorer by @dlachaumepalo in #1426
- Activate
babbage/conwayeras indevnetby @jpraynaud in #1427 - Upgrade
testing-previewVM in infra by @jpraynaud in #1429 - Update
ci.ymlafter the deletion ofdoc.ymlby @dlachaumepalo in #1432 - Upgrade Cardano node to
8.7.3by @jpraynaud in #1430 - Fix
devnetto run consistently on mac OS by @jpraynaud in #1433 - Use
CardanoChainera reader in end to end test by @jpraynaud in #1431 - Fix Docker registry for Cardano node by @jpraynaud in #1440
- Fix Cardano configuration in infrastructure by @jpraynaud in #1442
- Fix path on command by @albertodvp in #1438
- Remove contact form in the documentation website by @jpraynaud in #1443
- Support
CardanoTransactionssigned entity type by @jpraynaud in #1437 - Warn missing docs directive missing in Mithril Client Cli by @Alenar in #1444
- Greg/1397/fake aggregator by @ghubertpalo in #1422
- Upgrade dependencies by @jpraynaud in #1445
- Implement fake aggregator in wasm tests by @dlachaumepalo in #1441
New Contributors
- @falcucci made their first contribution in #1348
- @sfauvel made their first contribution in #1394
- @albertodvp made their first contribution in #1438
Full Changelog: 2347.0...2403.0-pre
Crates Versions
| Crate | Version |
|---|---|
| mithril-aggregator | 0.4.27 |
| mithril-aggregator-fake | 0.1.1 |
| mithril-client | 0.5.17 |
| mithril-client-cli | 0.5.17 |
| mithril-client-wasm | 0.1.6 |
| mithril-common | 0.2.152 |
| mithril-signer | 0.2.103 |
| mithril-stm | 0.3.14 |
Networks Compatibility ⚠️
| Network | Compatible |
|---|---|
| release-mainnet | ⛔ |
| release-preprod | ⛔ |
| pre-release-preview | ✔ |
| testing-preview | ✔ |
Linux Requirements
The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>" - there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity o...
Mithril v2347.0
Highlights
- Public release of the Mithril client library available for developers on crates.io.
- Support for slim certificates produced by the Mithril aggregator (1).
- Bug fixes and performance improvements.
(1): requires Mithril client (a.k.a mithril-client-cli) 0.5.5+ for restoration
What's Changed
- Aggregator keyreg bottleneck by @Alenar in #1295
- Update current documentation by @jpraynaud in #1307
- Add missing configuration parameters in signer documentation by @jpraynaud in #1317
- Explorer certificates list & signers summary by @Alenar in #1309
- rework client to export mithril API by @ghubertpalo in #1291
- Handle sqlite access using a ConnectionWithFullMutex by @Alenar in #1316
- total_stake calculation corrected by @curiecrypt in #1308
- Fix aggregator HTTP server CORS by @jpraynaud in #1318
- add soft limit in certificate query by @ghubertpalo in #1314
- Simplify certificate verifier usage by @Alenar in #1319
- Rename
mithril-clienttomithril-client-cliby @Alenar in #1320 - Client regressions in snapshot list and download by @dlachaumepalo in #1323
- Enhance Mithril nodes
devnetDocker images by @jpraynaud in #1324 - Fix
devnetcrashing at startup by @jpraynaud in #1329 - Fix client CLI Docker package name in CI/CD by @jpraynaud in #1330
- Revert "add soft limit in certificate query" by @ghubertpalo in #1328
- Add Mithril end to end instructions for
--skip-cardano-bin-downloadcommand by @dlachaumepalo in #1331 - Greg/1310/lower serialization by @ghubertpalo in #1333
- Fix certificate chain hashes recomputation by @jpraynaud in #1337
- Enhance end to end readme and fix
work_directorydefault value on MacOS by @dlachaumepalo in #1338 - Add SSH key by @dlachaumepalo in #1339
- Add linebreak after last ssh key by @dlachaumepalo in #1340
- Redesign mithril client api by @Alenar in #1332
- Add subnote and git command for unstable release by @dlachaumepalo in #1334
- Fix github action contains expression by @dlachaumepalo in #1342
- Simplify common deps by @Alenar in #1341
- Fix certificate hashes re-computation in aggregator by @jpraynaud in #1345
- enhance Aggregator REST API performances by @ghubertpalo in #1347
- Mithril client and common crates preparation for publication by @jpraynaud in #1349
- Upgrade dependencies by @jpraynaud in #1351
- Mithril relay P2P network for signatures PoC by @jpraynaud in #1346
- Use Cardano node custom version CI/CD by @jpraynaud in #1359
- Manual deployment of test Mithril network by @jpraynaud in #1358
- Runbooks for test distributions and deployments by @jpraynaud in #1360
- HTTP message service by @ghubertpalo in #1353
- Mithril-client-lib: Gate snapshot download & message computation behind a feature by @Alenar in #1344
- Fix Mithril relay Rust doc by @jpraynaud in #1364
- Standardize default environment file path of Signer node configuration for SPOs by @dlachaumepalo in #1365
Full Changelog: 2342.0...2347.0
Crates Versions
| Crate | Version |
|---|---|
| mithril-aggregator | 0.4.12 |
| mithril-client | 0.5.7 |
| mithril-client-cli | 0.5.5 |
| mithril-common | 0.2.135 |
| mithril-signer | 0.2.90 |
| mithril-stm | 0.3.10 |
Networks Compatibility ⚠️
| Network | Compatible |
|---|---|
| release-mainnet | ✔ |
| release-preprod | ✔ |
| pre-release-preview | ✔ |
| testing-preview | ✔ |
Linux Requirements
The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>" - there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️
Mithril v2347.0-pre
Highlights
- Public release of the Mithril client library available for developers.
- Support for slim certificates produced by the Mithril aggregator (1).
- Bug fixes and performance improvements.
(1): requires Mithril client (a.k.a mithril-client-cli) 0.5.5+ for restoration
What's Changed
- Aggregator keyreg bottleneck by @Alenar in #1295
- Update current documentation by @jpraynaud in #1307
- Add missing configuration parameters in signer documentation by @jpraynaud in #1317
- Explorer certificates list & signers summary by @Alenar in #1309
- rework client to export mithril API by @ghubertpalo in #1291
- Handle sqlite access using a ConnectionWithFullMutex by @Alenar in #1316
- total_stake calculation corrected by @curiecrypt in #1308
- Fix aggregator HTTP server CORS by @jpraynaud in #1318
- add soft limit in certificate query by @ghubertpalo in #1314
- Simplify certificate verifier usage by @Alenar in #1319
- Rename
mithril-clienttomithril-client-cliby @Alenar in #1320 - Client regressions in snapshot list and download by @dlachaumepalo in #1323
- Enhance Mithril nodes
devnetDocker images by @jpraynaud in #1324 - Fix
devnetcrashing at startup by @jpraynaud in #1329 - Fix client CLI Docker package name in CI/CD by @jpraynaud in #1330
- Revert "add soft limit in certificate query" by @ghubertpalo in #1328
- Add Mithril end to end instructions for
--skip-cardano-bin-downloadcommand by @dlachaumepalo in #1331 - Greg/1310/lower serialization by @ghubertpalo in #1333
- Fix certificate chain hashes recomputation by @jpraynaud in #1337
- Enhance end to end readme and fix
work_directorydefault value on MacOS by @dlachaumepalo in #1338 - Add SSH key by @dlachaumepalo in #1339
- Add linebreak after last ssh key by @dlachaumepalo in #1340
- Redesign mithril client api by @Alenar in #1332
- Add subnote and git command for unstable release by @dlachaumepalo in #1334
- Fix github action contains expression by @dlachaumepalo in #1342
- Simplify common deps by @Alenar in #1341
- Fix certificate hashes re-computation in aggregator by @jpraynaud in #1345
- enhance Aggregator REST API performances by @ghubertpalo in #1347
- Mithril client and common crates preparation for publication by @jpraynaud in #1349
- Upgrade dependencies by @jpraynaud in #1351
- Mithril relay P2P network for signatures PoC by @jpraynaud in #1346
- Use Cardano node custom version CI/CD by @jpraynaud in #1359
- Manual deployment of test Mithril network by @jpraynaud in #1358
- Runbooks for test distributions and deployments by @jpraynaud in #1360
- HTTP message service by @ghubertpalo in #1353
- Mithril-client-lib: Gate snapshot download & message computation behind a feature by @Alenar in #1344
- Fix Mithril relay Rust doc by @jpraynaud in #1364
- Standardize default environment file path of Signer node configuration for SPOs by @dlachaumepalo in #1365
Full Changelog: 2342.0...2347.0-pre
Crates Versions
| Crate | Version |
|---|---|
| mithril-aggregator | 0.4.12 |
| mithril-client | 0.5.7 |
| mithril-client-cli | 0.5.5 |
| mithril-common | 0.2.135 |
| mithril-signer | 0.2.90 |
| mithril-stm | 0.3.10 |
Networks Compatibility ⚠️
| Network | Compatible |
|---|---|
| release-mainnet | ⛔ |
| release-preprod | ⛔ |
| pre-release-preview | ✔ |
| testing-preview | ✔ |
Linux Requirements
The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>" - there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️
Mithril v2342.0
Highlights
- Support for SPO tickers displayed next to their pool Ids in the Mithril explorer.
- Support for producing slim Docker images for the Mithril nodes.
- Bug fixes and performance improvements.
What's Changed
- Implement anyhow context in aggregator runtime by @dlachaumepalo in #1240
- Implement anyhow context in aggregator/services by @dlachaumepalo in #1242
- Implement anyhow context in aggregator/signer_register by @dlachaumepalo in #1243
- Implement anyhow context in aggregator/snapshotter by @dlachaumepalo in #1246
- refactored aggregator client errors by @ghubertpalo in #1245
- refactored client configuration errors by @ghubertpalo in #1248
- Use anyhow in aggregator
multi-signerby @jpraynaud in #1247 - refactor common sqlite errors by @ghubertpalo in #1249
- Add anyhow context mithril-client/aggregator-client by @dlachaumepalo in #1250
- Add anyhow context in mithril-client/commands by @dlachaumepalo in #1252
- Add anyhow context in mithril-client/dependencies by @dlachaumepalo in #1253
- Fix aggregator stress test bottleneck with client traffic by @jpraynaud in #1251
- Use anyhow in signer
single-signerby @jpraynaud in #1255 - Update current documentation by @jpraynaud in #1258
- Fix terraform composite action by @jpraynaud in #1259
- Add anyhow context for mithril-client/services by @dlachaumepalo in #1256
- remove store error by @ghubertpalo in #1257
- Fix explorer display units by @jpraynaud in #1261
- Get rid of string error comparison in tests by @dlachaumepalo in #1260
- Add errors standards ADR by @jpraynaud in #1266
- Add anyhow in integration & e2e tests by @Alenar in #1264
- Enhance signer setup guide for SPO by @jpraynaud in #1263
- Use source attribute in wrapped errors by @Alenar in #1268
- Add a JSON message response on /aggregator endpoint calls by @dlachaumepalo in #1270
- Benchmark aggregator performances by @jpraynaud in #1271
- Upgrade dependencies by @jpraynaud in #1275
- Add Mithril networks status page in website footer by @jpraynaud in #1278
- Add signers ticker automatic import process +
/signers/tickersroute to aggregator http server by @Alenar in #1276 - Deploy infrastructure for SPO tickers by @jpraynaud in #1279
- Update
flake.lockby @yvan-sraka in #1281 - SPO tickers in explorer by @Alenar in #1280
- Upgrade Rust
1.73.0by @jpraynaud in #1285 - Cache
/signers/tickerscalls in explorer by @Alenar in #1286 - Prettier formatter for explorer by @Alenar in #1288
- Upgrade dependencies by @dlachaumepalo in #1289
- Fix
mithril-stmWASM build by @jpraynaud in #1290 - Infrastructure VM upgrade runbook by @jpraynaud in #1293
- Rename GPG public key in releases by @jpraynaud in #1294
- Mithril relay security advisory dev blog post by @jpraynaud in #1296
- Fix missing aggregator configuration in
devnetby @jpraynaud in #1297 - Fix typo in relay security advisory dev blog post by @jpraynaud in #1301
- Publish multiple packages to
crates.ioby @jpraynaud in #1299 - Upgrade dependencies by @jpraynaud in #1304
- Update contributing guidelines by @jpraynaud in #1305
- Refactor Dockerfile.ci to slim containers by @TrevorBenson in #1302
New Contributors
- @TrevorBenson made their first contribution in #1302
Full Changelog: 2337.0...2342.0
Crates Versions
| Crate | Version |
|---|---|
| mithril-aggregator | 0.3.111 |
| mithril-client | 0.4.12 |
| mithril-common | 0.2.126 |
| mithril-signer | 0.2.87 |
| mithril-stm | 0.3.8 |
Networks Compatibility ⚠️
| Network | Compatible |
|---|---|
| release-mainnet | ✔ |
| release-preprod | ✔ |
| pre-release-preview | ✔ |
| testing-preview | ✔ |
Linux Requirements
The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>" - there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️
Mithril v2342.0-pre
Highlights
- Support for SPO tickers displayed next to their pool Ids in the Mithril explorer.
- Support for producing slim Docker images for the Mithril nodes.
- Bug fixes and performance improvements.
What's Changed
- Implement anyhow context in aggregator runtime by @dlachaumepalo in #1240
- Implement anyhow context in aggregator/services by @dlachaumepalo in #1242
- Implement anyhow context in aggregator/signer_register by @dlachaumepalo in #1243
- Implement anyhow context in aggregator/snapshotter by @dlachaumepalo in #1246
- refactored aggregator client errors by @ghubertpalo in #1245
- refactored client configuration errors by @ghubertpalo in #1248
- Use anyhow in aggregator
multi-signerby @jpraynaud in #1247 - refactor common sqlite errors by @ghubertpalo in #1249
- Add anyhow context mithril-client/aggregator-client by @dlachaumepalo in #1250
- Add anyhow context in mithril-client/commands by @dlachaumepalo in #1252
- Add anyhow context in mithril-client/dependencies by @dlachaumepalo in #1253
- Fix aggregator stress test bottleneck with client traffic by @jpraynaud in #1251
- Use anyhow in signer
single-signerby @jpraynaud in #1255 - Update current documentation by @jpraynaud in #1258
- Fix terraform composite action by @jpraynaud in #1259
- Add anyhow context for mithril-client/services by @dlachaumepalo in #1256
- remove store error by @ghubertpalo in #1257
- Fix explorer display units by @jpraynaud in #1261
- Get rid of string error comparison in tests by @dlachaumepalo in #1260
- Add errors standards ADR by @jpraynaud in #1266
- Add anyhow in integration & e2e tests by @Alenar in #1264
- Enhance signer setup guide for SPO by @jpraynaud in #1263
- Use source attribute in wrapped errors by @Alenar in #1268
- Add a JSON message response on /aggregator endpoint calls by @dlachaumepalo in #1270
- Benchmark aggregator performances by @jpraynaud in #1271
- Upgrade dependencies by @jpraynaud in #1275
- Add Mithril networks status page in website footer by @jpraynaud in #1278
- Add signers ticker automatic import process +
/signers/tickersroute to aggregator http server by @Alenar in #1276 - Deploy infrastructure for SPO tickers by @jpraynaud in #1279
- Update
flake.lockby @yvan-sraka in #1281 - SPO tickers in explorer by @Alenar in #1280
- Upgrade Rust
1.73.0by @jpraynaud in #1285 - Cache
/signers/tickerscalls in explorer by @Alenar in #1286 - Prettier formatter for explorer by @Alenar in #1288
- Upgrade dependencies by @dlachaumepalo in #1289
- Fix
mithril-stmWASM build by @jpraynaud in #1290 - Infrastructure VM upgrade runbook by @jpraynaud in #1293
- Rename GPG public key in releases by @jpraynaud in #1294
- Mithril relay security advisory dev blog post by @jpraynaud in #1296
- Fix missing aggregator configuration in
devnetby @jpraynaud in #1297 - Fix typo in relay security advisory dev blog post by @jpraynaud in #1301
- Publish multiple packages to
crates.ioby @jpraynaud in #1299 - Upgrade dependencies by @jpraynaud in #1304
- Update contributing guidelines by @jpraynaud in #1305
- Refactor Dockerfile.ci to slim containers by @TrevorBenson in #1302
New Contributors
- @TrevorBenson made their first contribution in #1302
Full Changelog: 2337.0...2342.0-pre
Crates Versions
| Crate | Version |
|---|---|
| mithril-aggregator | 0.3.111 |
| mithril-client | 0.4.12 |
| mithril-common | 0.2.126 |
| mithril-signer | 0.2.87 |
| mithril-stm | 0.3.8 |
Networks Compatibility ⚠️
| Network | Compatible |
|---|---|
| release-mainnet | ⛔ |
| release-preprod | ⛔ |
| pre-release-preview | ✔ |
| testing-preview | ✔ |
Linux Requirements
The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>" - there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️
Mithril v2337.0
Highlights
- Support for
zstandardcompression algorithm for creating snapshot archives (1). - Support for Cardano node version used to create archive in the snapshot metadata.
- Support for recording download statistics in the aggregator.
(1): requires Mithril client 0.4.2+ for restoration
What's Changed
- Use zstandard compression for snapshot archives by @Alenar in #1195
- Fix Mithril network compatibility in
unstablerelease by @jpraynaud in #1196 - Add anyhow context for api_version by @dlachaumepalo in #1201
- Implement anyhow context for beacon_provider by @dlachaumepalo in #1202
- Update current documentation for distribution
2335.0by @jpraynaud in #1204 - Implement anyhow context for certificate chain by @dlachaumepalo in #1205
- Add Cardano Node version to the artifacts by @ghubertpalo in #1203
- Stress test aggregator phase 2 by @jpraynaud in #1194
- add database migration for snapshots by @ghubertpalo in #1209
- Add snapshot archive compression algorithm in explorer by @jpraynaud in #1210
- display cardano node version in client by @ghubertpalo in #1211
- Enhance aggregator stress tester performances by @jpraynaud in #1214
- Greg/947/cardano node version doc by @ghubertpalo in #1216
- compare for avk by @curiecrypt in #1217
- Implement anyhow context in mithril-common database by @dlachaumepalo in #1212
- Implement anyhow context for adapters by @dlachaumepalo in #1221
- Use anyhow in Era framework by @ghubertpalo in #1223
- refacto message parts by @ghubertpalo in #1225
- Use compression parameters in the terraform deployments by @jpraynaud in #1222
- Implement anyhow context in mithril-aggregator database by @dlachaumepalo in #1213
- Implement anyhow context for signable_builder by @dlachaumepalo in #1226
- Implement anyhow for common store by @dlachaumepalo in #1227
- Add aggregator CDN support in infrastructure by @jpraynaud in #1206
- Implement anyhow context for digesters by @dlachaumepalo in #1228
- Implement anyhow context for common/protocol by @dlachaumepalo in #1229
- Upgrade dependencies by @jpraynaud in #1231
- Implement anyhow context for artifact builder by @dlachaumepalo in #1232
- Use anyhow in
common/crypto_helperby @jpraynaud in #1224 - Implement anyhow context for aggregator configuration by @dlachaumepalo in #1236
- Implement anyhow context: dependency_injection by @dlachaumepalo in #1237
- Upgrade client version to
0.4.0by @jpraynaud in #1241 - Greg/1127/download statistics by @ghubertpalo in #1239
- Fix record download statistics by @jpraynaud in #1244
Full Changelog: 2335.0...2337.0
Crates Versions
| Crate | Version |
|---|---|
| mithril-aggregator | 0.3.95 |
| mithril-client | 0.4.2 |
| mithril-common | 0.2.115 |
| mithril-signer | 0.2.80 |
| mithril-stm | 0.3.3 |
Networks Compatibility ⚠️
| Network | Compatible |
|---|---|
| release-mainnet | ✔ |
| release-preprod | ✔ |
| pre-release-preview | ✔ |
| testing-preview | ✔ |
Linux Requirements
The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>" - there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️
Mithril v2337.0-pre
Highlights
- Support for
zstandardcompression algorithm for creating snapshot archives (1). - Support for Cardano node version used to create archive in the snapshot metadata.
- Support for recording download statistics in the aggregator.
(1): requires Mithril client 0.4.2+ for restoration
What's Changed
- Use zstandard compression for snapshot archives by @Alenar in #1195
- Fix Mithril network compatibility in
unstablerelease by @jpraynaud in #1196 - Add anyhow context for api_version by @dlachaumepalo in #1201
- Implement anyhow context for beacon_provider by @dlachaumepalo in #1202
- Update current documentation for distribution
2335.0by @jpraynaud in #1204 - Implement anyhow context for certificate chain by @dlachaumepalo in #1205
- Add Cardano Node version to the artifacts by @ghubertpalo in #1203
- Stress test aggregator phase 2 by @jpraynaud in #1194
- add database migration for snapshots by @ghubertpalo in #1209
- Add snapshot archive compression algorithm in explorer by @jpraynaud in #1210
- display cardano node version in client by @ghubertpalo in #1211
- Enhance aggregator stress tester performances by @jpraynaud in #1214
- Greg/947/cardano node version doc by @ghubertpalo in #1216
- compare for avk by @curiecrypt in #1217
- Implement anyhow context in mithril-common database by @dlachaumepalo in #1212
- Implement anyhow context for adapters by @dlachaumepalo in #1221
- Use anyhow in Era framework by @ghubertpalo in #1223
- refacto message parts by @ghubertpalo in #1225
- Use compression parameters in the terraform deployments by @jpraynaud in #1222
- Implement anyhow context in mithril-aggregator database by @dlachaumepalo in #1213
- Implement anyhow context for signable_builder by @dlachaumepalo in #1226
- Implement anyhow for common store by @dlachaumepalo in #1227
- Add aggregator CDN support in infrastructure by @jpraynaud in #1206
- Implement anyhow context for digesters by @dlachaumepalo in #1228
- Implement anyhow context for common/protocol by @dlachaumepalo in #1229
- Upgrade dependencies by @jpraynaud in #1231
- Implement anyhow context for artifact builder by @dlachaumepalo in #1232
- Use anyhow in
common/crypto_helperby @jpraynaud in #1224 - Implement anyhow context for aggregator configuration by @dlachaumepalo in #1236
- Implement anyhow context: dependency_injection by @dlachaumepalo in #1237
- Upgrade client version to
0.4.0by @jpraynaud in #1241 - Greg/1127/download statistics by @ghubertpalo in #1239
- Fix record download statistics by @jpraynaud in #1244
Full Changelog: 2335.0...2337.0-pre
Crates Versions
| Crate | Version |
|---|---|
| mithril-aggregator | 0.3.95 |
| mithril-client | 0.4.2 |
| mithril-common | 0.2.115 |
| mithril-signer | 0.2.80 |
| mithril-stm | 0.3.3 |
Networks Compatibility ⚠️
| Network | Compatible |
|---|---|
| release-mainnet | ⛔ |
| release-preprod | ⛔ |
| pre-release-preview | ✔ |
| testing-preview | ✔ |
Linux Requirements
The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>" - there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️
Mithril v2335.0
Highlights
- Support of simultaneous snapshot archive download and decompression in the client.
- Support of the
snapshot download latestcommand in client to download the latest snapshot easily. - Support of machine readable progress information in the client when used with
--jsonoption. - Mithril networks compatibility table automatically appended to the releases notes.
What's Changed
- TW review of references.md by @olgahryniuk in #1134
- ECS-3077 Apply style guide, tighten some sentences. by @NeilBurgess42 in #1130
- ECS-3078 review certificates.md, the description of the certificate c… by @NeilBurgess42 in #1135
- ECS-3079 Review simulation document, apply style guide, some suggesti… by @NeilBurgess42 in #1136
- ECS-3111 Apply style guide, minor changes. by @NeilBurgess42 in #1143
- TW review of: aggregator.md & signer.md by @olgahryniuk in #1145
- ECS-3112 Review architecture.md, apply style guide. by @NeilBurgess42 in #1144
- ECS-3115 Review client.md, apply IOG style guide. by @NeilBurgess42 in #1146
- Better unpack error in client by @jpraynaud in #1148
- Reorganize docs folder by @jpraynaud in #1150
- Implement prometheus monitor for end to end tests by @jpraynaud in #1139
- Upgrade explorer to next 13 by @Alenar in #1149
- Add network production runbooks for Aggregator by @jpraynaud in #1086
- Registered signers page to explorer by @Alenar in #1157
- Download latest snapshot & stake distribution if
latestis mentioned in Mithril Client commands by @dlachaumepalo in #1110 - fnv/core verifier by @curiecrypt in #939
- ECS-3156 Review glossary. Adjust capitalization and bolding. by @NeilBurgess42 in #1158
- StdResult and StdError as anyhow alias by @Alenar in #1162
- Protocol key for Operational Certificate by @dlachaumepalo in #1161
- Upgrade dependencies by @Alenar in #1163
- Protocol key for verification key signature by @dlachaumepalo in #1164
- Regression on signer registration by @Alenar in #1166
- Simplify logs by @Alenar in #1165
- Protocol key for genesis keys by @dlachaumepalo in #1167
- Fix broken
.#hydraJobs.x86_64-linux.mithril-end-to-endby @yvan-sraka in #1168 - Call Aggregator API to verify Signer registration by @dlachaumepalo in #1169
- Protocol key for AVK by @Alenar in #1170
- Protocol key for era keys by @Alenar in #1171
- Client snapshot download progress with json output by @Alenar in #1172
- Fix run-signer-node doc by @dlachaumepalo in #1175
- Rust version 1.72.0 : fix cargo clippy warning & update dependencies by @dlachaumepalo in #1176
- Add network compatiblity table to autogenerated releases by @Alenar in #1177
- Fix network compatibility table generation by @Alenar in #1180
- Replace
git switchwithgit checkoutin docs by @dlachaumepalo in #1178 - Fix verify archive in aggregator Snapshotter by @jpraynaud in #1179
- Fix latest digest usage in documentation by @jpraynaud in #1182
- Fix flaky end to end test by @jpraynaud in #1181
- Download unpack snapshots simultaneously by @Alenar in #1183
- Aggregator stress test refactoring by @jpraynaud in #1186
- Fix disk space warning not displayed in client by @jpraynaud in #1192
- Add common error: CodecError by @dlachaumepalo in #1193
- Upgrade ed25519-dalek to v2 by @Alenar in #1189
New Contributors
- @NeilBurgess42 made their first contribution in #1130
- @yvan-sraka made their first contribution in #1168
Full Changelog: 2331.1...2335.0
Crates Versions
| Crate | Version |
|---|---|
| mithril-aggregator | 0.3.76 |
| mithril-client | 0.3.38 |
| mithril-common | 0.2.100 |
| mithril-signer | 0.2.72 |
| mithril-stm | 0.3.1 |
Networks Compatibility ⚠️
| Network | Compatible |
|---|---|
| release-mainnet | ✔ |
| release-preprod | ✔ |
| pre-release-preview | ✔ |
| testing-preview | ✔ |
Linux Requirements
The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>" - there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️