Releases: lightninglabs/chantools
v0.7.0
Changelog
- Update to
lnd v0.11.1-betato make the channel DB compatible. - Add
removechannelcommand.
Verifying the Release
In order to verify the release, you'll need to have gpg or gpg2 installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import guggero's key from keybase:
curl https://keybase.io/guggero/pgp_keys.asc | gpg --import
You should now be able to list all of gugger's keys:
gpg --list-keys --with-subkey-fingerprints F4FC70F07310028424EFC20A8E4256593F177720
Once you have his PGP key you can verify the release (assuming manifest-v0.7.0.txt.asc is in the current directory) with:
gpg --verify manifest-v0.7.0.txt.asc
You should see the following if the verification was successful:
gpg: Signature made Mi 29 Jul 2020 14:59:19 CEST
gpg: using RSA key 6E01EEC9656903B0542B8F1003DB6322267C373B
gpg: Good signature from "Oliver Gugger <[email protected]>" [ultimate]
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Make sure the key used for the signature is listed in the output of the gpg --list-keys command from above.
Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes (which are
cat manifest-v0.7.0.txt
One can use the shasum -a 256 <file name here> tool in order to re-compute the sha256 hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
Finally, you can also verify the tag itself with the following command:
git verify-tag v0.7.0
v0.6.0
Changelog
- Allow specifying the seed/passphrase/wallet password through environment variables to make automation of
chantooltasks easier. See new section about seed input in the main README.
Verifying the Release
In order to verify the release, you'll need to have gpg or gpg2 installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import guggero's key from keybase:
curl https://keybase.io/guggero/pgp_keys.asc | gpg --import
You should now be able to list all of gugger's keys:
gpg --list-keys --with-subkey-fingerprints F4FC70F07310028424EFC20A8E4256593F177720
Once you have his PGP key you can verify the release (assuming manifest-v0.6.0.txt.asc is in the current directory) with:
gpg --verify manifest-v0.6.0.txt.asc
You should see the following if the verification was successful:
gpg: Signature made Mi 29 Jul 2020 14:59:19 CEST
gpg: using RSA key 6E01EEC9656903B0542B8F1003DB6322267C373B
gpg: Good signature from "Oliver Gugger <[email protected]>" [ultimate]
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Make sure the key used for the signature is listed in the output of the gpg --list-keys command from above.
Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes (which are
cat manifest-v0.6.0.txt
One can use the shasum -a 256 <file name here> tool in order to re-compute the sha256 hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
Finally, you can also verify the tag itself with the following command:
git verify-tag v0.6.0
v0.5.1
Changelog
- Skip nil buckets in
compactdbto possibly recover corrupted DB.
Verifying the Release
In order to verify the release, you'll need to have gpg or gpg2 installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import guggero's key from keybase:
curl https://keybase.io/guggero/pgp_keys.asc | gpg --import
You should now be able to list all of gugger's keys:
gpg --list-keys --with-subkey-fingerprints F4FC70F07310028424EFC20A8E4256593F177720
Once you have his PGP key you can verify the release (assuming manifest-v0.5.1.txt.asc is in the current directory) with:
gpg --verify manifest-v0.5.1.txt.asc
You should see the following if the verification was successful:
gpg: Signature made Mi 29 Jul 2020 14:59:19 CEST
gpg: using RSA key 6E01EEC9656903B0542B8F1003DB6322267C373B
gpg: Good signature from "Oliver Gugger <[email protected]>" [ultimate]
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Make sure the key used for the signature is listed in the output of the gpg --list-keys command from above.
Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes (which are
cat manifest-v0.5.1.txt
One can use the shasum -a 256 <file name here> tool in order to re-compute the sha256 hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
Finally, you can also verify the tag itself with the following command:
git verify-tag v0.5.1
v0.5.0
Changelog
- Add
sweeptimelockmanualcommand.
Verifying the Release
In order to verify the release, you'll need to have gpg or gpg2 installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import guggero's key from keybase:
curl https://keybase.io/guggero/pgp_keys.asc | gpg --import
You should now be able to list all of gugger's keys:
gpg --list-keys --with-subkey-fingerprints F4FC70F07310028424EFC20A8E4256593F177720
Once you have his PGP key you can verify the release (assuming manifest-v0.5.0.txt.asc is in the current directory) with:
gpg --verify manifest-v0.5.0.txt.asc
You should see the following if the verification was successful:
gpg: Signature made Mi 29 Jul 2020 14:59:19 CEST
gpg: using RSA key 6E01EEC9656903B0542B8F1003DB6322267C373B
gpg: Good signature from "Oliver Gugger <[email protected]>" [ultimate]
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Make sure the key used for the signature is listed in the output of the gpg --list-keys command from above.
Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes (which are
cat manifest-v0.5.0.txt
One can use the shasum -a 256 <file name here> tool in order to re-compute the sha256 hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
Finally, you can also verify the tag itself with the following command:
git verify-tag v0.5.0
v0.4.1
Changelog
- Fix a bug that caused the
--confirmedchannelpointparameter inrescuefundingto be ignored.
Verifying the Release
In order to verify the release, you'll need to have gpg or gpg2 installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import guggero's key from keybase:
curl https://keybase.io/guggero/pgp_keys.asc | gpg --import
You should now be able to list all of gugger's keys:
gpg --list-keys --with-subkey-fingerprints F4FC70F07310028424EFC20A8E4256593F177720
Once you have his PGP key you can verify the release (assuming manifest-v0.4.1.txt.asc is in the current directory) with:
gpg --verify manifest-v0.4.1.txt.asc
You should see the following if the verification was successful:
gpg: Signature made Mi 29 Jul 2020 14:59:19 CEST
gpg: using RSA key 6E01EEC9656903B0542B8F1003DB6322267C373B
gpg: Good signature from "Oliver Gugger <[email protected]>" [ultimate]
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Make sure the key used for the signature is listed in the output of the gpg --list-keys command from above.
Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes (which are
cat manifest-v0.4.1.txt
One can use the shasum -a 256 <file name here> tool in order to re-compute the sha256 hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
v0.4.0
Changelog
- Add
rescuefundingandsignrescuefundingcommands.
Verifying the Release
In order to verify the release, you'll need to have gpg or gpg2 installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import guggero's key from keybase:
curl https://keybase.io/guggero/pgp_keys.asc | gpg --import
Once you have his PGP key you can verify the release (assuming manifest-v0.4.0.txt.asc is in the current directory) with:
gpg --verify manifest-v0.4.0.txt.asc
You should see the following if the verification was successful:
gpg: Signature made Mi 29 Jul 2020 14:59:19 CEST
gpg: using RSA key 6E01EEC9656903B0542B8F1003DB6322267C373B
gpg: Good signature from "Oliver Gugger <[email protected]>" [ultimate]
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes (which are
cat manifest-v0.4.0.txt
One can use the shasum -a 256 <file name here> tool in order to re-compute the sha256 hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
Finally, you can also verify the tag itself with the following command:
git verify-tag v0.4.0
v0.3.0
Changelog
- Extracted some additional functions so they can be used as a library.
- Added BIP39 key derivation to
derivekeyandshowrootkeycommands. - Documented default recovery scenario.
- Added testnet support for
genimportscriptcommand. - Remove numbers, dots and spaces from
lnd's aezeed phrase so it can easily be copy/pasted fromlnd's output. - Add
vanitygencommand. - Add closed channels to
dumpchannelscommand.
Verifying the Release
In order to verify the release, you'll need to have gpg or gpg2 installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import guggero's key from keybase:
curl https://keybase.io/guggero/pgp_keys.asc | gpg --import
Once you have his PGP key you can verify the release (assuming manifest-v0.3.0.txt.asc is in the current directory) with:
gpg --verify manifest-v0.3.0.txt.asc
You should see the following if the verification was successful:
gpg: Signature made Mi 29 Jul 2020 14:59:19 CEST
gpg: using RSA key 6E01EEC9656903B0542B8F1003DB6322267C373B
gpg: Good signature from "Oliver Gugger <[email protected]>" [ultimate]
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes (which are
cat manifest-v0.3.0.txt
One can use the shasum -a 256 <file name here> tool in order to re-compute the sha256 hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
Finally, you can also verify the tag itself with the following command:
git verify-tag v0.3.0
First official release with binaries
Version v0.2.0 is the first version with pre-built binaries for most operating systems. No more building the tool from source is required.