Skip to content

Releases: input-output-hk/mithril

Mithril v2412.0-pre

22 Mar 13:31
2e462c0
Compare
Choose a tag to compare
Mithril v2412.0-pre Pre-release
Pre-release

Highlights

  • ⚠️ Deprecated 'snapshot' command in the Mithril client CLI:
    • Renamed to cardano-db snapshot.
    • Will be removed in a near future.
  • Support for Prometheus endpoint for metrics in signer (setup guide).
  • Full support for chain observer with Pallas in signer and aggregator.
  • Support for Cardano node 8.9.0 in the signer and the aggregator.
  • Bug fixes and performance improvements.

What's Changed

  • Adapt multi platform test for Cardano transactions by @dlachaumepalo in #1518
  • Fix end to end test flakiness in CI by @jpraynaud in #1486
  • Rotate documentation by @dlachaumepalo in #1527
  • Unified temp dir builder by @Alenar in #1529
  • Add dev blog post for mithril-client-cli output update by @dlachaumepalo in #1532
  • Add runbook for 'Mithril client multi-platform test' by @dlachaumepalo in #1534
  • Fix runbook broken link by @dlachaumepalo in #1539
  • Document Mithril signer footprint in SPO Setup guide by @jpraynaud in #1538
  • Reorganize crates by @Alenar in #1540
  • Stabilize namings cardano transactions by @dlachaumepalo in #1542
  • Improve aggregator HTTP server tests by @dlachaumepalo in #1543
  • Activate metrics endpoint on signer by @jpraynaud in #1544
  • Upgrade dependencies by @dlachaumepalo in #1547
  • Fix signature related metrics name in signer by @jpraynaud in #1548
  • Add new npm package step dedicated to release process (latest tag) by @dlachaumepalo in #1545
  • Replacement of serde_cbor dependency by ciborium dependency by @dlachaumepalo in #1549
  • Send aggregator logs in the right output (stdout / stderr) by @dlachaumepalo in #1550
  • Support download binaries for macOS in E2E test by @dlachaumepalo in #1551
  • Cardano Transactions Snapshots/Certification in explorer by @Alenar in #1553
  • Fix parsing Cardano Conway transactions from immutable files by @jpraynaud in #1563
  • feat: implement and calculate the current key period using pallas by @falcucci in #1541
  • Enhance Cardano transaction part in mithril-client-wasm/www by @dlachaumepalo in #1555
  • Use pallas hardano transactions parser by @sfauvel in #1564
  • Reduce Prometheus scrape interval in infra by @jpraynaud in #1565
  • Handle pallas-hardano parsing errors by @dlachaumepalo in #1566
  • Fix E2E flakiness when transferring funds by @jpraynaud in #1568
  • Explorer: Improve Cardano Transaction Certification & Certificate Chain Validation UI by @Alenar in #1569
  • Rename moria Discord channel to ask-mithril by @jpraynaud in #1574
  • Support Cardano node 8.9.0 by @jpraynaud in #1509
  • Fix Cardano configurations in infra by @jpraynaud in #1575
  • Provide latest immutable file number with certified ctx by @sfauvel in #1571
  • feat: refactor get_kes_period to create isolated new queries by @falcucci in #1576
  • Fix SPO on-boarding guide by @jpraynaud in #1579
  • Fix minimum Squid version in SPO guide by @jpraynaud in #1580
  • Add ssh key by @sfauvel in #1578
  • Accept existing but empty db dir for client-cli cardano-db download by @Alenar in #1581
  • Implement Block range merkelization for Cardano transactions by @jpraynaud in #1560
  • Establish a more explicit security policy by @ch1bo in #1582
  • Upgrade dependencies by @jpraynaud in #1584

New Contributors

Full Changelog: 2408.0...2412.0-pre

Crates Versions

Crate Version
mithril-aggregator 0.4.49
mithril-client 0.6.9
mithril-client-cli 0.7.6
mithril-client-wasm 0.2.5
mithril-common 0.3.21
mithril-signer 0.2.116
mithril-stm 0.3.17

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview
testing-sanchonet

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2408.0

26 Feb 13:46
5afc6fc
Compare
Choose a tag to compare

Highlights

  • ⚠️ Breaking change introduced in the Mithril client CLI: the logs output are switched from stdout to stderr from version 0.7.0.
  • Support for stake distribution and Mithril era markers retrieval in the Pallas chain observer in signer and aggregator.
  • Enhanced support for Conway era and Sanchonet network.
  • Bug fixes and performance improvements.

What's Changed

  • Fix npm authentication to registry in CI by @jpraynaud in #1448
  • Fix mithril-client wasm basic JS code example by @dlachaumepalo in #1449
  • Specify explicitly permissions for prerelease creation by @Alenar in #1452
  • Rotate current documentation by @dlachaumepalo in #1446
  • Increment mithril-client-wasm version for npm publish by @dlachaumepalo in #1453
  • Add dev blog post to announce Mithril client npm package by @jpraynaud in #1454
  • Gather and store Cardano transactions from immutable files by @jpraynaud in #1451
  • Fix npm badge in mithril-client-wasm README files by @dlachaumepalo in #1458
  • Compute message to sign for Cardano transactions by @jpraynaud in #1455
  • Fix missing test data in nix flake build by @jpraynaud in #1461
  • Enhance end to end test for Cardano hard forks by @jpraynaud in #1459
  • Fix building mithril-common with some features and targets combinatory by @Alenar in #1463
  • Failed end to end tests artifact names by @jpraynaud in #1472
  • List immutables resilience by @Alenar in #1465
  • Implement CardanoTransactions proof generation route in aggregator by @jpraynaud in #1473
  • Add mithril-client-wasm tests in multi platform test by @dlachaumepalo in #1462
  • Clean www/ directory by @dlachaumepalo in #1477
  • Update dependencies by @Alenar in #1476
  • Implement CardanoTransactions artifact routes in aggregator by @jpraynaud in #1479
  • Certificate hash in transaction set message by @Alenar in #1485
  • More explicit error message when db dir is not writable by @abailly-iohk in #1483
  • Remove http from dependencies by @Alenar in #1490
  • Support Sanchonet Cardano network by @jpraynaud in #1384
  • Add Cardano transactions proofs support to mithril-client by @Alenar in #1489
  • Fix clippy lint from rust 1.76 by @Alenar in #1493
  • Sfa/improve signed entity test by @sfauvel in #1460
  • Add dev blog post announcing testing-sanchonet network by @jpraynaud in #1491
  • Minor adjustments to generic identifier descriptions by @olgahryniuk in #1498
  • Extract persistence related code to a new shared crate by @Alenar in #1494
  • get datums using pallas observer by @falcucci in #1403
  • Cardano transaction sets & proof in client cli by @Alenar in #1501
  • Update Mithril architecture documentation by @jpraynaud in #1499
  • Fix clippy warning in common when using only fs flag by @Alenar in #1504
  • Upgrade Cardano configurations in infra by @jpraynaud in #1505
  • Add signing capabilities to aggregator root route by @dlachaumepalo in #1506
  • Update SPO-on-boarding-guide.md, it's not required (anymore?) to run … by @brouwerQ in #1507
  • Add example crate for Cardano transactions by @dlachaumepalo in #1511
  • Generate documentation on module command lines by @sfauvel in #1424
  • Implement Cardano transactions verification in mithril-client-wasm by @dlachaumepalo in #1512
  • Mithril client CLI: fix remove archive directory by @dlachaumepalo in #1517
  • Enhance client-cli standard output by @Alenar in #1516
  • add pallas stake snapshots integration by @falcucci in #1513
  • CI: Upgrade actions by @Alenar in #1521
  • Fix update_release action version in CI by @Alenar in #1525
  • Upgrade mithril-client-wasm minor version to 0.2.0 by @dlachaumepalo in #1526

New Contributors

Full Changelog: 2403.1...2408.0

Crates Versions

Crate Version
mithril-aggregator 0.4.39
mithril-client 0.6.4
mithril-client-cli 0.7.0
mithril-client-wasm 0.2.0
mithril-common 0.3.7
mithril-signer 0.2.109
mithril-stm 0.3.15

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2408.0-pre

23 Feb 09:52
5afc6fc
Compare
Choose a tag to compare
Mithril v2408.0-pre Pre-release
Pre-release

Highlights

  • ⚠️ Breaking change introduced in the Mithril client CLI: the logs output are switched from stdout to stderr from version 0.7.0.
  • Support for stake distribution and Mithril era markers retrieval in the Pallas chain observer in signer and aggregator.
  • Enhanced support for Conway era and Sanchonet network.
  • Bug fixes and performance improvements.

What's Changed

  • Fix npm authentication to registry in CI by @jpraynaud in #1448
  • Fix mithril-client wasm basic JS code example by @dlachaumepalo in #1449
  • Specify explicitly permissions for prerelease creation by @Alenar in #1452
  • Rotate current documentation by @dlachaumepalo in #1446
  • Increment mithril-client-wasm version for npm publish by @dlachaumepalo in #1453
  • Add dev blog post to announce Mithril client npm package by @jpraynaud in #1454
  • Gather and store Cardano transactions from immutable files by @jpraynaud in #1451
  • Fix npm badge in mithril-client-wasm README files by @dlachaumepalo in #1458
  • Compute message to sign for Cardano transactions by @jpraynaud in #1455
  • Fix missing test data in nix flake build by @jpraynaud in #1461
  • Enhance end to end test for Cardano hard forks by @jpraynaud in #1459
  • Fix building mithril-common with some features and targets combinatory by @Alenar in #1463
  • Failed end to end tests artifact names by @jpraynaud in #1472
  • List immutables resilience by @Alenar in #1465
  • Implement CardanoTransactions proof generation route in aggregator by @jpraynaud in #1473
  • Add mithril-client-wasm tests in multi platform test by @dlachaumepalo in #1462
  • Clean www/ directory by @dlachaumepalo in #1477
  • Update dependencies by @Alenar in #1476
  • Implement CardanoTransactions artifact routes in aggregator by @jpraynaud in #1479
  • Certificate hash in transaction set message by @Alenar in #1485
  • More explicit error message when db dir is not writable by @abailly-iohk in #1483
  • Remove http from dependencies by @Alenar in #1490
  • Support Sanchonet Cardano network by @jpraynaud in #1384
  • Add Cardano transactions proofs support to mithril-client by @Alenar in #1489
  • Fix clippy lint from rust 1.76 by @Alenar in #1493
  • Sfa/improve signed entity test by @sfauvel in #1460
  • Add dev blog post announcing testing-sanchonet network by @jpraynaud in #1491
  • Minor adjustments to generic identifier descriptions by @olgahryniuk in #1498
  • Extract persistence related code to a new shared crate by @Alenar in #1494
  • get datums using pallas observer by @falcucci in #1403
  • Cardano transaction sets & proof in client cli by @Alenar in #1501
  • Update Mithril architecture documentation by @jpraynaud in #1499
  • Fix clippy warning in common when using only fs flag by @Alenar in #1504
  • Upgrade Cardano configurations in infra by @jpraynaud in #1505
  • Add signing capabilities to aggregator root route by @dlachaumepalo in #1506
  • Update SPO-on-boarding-guide.md, it's not required (anymore?) to run … by @brouwerQ in #1507
  • Add example crate for Cardano transactions by @dlachaumepalo in #1511
  • Generate documentation on module command lines by @sfauvel in #1424
  • Implement Cardano transactions verification in mithril-client-wasm by @dlachaumepalo in #1512
  • Mithril client CLI: fix remove archive directory by @dlachaumepalo in #1517
  • Enhance client-cli standard output by @Alenar in #1516
  • add pallas stake snapshots integration by @falcucci in #1513
  • CI: Upgrade actions by @Alenar in #1521
  • Fix update_release action version in CI by @Alenar in #1525
  • Upgrade mithril-client-wasm minor version to 0.2.0 by @dlachaumepalo in #1526

New Contributors

Full Changelog: 2403.1...2408.0-pre

Crates Versions

Crate Version
mithril-aggregator 0.4.39
mithril-client 0.6.4
mithril-client-cli 0.7.0
mithril-client-wasm 0.2.0
mithril-common 0.3.7
mithril-signer 0.2.109
mithril-stm 0.3.15

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2403.1

23 Jan 11:03
254d266
Compare
Choose a tag to compare

Highlights:

  • Public release of Mithril client library in WASM available for developers on npmjs.com.
  • Rollout of new pallas based chain observer in signer and aggregator.
  • Support for Cardano 8.7.3 in the signer and the aggregator.

What's Changed

  • Deploy P2P network infrastructure by @jpraynaud in #1363
  • Add goodbye message for signer node by @dlachaumepalo in #1362
  • Fix dev-preview network protocol parameters by @jpraynaud in #1369
  • Update current documentation for 2347 distribution by @jpraynaud in #1367
  • Fix crates.io release credentials by @jpraynaud in #1370
  • Announce Mithril client library is released by @jpraynaud in #1371
  • Fix mithril-common publication on crates.io by @jpraynaud in #1372
  • enhance mithril/cardano node communication by @falcucci in #1348
  • Fix verbosity log levels by @dlachaumepalo in #1373
  • Add timeout on signer node HTTP requests by @dlachaumepalo in #1374
  • HTTP message service handles signed entities by @ghubertpalo in #1366
  • Upgrade dependencies by @jpraynaud in #1376
  • Fix explorer switch aggregator infinite loop by @jpraynaud in #1378
  • Implement manual crates publication workflow by @jpraynaud in #1382
  • Add full feature to mithril-common by @jpraynaud in #1383
  • Adapt mithril-client and mithril-common to compile in WASM by @jpraynaud in #1368
  • Make mithril-client examples full crates by @dlachaumepalo in #1379
  • Create dummies for SignedEntities by @dlachaumepalo in #1386
  • Fix mithril-client dependencies by @jpraynaud in #1391
  • Greg/1357/upgrade sqlite by @ghubertpalo in #1392
  • Fix broken links in documentation by @sfauvel in #1394
  • Implement Mithril client WASM API by @jpraynaud in #1389
  • Refactor mithril-client-cli using mithril-client library by @dlachaumepalo in #1395
  • Fix breaking change introduced with mithril-client-cli using mithril-client library by @dlachaumepalo in #1398
  • Upgrade dependencies by @jpraynaud in #1399
  • Add toggle for network deployment in CI by @jpraynaud in #1402
  • Implement open_message timeout in aggregator by @jpraynaud in #1401
  • Enhance machine readable logs in client by @dlachaumepalo in #1400
  • Support for configurable signed entity types in aggregator by @jpraynaud in #1412
  • Add toggle for unstable release publication in CI by @jpraynaud in #1415
  • Implement manual npm publication workflow by @jpraynaud in #1414
  • Fix toggle for unstable release publication in CI by @jpraynaud in #1416
  • Simplify mithril-client CLI by @dlachaumepalo in #1413
  • Rust version 1.75.0: fix cargo clippy warning & update dependencies by @dlachaumepalo in #1420
  • Activate Cardano node P2P mode in infrastructure by @jpraynaud in #1417
  • Fix signer service recommended configuration by @dlachaumepalo in #1419
  • Implement tests for WASM library by @dlachaumepalo in #1418
  • Update new signer configuration blog post by @dlachaumepalo in #1421
  • Implement configurable Chain Observer in aggregator by @jpraynaud in #1423
  • Implement mithril client wasm in explorer by @dlachaumepalo in #1426
  • Activate babbage/conway eras in devnet by @jpraynaud in #1427
  • Upgrade testing-preview VM in infra by @jpraynaud in #1429
  • Update ci.yml after the deletion of doc.yml by @dlachaumepalo in #1432
  • Upgrade Cardano node to 8.7.3 by @jpraynaud in #1430
  • Fix devnet to run consistently on mac OS by @jpraynaud in #1433
  • Use CardanoChain era reader in end to end test by @jpraynaud in #1431
  • Fix Docker registry for Cardano node by @jpraynaud in #1440
  • Fix Cardano configuration in infrastructure by @jpraynaud in #1442
  • Fix path on command by @albertodvp in #1438
  • Remove contact form in the documentation website by @jpraynaud in #1443
  • Support CardanoTransactions signed entity type by @jpraynaud in #1437
  • Warn missing docs directive missing in Mithril Client Cli by @Alenar in #1444
  • Greg/1397/fake aggregator by @ghubertpalo in #1422
  • Upgrade dependencies by @jpraynaud in #1445
  • Implement fake aggregator in wasm tests by @dlachaumepalo in #1441
  • Fix 2803 pre-release distribution by @jpraynaud in #1447

New Contributors

Full Changelog: 2347.0...2403.1

Crates Versions

Crate Version
mithril-aggregator 0.4.27
mithril-aggregator-fake 0.1.1
mithril-client 0.5.17
mithril-client-cli 0.5.17
mithril-client-wasm 0.1.6
mithril-common 0.2.152
mithril-signer 0.2.103
mithril-stm 0.3.14

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a li...
Read more

Mithril v2403.1-pre

19 Jan 13:18
254d266
Compare
Choose a tag to compare
Mithril v2403.1-pre Pre-release
Pre-release

Highlights:

  • Release of client library in WASM.
  • Rollout of new pallas based chain observer in signer and aggregator.
  • Support for Cardano 8.7.3 in the signer and the aggregator.

What's Changed

  • Deploy P2P network infrastructure by @jpraynaud in #1363
  • Add goodbye message for signer node by @dlachaumepalo in #1362
  • Fix dev-preview network protocol parameters by @jpraynaud in #1369
  • Update current documentation for 2347 distribution by @jpraynaud in #1367
  • Fix crates.io release credentials by @jpraynaud in #1370
  • Announce Mithril client library is released by @jpraynaud in #1371
  • Fix mithril-common publication on crates.io by @jpraynaud in #1372
  • enhance mithril/cardano node communication by @falcucci in #1348
  • Fix verbosity log levels by @dlachaumepalo in #1373
  • Add timeout on signer node HTTP requests by @dlachaumepalo in #1374
  • HTTP message service handles signed entities by @ghubertpalo in #1366
  • Upgrade dependencies by @jpraynaud in #1376
  • Fix explorer switch aggregator infinite loop by @jpraynaud in #1378
  • Implement manual crates publication workflow by @jpraynaud in #1382
  • Add full feature to mithril-common by @jpraynaud in #1383
  • Adapt mithril-client and mithril-common to compile in WASM by @jpraynaud in #1368
  • Make mithril-client examples full crates by @dlachaumepalo in #1379
  • Create dummies for SignedEntities by @dlachaumepalo in #1386
  • Fix mithril-client dependencies by @jpraynaud in #1391
  • Greg/1357/upgrade sqlite by @ghubertpalo in #1392
  • Fix broken links in documentation by @sfauvel in #1394
  • Implement Mithril client WASM API by @jpraynaud in #1389
  • Refactor mithril-client-cli using mithril-client library by @dlachaumepalo in #1395
  • Fix breaking change introduced with mithril-client-cli using mithril-client library by @dlachaumepalo in #1398
  • Upgrade dependencies by @jpraynaud in #1399
  • Add toggle for network deployment in CI by @jpraynaud in #1402
  • Implement open_message timeout in aggregator by @jpraynaud in #1401
  • Enhance machine readable logs in client by @dlachaumepalo in #1400
  • Support for configurable signed entity types in aggregator by @jpraynaud in #1412
  • Add toggle for unstable release publication in CI by @jpraynaud in #1415
  • Implement manual npm publication workflow by @jpraynaud in #1414
  • Fix toggle for unstable release publication in CI by @jpraynaud in #1416
  • Simplify mithril-client CLI by @dlachaumepalo in #1413
  • Rust version 1.75.0: fix cargo clippy warning & update dependencies by @dlachaumepalo in #1420
  • Activate Cardano node P2P mode in infrastructure by @jpraynaud in #1417
  • Fix signer service recommended configuration by @dlachaumepalo in #1419
  • Implement tests for WASM library by @dlachaumepalo in #1418
  • Update new signer configuration blog post by @dlachaumepalo in #1421
  • Implement configurable Chain Observer in aggregator by @jpraynaud in #1423
  • Implement mithril client wasm in explorer by @dlachaumepalo in #1426
  • Activate babbage/conway eras in devnet by @jpraynaud in #1427
  • Upgrade testing-preview VM in infra by @jpraynaud in #1429
  • Update ci.yml after the deletion of doc.yml by @dlachaumepalo in #1432
  • Upgrade Cardano node to 8.7.3 by @jpraynaud in #1430
  • Fix devnet to run consistently on mac OS by @jpraynaud in #1433
  • Use CardanoChain era reader in end to end test by @jpraynaud in #1431
  • Fix Docker registry for Cardano node by @jpraynaud in #1440
  • Fix Cardano configuration in infrastructure by @jpraynaud in #1442
  • Fix path on command by @albertodvp in #1438
  • Remove contact form in the documentation website by @jpraynaud in #1443
  • Support CardanoTransactions signed entity type by @jpraynaud in #1437
  • Warn missing docs directive missing in Mithril Client Cli by @Alenar in #1444
  • Greg/1397/fake aggregator by @ghubertpalo in #1422
  • Upgrade dependencies by @jpraynaud in #1445
  • Implement fake aggregator in wasm tests by @dlachaumepalo in #1441
  • Fix 2803 pre-release distribution by @jpraynaud in #1447

New Contributors

Full Changelog: 2347.0...2403.1-pre

Crates Versions

Crate Version
mithril-aggregator 0.4.27
mithril-aggregator-fake 0.1.1
mithril-client 0.5.17
mithril-client-cli 0.5.17
mithril-client-wasm 0.1.6
mithril-common 0.2.152
mithril-signer 0.2.103
mithril-stm 0.3.14

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you...
Read more

Mithril v2403.0-pre

19 Jan 10:09
31cd6e2
Compare
Choose a tag to compare
Mithril v2403.0-pre Pre-release
Pre-release

Highlights:

  • Release of client library in WASM.
  • Rollout of new pallas based chain observer in signer and aggregator.
  • Support for Cardano 8.7.3 in the signer and the aggregator.

What's Changed

  • Deploy P2P network infrastructure by @jpraynaud in #1363
  • Add goodbye message for signer node by @dlachaumepalo in #1362
  • Fix dev-preview network protocol parameters by @jpraynaud in #1369
  • Update current documentation for 2347 distribution by @jpraynaud in #1367
  • Fix crates.io release credentials by @jpraynaud in #1370
  • Announce Mithril client library is released by @jpraynaud in #1371
  • Fix mithril-common publication on crates.io by @jpraynaud in #1372
  • enhance mithril/cardano node communication by @falcucci in #1348
  • Fix verbosity log levels by @dlachaumepalo in #1373
  • Add timeout on signer node HTTP requests by @dlachaumepalo in #1374
  • HTTP message service handles signed entities by @ghubertpalo in #1366
  • Upgrade dependencies by @jpraynaud in #1376
  • Fix explorer switch aggregator infinite loop by @jpraynaud in #1378
  • Implement manual crates publication workflow by @jpraynaud in #1382
  • Add full feature to mithril-common by @jpraynaud in #1383
  • Adapt mithril-client and mithril-common to compile in WASM by @jpraynaud in #1368
  • Make mithril-client examples full crates by @dlachaumepalo in #1379
  • Create dummies for SignedEntities by @dlachaumepalo in #1386
  • Fix mithril-client dependencies by @jpraynaud in #1391
  • Greg/1357/upgrade sqlite by @ghubertpalo in #1392
  • Fix broken links in documentation by @sfauvel in #1394
  • Implement Mithril client WASM API by @jpraynaud in #1389
  • Refactor mithril-client-cli using mithril-client library by @dlachaumepalo in #1395
  • Fix breaking change introduced with mithril-client-cli using mithril-client library by @dlachaumepalo in #1398
  • Upgrade dependencies by @jpraynaud in #1399
  • Add toggle for network deployment in CI by @jpraynaud in #1402
  • Implement open_message timeout in aggregator by @jpraynaud in #1401
  • Enhance machine readable logs in client by @dlachaumepalo in #1400
  • Support for configurable signed entity types in aggregator by @jpraynaud in #1412
  • Add toggle for unstable release publication in CI by @jpraynaud in #1415
  • Implement manual npm publication workflow by @jpraynaud in #1414
  • Fix toggle for unstable release publication in CI by @jpraynaud in #1416
  • Simplify mithril-client CLI by @dlachaumepalo in #1413
  • Rust version 1.75.0: fix cargo clippy warning & update dependencies by @dlachaumepalo in #1420
  • Activate Cardano node P2P mode in infrastructure by @jpraynaud in #1417
  • Fix signer service recommended configuration by @dlachaumepalo in #1419
  • Implement tests for WASM library by @dlachaumepalo in #1418
  • Update new signer configuration blog post by @dlachaumepalo in #1421
  • Implement configurable Chain Observer in aggregator by @jpraynaud in #1423
  • Implement mithril client wasm in explorer by @dlachaumepalo in #1426
  • Activate babbage/conway eras in devnet by @jpraynaud in #1427
  • Upgrade testing-preview VM in infra by @jpraynaud in #1429
  • Update ci.yml after the deletion of doc.yml by @dlachaumepalo in #1432
  • Upgrade Cardano node to 8.7.3 by @jpraynaud in #1430
  • Fix devnet to run consistently on mac OS by @jpraynaud in #1433
  • Use CardanoChain era reader in end to end test by @jpraynaud in #1431
  • Fix Docker registry for Cardano node by @jpraynaud in #1440
  • Fix Cardano configuration in infrastructure by @jpraynaud in #1442
  • Fix path on command by @albertodvp in #1438
  • Remove contact form in the documentation website by @jpraynaud in #1443
  • Support CardanoTransactions signed entity type by @jpraynaud in #1437
  • Warn missing docs directive missing in Mithril Client Cli by @Alenar in #1444
  • Greg/1397/fake aggregator by @ghubertpalo in #1422
  • Upgrade dependencies by @jpraynaud in #1445
  • Implement fake aggregator in wasm tests by @dlachaumepalo in #1441

New Contributors

Full Changelog: 2347.0...2403.0-pre

Crates Versions

Crate Version
mithril-aggregator 0.4.27
mithril-aggregator-fake 0.1.1
mithril-client 0.5.17
mithril-client-cli 0.5.17
mithril-client-wasm 0.1.6
mithril-common 0.2.152
mithril-signer 0.2.103
mithril-stm 0.3.14

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity o...
Read more

Mithril v2347.0

27 Nov 08:58
0780dfa
Compare
Choose a tag to compare

Highlights

  • Public release of the Mithril client library available for developers on crates.io.
  • Support for slim certificates produced by the Mithril aggregator (1).
  • Bug fixes and performance improvements.

(1): requires Mithril client (a.k.a mithril-client-cli) 0.5.5+ for restoration ⚠️.

What's Changed

  • Aggregator keyreg bottleneck by @Alenar in #1295
  • Update current documentation by @jpraynaud in #1307
  • Add missing configuration parameters in signer documentation by @jpraynaud in #1317
  • Explorer certificates list & signers summary by @Alenar in #1309
  • rework client to export mithril API by @ghubertpalo in #1291
  • Handle sqlite access using a ConnectionWithFullMutex by @Alenar in #1316
  • total_stake calculation corrected by @curiecrypt in #1308
  • Fix aggregator HTTP server CORS by @jpraynaud in #1318
  • add soft limit in certificate query by @ghubertpalo in #1314
  • Simplify certificate verifier usage by @Alenar in #1319
  • Rename mithril-client to mithril-client-cli by @Alenar in #1320
  • Client regressions in snapshot list and download by @dlachaumepalo in #1323
  • Enhance Mithril nodes devnet Docker images by @jpraynaud in #1324
  • Fix devnet crashing at startup by @jpraynaud in #1329
  • Fix client CLI Docker package name in CI/CD by @jpraynaud in #1330
  • Revert "add soft limit in certificate query" by @ghubertpalo in #1328
  • Add Mithril end to end instructions for --skip-cardano-bin-download command by @dlachaumepalo in #1331
  • Greg/1310/lower serialization by @ghubertpalo in #1333
  • Fix certificate chain hashes recomputation by @jpraynaud in #1337
  • Enhance end to end readme and fix work_directory default value on MacOS by @dlachaumepalo in #1338
  • Add SSH key by @dlachaumepalo in #1339
  • Add linebreak after last ssh key by @dlachaumepalo in #1340
  • Redesign mithril client api by @Alenar in #1332
  • Add subnote and git command for unstable release by @dlachaumepalo in #1334
  • Fix github action contains expression by @dlachaumepalo in #1342
  • Simplify common deps by @Alenar in #1341
  • Fix certificate hashes re-computation in aggregator by @jpraynaud in #1345
  • enhance Aggregator REST API performances by @ghubertpalo in #1347
  • Mithril client and common crates preparation for publication by @jpraynaud in #1349
  • Upgrade dependencies by @jpraynaud in #1351
  • Mithril relay P2P network for signatures PoC by @jpraynaud in #1346
  • Use Cardano node custom version CI/CD by @jpraynaud in #1359
  • Manual deployment of test Mithril network by @jpraynaud in #1358
  • Runbooks for test distributions and deployments by @jpraynaud in #1360
  • HTTP message service by @ghubertpalo in #1353
  • Mithril-client-lib: Gate snapshot download & message computation behind a feature by @Alenar in #1344
  • Fix Mithril relay Rust doc by @jpraynaud in #1364
  • Standardize default environment file path of Signer node configuration for SPOs by @dlachaumepalo in #1365

Full Changelog: 2342.0...2347.0

Crates Versions

Crate Version
mithril-aggregator 0.4.12
mithril-client 0.5.7
mithril-client-cli 0.5.5
mithril-common 0.2.135
mithril-signer 0.2.90
mithril-stm 0.3.10

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2347.0-pre

23 Nov 09:14
0780dfa
Compare
Choose a tag to compare
Mithril v2347.0-pre Pre-release
Pre-release

Highlights

  • Public release of the Mithril client library available for developers.
  • Support for slim certificates produced by the Mithril aggregator (1).
  • Bug fixes and performance improvements.

(1): requires Mithril client (a.k.a mithril-client-cli) 0.5.5+ for restoration ⚠️.

What's Changed

  • Aggregator keyreg bottleneck by @Alenar in #1295
  • Update current documentation by @jpraynaud in #1307
  • Add missing configuration parameters in signer documentation by @jpraynaud in #1317
  • Explorer certificates list & signers summary by @Alenar in #1309
  • rework client to export mithril API by @ghubertpalo in #1291
  • Handle sqlite access using a ConnectionWithFullMutex by @Alenar in #1316
  • total_stake calculation corrected by @curiecrypt in #1308
  • Fix aggregator HTTP server CORS by @jpraynaud in #1318
  • add soft limit in certificate query by @ghubertpalo in #1314
  • Simplify certificate verifier usage by @Alenar in #1319
  • Rename mithril-client to mithril-client-cli by @Alenar in #1320
  • Client regressions in snapshot list and download by @dlachaumepalo in #1323
  • Enhance Mithril nodes devnet Docker images by @jpraynaud in #1324
  • Fix devnet crashing at startup by @jpraynaud in #1329
  • Fix client CLI Docker package name in CI/CD by @jpraynaud in #1330
  • Revert "add soft limit in certificate query" by @ghubertpalo in #1328
  • Add Mithril end to end instructions for --skip-cardano-bin-download command by @dlachaumepalo in #1331
  • Greg/1310/lower serialization by @ghubertpalo in #1333
  • Fix certificate chain hashes recomputation by @jpraynaud in #1337
  • Enhance end to end readme and fix work_directory default value on MacOS by @dlachaumepalo in #1338
  • Add SSH key by @dlachaumepalo in #1339
  • Add linebreak after last ssh key by @dlachaumepalo in #1340
  • Redesign mithril client api by @Alenar in #1332
  • Add subnote and git command for unstable release by @dlachaumepalo in #1334
  • Fix github action contains expression by @dlachaumepalo in #1342
  • Simplify common deps by @Alenar in #1341
  • Fix certificate hashes re-computation in aggregator by @jpraynaud in #1345
  • enhance Aggregator REST API performances by @ghubertpalo in #1347
  • Mithril client and common crates preparation for publication by @jpraynaud in #1349
  • Upgrade dependencies by @jpraynaud in #1351
  • Mithril relay P2P network for signatures PoC by @jpraynaud in #1346
  • Use Cardano node custom version CI/CD by @jpraynaud in #1359
  • Manual deployment of test Mithril network by @jpraynaud in #1358
  • Runbooks for test distributions and deployments by @jpraynaud in #1360
  • HTTP message service by @ghubertpalo in #1353
  • Mithril-client-lib: Gate snapshot download & message computation behind a feature by @Alenar in #1344
  • Fix Mithril relay Rust doc by @jpraynaud in #1364
  • Standardize default environment file path of Signer node configuration for SPOs by @dlachaumepalo in #1365

Full Changelog: 2342.0...2347.0-pre

Crates Versions

Crate Version
mithril-aggregator 0.4.12
mithril-client 0.5.7
mithril-client-cli 0.5.5
mithril-common 0.2.135
mithril-signer 0.2.90
mithril-stm 0.3.10

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2342.0

23 Oct 10:20
e5ae362
Compare
Choose a tag to compare

Highlights

  • Support for SPO tickers displayed next to their pool Ids in the Mithril explorer.
  • Support for producing slim Docker images for the Mithril nodes.
  • Bug fixes and performance improvements.

What's Changed

  • Implement anyhow context in aggregator runtime by @dlachaumepalo in #1240
  • Implement anyhow context in aggregator/services by @dlachaumepalo in #1242
  • Implement anyhow context in aggregator/signer_register by @dlachaumepalo in #1243
  • Implement anyhow context in aggregator/snapshotter by @dlachaumepalo in #1246
  • refactored aggregator client errors by @ghubertpalo in #1245
  • refactored client configuration errors by @ghubertpalo in #1248
  • Use anyhow in aggregator multi-signer by @jpraynaud in #1247
  • refactor common sqlite errors by @ghubertpalo in #1249
  • Add anyhow context mithril-client/aggregator-client by @dlachaumepalo in #1250
  • Add anyhow context in mithril-client/commands by @dlachaumepalo in #1252
  • Add anyhow context in mithril-client/dependencies by @dlachaumepalo in #1253
  • Fix aggregator stress test bottleneck with client traffic by @jpraynaud in #1251
  • Use anyhow in signer single-signer by @jpraynaud in #1255
  • Update current documentation by @jpraynaud in #1258
  • Fix terraform composite action by @jpraynaud in #1259
  • Add anyhow context for mithril-client/services by @dlachaumepalo in #1256
  • remove store error by @ghubertpalo in #1257
  • Fix explorer display units by @jpraynaud in #1261
  • Get rid of string error comparison in tests by @dlachaumepalo in #1260
  • Add errors standards ADR by @jpraynaud in #1266
  • Add anyhow in integration & e2e tests by @Alenar in #1264
  • Enhance signer setup guide for SPO by @jpraynaud in #1263
  • Use source attribute in wrapped errors by @Alenar in #1268
  • Add a JSON message response on /aggregator endpoint calls by @dlachaumepalo in #1270
  • Benchmark aggregator performances by @jpraynaud in #1271
  • Upgrade dependencies by @jpraynaud in #1275
  • Add Mithril networks status page in website footer by @jpraynaud in #1278
  • Add signers ticker automatic import process + /signers/tickers route to aggregator http server by @Alenar in #1276
  • Deploy infrastructure for SPO tickers by @jpraynaud in #1279
  • Update flake.lock by @yvan-sraka in #1281
  • SPO tickers in explorer by @Alenar in #1280
  • Upgrade Rust 1.73.0 by @jpraynaud in #1285
  • Cache /signers/tickers calls in explorer by @Alenar in #1286
  • Prettier formatter for explorer by @Alenar in #1288
  • Upgrade dependencies by @dlachaumepalo in #1289
  • Fix mithril-stm WASM build by @jpraynaud in #1290
  • Infrastructure VM upgrade runbook by @jpraynaud in #1293
  • Rename GPG public key in releases by @jpraynaud in #1294
  • Mithril relay security advisory dev blog post by @jpraynaud in #1296
  • Fix missing aggregator configuration in devnet by @jpraynaud in #1297
  • Fix typo in relay security advisory dev blog post by @jpraynaud in #1301
  • Publish multiple packages to crates.io by @jpraynaud in #1299
  • Upgrade dependencies by @jpraynaud in #1304
  • Update contributing guidelines by @jpraynaud in #1305
  • Refactor Dockerfile.ci to slim containers by @TrevorBenson in #1302

New Contributors

Full Changelog: 2337.0...2342.0

Crates Versions

Crate Version
mithril-aggregator 0.3.111
mithril-client 0.4.12
mithril-common 0.2.126
mithril-signer 0.2.87
mithril-stm 0.3.8

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2342.0-pre

19 Oct 08:44
e5ae362
Compare
Choose a tag to compare
Mithril v2342.0-pre Pre-release
Pre-release

Highlights

  • Support for SPO tickers displayed next to their pool Ids in the Mithril explorer.
  • Support for producing slim Docker images for the Mithril nodes.
  • Bug fixes and performance improvements.

What's Changed

  • Implement anyhow context in aggregator runtime by @dlachaumepalo in #1240
  • Implement anyhow context in aggregator/services by @dlachaumepalo in #1242
  • Implement anyhow context in aggregator/signer_register by @dlachaumepalo in #1243
  • Implement anyhow context in aggregator/snapshotter by @dlachaumepalo in #1246
  • refactored aggregator client errors by @ghubertpalo in #1245
  • refactored client configuration errors by @ghubertpalo in #1248
  • Use anyhow in aggregator multi-signer by @jpraynaud in #1247
  • refactor common sqlite errors by @ghubertpalo in #1249
  • Add anyhow context mithril-client/aggregator-client by @dlachaumepalo in #1250
  • Add anyhow context in mithril-client/commands by @dlachaumepalo in #1252
  • Add anyhow context in mithril-client/dependencies by @dlachaumepalo in #1253
  • Fix aggregator stress test bottleneck with client traffic by @jpraynaud in #1251
  • Use anyhow in signer single-signer by @jpraynaud in #1255
  • Update current documentation by @jpraynaud in #1258
  • Fix terraform composite action by @jpraynaud in #1259
  • Add anyhow context for mithril-client/services by @dlachaumepalo in #1256
  • remove store error by @ghubertpalo in #1257
  • Fix explorer display units by @jpraynaud in #1261
  • Get rid of string error comparison in tests by @dlachaumepalo in #1260
  • Add errors standards ADR by @jpraynaud in #1266
  • Add anyhow in integration & e2e tests by @Alenar in #1264
  • Enhance signer setup guide for SPO by @jpraynaud in #1263
  • Use source attribute in wrapped errors by @Alenar in #1268
  • Add a JSON message response on /aggregator endpoint calls by @dlachaumepalo in #1270
  • Benchmark aggregator performances by @jpraynaud in #1271
  • Upgrade dependencies by @jpraynaud in #1275
  • Add Mithril networks status page in website footer by @jpraynaud in #1278
  • Add signers ticker automatic import process + /signers/tickers route to aggregator http server by @Alenar in #1276
  • Deploy infrastructure for SPO tickers by @jpraynaud in #1279
  • Update flake.lock by @yvan-sraka in #1281
  • SPO tickers in explorer by @Alenar in #1280
  • Upgrade Rust 1.73.0 by @jpraynaud in #1285
  • Cache /signers/tickers calls in explorer by @Alenar in #1286
  • Prettier formatter for explorer by @Alenar in #1288
  • Upgrade dependencies by @dlachaumepalo in #1289
  • Fix mithril-stm WASM build by @jpraynaud in #1290
  • Infrastructure VM upgrade runbook by @jpraynaud in #1293
  • Rename GPG public key in releases by @jpraynaud in #1294
  • Mithril relay security advisory dev blog post by @jpraynaud in #1296
  • Fix missing aggregator configuration in devnet by @jpraynaud in #1297
  • Fix typo in relay security advisory dev blog post by @jpraynaud in #1301
  • Publish multiple packages to crates.io by @jpraynaud in #1299
  • Upgrade dependencies by @jpraynaud in #1304
  • Update contributing guidelines by @jpraynaud in #1305
  • Refactor Dockerfile.ci to slim containers by @TrevorBenson in #1302

New Contributors

Full Changelog: 2337.0...2342.0-pre

Crates Versions

Crate Version
mithril-aggregator 0.3.111
mithril-client 0.4.12
mithril-common 0.2.126
mithril-signer 0.2.87
mithril-stm 0.3.8

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️