Releases: input-output-hk/mithril
Mithril v2445.0
Highlights:
- 🔥 BREAKING changes in Mithril client library, CLI, and WASM:
- Remove deprecated
beacon
field from Mithril certificates. - Clients from distribution
2430
and above are compatible with this change.
- Remove deprecated
- Stable support for Cardano node
10.1.2
in the signer and the aggregator. - Stable support for Cardano stake distribution client library, CLI and WASM.
- Stable support for Prometheus metrics endpoint in aggregator.
- Bug fixes and performance improvements.
What's Changed
- Fix: add missing automatically generated release note section for
unstable
releases by @dlachaume in #2011 - Standardize logs in common, signer, and persistence by @Alenar in #2010
- Sfauvel/1990/refactor prometheus metrics using struct by @sfauvel in #1998
- Feat: implement certificate chain builder for tests by @jpraynaud in #1999
- Refactor client cli command parameters by @Alenar in #2012
- Enhance logs in client and client-cli by @Alenar in #2013
- Fix clippy warnings from Rust 1.82 by @Alenar in #2015
- Enhance logs in mithril-relay by @Alenar in #2014
- Upgrade mac runner + Fix incorrect param by @Alenar in #2019
- Upgrade actions to latest by @Alenar in #2020
- Docs: rotate documentation for
2442
distribution by @jpraynaud in #2005 - Docs: final CHANGELOG for '2442.0' distribution by @jpraynaud in #2031
- Create dev blog post for certification of Cardano stake distribution by @dlachaume in #1892
- Activate metrics endpoint on aggregator by @dlachaume in #2022
- Fix:
clap
arguments are always overriding configuration by @dlachaume in #2038 - Docs: enhance era markers runbook by @jpraynaud in #2033
- Fix: monitoring configuration in infra by @jpraynaud in #2039
- Fix: rename
certificate_total_produced_since_startup
metric name in aggregator by @dlachaume in #2040 - Fix unneeded rescan when importing transactions in chunk by @Alenar in #2035
- Fix: remove
_counter
suffix from aggregator metrics by @dlachaume in #2041 - Fix: computation of the chaining of the certificates in tests by @jpraynaud in #2032
- Devbook: upgrade crates and openapi script by @Alenar in #2042
- Fix: ensure epoch consistency during epoch changes when signer is signing by @dlachaume in #2046
- Respin
testing-sanchonet
with Cardano10.1.0-pre
by @jpraynaud in #2048 - Refactor event store to use migration mechanism by @sfauvel in #2043
- Enhance end-to-end tests termination by @Alenar in #2050
- Refactor ChainPoint conversion from pallas Point by @Alenar in #2049
- Feat: Make Cardano stake distribution stable in client by @dlachaume in #2052
- Fix: era markers and pool tools for Cardano
10.1
by @jpraynaud in #2053 - Remove beacon from certificate by @Alenar in #2055
- Ensemble/1958/fix explorer by @Alenar in #2056
- Feat: add aggregator metric to record the number of restoration of the Cardano database by @dlachaume in #2057
- Refactor: rename protocol parameters for consistency in signer and aggregator by @dlachaume in #2058
- CI: add scheduled Docker builds workflow by @dlachaume in #2060
- ci: add nightly backward compatibility testing with e2e tests by @dlachaume in #2063
- Record aggregator metrics in event store by @sfauvel in #2059
- Remove pending certificate from explorer by @Alenar in #2061
- Access registered signers for latest epoch in explorer by @Alenar in #2062
- Upgrade mithril explorer to Next 15 by @Alenar in #2065
- Fix metrics_per_day view and improve test by building the real Metric… by @sfauvel in #2068
- ci: update cron schedule expression with co-authors to enable notifications by @dlachaume in #2066
- Feat: Support Cardano node
10.1.1
by @jpraynaud in #2070 - Streamline configurations usage in aggregator by @Alenar in #2081
- Chore: update dependencies for distribution
2445
by @jpraynaud in #2078 - CI: enhance nightly backward compatibility testing workflow by @dlachaume in #2083
- Chore: upgrade to Cardano '10.1.2' by @jpraynaud in #2084
- Feat: add
latest
shortcut as targeted era for Cardano CLI commands by @dlachaume in #2085 - Create view for registrations monitoring by @sfauvel in #2086
- Docs: update CHANGELOG for
2445.0
distribution release by @jpraynaud in #2080
Full Changelog: 2442.0...2445.0
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.5.102 |
mithril-client | 0.10.1 |
mithril-client-cli | 0.10.1 |
mithril-client-wasm | 0.6.1 |
mithril-common | 0.4.79 |
mithril-signer | 0.2.209 |
mithril-stm | 0.3.31 |
Networks Compatibility ⚠️
Network | Compatible |
---|---|
release-mainnet | ✔ |
release-preprod | ✔ |
pre-release-preview | ✔ |
testing-preview | ⛔ |
testing-sanchonet | ⛔ |
Distributions Compatibility ⚠️
Compatibility | mithril-signer | mithril-client |
---|---|---|
2442.0 |
✔ | ✔ |
2437.1 |
✔ | ✔ |
2430.0 |
✔ | ✔ |
2428.0 |
⛔ | ⛔ |
2423.0 |
⛔ | ⛔ |
Linux Requirements
The Linux binaries target glibc
: to run them or install the .deb
packages you must have glibc
version 2.31+
installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+
or Debian 11+
(Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <mithril@iohk.io>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [mithril@iohk.io] and let us know of...
Unstable Development Builds
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.5.106 |
mithril-client | 0.10.2 |
mithril-client-cli | 0.10.2 |
mithril-client-wasm | 0.6.1 |
mithril-common | 0.4.82 |
mithril-signer | 0.2.211 |
mithril-stm | 0.3.31 |
Networks Compatibility ⚠️
Network | Compatible |
---|---|
release-mainnet | ⛔ |
release-preprod | ⛔ |
pre-release-preview | ⛔ |
testing-preview | ✔ |
testing-sanchonet | ✔ |
Linux Requirements
The Linux binaries target glibc
: to run them or install the .deb
packages you must have glibc
version 2.31+
installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+
or Debian 11+
(Bullseye)).
Fetch the latest version of the unstable
tag
The unstable
tag is updated with a new commit id when a new unstable
release is published.
To fetch the latest version of the unstable tag, execute the command:
git tag -d unstable && git fetch origin tag unstable
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <mithril@iohk.io>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [mithril@iohk.io] and let us know of the outcome of your run of this process⚠️
What's Changed
- Feat: custom signed entity types in backward compatibility test in CI by @jpraynaud in #2087
- Do not add unfollow files when commit with upgrade_crates_and_openapi_versions.sh by @sfauvel in #2088
- Simplify tests by @Alenar in #2090
- Refactor event message creation by @sfauvel in #2089
- Feat: add Cardano era retrieval in chain observer implementations by @dlachaume in #2094
- Docs: rotate documentation for
2445
distribution by @jpraynaud in #2079 - Docs: final CHANGELOG for '2445.0' distribution by @jpraynaud in #2096
- Docs: dev blog post for aggregator prometheus endpoint by @jpraynaud in #2095
- chore: add build target nodejs by @fabianbormann in #2082
- Prepare network removal from
CardanoDbBeacon
by @Alenar in #2097
New Contributors
- @fabianbormann made their first contribution in #2082
Full Changelog: 2445.0...unstable
Mithril v2445.0-pre
Highlights:
- 🔥 BREAKING changes in Mithril client library, CLI, and WASM:
- Remove deprecated
beacon
field from Mithril certificates. - Clients from distribution
2430
and above are compatible with this change.
- Remove deprecated
- Stable support for Cardano node
10.1.2
in the signer and the aggregator. - Stable support for Cardano stake distribution client library, CLI and WASM.
- Stable support for Prometheus metrics endpoint in aggregator.
- Bug fixes and performance improvements.
What's Changed
- Fix: add missing automatically generated release note section for
unstable
releases by @dlachaume in #2011 - Standardize logs in common, signer, and persistence by @Alenar in #2010
- Sfauvel/1990/refactor prometheus metrics using struct by @sfauvel in #1998
- Feat: implement certificate chain builder for tests by @jpraynaud in #1999
- Refactor client cli command parameters by @Alenar in #2012
- Enhance logs in client and client-cli by @Alenar in #2013
- Fix clippy warnings from Rust 1.82 by @Alenar in #2015
- Enhance logs in mithril-relay by @Alenar in #2014
- Upgrade mac runner + Fix incorrect param by @Alenar in #2019
- Upgrade actions to latest by @Alenar in #2020
- Docs: rotate documentation for
2442
distribution by @jpraynaud in #2005 - Docs: final CHANGELOG for '2442.0' distribution by @jpraynaud in #2031
- Create dev blog post for certification of Cardano stake distribution by @dlachaume in #1892
- Activate metrics endpoint on aggregator by @dlachaume in #2022
- Fix:
clap
arguments are always overriding configuration by @dlachaume in #2038 - Docs: enhance era markers runbook by @jpraynaud in #2033
- Fix: monitoring configuration in infra by @jpraynaud in #2039
- Fix: rename
certificate_total_produced_since_startup
metric name in aggregator by @dlachaume in #2040 - Fix unneeded rescan when importing transactions in chunk by @Alenar in #2035
- Fix: remove
_counter
suffix from aggregator metrics by @dlachaume in #2041 - Fix: computation of the chaining of the certificates in tests by @jpraynaud in #2032
- Devbook: upgrade crates and openapi script by @Alenar in #2042
- Fix: ensure epoch consistency during epoch changes when signer is signing by @dlachaume in #2046
- Respin
testing-sanchonet
with Cardano10.1.0-pre
by @jpraynaud in #2048 - Refactor event store to use migration mechanism by @sfauvel in #2043
- Enhance end-to-end tests termination by @Alenar in #2050
- Refactor ChainPoint conversion from pallas Point by @Alenar in #2049
- Feat: Make Cardano stake distribution stable in client by @dlachaume in #2052
- Fix: era markers and pool tools for Cardano
10.1
by @jpraynaud in #2053 - Remove beacon from certificate by @Alenar in #2055
- Ensemble/1958/fix explorer by @Alenar in #2056
- Feat: add aggregator metric to record the number of restoration of the Cardano database by @dlachaume in #2057
- Refactor: rename protocol parameters for consistency in signer and aggregator by @dlachaume in #2058
- CI: add scheduled Docker builds workflow by @dlachaume in #2060
- ci: add nightly backward compatibility testing with e2e tests by @dlachaume in #2063
- Record aggregator metrics in event store by @sfauvel in #2059
- Remove pending certificate from explorer by @Alenar in #2061
- Access registered signers for latest epoch in explorer by @Alenar in #2062
- Upgrade mithril explorer to Next 15 by @Alenar in #2065
- Fix metrics_per_day view and improve test by building the real Metric… by @sfauvel in #2068
- ci: update cron schedule expression with co-authors to enable notifications by @dlachaume in #2066
- Feat: Support Cardano node
10.1.1
by @jpraynaud in #2070 - Streamline configurations usage in aggregator by @Alenar in #2081
- Chore: update dependencies for distribution
2445
by @jpraynaud in #2078 - CI: enhance nightly backward compatibility testing workflow by @dlachaume in #2083
- Chore: upgrade to Cardano '10.1.2' by @jpraynaud in #2084
- Feat: add
latest
shortcut as targeted era for Cardano CLI commands by @dlachaume in #2085 - Create view for registrations monitoring by @sfauvel in #2086
- Docs: update CHANGELOG for
2445.0
distribution release by @jpraynaud in #2080
Full Changelog: 2442.0...2445.0-pre
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.5.102 |
mithril-client | 0.10.1 |
mithril-client-cli | 0.10.1 |
mithril-client-wasm | 0.6.1 |
mithril-common | 0.4.79 |
mithril-signer | 0.2.209 |
mithril-stm | 0.3.31 |
Networks Compatibility ⚠️
Network | Compatible |
---|---|
release-mainnet | ⛔ |
release-preprod | ⛔ |
pre-release-preview | ✔ |
testing-preview | ⛔ |
testing-sanchonet | ⛔ |
Distributions Compatibility ⚠️
Compatibility | mithril-signer | mithril-client |
---|---|---|
2442.0 |
✔ | ✔ |
2437.1 |
✔ | ✔ |
2430.0 |
✔ | ✔ |
2428.0 |
⛔ | ⛔ |
2423.0 |
⛔ | ⛔ |
Linux Requirements
The Linux binaries target glibc
: to run them or install the .deb
packages you must have glibc
version 2.31+
installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+
or Debian 11+
(Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <mithril@iohk.io>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [mithril@iohk.io] and le...
Mithril v2442.0
Highlights
- Stable support for decentralized signature orchestration (the signer node computes autonomously the messages to sign).
- Stable support for Cardano transaction client library, CLI and WASM.
- Stable support for new
Pythagoras
Mithril era. - Bug fixes and performance improvements.
What's Changed
- Refactor signer state machine by @dlachaume in #1931
- Aggregator single signatures buffer by @Alenar in #1934
- Retrieve custom signing configuration with epoch settings in Signer by @dlachaume in #1939
- Enhance
mithril-common
logging by @Alenar in #1940 - Docs: rotate documentation for
2437
distribution by @jpraynaud in #1930 - Docs: final CHANGELOG for '2437.1' distribution by @jpraynaud in #1947
- Feat: create new 'Pythagoras' Mithril era by @jpraynaud in #1948
- Update websites dependencies by @jpraynaud in #1937
- Refactor: standardize epoch settings naming by @dlachaume in #1949
- Feat: sign protocol parameters in Genesis certificate by @jpraynaud in #1950
- Refactor: signable builder services compute full protocol message by @jpraynaud in #1942
- Docs: dev blog posts for
2437
distribution by @jpraynaud in #1953 - Fix: hydra CI error when
allow
lint attribute specifies a reason by @dlachaume in #1960 - docs: improve clarity in "Verify your signer is registered" section by @dlachaume in #1962
- crane fix by @locallycompact in #1959
- Fix: swagger build step failing in CI by @jpraynaud in #1965
- Feat: sign protocol parameters and epoch in certificate by @jpraynaud in #1954
- Fix: discrepancy protocol parameters by @jpraynaud in #1967
- Make aggregator advertises constant signing configurations for an epoch by @dlachaume in #1964
- Fix: add migration to resolve deserialization issue with
cardano_transactions_signing_config
by @dlachaume in #1971 - Docs: dev blog post for activation of the Cardano transaction certification by @jpraynaud in #1973
- Signer self compute signed entity by @Alenar in #1970
- Deprecate certificate pending by @Alenar in #1972
- Feat: Support Cardano node
9.2.1
by @jpraynaud in #1969 - Fix signer stuck if signature already aggregated by @Alenar in #1977
- docs: update since signers now compute what to sign independently by @Alenar in #1975
- Chore: decommission
testing-mainnet
network by @jpraynaud in #1978 - Fix: topology computation of the Cardano nodes of the signers in infra by @jpraynaud in #1985
- Signer certifier service sign & send signatures by @Alenar in #1979
- Make epoch mandatory in
RegisterSignerMessage
by @Alenar in #1986 - Feat: sign epoch in genesis certificate by @jpraynaud in #1987
- Make Cardano transaction client stable by @dlachaume in #1989
- Optimize
/register-signer
route by replacing ticker service with epoch service by @dlachaume in #1991 - Feat: use stored signing configuration in aggregator when creating signed entity type by @dlachaume in #1988
- Feat: implement era switch in e2e tests by @jpraynaud in #1974
- Enhance logs in mithril-signer and mithril-persistence by @Alenar in #1992
- Better folder structure for End to End test by @Alenar in #1994
- Docs: add timeout troubleshooting macOS section in E2E README by @dlachaume in #1993
- Fix: aggregator panics in CI by @dlachaume in #1995
- Refactor(aggregator): simplify http server dependencies by @Alenar in #1996
- Use new GitHub action for creating releases by @dlachaume in #2000
- Enhance logs construction and usage in aggregator by @Alenar in #2002
- Chore: update signer preloader refresh interval by @jpraynaud in #2003
- Chore: update dependencies for distribution
2442
by @jpraynaud in #2004 - Docs: update CHANGELOG for
2442.0
distribution release by @jpraynaud in #2006 - setting benchmark path by @Fuma419 in #1951
- Fix: update dependencies runbook and script by @dlachaume in #2008
- Use new GitHub action for creating
unstable
release by @dlachaume in #2007 - Rework & harmonize aggregator log messages by @Alenar in #2009
New Contributors
- @locallycompact made their first contribution in #1959
- @Fuma419 made their first contribution in #1951
Full Changelog: 2437.1...2442.0
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.5.83 |
mithril-client | 0.9.2 |
mithril-client-cli | 0.9.15 |
mithril-client-wasm | 0.5.2 |
mithril-common | 0.4.69 |
mithril-signer | 0.2.200 |
mithril-stm | 0.3.30 |
Networks Compatibility ⚠️
Network | Compatible |
---|---|
release-mainnet | ✔ |
release-preprod | ✔ |
pre-release-preview | ✔ |
testing-preview | ⛔ |
testing-sanchonet | ⛔ |
Linux Requirements
The Linux binaries target glibc
: to run them or install the .deb
packages you must have glibc
version 2.31+
installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+
or Debian 11+
(Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <mithril@iohk.io>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [mithril@iohk.io] and let us know of the outcome of your run of this process⚠️
Mithril v2442.0-pre
Highlights
- Stable support for decentralized signature orchestration (the signer node computes autonomously the messages to sign).
- Stable support for Cardano transaction client library, CLI and WASM.
- Stable support for new
Pythagoras
Mithril era. - Bug fixes and performance improvements.
What's Changed
- Refactor signer state machine by @dlachaume in #1931
- Aggregator single signatures buffer by @Alenar in #1934
- Retrieve custom signing configuration with epoch settings in Signer by @dlachaume in #1939
- Enhance
mithril-common
logging by @Alenar in #1940 - Docs: rotate documentation for
2437
distribution by @jpraynaud in #1930 - Docs: final CHANGELOG for '2437.1' distribution by @jpraynaud in #1947
- Feat: create new 'Pythagoras' Mithril era by @jpraynaud in #1948
- Update websites dependencies by @jpraynaud in #1937
- Refactor: standardize epoch settings naming by @dlachaume in #1949
- Feat: sign protocol parameters in Genesis certificate by @jpraynaud in #1950
- Refactor: signable builder services compute full protocol message by @jpraynaud in #1942
- Docs: dev blog posts for
2437
distribution by @jpraynaud in #1953 - Fix: hydra CI error when
allow
lint attribute specifies a reason by @dlachaume in #1960 - docs: improve clarity in "Verify your signer is registered" section by @dlachaume in #1962
- crane fix by @locallycompact in #1959
- Fix: swagger build step failing in CI by @jpraynaud in #1965
- Feat: sign protocol parameters and epoch in certificate by @jpraynaud in #1954
- Fix: discrepancy protocol parameters by @jpraynaud in #1967
- Make aggregator advertises constant signing configurations for an epoch by @dlachaume in #1964
- Fix: add migration to resolve deserialization issue with
cardano_transactions_signing_config
by @dlachaume in #1971 - Docs: dev blog post for activation of the Cardano transaction certification by @jpraynaud in #1973
- Signer self compute signed entity by @Alenar in #1970
- Deprecate certificate pending by @Alenar in #1972
- Feat: Support Cardano node
9.2.1
by @jpraynaud in #1969 - Fix signer stuck if signature already aggregated by @Alenar in #1977
- docs: update since signers now compute what to sign independently by @Alenar in #1975
- Chore: decommission
testing-mainnet
network by @jpraynaud in #1978 - Fix: topology computation of the Cardano nodes of the signers in infra by @jpraynaud in #1985
- Signer certifier service sign & send signatures by @Alenar in #1979
- Make epoch mandatory in
RegisterSignerMessage
by @Alenar in #1986 - Feat: sign epoch in genesis certificate by @jpraynaud in #1987
- Make Cardano transaction client stable by @dlachaume in #1989
- Optimize
/register-signer
route by replacing ticker service with epoch service by @dlachaume in #1991 - Feat: use stored signing configuration in aggregator when creating signed entity type by @dlachaume in #1988
- Feat: implement era switch in e2e tests by @jpraynaud in #1974
- Enhance logs in mithril-signer and mithril-persistence by @Alenar in #1992
- Better folder structure for End to End test by @Alenar in #1994
- Docs: add timeout troubleshooting macOS section in E2E README by @dlachaume in #1993
- Fix: aggregator panics in CI by @dlachaume in #1995
- Refactor(aggregator): simplify http server dependencies by @Alenar in #1996
- Use new GitHub action for creating releases by @dlachaume in #2000
- Enhance logs construction and usage in aggregator by @Alenar in #2002
- Chore: update signer preloader refresh interval by @jpraynaud in #2003
- Chore: update dependencies for distribution
2442
by @jpraynaud in #2004 - Docs: update CHANGELOG for
2442.0
distribution release by @jpraynaud in #2006 - setting benchmark path by @Fuma419 in #1951
- Fix: update dependencies runbook and script by @dlachaume in #2008
- Use new GitHub action for creating
unstable
release by @dlachaume in #2007 - Rework & harmonize aggregator log messages by @Alenar in #2009
New Contributors
- @locallycompact made their first contribution in #1959
- @Fuma419 made their first contribution in #1951
Full Changelog: 2437.1...2442.0-pre
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.5.83 |
mithril-client | 0.9.2 |
mithril-client-cli | 0.9.15 |
mithril-client-wasm | 0.5.2 |
mithril-common | 0.4.69 |
mithril-signer | 0.2.200 |
mithril-stm | 0.3.30 |
Networks Compatibility ⚠️
Network | Compatible |
---|---|
release-mainnet | ⛔ |
release-preprod | ⛔ |
pre-release-preview | ✔ |
testing-preview | ⛔ |
testing-sanchonet | ⛔ |
Linux Requirements
The Linux binaries target glibc
: to run them or install the .deb
packages you must have glibc
version 2.31+
installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+
or Debian 11+
(Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <mithril@iohk.io>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [mithril@iohk.io] and let us know of the outcome of your run of this process⚠️
Mithril v2437.1
Highlights:
- 🔥 BREAKING changes in Mithril client WASM:
- Implementation of seamless transition from unstable to stable features.
- A new
unstable
option in the client allows the usage of unstable features. - The previous
client.unstable
implementation is not supported anymore and must be replaced withclient
.
- Stable support for Cardano transactions certification in signer and aggregator.
- Stable support for Cardano stake distribution certification in signer and aggregator.
- Bug fixes and performance improvements.
What's Changed
- Implement signable and artifact builders for Cardano Stake Distribution by @dlachaume in #1847
- Increase timeout for client WASM headless browser tests by @dlachaume in #1864
- Fix typos by @sfauvel in #1865
- Update CHANGELOG for
2430.0
distribution release by @jpraynaud in #1866 - Dev blog post for
Cardano transaction certification
feature roll-out by @jpraynaud in #1868 - Make signed_entity_type non optional in RegisterSignatureMessage by @sfauvel in #1870
- Monitor Mithril nodes footprint by @jpraynaud in #1871
- Add a redirection on index.html to clean url by @sfauvel in #1869
- Escape slashes in sed command by @sfauvel in #1873
- Update Mithril signer footprint with Cardano transactions by @jpraynaud in #1874
- Fix:
ChainReaderBlockStreamer
skipsRollForward
blocks at the tip by @jpraynaud in #1877 - Implement Cardano stake distribution HTTP routes by @dlachaume in #1872
- Update Mithril signer footprint in SPO guide by @jpraynaud in #1879
- Implement Cardano stake distribution in
mithril-client
library by @dlachaume in #1882 - Implement Cardano stake distribution commands in
mithril-client
CLI by @dlachaume in #1883 - Implement Cardano stake distribution in
mithril-client
WASM by @dlachaume in #1887 - Add new tab Cardano Stake Distribution in the explorer by @dlachaume in #1888
- Document Cardano Stake Distribution by @dlachaume in #1889
- Add missing Cardano stake distribution example in developer documentation by @dlachaume in #1891
- fix: macOS e2e local tests fails on M3 silicon processors by @falcucci in #1767
- Add support for custom HTTP Headers in Mithril client WASM library by @dlachaume in #1890
- Create repository dependencies upgrade runbook by @dlachaume in #1893
- feat: support
file://
URLs for snapshot locations by @michalrus in #1885 - Fix: Cardano stake distribution certification epoch discrepancy by @jpraynaud in #1896
- Optimize memory usage of signer for Cardano transactions by @jpraynaud in #1904
- Add Cardano transactions signing configuration in Aggregator '/' route by @Alenar in #1905
- Reorganize signer dependencies by @Alenar in #1908
- docs: update signer footprint in SPO setup guide by @jpraynaud in #1907
- Optional signed message in registered signatures by @Alenar in #1909
- feat: Make
rug-backend
optional formithril-client
crate by @Mr-Leshiy in #1884 - Chore: post
Chang
hard fork cleanup by @jpraynaud in #1912 - Refactor: seamless
unstable
tostable
transition in WASM client by @jpraynaud in #1914 - Fix clippy warnings from Rust 1.81 by @Alenar in #1918
- Add a script to update all dependencies by @sfauvel in #1916
- Feat: add infinite Cardano transactions preloader in signer by @jpraynaud in #1921
- Update dependencies for release 2437 by @Alenar in #1919
- Enhance upgrade dependency runbook by @Alenar in #1926
- Fix: preloading configuration makes signer panic at startup by @jpraynaud in #1927
- signer retrieves registrations with epoch settings route by @sfauvel in #1913
- Enhance Cardano transactions rollbacks by @jpraynaud in #1917
- Update CHANGELOG for
2437.0
distribution release by @jpraynaud in #1932 - Enhance Cardano transaction prover benchmark by @jpraynaud in #1933
- Fix: data inconsistency in Cardano transactions stores by @jpraynaud in #1936
New Contributors
- @michalrus made their first contribution in #1885
- @Mr-Leshiy made their first contribution in #1884
Full Changelog: 2430.0...2437.1
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.5.63 |
mithril-client | 0.8.18 |
mithril-client-cli | 0.9.12 |
mithril-client-wasm | 0.4.1 |
mithril-common | 0.4.51 |
mithril-signer | 0.2.182 |
mithril-stm | 0.3.29 |
Networks Compatibility ⚠️
Network | Compatible |
---|---|
release-mainnet | ✔ |
release-preprod | ✔ |
pre-release-preview | ✔ |
testing-preview | ⛔ |
testing-sanchonet | ⛔ |
Linux Requirements
The Linux binaries target glibc
: to run them or install the .deb
packages you must have glibc
version 2.31+
installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+
or Debian 11+
(Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <mithril@iohk.io>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [mithril@iohk.io] and let us know of the outcome of your run of this process⚠️
Mithril v2437.1-pre
Highlights:
- 🔥 BREAKING changes in Mithril client WASM:
- Implementation of seamless transition from unstable to stable features.
- A new
unstable
option in the client allows the usage of unstable features. - The previous
client.unstable
implementation is not supported anymore and must be replaced withclient
.
- Stable support for Cardano transactions certification in signer and aggregator.
- Stable support for Cardano stake distribution certification in signer and aggregator.
- Bug fixes and performance improvements.
What's Changed
- Implement signable and artifact builders for Cardano Stake Distribution by @dlachaume in #1847
- Increase timeout for client WASM headless browser tests by @dlachaume in #1864
- Fix typos by @sfauvel in #1865
- Update CHANGELOG for
2430.0
distribution release by @jpraynaud in #1866 - Dev blog post for
Cardano transaction certification
feature roll-out by @jpraynaud in #1868 - Make signed_entity_type non optional in RegisterSignatureMessage by @sfauvel in #1870
- Monitor Mithril nodes footprint by @jpraynaud in #1871
- Add a redirection on index.html to clean url by @sfauvel in #1869
- Escape slashes in sed command by @sfauvel in #1873
- Update Mithril signer footprint with Cardano transactions by @jpraynaud in #1874
- Fix:
ChainReaderBlockStreamer
skipsRollForward
blocks at the tip by @jpraynaud in #1877 - Implement Cardano stake distribution HTTP routes by @dlachaume in #1872
- Update Mithril signer footprint in SPO guide by @jpraynaud in #1879
- Implement Cardano stake distribution in
mithril-client
library by @dlachaume in #1882 - Implement Cardano stake distribution commands in
mithril-client
CLI by @dlachaume in #1883 - Implement Cardano stake distribution in
mithril-client
WASM by @dlachaume in #1887 - Add new tab Cardano Stake Distribution in the explorer by @dlachaume in #1888
- Document Cardano Stake Distribution by @dlachaume in #1889
- Add missing Cardano stake distribution example in developer documentation by @dlachaume in #1891
- fix: macOS e2e local tests fails on M3 silicon processors by @falcucci in #1767
- Add support for custom HTTP Headers in Mithril client WASM library by @dlachaume in #1890
- Create repository dependencies upgrade runbook by @dlachaume in #1893
- feat: support
file://
URLs for snapshot locations by @michalrus in #1885 - Fix: Cardano stake distribution certification epoch discrepancy by @jpraynaud in #1896
- Optimize memory usage of signer for Cardano transactions by @jpraynaud in #1904
- Add Cardano transactions signing configuration in Aggregator '/' route by @Alenar in #1905
- Reorganize signer dependencies by @Alenar in #1908
- docs: update signer footprint in SPO setup guide by @jpraynaud in #1907
- Optional signed message in registered signatures by @Alenar in #1909
- feat: Make
rug-backend
optional formithril-client
crate by @Mr-Leshiy in #1884 - Chore: post
Chang
hard fork cleanup by @jpraynaud in #1912 - Refactor: seamless
unstable
tostable
transition in WASM client by @jpraynaud in #1914 - Fix clippy warnings from Rust 1.81 by @Alenar in #1918
- Add a script to update all dependencies by @sfauvel in #1916
- Feat: add infinite Cardano transactions preloader in signer by @jpraynaud in #1921
- Update dependencies for release 2437 by @Alenar in #1919
- Enhance upgrade dependency runbook by @Alenar in #1926
- Fix: preloading configuration makes signer panic at startup by @jpraynaud in #1927
- signer retrieves registrations with epoch settings route by @sfauvel in #1913
- Enhance Cardano transactions rollbacks by @jpraynaud in #1917
- Update CHANGELOG for
2437.0
distribution release by @jpraynaud in #1932 - Enhance Cardano transaction prover benchmark by @jpraynaud in #1933
- Fix: data inconsistency in Cardano transactions stores by @jpraynaud in #1936
New Contributors
- @michalrus made their first contribution in #1885
- @Mr-Leshiy made their first contribution in #1884
Full Changelog: 2430.0...2437.1-pre
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.5.63 |
mithril-client | 0.8.18 |
mithril-client-cli | 0.9.12 |
mithril-client-wasm | 0.4.1 |
mithril-common | 0.4.51 |
mithril-signer | 0.2.182 |
mithril-stm | 0.3.29 |
Networks Compatibility ⚠️
Network | Compatible |
---|---|
release-mainnet | ⛔ |
release-preprod | ⛔ |
pre-release-preview | ✔ |
testing-preview | ⛔ |
testing-sanchonet | ⛔ |
Linux Requirements
The Linux binaries target glibc
: to run them or install the .deb
packages you must have glibc
version 2.31+
installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+
or Debian 11+
(Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <mithril@iohk.io>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [mithril@iohk.io] and let us know of the outcome of your run of this process⚠️
Mithril v2437.0-pre
Highlights:
- 🔥 BREAKING changes in Mithril client WASM:
- Implementation of seamless transition from unstable to stable features.
- A new
unstable
option in the client allows the usage of unstable features. - The previous
client.unstable
implementation is not supported anymore and must be replaced withclient
.
- Stable support for Cardano transactions certification in signer and aggregator.
- Stable support for Cardano stake distribution certification in signer and aggregator.
- Bug fixes and performance improvements.
What's Changed
- Implement signable and artifact builders for Cardano Stake Distribution by @dlachaume in #1847
- Increase timeout for client WASM headless browser tests by @dlachaume in #1864
- Fix typos by @sfauvel in #1865
- Update CHANGELOG for
2430.0
distribution release by @jpraynaud in #1866 - Dev blog post for
Cardano transaction certification
feature roll-out by @jpraynaud in #1868 - Make signed_entity_type non optional in RegisterSignatureMessage by @sfauvel in #1870
- Monitor Mithril nodes footprint by @jpraynaud in #1871
- Add a redirection on index.html to clean url by @sfauvel in #1869
- Escape slashes in sed command by @sfauvel in #1873
- Update Mithril signer footprint with Cardano transactions by @jpraynaud in #1874
- Fix:
ChainReaderBlockStreamer
skipsRollForward
blocks at the tip by @jpraynaud in #1877 - Implement Cardano stake distribution HTTP routes by @dlachaume in #1872
- Update Mithril signer footprint in SPO guide by @jpraynaud in #1879
- Implement Cardano stake distribution in
mithril-client
library by @dlachaume in #1882 - Implement Cardano stake distribution commands in
mithril-client
CLI by @dlachaume in #1883 - Implement Cardano stake distribution in
mithril-client
WASM by @dlachaume in #1887 - Add new tab Cardano Stake Distribution in the explorer by @dlachaume in #1888
- Document Cardano Stake Distribution by @dlachaume in #1889
- Add missing Cardano stake distribution example in developer documentation by @dlachaume in #1891
- fix: macOS e2e local tests fails on M3 silicon processors by @falcucci in #1767
- Add support for custom HTTP Headers in Mithril client WASM library by @dlachaume in #1890
- Create repository dependencies upgrade runbook by @dlachaume in #1893
- feat: support
file://
URLs for snapshot locations by @michalrus in #1885 - Fix: Cardano stake distribution certification epoch discrepancy by @jpraynaud in #1896
- Optimize memory usage of signer for Cardano transactions by @jpraynaud in #1904
- Add Cardano transactions signing configuration in Aggregator '/' route by @Alenar in #1905
- Reorganize signer dependencies by @Alenar in #1908
- docs: update signer footprint in SPO setup guide by @jpraynaud in #1907
- Optional signed message in registered signatures by @Alenar in #1909
- feat: Make
rug-backend
optional formithril-client
crate by @Mr-Leshiy in #1884 - Chore: post
Chang
hard fork cleanup by @jpraynaud in #1912 - Refactor: seamless
unstable
tostable
transition in WASM client by @jpraynaud in #1914 - Fix clippy warnings from Rust 1.81 by @Alenar in #1918
- Add a script to update all dependencies by @sfauvel in #1916
- Feat: add infinite Cardano transactions preloader in signer by @jpraynaud in #1921
- Update dependencies for release 2437 by @Alenar in #1919
- Enhance upgrade dependency runbook by @Alenar in #1926
- Fix: preloading configuration makes signer panic at startup by @jpraynaud in #1927
- signer retrieves registrations with epoch settings route by @sfauvel in #1913
- Enhance Cardano transactions rollbacks by @jpraynaud in #1917
- Update CHANGELOG for
2437.0
distribution release by @jpraynaud in #1932
New Contributors
- @michalrus made their first contribution in #1885
- @Mr-Leshiy made their first contribution in #1884
Full Changelog: 2430.0...2437.0-pre
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.5.62 |
mithril-client | 0.8.18 |
mithril-client-cli | 0.9.12 |
mithril-client-wasm | 0.4.1 |
mithril-common | 0.4.51 |
mithril-signer | 0.2.181 |
mithril-stm | 0.3.29 |
Networks Compatibility ⚠️
Network | Compatible |
---|---|
release-mainnet | ⛔ |
release-preprod | ⛔ |
pre-release-preview | ✔ |
testing-preview | ⛔ |
testing-sanchonet | ⛔ |
Linux Requirements
The Linux binaries target glibc
: to run them or install the .deb
packages you must have glibc
version 2.31+
installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+
or Debian 11+
(Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <mithril@iohk.io>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [mithril@iohk.io] and let us know of the outcome of your run of this process⚠️
Mithril v2430.0
Highlights:
- Support for Cardano node
9.1.0
. - Support for Cardano transactions certification in
release-preprod
andpre-release-preview
. - Bug fixes and performance improvements.
What's Changed
- Configure Cardano transaction signing parameters with CI/CD by @jpraynaud in #1815
- Fix Signer
make test
command errors by @dlachaume in #1817 - Fix: Explorer keep previous error until refresh in cardano transaction certification modal by @Alenar in #1824
- Fix: missing configuration in terraform deployment action in CI/CD by @jpraynaud in #1821
- Rotate documentation for
2428
distribution by @jpraynaud in #1823 - Update CHANGELOG for
2428.0
distribution release by @jpraynaud in #1827 - Respin
testing-sanchonet
with Cardano9.0.0
by @jpraynaud in #1829 - Bugfix: Block range computation ignored last block range & last block range if it finished with empty blocks by @Alenar in #1820
- Fix formatting error in Mithril Signer node documentation by @dlachaume in #1831
- Remove
task::block_in_place
in transaction importer by @Alenar in #1805 - Ensemble/1792/non blocking artifact production in aggregator by @sfauvel in #1828
- Add metrics table in the "Activate Prometheus endpoint" section by @dlachaume in #1833
- Make upper bound of
ChainReaderBlockStreamer
inclusive by @Alenar in #1835 - Ensemble/1825/cleanup immutable file in cardano transation by @sfauvel in #1838
- Make deprecated
beacon
field optional inCertificate
&CertificateList
messages by @Alenar in #1839 - fix: Resource not Reset when given back to Pool by @jpraynaud in #1848
- Replace
BlockNumber
alias with dedicated structure by @Alenar in #1846 - fix:
ChainReader
fails onfind_intersect_point
without agency by @jpraynaud in #1852 - fix: clippy warnings with Rust
1.80.0
by @jpraynaud in #1857 - Support Cardano node
9.1.0
by @jpraynaud in #1856 - Replace
SlotNumber
alias with dedicated structure by @sfauvel in #1854 - Upgrade infrastructure deployment with disk configurations by @jpraynaud in #1850
- Upgrade
release-mainnet
aggregator VM data disk by @jpraynaud in #1859 - Upgrade Rust dependencies by @jpraynaud in #1858
- Update CHANGELOG for
2430
distribution release by @jpraynaud in #1860
Full Changelog: 2428.0...2430.0
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.5.50 |
mithril-client | 0.8.10 |
mithril-client-cli | 0.9.9 |
mithril-client-wasm | 0.3.8 |
mithril-common | 0.4.38 |
mithril-signer | 0.2.170 |
mithril-stm | 0.3.26 |
Networks Compatibility ⚠️
Network | Compatible |
---|---|
release-mainnet | ✔ |
release-preprod | ✔ |
pre-release-preview | ✔ |
testing-preview | ⛔ |
testing-sanchonet | ⛔ |
Linux Requirements
The Linux binaries target glibc
: to run them or install the .deb
packages you must have glibc
version 2.31+
installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+
or Debian 11+
(Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <mithril@iohk.io>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [mithril@iohk.io] and let us know of the outcome of your run of this process⚠️
Mithril v2430.0-pre
Highlights:
- Support for Cardano node
9.1.0
. - Support for Cardano transactions certification in
release-preprod
andpre-release-preview
. - Bug fixes and performance improvements.
What's Changed
- Configure Cardano transaction signing parameters with CI/CD by @jpraynaud in #1815
- Fix Signer
make test
command errors by @dlachaume in #1817 - Fix: Explorer keep previous error until refresh in cardano transaction certification modal by @Alenar in #1824
- Fix: missing configuration in terraform deployment action in CI/CD by @jpraynaud in #1821
- Rotate documentation for
2428
distribution by @jpraynaud in #1823 - Update CHANGELOG for
2428.0
distribution release by @jpraynaud in #1827 - Respin
testing-sanchonet
with Cardano9.0.0
by @jpraynaud in #1829 - Bugfix: Block range computation ignored last block range & last block range if it finished with empty blocks by @Alenar in #1820
- Fix formatting error in Mithril Signer node documentation by @dlachaume in #1831
- Remove
task::block_in_place
in transaction importer by @Alenar in #1805 - Ensemble/1792/non blocking artifact production in aggregator by @sfauvel in #1828
- Add metrics table in the "Activate Prometheus endpoint" section by @dlachaume in #1833
- Make upper bound of
ChainReaderBlockStreamer
inclusive by @Alenar in #1835 - Ensemble/1825/cleanup immutable file in cardano transation by @sfauvel in #1838
- Make deprecated
beacon
field optional inCertificate
&CertificateList
messages by @Alenar in #1839 - fix: Resource not Reset when given back to Pool by @jpraynaud in #1848
- Replace
BlockNumber
alias with dedicated structure by @Alenar in #1846 - fix:
ChainReader
fails onfind_intersect_point
without agency by @jpraynaud in #1852 - fix: clippy warnings with Rust
1.80.0
by @jpraynaud in #1857 - Support Cardano node
9.1.0
by @jpraynaud in #1856 - Replace
SlotNumber
alias with dedicated structure by @sfauvel in #1854 - Upgrade infrastructure deployment with disk configurations by @jpraynaud in #1850
- Upgrade
release-mainnet
aggregator VM data disk by @jpraynaud in #1859 - Upgrade Rust dependencies by @jpraynaud in #1858
- Update CHANGELOG for
2430
distribution release by @jpraynaud in #1860
Full Changelog: 2428.0...2430.0-pre
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.5.50 |
mithril-client | 0.8.10 |
mithril-client-cli | 0.9.9 |
mithril-client-wasm | 0.3.8 |
mithril-common | 0.4.38 |
mithril-signer | 0.2.170 |
mithril-stm | 0.3.26 |
Networks Compatibility ⚠️
Network | Compatible |
---|---|
release-mainnet | ⛔ |
release-preprod | ⛔ |
pre-release-preview | ✔ |
testing-preview | ⛔ |
testing-sanchonet | ⛔ |
Linux Requirements
The Linux binaries target glibc
: to run them or install the .deb
packages you must have glibc
version 2.31+
installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+
or Debian 11+
(Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <mithril@iohk.io>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <mithril@iohk.io>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [mithril@iohk.io] and let us know of the outcome of your run of this process⚠️