Skip to content

Mithril v2347.0-pre

Pre-release
Pre-release
Compare
Choose a tag to compare
@github-actions github-actions released this 23 Nov 09:14
· 3630 commits to main since this release
0780dfa

Highlights

  • Public release of the Mithril client library available for developers.
  • Support for slim certificates produced by the Mithril aggregator (1).
  • Bug fixes and performance improvements.

(1): requires Mithril client (a.k.a mithril-client-cli) 0.5.5+ for restoration ⚠️.

What's Changed

  • Aggregator keyreg bottleneck by @Alenar in #1295
  • Update current documentation by @jpraynaud in #1307
  • Add missing configuration parameters in signer documentation by @jpraynaud in #1317
  • Explorer certificates list & signers summary by @Alenar in #1309
  • rework client to export mithril API by @ghubertpalo in #1291
  • Handle sqlite access using a ConnectionWithFullMutex by @Alenar in #1316
  • total_stake calculation corrected by @curiecrypt in #1308
  • Fix aggregator HTTP server CORS by @jpraynaud in #1318
  • add soft limit in certificate query by @ghubertpalo in #1314
  • Simplify certificate verifier usage by @Alenar in #1319
  • Rename mithril-client to mithril-client-cli by @Alenar in #1320
  • Client regressions in snapshot list and download by @dlachaumepalo in #1323
  • Enhance Mithril nodes devnet Docker images by @jpraynaud in #1324
  • Fix devnet crashing at startup by @jpraynaud in #1329
  • Fix client CLI Docker package name in CI/CD by @jpraynaud in #1330
  • Revert "add soft limit in certificate query" by @ghubertpalo in #1328
  • Add Mithril end to end instructions for --skip-cardano-bin-download command by @dlachaumepalo in #1331
  • Greg/1310/lower serialization by @ghubertpalo in #1333
  • Fix certificate chain hashes recomputation by @jpraynaud in #1337
  • Enhance end to end readme and fix work_directory default value on MacOS by @dlachaumepalo in #1338
  • Add SSH key by @dlachaumepalo in #1339
  • Add linebreak after last ssh key by @dlachaumepalo in #1340
  • Redesign mithril client api by @Alenar in #1332
  • Add subnote and git command for unstable release by @dlachaumepalo in #1334
  • Fix github action contains expression by @dlachaumepalo in #1342
  • Simplify common deps by @Alenar in #1341
  • Fix certificate hashes re-computation in aggregator by @jpraynaud in #1345
  • enhance Aggregator REST API performances by @ghubertpalo in #1347
  • Mithril client and common crates preparation for publication by @jpraynaud in #1349
  • Upgrade dependencies by @jpraynaud in #1351
  • Mithril relay P2P network for signatures PoC by @jpraynaud in #1346
  • Use Cardano node custom version CI/CD by @jpraynaud in #1359
  • Manual deployment of test Mithril network by @jpraynaud in #1358
  • Runbooks for test distributions and deployments by @jpraynaud in #1360
  • HTTP message service by @ghubertpalo in #1353
  • Mithril-client-lib: Gate snapshot download & message computation behind a feature by @Alenar in #1344
  • Fix Mithril relay Rust doc by @jpraynaud in #1364
  • Standardize default environment file path of Signer node configuration for SPOs by @dlachaumepalo in #1365

Full Changelog: 2342.0...2347.0-pre

Crates Versions

Crate Version
mithril-aggregator 0.4.12
mithril-client 0.5.7
mithril-client-cli 0.5.5
mithril-common 0.2.135
mithril-signer 0.2.90
mithril-stm 0.3.10

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️