Mithril v2428.0-pre
Pre-release
Pre-release
github-actions
released this
11 Jul 08:14
·
1345 commits
to main
since this release
Highlights
- Support for Cardano node
9.0.0
. - Database cleanup and optimization once per epoch.
- Bug fixes and performance improvements.
What's Changed
- Remove manual workflow step for old
snapshot
commands availability by @dlachaume in #1734 - Fix: make prover not certify transactions stored but not certified yet by @jpraynaud in #1721
- Add
Makefiles
to facilitate the update ofwww
andwww-test
dependencies by @dlachaume in #1735 - Add tooling to verify example conformity in openapi.yaml by @sfauvel in #1728
- Refactor timepoint retrieval & conversion to signed entities by @Alenar in #1736
- feat(tls): Allow the underlying TLS implementation to be selected by feature flags. by @stevenj in #1738
- Update CHANGELOG with
2423.0
distribution release by @jpraynaud in #1733 - docs: add missing pre-requisites for building crates by @jpraynaud in #1740
- Remove bottleneck in proof generation of Merkle map by @jpraynaud in #1739
- Sqlite auto rollback by @Alenar in #1742
- Rotate documentation for
2423
distribution by @jpraynaud in #1732 - Update CHANGELOG with
2423.0
distribution release by @jpraynaud in #1745 - Dev blog post for removed
snapshot
command in client CLI by @jpraynaud in #1746 - Implement pooled resource item reset when given back by @jpraynaud in #1744
- Handle rollbacks when reading blocks from the chain by @Alenar in #1748
- fix: clippy warnings with Rust
1.79.0
by @jpraynaud in #1749 - Signed entity lock mechanism by @Alenar in #1758
- Use
macOS-arm64
runner in CI by @dlachaume in #1752 - Fix
macOS-arm64
architecture value from lowercase to uppercase in CI by @dlachaume in #1759 - Upgrade doc dependencies by @dlachaume in #1764
- Warmup/Preload cardano transactions & block range roots by @Alenar in #1763
- Upgrade
mithril-explorer
,www
andwww-test
dependencies by @dlachaume in #1765 - Upgrade project dependencies by @dlachaume in #1768
- Add
Mithril Threat Model
page on website by @jpraynaud in #1726 - Import transactions in sequence on signer by @Alenar in #1769
- Implement database connection pooling for Cardano transaction store by @jpraynaud in #1761
- Only save rust cache on main branch by @Alenar in #1770
- Add missing pre-requisites to build WASM client by @dlachaume in #1772
- Ensure validation of transaction hashes to provide to the prover by @dlachaume in #1774
- Vacuum sqlite database at startup & after transactions preload by @Alenar in #1771
- Add MSYS2 building instructions by @jasagredo in #1773
- Use a macro to limit error in default configuration by @sfauvel in #1778
- Fix #1762: CardanoTransactionSnapshot block number is not certified by @Alenar in #1779
- Fix: avoid iterator copy in
BlockRangeRootRetriever
by @jpraynaud in #1780 - Import Cardano transactions with Pallas chain reader by @jpraynaud in #1747
- Fix aggregator Cardano transaction prover benchmark tool by @jpraynaud in #1790
- Conditional embedding cardano cli in docker image by @sfauvel in #1789
- Fix
sanchonet
blocks parsing by @jpraynaud in #1794 - Upkeep service for aggregator & signer by @Alenar in #1791
- Support Cardano node
8.12.2
by @jpraynaud in #1788 - Fix: aggregator and signer blocked during Cardano transactions import by @jpraynaud in #1798
- Fix: Support Cardano
8.12
by @jpraynaud in #1799 - Bugfix: Can't generate proof for transactions on the last signed block number by @Alenar in #1795
- Preload Cardano transactions based on Aggregator's Signing Capability by @dlachaume in #1796
- Fix explorer crash when proving transaction & enhance mithril-client error by @Alenar in #1800
- Standardize code formatting in repository by @dlachaume in #1783
- Fix: avoid pool acquire timeout during Cardano transaction prover cache computation by @jpraynaud in #1801
- UpkeepService tests flakiness by @Alenar in #1802
- Refactor: Cardano node configuration in infra by @jpraynaud in #1806
- Support Cardano node
9.0.0
by @jpraynaud in #1809 - Remove call to chain observer on pending certificate route by @sfauvel in #1808
- Update CHANGELOG with
2428
distribution release by @jpraynaud in #1812 - Upgrade dependencies by @jpraynaud in #1811
New Contributors
- @stevenj made their first contribution in #1738
- @jasagredo made their first contribution in #1773
Full Changelog: 2423.0...2428.0-pre
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.5.40 |
mithril-client | 0.8.7 |
mithril-client-cli | 0.9.6 |
mithril-client-wasm | 0.3.7 |
mithril-common | 0.4.29 |
mithril-signer | 0.2.161 |
mithril-stm | 0.3.24 |
Networks Compatibility ⚠️
Network | Compatible |
---|---|
release-mainnet | ⛔ |
release-preprod | ⛔ |
pre-release-preview | ✔ |
testing-preview | ⛔ |
testing-sanchonet | ⛔ |
Linux Requirements
The Linux binaries target glibc
: to run them or install the .deb
packages you must have glibc
version 2.31+
installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+
or Debian 11+
(Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️