Skip to content

Releases: input-output-hk/mithril

Mithril v2347.0

27 Nov 08:58
0780dfa
Compare
Choose a tag to compare

Highlights

  • Public release of the Mithril client library available for developers on crates.io.
  • Support for slim certificates produced by the Mithril aggregator (1).
  • Bug fixes and performance improvements.

(1): requires Mithril client (a.k.a mithril-client-cli) 0.5.5+ for restoration ⚠️.

What's Changed

  • Aggregator keyreg bottleneck by @Alenar in #1295
  • Update current documentation by @jpraynaud in #1307
  • Add missing configuration parameters in signer documentation by @jpraynaud in #1317
  • Explorer certificates list & signers summary by @Alenar in #1309
  • rework client to export mithril API by @ghubertpalo in #1291
  • Handle sqlite access using a ConnectionWithFullMutex by @Alenar in #1316
  • total_stake calculation corrected by @curiecrypt in #1308
  • Fix aggregator HTTP server CORS by @jpraynaud in #1318
  • add soft limit in certificate query by @ghubertpalo in #1314
  • Simplify certificate verifier usage by @Alenar in #1319
  • Rename mithril-client to mithril-client-cli by @Alenar in #1320
  • Client regressions in snapshot list and download by @dlachaumepalo in #1323
  • Enhance Mithril nodes devnet Docker images by @jpraynaud in #1324
  • Fix devnet crashing at startup by @jpraynaud in #1329
  • Fix client CLI Docker package name in CI/CD by @jpraynaud in #1330
  • Revert "add soft limit in certificate query" by @ghubertpalo in #1328
  • Add Mithril end to end instructions for --skip-cardano-bin-download command by @dlachaumepalo in #1331
  • Greg/1310/lower serialization by @ghubertpalo in #1333
  • Fix certificate chain hashes recomputation by @jpraynaud in #1337
  • Enhance end to end readme and fix work_directory default value on MacOS by @dlachaumepalo in #1338
  • Add SSH key by @dlachaumepalo in #1339
  • Add linebreak after last ssh key by @dlachaumepalo in #1340
  • Redesign mithril client api by @Alenar in #1332
  • Add subnote and git command for unstable release by @dlachaumepalo in #1334
  • Fix github action contains expression by @dlachaumepalo in #1342
  • Simplify common deps by @Alenar in #1341
  • Fix certificate hashes re-computation in aggregator by @jpraynaud in #1345
  • enhance Aggregator REST API performances by @ghubertpalo in #1347
  • Mithril client and common crates preparation for publication by @jpraynaud in #1349
  • Upgrade dependencies by @jpraynaud in #1351
  • Mithril relay P2P network for signatures PoC by @jpraynaud in #1346
  • Use Cardano node custom version CI/CD by @jpraynaud in #1359
  • Manual deployment of test Mithril network by @jpraynaud in #1358
  • Runbooks for test distributions and deployments by @jpraynaud in #1360
  • HTTP message service by @ghubertpalo in #1353
  • Mithril-client-lib: Gate snapshot download & message computation behind a feature by @Alenar in #1344
  • Fix Mithril relay Rust doc by @jpraynaud in #1364
  • Standardize default environment file path of Signer node configuration for SPOs by @dlachaumepalo in #1365

Full Changelog: 2342.0...2347.0

Crates Versions

Crate Version
mithril-aggregator 0.4.12
mithril-client 0.5.7
mithril-client-cli 0.5.5
mithril-common 0.2.135
mithril-signer 0.2.90
mithril-stm 0.3.10

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2347.0-pre

23 Nov 09:14
0780dfa
Compare
Choose a tag to compare
Mithril v2347.0-pre Pre-release
Pre-release

Highlights

  • Public release of the Mithril client library available for developers.
  • Support for slim certificates produced by the Mithril aggregator (1).
  • Bug fixes and performance improvements.

(1): requires Mithril client (a.k.a mithril-client-cli) 0.5.5+ for restoration ⚠️.

What's Changed

  • Aggregator keyreg bottleneck by @Alenar in #1295
  • Update current documentation by @jpraynaud in #1307
  • Add missing configuration parameters in signer documentation by @jpraynaud in #1317
  • Explorer certificates list & signers summary by @Alenar in #1309
  • rework client to export mithril API by @ghubertpalo in #1291
  • Handle sqlite access using a ConnectionWithFullMutex by @Alenar in #1316
  • total_stake calculation corrected by @curiecrypt in #1308
  • Fix aggregator HTTP server CORS by @jpraynaud in #1318
  • add soft limit in certificate query by @ghubertpalo in #1314
  • Simplify certificate verifier usage by @Alenar in #1319
  • Rename mithril-client to mithril-client-cli by @Alenar in #1320
  • Client regressions in snapshot list and download by @dlachaumepalo in #1323
  • Enhance Mithril nodes devnet Docker images by @jpraynaud in #1324
  • Fix devnet crashing at startup by @jpraynaud in #1329
  • Fix client CLI Docker package name in CI/CD by @jpraynaud in #1330
  • Revert "add soft limit in certificate query" by @ghubertpalo in #1328
  • Add Mithril end to end instructions for --skip-cardano-bin-download command by @dlachaumepalo in #1331
  • Greg/1310/lower serialization by @ghubertpalo in #1333
  • Fix certificate chain hashes recomputation by @jpraynaud in #1337
  • Enhance end to end readme and fix work_directory default value on MacOS by @dlachaumepalo in #1338
  • Add SSH key by @dlachaumepalo in #1339
  • Add linebreak after last ssh key by @dlachaumepalo in #1340
  • Redesign mithril client api by @Alenar in #1332
  • Add subnote and git command for unstable release by @dlachaumepalo in #1334
  • Fix github action contains expression by @dlachaumepalo in #1342
  • Simplify common deps by @Alenar in #1341
  • Fix certificate hashes re-computation in aggregator by @jpraynaud in #1345
  • enhance Aggregator REST API performances by @ghubertpalo in #1347
  • Mithril client and common crates preparation for publication by @jpraynaud in #1349
  • Upgrade dependencies by @jpraynaud in #1351
  • Mithril relay P2P network for signatures PoC by @jpraynaud in #1346
  • Use Cardano node custom version CI/CD by @jpraynaud in #1359
  • Manual deployment of test Mithril network by @jpraynaud in #1358
  • Runbooks for test distributions and deployments by @jpraynaud in #1360
  • HTTP message service by @ghubertpalo in #1353
  • Mithril-client-lib: Gate snapshot download & message computation behind a feature by @Alenar in #1344
  • Fix Mithril relay Rust doc by @jpraynaud in #1364
  • Standardize default environment file path of Signer node configuration for SPOs by @dlachaumepalo in #1365

Full Changelog: 2342.0...2347.0-pre

Crates Versions

Crate Version
mithril-aggregator 0.4.12
mithril-client 0.5.7
mithril-client-cli 0.5.5
mithril-common 0.2.135
mithril-signer 0.2.90
mithril-stm 0.3.10

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2342.0

23 Oct 10:20
e5ae362
Compare
Choose a tag to compare

Highlights

  • Support for SPO tickers displayed next to their pool Ids in the Mithril explorer.
  • Support for producing slim Docker images for the Mithril nodes.
  • Bug fixes and performance improvements.

What's Changed

  • Implement anyhow context in aggregator runtime by @dlachaumepalo in #1240
  • Implement anyhow context in aggregator/services by @dlachaumepalo in #1242
  • Implement anyhow context in aggregator/signer_register by @dlachaumepalo in #1243
  • Implement anyhow context in aggregator/snapshotter by @dlachaumepalo in #1246
  • refactored aggregator client errors by @ghubertpalo in #1245
  • refactored client configuration errors by @ghubertpalo in #1248
  • Use anyhow in aggregator multi-signer by @jpraynaud in #1247
  • refactor common sqlite errors by @ghubertpalo in #1249
  • Add anyhow context mithril-client/aggregator-client by @dlachaumepalo in #1250
  • Add anyhow context in mithril-client/commands by @dlachaumepalo in #1252
  • Add anyhow context in mithril-client/dependencies by @dlachaumepalo in #1253
  • Fix aggregator stress test bottleneck with client traffic by @jpraynaud in #1251
  • Use anyhow in signer single-signer by @jpraynaud in #1255
  • Update current documentation by @jpraynaud in #1258
  • Fix terraform composite action by @jpraynaud in #1259
  • Add anyhow context for mithril-client/services by @dlachaumepalo in #1256
  • remove store error by @ghubertpalo in #1257
  • Fix explorer display units by @jpraynaud in #1261
  • Get rid of string error comparison in tests by @dlachaumepalo in #1260
  • Add errors standards ADR by @jpraynaud in #1266
  • Add anyhow in integration & e2e tests by @Alenar in #1264
  • Enhance signer setup guide for SPO by @jpraynaud in #1263
  • Use source attribute in wrapped errors by @Alenar in #1268
  • Add a JSON message response on /aggregator endpoint calls by @dlachaumepalo in #1270
  • Benchmark aggregator performances by @jpraynaud in #1271
  • Upgrade dependencies by @jpraynaud in #1275
  • Add Mithril networks status page in website footer by @jpraynaud in #1278
  • Add signers ticker automatic import process + /signers/tickers route to aggregator http server by @Alenar in #1276
  • Deploy infrastructure for SPO tickers by @jpraynaud in #1279
  • Update flake.lock by @yvan-sraka in #1281
  • SPO tickers in explorer by @Alenar in #1280
  • Upgrade Rust 1.73.0 by @jpraynaud in #1285
  • Cache /signers/tickers calls in explorer by @Alenar in #1286
  • Prettier formatter for explorer by @Alenar in #1288
  • Upgrade dependencies by @dlachaumepalo in #1289
  • Fix mithril-stm WASM build by @jpraynaud in #1290
  • Infrastructure VM upgrade runbook by @jpraynaud in #1293
  • Rename GPG public key in releases by @jpraynaud in #1294
  • Mithril relay security advisory dev blog post by @jpraynaud in #1296
  • Fix missing aggregator configuration in devnet by @jpraynaud in #1297
  • Fix typo in relay security advisory dev blog post by @jpraynaud in #1301
  • Publish multiple packages to crates.io by @jpraynaud in #1299
  • Upgrade dependencies by @jpraynaud in #1304
  • Update contributing guidelines by @jpraynaud in #1305
  • Refactor Dockerfile.ci to slim containers by @TrevorBenson in #1302

New Contributors

Full Changelog: 2337.0...2342.0

Crates Versions

Crate Version
mithril-aggregator 0.3.111
mithril-client 0.4.12
mithril-common 0.2.126
mithril-signer 0.2.87
mithril-stm 0.3.8

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2342.0-pre

19 Oct 08:44
e5ae362
Compare
Choose a tag to compare
Mithril v2342.0-pre Pre-release
Pre-release

Highlights

  • Support for SPO tickers displayed next to their pool Ids in the Mithril explorer.
  • Support for producing slim Docker images for the Mithril nodes.
  • Bug fixes and performance improvements.

What's Changed

  • Implement anyhow context in aggregator runtime by @dlachaumepalo in #1240
  • Implement anyhow context in aggregator/services by @dlachaumepalo in #1242
  • Implement anyhow context in aggregator/signer_register by @dlachaumepalo in #1243
  • Implement anyhow context in aggregator/snapshotter by @dlachaumepalo in #1246
  • refactored aggregator client errors by @ghubertpalo in #1245
  • refactored client configuration errors by @ghubertpalo in #1248
  • Use anyhow in aggregator multi-signer by @jpraynaud in #1247
  • refactor common sqlite errors by @ghubertpalo in #1249
  • Add anyhow context mithril-client/aggregator-client by @dlachaumepalo in #1250
  • Add anyhow context in mithril-client/commands by @dlachaumepalo in #1252
  • Add anyhow context in mithril-client/dependencies by @dlachaumepalo in #1253
  • Fix aggregator stress test bottleneck with client traffic by @jpraynaud in #1251
  • Use anyhow in signer single-signer by @jpraynaud in #1255
  • Update current documentation by @jpraynaud in #1258
  • Fix terraform composite action by @jpraynaud in #1259
  • Add anyhow context for mithril-client/services by @dlachaumepalo in #1256
  • remove store error by @ghubertpalo in #1257
  • Fix explorer display units by @jpraynaud in #1261
  • Get rid of string error comparison in tests by @dlachaumepalo in #1260
  • Add errors standards ADR by @jpraynaud in #1266
  • Add anyhow in integration & e2e tests by @Alenar in #1264
  • Enhance signer setup guide for SPO by @jpraynaud in #1263
  • Use source attribute in wrapped errors by @Alenar in #1268
  • Add a JSON message response on /aggregator endpoint calls by @dlachaumepalo in #1270
  • Benchmark aggregator performances by @jpraynaud in #1271
  • Upgrade dependencies by @jpraynaud in #1275
  • Add Mithril networks status page in website footer by @jpraynaud in #1278
  • Add signers ticker automatic import process + /signers/tickers route to aggregator http server by @Alenar in #1276
  • Deploy infrastructure for SPO tickers by @jpraynaud in #1279
  • Update flake.lock by @yvan-sraka in #1281
  • SPO tickers in explorer by @Alenar in #1280
  • Upgrade Rust 1.73.0 by @jpraynaud in #1285
  • Cache /signers/tickers calls in explorer by @Alenar in #1286
  • Prettier formatter for explorer by @Alenar in #1288
  • Upgrade dependencies by @dlachaumepalo in #1289
  • Fix mithril-stm WASM build by @jpraynaud in #1290
  • Infrastructure VM upgrade runbook by @jpraynaud in #1293
  • Rename GPG public key in releases by @jpraynaud in #1294
  • Mithril relay security advisory dev blog post by @jpraynaud in #1296
  • Fix missing aggregator configuration in devnet by @jpraynaud in #1297
  • Fix typo in relay security advisory dev blog post by @jpraynaud in #1301
  • Publish multiple packages to crates.io by @jpraynaud in #1299
  • Upgrade dependencies by @jpraynaud in #1304
  • Update contributing guidelines by @jpraynaud in #1305
  • Refactor Dockerfile.ci to slim containers by @TrevorBenson in #1302

New Contributors

Full Changelog: 2337.0...2342.0-pre

Crates Versions

Crate Version
mithril-aggregator 0.3.111
mithril-client 0.4.12
mithril-common 0.2.126
mithril-signer 0.2.87
mithril-stm 0.3.8

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link public-key.gpg and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./public-key.gpg

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./public-key.gpg ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2337.0

25 Sep 10:52
7d5a683
Compare
Choose a tag to compare

Highlights

  • Support for zstandard compression algorithm for creating snapshot archives (1).
  • Support for Cardano node version used to create archive in the snapshot metadata.
  • Support for recording download statistics in the aggregator.

(1): requires Mithril client 0.4.2+ for restoration ⚠️.

What's Changed

  • Use zstandard compression for snapshot archives by @Alenar in #1195
  • Fix Mithril network compatibility in unstable release by @jpraynaud in #1196
  • Add anyhow context for api_version by @dlachaumepalo in #1201
  • Implement anyhow context for beacon_provider by @dlachaumepalo in #1202
  • Update current documentation for distribution 2335.0 by @jpraynaud in #1204
  • Implement anyhow context for certificate chain by @dlachaumepalo in #1205
  • Add Cardano Node version to the artifacts by @ghubertpalo in #1203
  • Stress test aggregator phase 2 by @jpraynaud in #1194
  • add database migration for snapshots by @ghubertpalo in #1209
  • Add snapshot archive compression algorithm in explorer by @jpraynaud in #1210
  • display cardano node version in client by @ghubertpalo in #1211
  • Enhance aggregator stress tester performances by @jpraynaud in #1214
  • Greg/947/cardano node version doc by @ghubertpalo in #1216
  • compare for avk by @curiecrypt in #1217
  • Implement anyhow context in mithril-common database by @dlachaumepalo in #1212
  • Implement anyhow context for adapters by @dlachaumepalo in #1221
  • Use anyhow in Era framework by @ghubertpalo in #1223
  • refacto message parts by @ghubertpalo in #1225
  • Use compression parameters in the terraform deployments by @jpraynaud in #1222
  • Implement anyhow context in mithril-aggregator database by @dlachaumepalo in #1213
  • Implement anyhow context for signable_builder by @dlachaumepalo in #1226
  • Implement anyhow for common store by @dlachaumepalo in #1227
  • Add aggregator CDN support in infrastructure by @jpraynaud in #1206
  • Implement anyhow context for digesters by @dlachaumepalo in #1228
  • Implement anyhow context for common/protocol by @dlachaumepalo in #1229
  • Upgrade dependencies by @jpraynaud in #1231
  • Implement anyhow context for artifact builder by @dlachaumepalo in #1232
  • Use anyhow in common/crypto_helper by @jpraynaud in #1224
  • Implement anyhow context for aggregator configuration by @dlachaumepalo in #1236
  • Implement anyhow context: dependency_injection by @dlachaumepalo in #1237
  • Upgrade client version to 0.4.0 by @jpraynaud in #1241
  • Greg/1127/download statistics by @ghubertpalo in #1239
  • Fix record download statistics by @jpraynaud in #1244

Full Changelog: 2335.0...2337.0

Crates Versions

Crate Version
mithril-aggregator 0.3.95
mithril-client 0.4.2
mithril-common 0.2.115
mithril-signer 0.2.80
mithril-stm 0.3.3

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2337.0-pre

21 Sep 13:16
7d5a683
Compare
Choose a tag to compare
Mithril v2337.0-pre Pre-release
Pre-release

Highlights

  • Support for zstandard compression algorithm for creating snapshot archives (1).
  • Support for Cardano node version used to create archive in the snapshot metadata.
  • Support for recording download statistics in the aggregator.

(1): requires Mithril client 0.4.2+ for restoration ⚠️.

What's Changed

  • Use zstandard compression for snapshot archives by @Alenar in #1195
  • Fix Mithril network compatibility in unstable release by @jpraynaud in #1196
  • Add anyhow context for api_version by @dlachaumepalo in #1201
  • Implement anyhow context for beacon_provider by @dlachaumepalo in #1202
  • Update current documentation for distribution 2335.0 by @jpraynaud in #1204
  • Implement anyhow context for certificate chain by @dlachaumepalo in #1205
  • Add Cardano Node version to the artifacts by @ghubertpalo in #1203
  • Stress test aggregator phase 2 by @jpraynaud in #1194
  • add database migration for snapshots by @ghubertpalo in #1209
  • Add snapshot archive compression algorithm in explorer by @jpraynaud in #1210
  • display cardano node version in client by @ghubertpalo in #1211
  • Enhance aggregator stress tester performances by @jpraynaud in #1214
  • Greg/947/cardano node version doc by @ghubertpalo in #1216
  • compare for avk by @curiecrypt in #1217
  • Implement anyhow context in mithril-common database by @dlachaumepalo in #1212
  • Implement anyhow context for adapters by @dlachaumepalo in #1221
  • Use anyhow in Era framework by @ghubertpalo in #1223
  • refacto message parts by @ghubertpalo in #1225
  • Use compression parameters in the terraform deployments by @jpraynaud in #1222
  • Implement anyhow context in mithril-aggregator database by @dlachaumepalo in #1213
  • Implement anyhow context for signable_builder by @dlachaumepalo in #1226
  • Implement anyhow for common store by @dlachaumepalo in #1227
  • Add aggregator CDN support in infrastructure by @jpraynaud in #1206
  • Implement anyhow context for digesters by @dlachaumepalo in #1228
  • Implement anyhow context for common/protocol by @dlachaumepalo in #1229
  • Upgrade dependencies by @jpraynaud in #1231
  • Implement anyhow context for artifact builder by @dlachaumepalo in #1232
  • Use anyhow in common/crypto_helper by @jpraynaud in #1224
  • Implement anyhow context for aggregator configuration by @dlachaumepalo in #1236
  • Implement anyhow context: dependency_injection by @dlachaumepalo in #1237
  • Upgrade client version to 0.4.0 by @jpraynaud in #1241
  • Greg/1127/download statistics by @ghubertpalo in #1239
  • Fix record download statistics by @jpraynaud in #1244

Full Changelog: 2335.0...2337.0-pre

Crates Versions

Crate Version
mithril-aggregator 0.3.95
mithril-client 0.4.2
mithril-common 0.2.115
mithril-signer 0.2.80
mithril-stm 0.3.3

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2335.0

05 Sep 08:39
a6caa1c
Compare
Choose a tag to compare

Highlights

  • Support of simultaneous snapshot archive download and decompression in the client.
  • Support of the snapshot download latest command in client to download the latest snapshot easily.
  • Support of machine readable progress information in the client when used with --json option.
  • Mithril networks compatibility table automatically appended to the releases notes.

What's Changed

  • TW review of references.md by @olgahryniuk in #1134
  • ECS-3077 Apply style guide, tighten some sentences. by @NeilBurgess42 in #1130
  • ECS-3078 review certificates.md, the description of the certificate c… by @NeilBurgess42 in #1135
  • ECS-3079 Review simulation document, apply style guide, some suggesti… by @NeilBurgess42 in #1136
  • ECS-3111 Apply style guide, minor changes. by @NeilBurgess42 in #1143
  • TW review of: aggregator.md & signer.md by @olgahryniuk in #1145
  • ECS-3112 Review architecture.md, apply style guide. by @NeilBurgess42 in #1144
  • ECS-3115 Review client.md, apply IOG style guide. by @NeilBurgess42 in #1146
  • Better unpack error in client by @jpraynaud in #1148
  • Reorganize docs folder by @jpraynaud in #1150
  • Implement prometheus monitor for end to end tests by @jpraynaud in #1139
  • Upgrade explorer to next 13 by @Alenar in #1149
  • Add network production runbooks for Aggregator by @jpraynaud in #1086
  • Registered signers page to explorer by @Alenar in #1157
  • Download latest snapshot & stake distribution if latest is mentioned in Mithril Client commands by @dlachaumepalo in #1110
  • fnv/core verifier by @curiecrypt in #939
  • ECS-3156 Review glossary. Adjust capitalization and bolding. by @NeilBurgess42 in #1158
  • StdResult and StdError as anyhow alias by @Alenar in #1162
  • Protocol key for Operational Certificate by @dlachaumepalo in #1161
  • Upgrade dependencies by @Alenar in #1163
  • Protocol key for verification key signature by @dlachaumepalo in #1164
  • Regression on signer registration by @Alenar in #1166
  • Simplify logs by @Alenar in #1165
  • Protocol key for genesis keys by @dlachaumepalo in #1167
  • Fix broken .#hydraJobs.x86_64-linux.mithril-end-to-end by @yvan-sraka in #1168
  • Call Aggregator API to verify Signer registration by @dlachaumepalo in #1169
  • Protocol key for AVK by @Alenar in #1170
  • Protocol key for era keys by @Alenar in #1171
  • Client snapshot download progress with json output by @Alenar in #1172
  • Fix run-signer-node doc by @dlachaumepalo in #1175
  • Rust version 1.72.0 : fix cargo clippy warning & update dependencies by @dlachaumepalo in #1176
  • Add network compatiblity table to autogenerated releases by @Alenar in #1177
  • Fix network compatibility table generation by @Alenar in #1180
  • Replace git switch with git checkout in docs by @dlachaumepalo in #1178
  • Fix verify archive in aggregator Snapshotter by @jpraynaud in #1179
  • Fix latest digest usage in documentation by @jpraynaud in #1182
  • Fix flaky end to end test by @jpraynaud in #1181
  • Download unpack snapshots simultaneously by @Alenar in #1183
  • Aggregator stress test refactoring by @jpraynaud in #1186
  • Fix disk space warning not displayed in client by @jpraynaud in #1192
  • Add common error: CodecError by @dlachaumepalo in #1193
  • Upgrade ed25519-dalek to v2 by @Alenar in #1189

New Contributors

Full Changelog: 2331.1...2335.0

Crates Versions

Crate Version
mithril-aggregator 0.3.76
mithril-client 0.3.38
mithril-common 0.2.100
mithril-signer 0.2.72
mithril-stm 0.3.1

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2335.0-pre

01 Sep 08:56
a6caa1c
Compare
Choose a tag to compare
Mithril v2335.0-pre Pre-release
Pre-release

What's Changed

  • TW review of references.md by @olgahryniuk in #1134
  • ECS-3077 Apply style guide, tighten some sentences. by @NeilBurgess42 in #1130
  • ECS-3078 review certificates.md, the description of the certificate c… by @NeilBurgess42 in #1135
  • ECS-3079 Review simulation document, apply style guide, some suggesti… by @NeilBurgess42 in #1136
  • ECS-3111 Apply style guide, minor changes. by @NeilBurgess42 in #1143
  • TW review of: aggregator.md & signer.md by @olgahryniuk in #1145
  • ECS-3112 Review architecture.md, apply style guide. by @NeilBurgess42 in #1144
  • ECS-3115 Review client.md, apply IOG style guide. by @NeilBurgess42 in #1146
  • Better unpack error in client by @jpraynaud in #1148
  • Reorganize docs folder by @jpraynaud in #1150
  • Implement prometheus monitor for end to end tests by @jpraynaud in #1139
  • Upgrade explorer to next 13 by @Alenar in #1149
  • Add network production runbooks for Aggregator by @jpraynaud in #1086
  • Registered signers page to explorer by @Alenar in #1157
  • Download latest snapshot & stake distribution if latest is mentioned in Mithril Client commands by @dlachaumepalo in #1110
  • fnv/core verifier by @curiecrypt in #939
  • ECS-3156 Review glossary. Adjust capitalization and bolding. by @NeilBurgess42 in #1158
  • StdResult and StdError as anyhow alias by @Alenar in #1162
  • Protocol key for Operational Certificate by @dlachaumepalo in #1161
  • Upgrade dependencies by @Alenar in #1163
  • Protocol key for verification key signature by @dlachaumepalo in #1164
  • Regression on signer registration by @Alenar in #1166
  • Simplify logs by @Alenar in #1165
  • Protocol key for genesis keys by @dlachaumepalo in #1167
  • Fix broken .#hydraJobs.x86_64-linux.mithril-end-to-end by @yvan-sraka in #1168
  • Call Aggregator API to verify Signer registration by @dlachaumepalo in #1169
  • Protocol key for AVK by @Alenar in #1170
  • Protocol key for era keys by @Alenar in #1171
  • Client snapshot download progress with json output by @Alenar in #1172
  • Fix run-signer-node doc by @dlachaumepalo in #1175
  • Rust version 1.72.0 : fix cargo clippy warning & update dependencies by @dlachaumepalo in #1176
  • Add network compatiblity table to autogenerated releases by @Alenar in #1177
  • Fix network compatibility table generation by @Alenar in #1180
  • Replace git switch with git checkout in docs by @dlachaumepalo in #1178
  • Fix verify archive in aggregator Snapshotter by @jpraynaud in #1179
  • Fix latest digest usage in documentation by @jpraynaud in #1182
  • Fix flaky end to end test by @jpraynaud in #1181
  • Download unpack snapshots simultaneously by @Alenar in #1183
  • Aggregator stress test refactoring by @jpraynaud in #1186
  • Fix disk space warning not displayed in client by @jpraynaud in #1192
  • Add common error: CodecError by @dlachaumepalo in #1193
  • Upgrade ed25519-dalek to v2 by @Alenar in #1189

New Contributors

Full Changelog: 2331.1...2335.0-pre

Crates Versions

Crate Version
mithril-aggregator 0.3.76
mithril-client 0.3.38
mithril-common 0.2.100
mithril-signer 0.2.72
mithril-stm 0.3.1

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview
testing-preview

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2331.1

09 Aug 09:20
ff06651
Compare
Choose a tag to compare

What's Changed

Full Changelog: 2329.0...2331.1

Networks Compatibility ⚠️

Network Compatible
release-mainnet ✔️
release-preprod ✔️
pre-release-preview ✔️
testing-preview ✔️

Crates Versions

Crate Version
mithril-aggregator 0.3.67
mithril-client 0.3.27
mithril-common 0.2.89
mithril-signer 0.2.65
mithril-stm 0.2.20

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️

Mithril v2331.1-pre

08 Aug 10:04
ff06651
Compare
Choose a tag to compare
Mithril v2331.1-pre Pre-release
Pre-release

What's Changed since 2331.0-pre

Full Changelog: 2331.0-pre...2331.1-pre

What's Changed since 2329.0

Full Changelog: 2329.0...2331.1-pre

Networks Compatibility ⚠️

Network Compatible
release-mainnet
release-preprod
pre-release-preview ✔️
testing-preview ✔️

Crates Versions

Crate Version
mithril-aggregator 0.3.67
mithril-client 0.3.27
mithril-common 0.2.89
mithril-signer 0.2.65
mithril-stm 0.2.20

Linux Requirements

The Linux binaries target glibc: to run them or install the .deb packages you must have glibc version 2.31+ installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+ or Debian 11+ (Bullseye)).

Verify the authenticity of a downloaded asset

Detailed procedure to verify an asset

  • Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
  • Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
  • Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
  • Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***

You must see:

./***YOUR_ASSET_FILE***: OK
  • Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
  • Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key

You must see something like:

gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg:               imported: 1
  • Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc

You must see something like:

gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg:                using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388  E655 899A CD26 B8BC A0D2

The signature is valid if and only if:

  • there is a line with gpg: Good signature from "Input Output / Mithril <[email protected]>"
  • there is a line with Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
  • Step 8:
    If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
    If not, contact us at [[email protected]] and let us know of the outcome of your run of this process ⚠️