Releases: input-output-hk/mithril
Mithril v2331.0-pre
What's Changed
- Fix crates versions not shown in release notes by @jpraynaud in #1070
- Minor editing tweaks to 'Welcome' by @olgahryniuk in #1068
- nix: improve caching strategy to share deps among artifacts. by @jbgi in #1069
- Tech writing review by @olgahryniuk in #1067
- Add
release-mainnet
configuration in documentation and explorer by @jpraynaud in #1065 - Update current documentation by @jpraynaud in #1072
- Add dev blog post for
mainnet
Beta launch by @jpraynaud in #1074 - nix: fix build of common/stm, improve caching by @jbgi in #1077
- Ensemble/668/refacto crypto entities by @ghubertpalo in #1075
- Bundle openssl with released binaries by @Alenar in #1079
- fix verification key (de)serialization by @ghubertpalo in #1088
- TW review by @olgahryniuk in #1087
- Update Mainnet Beta Launch dev blog post by @jpraynaud in #1084
- Enhance Mithril relay configuration by @jpraynaud in #1089
- Remove legacy store adapters & fix prune of stake pool & epoch settings by @Alenar in #1076
- Add
sign
sub-command in aggregatorgenesis
command by @jpraynaud in #1082 - Update dependencies by @jpraynaud in #1093
- Enhance Run a Mithril Signer as an SPO guide by @dlachaumepalo in #1071
- Greg/668/single signature by @ghubertpalo in #1107
- Upgrade Cardano node to
8.1.2
by @jpraynaud in #1092 - Common protocol key type for serialization of Stm types by @Alenar in #1108
- Factorize hardcoded keys by @Alenar in #1109
- Update Mainnet Beta Launch dev blog post by @jpraynaud in #1113
- Getting started: capitalization edits by @olgahryniuk in #1119
- TW review of mithril-aggregator.md by @olgahryniuk in #1117
- Curiecrypt/resolve flaky test by @curiecrypt in #1105
- TW review of mithril-signer.md by @olgahryniuk in #1120
- TW review of mithril-client.md by @olgahryniuk in #1121
- Update
README
by @jpraynaud in #1118 - Update current documentation by @jpraynaud in #1123
- Protocol key for Multi and Genesis signature by @Alenar in #1124
- Simplify epoch type by implementing Deref & TryInto by @Alenar in #1126
- Aggregator Stress Test - Phase 1 by @jpraynaud in #1062
- Ingest metrics/logs in Grafana by @jpraynaud in #1128
- Add signers registered route to aggregator by @Alenar in #1129
Full Changelog: 2329.0...2331.0-pre
Networks Compatibility ⚠️
Network | Compatible |
---|---|
release-mainnet |
⛔ |
release-preprod |
⛔ |
pre-release-preview |
✔️ |
testing-preview |
✔️ |
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.3.66 |
mithril-client | 0.3.26 |
mithril-common | 0.2.89 |
mithril-signer | 0.2.65 |
mithril-stm | 0.2.20 |
Linux Requirements
The Linux binaries target glibc
: to run them or install the .deb
packages you must have glibc
version 2.31+
installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+
or Debian 11+
(Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️
Mithril v2329.0
What's Changed
- Fix documentation by @jpraynaud in #1032
- Fix failing end to end test in Hydra CI by @jpraynaud in #1031
- Remove certificate hash from Artifact by @dlachaumepalo in #1027
- Fix QA issues by @jpraynaud in #1034
- Update dependencies by @jpraynaud in #1036
- Update current documentation by @jpraynaud in #1038
- check epoch when validating certificate chain by @ghubertpalo in #1033
- Update Signer Deployment Models Firewall documentation by @jpraynaud in #1042
- Add monitoring persistent storage by @jpraynaud in #1039
- Fix prometheus infrastructure by @jpraynaud in #1044
- Add
created_at
field in Mithril Stake Distribution messages by @dlachaumepalo in #1047 - #1023 - fix flaky end-to-end tests by @ghubertpalo in #1050
- Add monitoring
loki
endpoint by @jpraynaud in #1046 - CI: Build linux binaries using ubuntu 20-04 and add vulnerabilities check by @Alenar in #1043
- Fix dependency-review check when merging to main by @Alenar in #1054
- Factorize crypto operation by @Alenar in #1045
- Add SPO On-boarding Guide by @jpraynaud in #1051
- Aggregator refactoring: services and dependencies container by @ghubertpalo in #1057
- Add run-only option in mithril-end-to-end test by @dlachaumepalo in #1052
- Add min libc version to distribution release note by @Alenar in #1056
- Fix min libc message in distribution release notes by @Alenar in #1059
- Upgrade Rust
1.71.0
by @jpraynaud in #1060 - Tech writing review by @olgahryniuk in #1061
- Add
mainnet
verification keys & address in infrastructure by @jpraynaud in #1063 - Tech writing review by @olgahryniuk in #1064
- Add
release-mainnet
deployment to CD by @jpraynaud in #1066
New Contributors
- @olgahryniuk made their first contribution in #1061
Full Changelog: 2327.0...2329.0
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.3.53 |
mithril-client | 0.3.20 |
mithril-common | 0.2.79 |
mithril-signer | 0.2.61 |
mithril-stm | 0.2.19 |
Linux Requirements
The Linux binaries target glibc
: to run them or install the .deb
packages you must have glibc
version 2.31+
installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+
or Debian 11+
(Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️
Mithril v2329.0-pre
What's Changed
- Fix documentation by @jpraynaud in #1032
- Fix failing end to end test in Hydra CI by @jpraynaud in #1031
- Remove certificate hash from Artifact by @dlachaumepalo in #1027
- Fix QA issues by @jpraynaud in #1034
- Update dependencies by @jpraynaud in #1036
- Update current documentation by @jpraynaud in #1038
- check epoch when validating certificate chain by @ghubertpalo in #1033
- Update Signer Deployment Models Firewall documentation by @jpraynaud in #1042
- Add monitoring persistent storage by @jpraynaud in #1039
- Fix prometheus infrastructure by @jpraynaud in #1044
- Add
created_at
field in Mithril Stake Distribution messages by @dlachaumepalo in #1047 - #1023 - fix flaky end-to-end tests by @ghubertpalo in #1050
- Add monitoring
loki
endpoint by @jpraynaud in #1046 - CI: Build linux binaries using ubuntu 20-04 and add vulnerabilities check by @Alenar in #1043
- Fix dependency-review check when merging to main by @Alenar in #1054
- Factorize crypto operation by @Alenar in #1045
- Add SPO On-boarding Guide by @jpraynaud in #1051
- Aggregator refactoring: services and dependencies container by @ghubertpalo in #1057
- Add run-only option in mithril-end-to-end test by @dlachaumepalo in #1052
- Add min libc version to distribution release note by @Alenar in #1056
- Fix min libc message in distribution release notes by @Alenar in #1059
- Upgrade Rust
1.71.0
by @jpraynaud in #1060 - Tech writing review by @olgahryniuk in #1061
- Add
mainnet
verification keys & address in infrastructure by @jpraynaud in #1063 - Tech writing review by @olgahryniuk in #1064
- Add
release-mainnet
deployment to CD by @jpraynaud in #1066
New Contributors
- @olgahryniuk made their first contribution in #1061
Full Changelog: 2327.0...2329.0-pre
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.3.53 |
mithril-client | 0.3.20 |
mithril-common | 0.2.79 |
mithril-signer | 0.2.61 |
mithril-stm | 0.2.19 |
Linux Requirements
The Linux binaries target glibc
: to run them or install the .deb
packages you must have glibc
version 2.31+
installed.
Compatible systems include, but are not limited to, Ubuntu 20.04+
or Debian 11+
(Bullseye)).
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️
Mithril v2327.0
What's Changed
- Fix curl commands for latest snapshot digest in docs by @jpraynaud in #943
- Update Mithril logo by @jpraynaud in #940
- Add Certificate list route to aggregator REST API by @jpraynaud in #949
- Update dependencies & rotate current doc by @jpraynaud in #950
- Ensemble/895/mithril client snapshot commands by @ghubertpalo in #951
- Upgrade Rust
1.70.0
by @jpraynaud in #959 - Greg/960/refactoring client by @ghubertpalo in #963
- Stake distribution client subcommand by @ghubertpalo in #966
- 899/greg/ete msd command by @ghubertpalo in #968
- Fix retrieve open message from correct epoch by @jpraynaud in #964
- Fix clean epoch Certifier service by @jpraynaud in #970
- Enhance terraform infrastructure by @jpraynaud in #957
- Enhance ImmutableDigesterError::NotEnoughImmutable error by @dlachaumepalo in #971
- Greg/960/refacto digester by @ghubertpalo in #972
- Fix
Mithril Client multi-platform test
workflow by @jpraynaud in #965 - add blog article about new client API by @ghubertpalo in #975
- Update Mithril Client documentation by @dlachaumepalo in #974
- update client architecture documentation by @ghubertpalo in #976
- Fix aggregator
SIGNING
state dead-loop by @jpraynaud in #985 - Fix snapshot download command error with --download-dir option in client by @dlachaumepalo in #981
- Update dependencies by @jpraynaud in #990
- Upgrade Rust outdated dependencies by @jpraynaud in #992
- Greg/967/stake distribution artifact by @ghubertpalo in #980
- Upgrade Cardano node to
8.1.1
by @jpraynaud in #997 - fix hanging critical error by @ghubertpalo in #996
- Add log with node version at startup in aggregator/signer by @dlachaumepalo in #995
- Signer deployment model by @jpraynaud in #999
- nix: bump crane to fix build. Add basic hydraJobs. by @jbgi in #1002
- Uniformise datetime usage by @Alenar in #994
- Fix rfc3339 datetime migration by @Alenar in #1005
- Update dependencies by @jpraynaud in #1009
- Fix master certificate retrieval by @Alenar in #1007
- Simplify aggregator integration tests by @Alenar in #1003
- Greg/982/refactoring client by @ghubertpalo in #998
- Fix flaky end to end tests by @jpraynaud in #977
- Fix darwin nix build by @jbgi in #1008
- Clean pending_snapshot directory of aggregator by @dlachaumepalo in #1011
- Update dependencies by @jpraynaud in #1014
- refactor client snapshot download by @ghubertpalo in #1012
- Signer deployment model dev blog post by @jpraynaud in #1016
- Aggregator Recompute cert hash command by @Alenar in #1013
- Implement Mithril Relay in infra by @jpraynaud in #1021
- retry when artifact creation failed by @ghubertpalo in #1019
- Update openapi spec examples by @dlachaumepalo in #1020
- Use cargo-nextest to run test on CI and reenable tests report by @Alenar in #1022
- nix: bump nixpkgs to get newer rustc by @jbgi in #1025
- Sqlite upgrade and bundling by @Alenar in #1024
- Add infrastructure monitoring by @jpraynaud in #1026
- Signer verification key discrepancy by @Alenar in #1028
- nix: increase cargo verbosity to avoid hitting max-silent-time by @jbgi in #1029
New Contributors
Full Changelog: 2321.1...2327.0
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.3.46 |
mithril-client | 0.3.14 |
mithril-common | 0.2.73 |
mithril-signer | 0.2.57 |
mithril-stm | 0.2.17 |
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️
Mithril v2327.0-pre
What's Changed
- Fix curl commands for latest snapshot digest in docs by @jpraynaud in #943
- Update Mithril logo by @jpraynaud in #940
- Add Certificate list route to aggregator REST API by @jpraynaud in #949
- Update dependencies & rotate current doc by @jpraynaud in #950
- Ensemble/895/mithril client snapshot commands by @ghubertpalo in #951
- Upgrade Rust
1.70.0
by @jpraynaud in #959 - Greg/960/refactoring client by @ghubertpalo in #963
- Stake distribution client subcommand by @ghubertpalo in #966
- 899/greg/ete msd command by @ghubertpalo in #968
- Fix retrieve open message from correct epoch by @jpraynaud in #964
- Fix clean epoch Certifier service by @jpraynaud in #970
- Enhance terraform infrastructure by @jpraynaud in #957
- Enhance ImmutableDigesterError::NotEnoughImmutable error by @dlachaumepalo in #971
- Greg/960/refacto digester by @ghubertpalo in #972
- Fix
Mithril Client multi-platform test
workflow by @jpraynaud in #965 - add blog article about new client API by @ghubertpalo in #975
- Update Mithril Client documentation by @dlachaumepalo in #974
- update client architecture documentation by @ghubertpalo in #976
- Fix aggregator
SIGNING
state dead-loop by @jpraynaud in #985 - Fix snapshot download command error with --download-dir option in client by @dlachaumepalo in #981
- Update dependencies by @jpraynaud in #990
- Upgrade Rust outdated dependencies by @jpraynaud in #992
- Greg/967/stake distribution artifact by @ghubertpalo in #980
- Upgrade Cardano node to
8.1.1
by @jpraynaud in #997 - fix hanging critical error by @ghubertpalo in #996
- Add log with node version at startup in aggregator/signer by @dlachaumepalo in #995
- Signer deployment model by @jpraynaud in #999
- nix: bump crane to fix build. Add basic hydraJobs. by @jbgi in #1002
- Uniformise datetime usage by @Alenar in #994
- Fix rfc3339 datetime migration by @Alenar in #1005
- Update dependencies by @jpraynaud in #1009
- Fix master certificate retrieval by @Alenar in #1007
- Simplify aggregator integration tests by @Alenar in #1003
- Greg/982/refactoring client by @ghubertpalo in #998
- Fix flaky end to end tests by @jpraynaud in #977
- Fix darwin nix build by @jbgi in #1008
- Clean pending_snapshot directory of aggregator by @dlachaumepalo in #1011
- Update dependencies by @jpraynaud in #1014
- refactor client snapshot download by @ghubertpalo in #1012
- Signer deployment model dev blog post by @jpraynaud in #1016
- Aggregator Recompute cert hash command by @Alenar in #1013
- Implement Mithril Relay in infra by @jpraynaud in #1021
- retry when artifact creation failed by @ghubertpalo in #1019
- Update openapi spec examples by @dlachaumepalo in #1020
- Use cargo-nextest to run test on CI and reenable tests report by @Alenar in #1022
- nix: bump nixpkgs to get newer rustc by @jbgi in #1025
- Sqlite upgrade and bundling by @Alenar in #1024
- Add infrastructure monitoring by @jpraynaud in #1026
- Signer verification key discrepancy by @Alenar in #1028
- nix: increase cargo verbosity to avoid hitting max-silent-time by @jbgi in #1029
New Contributors
Full Changelog: 2321.1...2327.0-pre
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.3.46 |
mithril-client | 0.3.14 |
mithril-common | 0.2.73 |
mithril-signer | 0.2.57 |
mithril-stm | 0.2.17 |
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️
Mithril v2321.1
What's Changed
- Make doc ci reports & fail if there's an error by @Alenar in #890
- add signable builder in signer by @ghubertpalo in #891
- Make
Artifact
usable as trait object by @jpraynaud in #889 - Mithril Stake Distribution Signable builder by @jpraynaud in #885
- Cardano Immutable Files Full Artifact builder in aggregator by @jpraynaud in #900
- Use Signable Builder Service in aggregator by @jpraynaud in #901
- Use Signable Builder Service in signer by @jpraynaud in #903
- Use Artifact Builder Service in aggregator by @jpraynaud in #906
- Handle multiple Signed Entity Types in aggregator/signer runtimes by @jpraynaud in #908
- Update dependencies by @jpraynaud in #923
- Implement new Stake Distribution computation by @jpraynaud in #921
- Implement Artifact routes by @jpraynaud in #924
- Fix legacy snapshot routes redirect by @jpraynaud in #926
- Add mithril stake distribution to explorer by @Alenar in #928
- Fix stake distribution computation for zero stake pools by @jpraynaud in #931
- rename signed entity service by @ghubertpalo in #929
- Update state machines runtime in Aggregator/Signer by @jpraynaud in #934
- Upgrade Cardano node to
8.0.0
by @jpraynaud in #922 - Fix open api version by @jpraynaud in #937
Full Changelog: 2318.0...2321.1
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.3.23 |
mithril-client | 0.2.22 |
mithril-common | 0.2.56 |
mithril-signer | 0.2.46 |
mithril-stm | 0.2.13 |
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️
Mithril v2321.1-pre
What's Changed
- Make doc ci reports & fail if there's an error by @Alenar in #890
- add signable builder in signer by @ghubertpalo in #891
- Make
Artifact
usable as trait object by @jpraynaud in #889 - Mithril Stake Distribution Signable builder by @jpraynaud in #885
- Cardano Immutable Files Full Artifact builder in aggregator by @jpraynaud in #900
- Use Signable Builder Service in aggregator by @jpraynaud in #901
- Use Signable Builder Service in signer by @jpraynaud in #903
- Use Artifact Builder Service in aggregator by @jpraynaud in #906
- Handle multiple Signed Entity Types in aggregator/signer runtimes by @jpraynaud in #908
- Update dependencies by @jpraynaud in #923
- Implement new Stake Distribution computation by @jpraynaud in #921
- Implement Artifact routes by @jpraynaud in #924
- Fix legacy snapshot routes redirect by @jpraynaud in #926
- Add mithril stake distribution to explorer by @Alenar in #928
- Fix stake distribution computation for zero stake pools by @jpraynaud in #931
- rename signed entity service by @ghubertpalo in #929
- Update state machines runtime in Aggregator/Signer by @jpraynaud in #934
- Upgrade Cardano node to
8.0.0
by @jpraynaud in #922 - Fix open api version by @jpraynaud in #937
Full Changelog: 2318.0...2321.1-pre
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.3.23 |
mithril-client | 0.2.22 |
mithril-common | 0.2.56 |
mithril-signer | 0.2.46 |
mithril-stm | 0.2.13 |
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️
Mithril v2321.0-pre
What's Changed
- Make doc ci reports & fail if there's an error by @Alenar in #890
- add signable builder in signer by @ghubertpalo in #891
- Make
Artifact
usable as trait object by @jpraynaud in #889 - Mithril Stake Distribution Signable builder by @jpraynaud in #885
- Cardano Immutable Files Full Artifact builder in aggregator by @jpraynaud in #900
- Use Signable Builder Service in aggregator by @jpraynaud in #901
- Use Signable Builder Service in signer by @jpraynaud in #903
- Use Artifact Builder Service in aggregator by @jpraynaud in #906
- Handle multiple Signed Entity Types in aggregator/signer runtimes by @jpraynaud in #908
- Update dependencies by @jpraynaud in #923
- Implement new Stake Distribution computation by @jpraynaud in #921
- Implement Artifact routes by @jpraynaud in #924
- Fix legacy snapshot routes redirect by @jpraynaud in #926
- Add mithril stake distribution to explorer by @Alenar in #928
- Fix stake distribution computation for zero stake pools by @jpraynaud in #931
- rename signed entity service by @ghubertpalo in #929
- Update state machines runtime in Aggregator/Signer by @jpraynaud in #934
- Upgrade Cardano node to
8.0.0
by @jpraynaud in #922
Full Changelog: 2318.0...2321.0-pre
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.3.22 |
mithril-client | 0.2.21 |
mithril-common | 0.2.56 |
mithril-signer | 0.2.45 |
mithril-stm | 0.2.13 |
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️
Mithril v2318.0
What's Changed
- Create/Migrate
signer
store by @jpraynaud in #861 - Update dependencies by @jpraynaud in #863
- Create/Migrate
single_signature
store by @jpraynaud in #864 - Implement Signable & Artifact Builders by @jpraynaud in #865
- Add flake.nix by @manveru in #811
- #850 Certifier service by @ghubertpalo in #866
- Add open message domain type by @Alenar in #879
- Fix Signer Registration Discrepancy by @jpraynaud in #877
- Implement Artifact Restorer by @jpraynaud in #875
- Update Cardano node to
1.35.7
by @jpraynaud in #882 - Update dependencies by @jpraynaud in #883
- Cleanup legacy single signature store by @jpraynaud in #884
- Mithril Stake Distribution Signable builder in aggregator by @jpraynaud in #867
- Greg/852/immutable signable by @ghubertpalo in #886
- Mithril Stake Distribution Artifact builder in aggregator by @jpraynaud in #887
New Contributors
Full Changelog: 2315.0...2318.0
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.3.8 |
mithril-client | 0.2.19 |
mithril-common | 0.2.44 |
mithril-signer | 0.2.36 |
mithril-stm | 0.2.12 |
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️
Mithril v2318.0-prerelease
What's Changed
- Create/Migrate
signer
store by @jpraynaud in #861 - Update dependencies by @jpraynaud in #863
- Create/Migrate
single_signature
store by @jpraynaud in #864 - Implement Signable & Artifact Builders by @jpraynaud in #865
- Add flake.nix by @manveru in #811
- #850 Certifier service by @ghubertpalo in #866
- Add open message domain type by @Alenar in #879
- Fix Signer Registration Discrepancy by @jpraynaud in #877
- Implement Artifact Restorer by @jpraynaud in #875
- Update Cardano node to
1.35.7
by @jpraynaud in #882 - Update dependencies by @jpraynaud in #883
- Cleanup legacy single signature store by @jpraynaud in #884
- Mithril Stake Distribution Signable builder in aggregator by @jpraynaud in #867
- Greg/852/immutable signable by @ghubertpalo in #886
- Mithril Stake Distribution Artifact builder in aggregator by @jpraynaud in #887
New Contributors
Full Changelog: 2315.0...2318.0-prerelease
Crates Versions
Crate | Version |
---|---|
mithril-aggregator | 0.3.8 |
mithril-client | 0.2.19 |
mithril-common | 0.2.44 |
mithril-signer | 0.2.36 |
mithril-stm | 0.2.12 |
Verify the authenticity of a downloaded asset
Detailed procedure to verify an asset
- Step 1: Identify the downloaded asset on your computer YOUR_ASSET_FILE
- Step 2: Download the signed checksum file from this link CHECKSUM.asc and save it in the same folder as the asset
- Step 3: In your terminal, go to the asset folder by running:
cd ***YOUR_ASSET_FOLDER***
- Step 4: Then verify the checksum of the asset by running:
sha256sum -c ./CHECKSUM.asc 2>/dev/null | grep ***YOUR_ASSET_FILE***
You must see:
./***YOUR_ASSET_FILE***: OK
- Step 5: Download the public key file from this link gpg-public.key and save it in the same folder as the asset
- Step 6: Then import the GPG public key:
gpg --import ./gpg-public.key
You must see something like:
gpg: key : public key "Input Output / Mithril <[email protected]>" imported
gpg: Total number processed: 1
gpg: imported: 1
- Step 7: Then verify the GPG signature of the checksum file:
gpg --verify ./gpg-public.key ./CHECKSUM.asc
You must see something like:
gpg: Signature made Mon 05 Dec 2022 04:53:54 PM CET
gpg: using RSA key 35EDE9D47BBA62A2F388E655899ACD26B8BCA0D2
gpg: Good signature from "Input Output / Mithril <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 35ED E9D4 7BBA 62A2 F388 E655 899A CD26 B8BC A0D2
The signature is valid if and only if:
- there is a line with
gpg: Good signature from "Input Output / Mithril <[email protected]>"
- there is a line with
Primary key fingerprint: 2AC0 7B11 8B23 1443 F544 2D0C 6E2C 1160 3E79 0021
- Step 8:
If you successfully validated all the steps of this process, then you have successfully verified the authenticity of the asset ✔️
If not, contact us at [[email protected]] and let us know of the outcome of your run of this process⚠️