@tzdybal tzdybal released this Aug 3, 2018

Assets 8

Fixed

  • 8a3bc2d Formatting of status in getTransactionReceipt

Signatures for all release artifact archives are included in signatures-v5.5.1-8a3bc2d.tar. For instructions on using gpg to verify a release artifact, please visit the Verify Release Artifacts page on the Wiki.

All tagged and development downloads are also be available at our automated builds website: http://builds.etcdevteam.com.

@tzdybal tzdybal released this Jul 20, 2018 · 2 commits to master since this release

Assets 8

Added

Fixed

  • 01ce9b3 #643 Add missing mixHash in RPC block formatting

Signatures for all release artifact archives are included in signatures-v5.5.0-382aa8f.tar. For instructions on using gpg to verify a release artifact, please visit the Verify Release Artifacts page on the Wiki.

All tagged and development downloads are also be available at our automated builds website: http://builds.etcdevteam.com.

@whilei whilei released this Jul 3, 2018 · 23 commits to master since this release

Assets 8

Added

  • 18b49e9 #607 Include more contextual version information in debug log file headers

Changed

  • b358535 #611 Relegate UPnP-not-mapped unimportant error to lower log level

Refactored

  • ad99cbf #619 Myriad refactoring and improvements to statedb, downloader, fetcher, and p2p/handler mechanisms
    • fixes "stuck" download/sync progress when near chain head
    • eth/downloader: moving pivot and capped memory usage
    • ": terminate state sync cleanly
    • ": separate state sync from queue
    • ": wait for all fetcher routines to exit before terminating
    • ": flush state sync data before exit
    • ": improve deliverNode data
    • eth: propagate blocks and txs asyncronously
    • core/trie: intermediate mempool btw. trie and db
    • eth/fetcher: check origin of filter tasks
    • eth: don't import propagated blocks during fast sync
    • increase timeout for required fork hash checks
    • adds new --display-fmt=gitlike display logging format
    • 6f54efa Péter Szilágyi eth: monitor malicious header retrieval requests 4 weeks ago
  • 100c522 Various Makefile and build script improvements

Fixed


Signatures for all release artifact archives are included in signatures-v5.4.3-5291a28.tar. For instructions on using gpg to verify a release artifact, please visit the Verify Release Artifacts page on the Wiki.

All tagged and development downloads are also be available at our automated builds website: http://builds.etcdevteam.com.

Jun 15, 2018
Merge pull request #627 from ethereumproject/fix/atxi-pagination-slic…
…e-oob

fix atxi pagination OoB possibility
Jun 8, 2018
Frankenstein 2.1: eth,downloader,fetcher,queue,core

@whilei whilei released this Jun 7, 2018 · 219 commits to master since this release

Assets 8

Security

  • Added a warning and prompt to continue when unsafely running geth with an unlocked account while exposing sensitive RPC APIs to the big bad internet (#600)

Fixed

  • Panic when attempting concurrent read/writes on state db map (#614)

Signatures for all release artifact archives are included in signatures-v5.4.1-a3d20f6.tar. For instructions on using gpg to verify a release artifact, please visit the Verify Release Artifacts page on the Wiki.

All tagged and development downloads are also be available at our automated builds website: http://builds.etcdevteam.com.

@whilei whilei released this May 29, 2018 · 229 commits to master since this release

Assets 17

Added

  • additional bootnodes for Morden testnet (#602)
  • additional ATXI features and functions: documentation
    • --atxi --atxi.auto-build switch to enable geth atxi-build function to run concurrently with geth
    • API geth_getATXIBuildStatus to return progress of atxi index build process alongside geth instance
    • geth_getAddressTransactions accepts TAG (eg. "latest") param for through block argument
    • alias geth_getTransactionsByAddress for geth_getAddressTransactions for congruence with existing eth_ transaction endpoints

Refactored

  • bats tests to own directory, and to share logic (#593)

Changed

  • use make instructions in README.md instead of adhoc scripts (#601)

Contributors


.zip.sig and .tar.gz.sig files are detached PGP signatures
.zip.asc and .tar.gz.asc files are ascii-armored detached PGP signatures
.zip and .tar.gz are archive (compressed) files containing the geth executable

To verify a release with a signature: First, make sure you have a gpg tool installed, eg. gnupg or gnupg2. Then, if you haven't already, you'll need to import the signing key, which you'll find here. This step is included below.

# Import my signing public key
$ wget https://raw.githubusercontent.com/ethereumproject/volunteer/master/Volunteer-Public-Keys/isaac.ardis%40gmail.com
$ gpg —import isaac.ardis@gmail.com
# Verify
$ gpg -verify geth-classic-linux-v5.4.0-4851b12.tar.gz.asc
gpg: assuming signed data in 'geth-classic-linux-v5.4.0-4851b12.tar.gz'
gpg: Signature made Tue May 29 11:30:22 2018 CEST
gpg:                using RSA key B23DC6DC7634399484DEB8A6F36487257419D94C
gpg: Good signature from "Isaac Ardis (ETCDEV Go Developer) <isaac.ardis@gmail.com>" [ultimate]

All tagged and development downloads are also be available at our automated builds website: http://builds.etcdevteam.com.

@whilei whilei released this May 14, 2018 · 275 commits to master since this release

Assets 17

Added

  • implement personal_ecRecover API method (#566)

Changed

  • use deterministic K-value in ECDSA signing algorithm (#565)
  • use default --cache value 1024mb instead of 128mb (#584)

Fixed

  • possibility for RequireBlockhash nil pointer when using --sputnikvm (#586)
  • failure to build with Golang 1.10.2 because of vendor dependency incompatibility (#582)
  • makes glog tests deterministic (#580)

Removed

  • --add-std flag for Solidity compiler has been deprecated; removed (#589)

Contributors


.zip.sig and .tar.gz.sig files are detached PGP signatures
.zip.asc and .tar.gz.asc files are ascii-armored detached PGP signatures
.zip and .tar.gz are archive (compressed) files containing the geth executable

To verify a release with a signature: First, make sure you have a gpg tool installed, eg. gnupg or gnupg2. Then, if you haven't already, you'll need to import the signing key, which you'll find here. This step is included below.

# Import my signing public key
$ wget https://raw.githubusercontent.com/ethereumproject/volunteer/master/Volunteer-Public-Keys/tomek%40zdybal.lap.pl.pub
$ gpg --import tomek\@zdybal.lap.pl.pub
# Verify
$ gpg --verify ./geth-classic-linux-v5.3.0-55fb00b.tar.gz.sig
gpg: assuming signed data in './geth-classic-linux-v5.3.0-55fb00b.tar.gz'
gpg: Signature made Fri May 11 08:17:05 2018 JST
gpg:                using DSA key 86C9E79D83B626AE95548DC3F157D3BD6E2EED66
gpg: conversion from 'utf-8' to 'US-ASCII' failed: Illegal byte sequence
gpg: Good signature from "Tomasz Zdyba\xc5\x82 (personal) <tomek@zdybal.lap.pl>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.

All tagged and development downloads are also be available at our automated builds website: http://builds.etcdevteam.com.

@whilei whilei released this May 7, 2018 · 326 commits to master since this release

Assets 17

Added

  • implement missing debug_setHead api method (#573)
  • implement miner_setExtra API method (#569)
  • Information about include in chain config files. (#567)

Changed

  • use deterministic K-value in ECDSA signing algorithm (#565)
  • implement personal_ecRecover API method (#566)

Refactored

  • chain config globals -> core/, fix requiredHash check and extensibility (#562)

Fixed

  • rpc: honour pending requests before tearing conn down (#578)

Contributors


.zip.sig and .tar.gz.sig files are detached PGP signatures
.zip.asc and .tar.gz.asc files are ascii-armored detached PGP signatures
.zip and .tar.gz are archive (compressed) files containing the geth executable

To verify a release with a signature: First, make sure you have a gpg tool installed, eg. gnupg or gnupg2. Then, if you haven't already, you'll need to import the signing key, which you'll find here. This step is included below.

# Import my signing public key
$ wget https://raw.githubusercontent.com/ethereumproject/volunteer/master/Volunteer-Public-Keys/isaac.ardis%40gmail.com
$ gpg —import isaac.ardis@gmail.com
# Verify
$ gpg --verify ./geth-classic-win64-v5.2.1-456053c.zip.sig
gpg: assuming signed data in './geth-classic-win64-v5.2.1-456053c.zip'
gpg: Signature made Wed May  2 21:41:00 2018 JST
gpg:                using RSA key B23DC6DC7634399484DEB8A6F36487257419D94C
gpg: Good signature from "Isaac Ardis (ETCDEV Go Developer) <isaac.ardis@gmail.com>" [ultimate]

All tagged and development downloads are also be available at our automated builds website: http://builds.etcdevteam.com.

@whilei whilei released this Apr 18, 2018 · 352 commits to master since this release

Assets 17

Added


Contributors


.zip.sig and .tar.gz.sig files are detached PGP signatures
.zip.asc and .tar.gz.asc files are ascii-armored detached PGP signatures
.zip and .tar.gz are archive (compressed) files containing the geth executable

To verify a release with a signature: First, make sure you have a gpg tool installed, eg. gnupg or gnupg2. Then, if you haven't already, you'll need to import the signing key, which you'll find here. This step is included below.

# Import my signing public key
$ wget https://raw.githubusercontent.com/ethereumproject/volunteer/master/Volunteer-Public-Keys/isaac.ardis%40gmail.com
$ gpg —import isaac.ardis@gmail.com
# Verify
$ gpg -verify geth-classic-linux-v5.2.0-480f90a.tar.gz.sig
gpg: assuming signed data in './geth-classic-linux-v5.2.0-480f90a.tar.gz'
gpg: Signature made Wed Apr 18 23:28:56 2018 JST
gpg:                using RSA key B23DC6DC7634399484DEB8A6F36487257419D94C
gpg: Good signature from "Isaac Ardis (ETCDEV Go Developer) <isaac.ardis@gmail.com>" [ultimate]

All tagged and development downloads are also be available at our automated builds website: http://builds.etcdevteam.com.