Skip to content

Shark Net, Point Release 2.0

Latest
Compare
Choose a tag to compare
@Sn1F3rt Sn1F3rt released this 28 Mar 15:02
· 3 commits to release since this release

Xolentum Shark Net, Point Release 2.0

Change-log

  • Fix for the inputs signature error when trying to send a transaction.
  • Fix for the reorg depth error. (See note below)
  • Minor bug fixes and improvements.

NOTE: The reorg depth error may still appear in a wallet that hasn't been synced for a while. The current patch only reduces the probability of occurrence of the error, not completely fix it. In case the error appears while opening a wallet with the RPC server, first sync the wallet via the CLI (instructions will be shown when the error appears on CLI, make sure N is greater than the current reorg depth shown on the screen). Note that you may also pass --trusted-daemon argument to the RPC server in order to bypass the error directly.

Contributors

Contributors for this release are @ngeojiajun and @sohamb03 and the Monero Developers.

Using

All the binaries can be used as-is.

Users can also pull the Docker image from here.

Verifying

SHA-256 checksums of the binaries are as follows:

b7ea358c86c4b95fac41d9d1cd4db707efa2a2e6834904a51e7eb35da5219803 *xolentum_v0.3.2.0_linux-x64.zip
c718d6572a814fade3687b6a259b42fd813d713c674c175ff4a12191b39f7ea4 *xolentum_v0.3.2.0_mac-x64.zip
dfac0a89b4eb017bdcb14875afb8ebb237f17f0796c697b89787776f2dbf3b93 *xolentum_v0.3.2.0_win-x64.zip

The binaries have been signed by my PGP key available at public-keys/sohamb03.asc in the repository. A .sig file has been shared for verification of the binaries. To verify the binaries, you have to download the .sig file for the platform you are using and verify using GPG.

For example, on Linux, use gpg --verify xolentum_v0.3.2.0_linux.sig xolentum_v0.3.2.0_linux-x64.zip.