Releases: ethereumproject/go-ethereum
Ethereum Classic Geth v5.5.1
Fixed
- 8a3bc2d Formatting of
status
ingetTransactionReceipt
Signatures for all release artifact archives are included in signatures-v5.5.1-8a3bc2d.tar
. For instructions on using gpg to verify a release artifact, please visit the Verify Release Artifacts page on the Wiki.
All tagged and development downloads are also be available at our automated builds website: http://builds.etcdevteam.com.
Ethereum Classic Geth v5.5.0
Added
- 382aa8f #634 Return
status
fromgetTransactionReceipt
Fixed
Signatures for all release artifact archives are included in signatures-v5.5.0-382aa8f.tar
. For instructions on using gpg to verify a release artifact, please visit the Verify Release Artifacts page on the Wiki.
All tagged and development downloads are also be available at our automated builds website: http://builds.etcdevteam.com.
Ethereum Classic Geth v5.4.3
Added
Changed
Refactored
- ad99cbf #619 Myriad refactoring and improvements to statedb, downloader, fetcher, and p2p/handler mechanisms
- fixes "stuck" download/sync progress when near chain head
- eth/downloader: moving pivot and capped memory usage
- ": terminate state sync cleanly
- ": separate state sync from queue
- ": wait for all fetcher routines to exit before terminating
- ": flush state sync data before exit
- ": improve deliverNode data
- eth: propagate blocks and txs asyncronously
- core/trie: intermediate mempool btw. trie and db
- eth/fetcher: check origin of filter tasks
- eth: don't import propagated blocks during fast sync
- increase timeout for required fork hash checks
- adds new
--display-fmt=gitlike
display logging format - 6f54efa Péter Szilágyi eth: monitor malicious header retrieval requests 4 weeks ago
- 100c522 Various Makefile and build script improvements
Fixed
- 5291a28 #627 Fix ATXI pagination slice-out-of-bounds error
- b1941bf #633 Remove defunct bad block reporting
- 5613579 #632 Fix node key file error
Signatures for all release artifact archives are included in signatures-v5.4.3-5291a28.tar
. For instructions on using gpg to verify a release artifact, please visit the Verify Release Artifacts page on the Wiki.
All tagged and development downloads are also be available at our automated builds website: http://builds.etcdevteam.com.
Ethereum Classic Geth 5.4.1
Security
- Added a warning and prompt to continue when unsafely running geth with an unlocked account while exposing sensitive RPC APIs to the big bad internet (#600)
Fixed
- Panic when attempting concurrent read/writes on state db map (#614)
Signatures for all release artifact archives are included in signatures-v5.4.1-a3d20f6.tar
. For instructions on using gpg to verify a release artifact, please visit the Verify Release Artifacts page on the Wiki.
All tagged and development downloads are also be available at our automated builds website: http://builds.etcdevteam.com.
Ethereum Classic Geth 5.4.0
Added
- additional bootnodes for Morden testnet (#602)
- additional ATXI features and functions: documentation
--atxi --atxi.auto-build
switch to enablegeth atxi-build
function to run concurrently with geth- API
geth_getATXIBuildStatus
to return progress of atxi index build process alongside geth instance geth_getAddressTransactions
acceptsTAG
(eg."latest"
) param for through block argument- alias
geth_getTransactionsByAddress
forgeth_getAddressTransactions
for congruence with existingeth_
transaction endpoints
Refactored
bats
tests to own directory, and to share logic (#593)
Changed
- use
make
instructions in README.md instead of adhoc scripts (#601)
Contributors
.zip.sig
and .tar.gz.sig
files are detached PGP signatures
.zip.asc
and .tar.gz.asc
files are ascii-armored detached PGP signatures
.zip
and .tar.gz
are archive (compressed) files containing the geth
executable
To verify a release with a signature: First, make sure you have a gpg
tool installed, eg. gnupg
or gnupg2
. Then, if you haven't already, you'll need to import the signing key, which you'll find here. This step is included below.
# Import my signing public key
$ wget https://raw.githubusercontent.com/ethereumproject/volunteer/master/Volunteer-Public-Keys/isaac.ardis%40gmail.com
$ gpg —import [email protected]
# Verify
$ gpg -verify geth-classic-linux-v5.4.0-4851b12.tar.gz.asc
gpg: assuming signed data in 'geth-classic-linux-v5.4.0-4851b12.tar.gz'
gpg: Signature made Tue May 29 11:30:22 2018 CEST
gpg: using RSA key B23DC6DC7634399484DEB8A6F36487257419D94C
gpg: Good signature from "Isaac Ardis (ETCDEV Go Developer) <[email protected]>" [ultimate]
All tagged and development downloads are also be available at our automated builds website: http://builds.etcdevteam.com.
Ethereum Classic Geth 5.3.0
Added
- implement personal_ecRecover API method (#566)
Changed
- use deterministic K-value in ECDSA signing algorithm (#565)
- use default
--cache
value1024mb
instead of128mb
(#584)
Fixed
- possibility for
RequireBlockhash
nil pointer when using--sputnikvm
(#586) - failure to build with Golang 1.10.2 because of vendor dependency incompatibility (#582)
- makes
glog
tests deterministic (#580)
Removed
--add-std
flag for Solidity compiler has been deprecated; removed (#589)
Contributors
.zip.sig
and .tar.gz.sig
files are detached PGP signatures
.zip.asc
and .tar.gz.asc
files are ascii-armored detached PGP signatures
.zip
and .tar.gz
are archive (compressed) files containing the geth
executable
To verify a release with a signature: First, make sure you have a gpg
tool installed, eg. gnupg
or gnupg2
. Then, if you haven't already, you'll need to import the signing key, which you'll find here. This step is included below.
# Import my signing public key
$ wget https://raw.githubusercontent.com/ethereumproject/volunteer/master/Volunteer-Public-Keys/tomek%40zdybal.lap.pl.pub
$ gpg --import tomek\@zdybal.lap.pl.pub
# Verify
$ gpg --verify ./geth-classic-linux-v5.3.0-55fb00b.tar.gz.sig
gpg: assuming signed data in './geth-classic-linux-v5.3.0-55fb00b.tar.gz'
gpg: Signature made Fri May 11 08:17:05 2018 JST
gpg: using DSA key 86C9E79D83B626AE95548DC3F157D3BD6E2EED66
gpg: conversion from 'utf-8' to 'US-ASCII' failed: Illegal byte sequence
gpg: Good signature from "Tomasz Zdyba\xc5\x82 (personal) <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
All tagged and development downloads are also be available at our automated builds website: http://builds.etcdevteam.com.
Ethereum Classic Geth 5.2.1
Added
- implement missing debug_setHead api method (#573)
- implement miner_setExtra API method (#569)
- Information about
include
in chain config files. (#567)
Changed
use deterministic K-value in ECDSA signing algorithm (#565)implement personal_ecRecover API method (#566)
Refactored
- chain config globals -> core/, fix requiredHash check and extensibility (#562)
Fixed
- rpc: honour pending requests before tearing conn down (#578)
Contributors
.zip.sig
and .tar.gz.sig
files are detached PGP signatures
.zip.asc
and .tar.gz.asc
files are ascii-armored detached PGP signatures
.zip
and .tar.gz
are archive (compressed) files containing the geth
executable
To verify a release with a signature: First, make sure you have a gpg
tool installed, eg. gnupg
or gnupg2
. Then, if you haven't already, you'll need to import the signing key, which you'll find here. This step is included below.
# Import my signing public key
$ wget https://raw.githubusercontent.com/ethereumproject/volunteer/master/Volunteer-Public-Keys/isaac.ardis%40gmail.com
$ gpg —import [email protected]
# Verify
$ gpg --verify ./geth-classic-win64-v5.2.1-456053c.zip.sig
gpg: assuming signed data in './geth-classic-win64-v5.2.1-456053c.zip'
gpg: Signature made Wed May 2 21:41:00 2018 JST
gpg: using RSA key B23DC6DC7634399484DEB8A6F36487257419D94C
gpg: Good signature from "Isaac Ardis (ETCDEV Go Developer) <[email protected]>" [ultimate]
All tagged and development downloads are also be available at our automated builds website: http://builds.etcdevteam.com.
Ethereum Classic Geth 5.2.0
Added
-
Address/transaction indexing. This feature makes it possible to build, continuously index, and query transactions by associated addresses. Read about it on Medium.
Find documentation for: -
Ability to configure genesis block state allocations via CSV.
-
Added field
includes
to configuration files in order to enable separation of node and chain configuration across arbitrary different files.
Contributors
.zip.sig
and .tar.gz.sig
files are detached PGP signatures
.zip.asc
and .tar.gz.asc
files are ascii-armored detached PGP signatures
.zip
and .tar.gz
are archive (compressed) files containing the geth
executable
To verify a release with a signature: First, make sure you have a gpg
tool installed, eg. gnupg
or gnupg2
. Then, if you haven't already, you'll need to import the signing key, which you'll find here. This step is included below.
# Import my signing public key
$ wget https://raw.githubusercontent.com/ethereumproject/volunteer/master/Volunteer-Public-Keys/isaac.ardis%40gmail.com
$ gpg —import [email protected]
# Verify
$ gpg -verify geth-classic-linux-v5.2.0-480f90a.tar.gz.sig
gpg: assuming signed data in './geth-classic-linux-v5.2.0-480f90a.tar.gz'
gpg: Signature made Wed Apr 18 23:28:56 2018 JST
gpg: using RSA key B23DC6DC7634399484DEB8A6F36487257419D94C
gpg: Good signature from "Isaac Ardis (ETCDEV Go Developer) <[email protected]>" [ultimate]
All tagged and development downloads are also be available at our automated builds website: http://builds.etcdevteam.com.
Ethereum Classic Geth 5.1.1
Fixed
Contributors
.zip.sig
and .tar.gz.sig
files are detached PGP signatures
.zip.asc
and .tar.gz.asc
files are ascii-armored detached PGP signatures
.zip
and .tar.gz
are archive (compressed) files containing the geth
executable
To verify a release with a signature: First, make sure you have a gpg
tool installed, eg. gnupg
or gnupg2
. Then, if you haven't already, you'll need to import the signing key, which you'll find here. This step is included below.
# Import my signing public key
$ wget https://raw.githubusercontent.com/ethereumproject/volunteer/master/Volunteer-Public-Keys/isaac.ardis%40gmail.com
$ gpg —import [email protected]
# Verify
$ gpg -verify geth-classic-linux-v5.1.1-003aa6f.tar.gz.sig geth-classic-linux-v5.1.1-003aa6f.tar.gz
gpg: assuming signed data in './geth-classic-linux-v5.1.1-003aa6f.tar.gz'
gpg: Signature made Thu Apr 5 17:29:56 2018 CDT
gpg: using RSA key B23DC6DC7634399484DEB8A6F36487257419D94C
gpg: Good signature from "Isaac Ardis (ETCDEV Go Developer) <[email protected]>" [ultimate]
All tagged and development downloads are also available at our automated builds website: http://builds.etcdevteam.com.
Ethereum Classic Geth 5.1.0
Security
- Eclipse attack countermeasures 1,2,3,4,5,6. PR #530, #531, #537
Added
- mlog data points for
wire
protocol,headerchain
,downloader.sync
, and session/client identity values. For more information, please see the API documention. - dial ratio for configuring inbound/dialed connections. PR #522. Thanks @sorpaas!
makefile
for building and testing geth and other executables.- chain configuration and p2p rates added to dash display. PR #497. Thanks @ManushB!
Refactored
- state sync refactored to be fully independent from other downloads. PR #506. Thanks @fjl!
- improve code formatting coverage via
gofmt
. PR #538 - eth/handler: don't call
peer.sync
more than necessary. PR #505
Removed
- extraneous vendor files
- old TravisCI key
Fixed
- sync issue where head could get stuck, likely because of broken downloader timeouts and/or error in processing content. Issue #398
- JSON-RPC
eth_sign
accepts variable data param. For more information, see JSON-RPC documentation. PR #513 TestBcForkUncleTests
made to be deterministic. PR #515- Windows colorable console output. PR #523
Contributors
.zip.sig
and .tar.gz.sig
files are detached PGP signatures
.zip.asc
and .tar.gz.asc
files are ascii-armored detached PGP signatures
.zip
and .tar.gz
are archive (compressed) files containing the geth
executable
To verify a release with a signature: First, make sure you have a gpg
tool installed, eg. gnupg
or gnupg2
. Then, if you haven't already, you'll need to import the signing key, which you'll find here. This step is included below.
# Import my signing public key
$ wget https://raw.githubusercontent.com/ethereumproject/volunteer/master/Volunteer-Public-Keys/tomek%40zdybal.lap.pl.pub
$ gpg —import [email protected]
# Verify
$ gpg --verify geth-classic-linux-v5.1.0-bb1e7b5.tar.gz.asc
gpg: assuming signed data in 'geth-classic-linux-v5.1.0-bb1e7b5.tar.gz'
gpg: Signature made Tue 27 Mar 2018 03:30:20 PM CEST
gpg: using DSA key 86C9E79D83B626AE95548DC3F157D3BD6E2EED66
gpg: Good signature from "Tomasz Zdybał (personal) <[email protected]>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 86C9 E79D 83B6 26AE 9554 8DC3 F157 D3BD 6E2E ED66
All tagged and development downloads are also be available at our automated builds website: http://builds.etcdevteam.com.