Releases

project release date
lib-ledger-core 4.3.10

What's Changed

2022-10-18
lib-ledger-core 4.3.9

What's Changed

2022-10-14
lnd v0.15.3-beta

This is a minor release that contains mainly bug fixes, and contains no new database migrations.

This release fixes a series of bugs related to fee estimation with taproot outputs/inputs, a bug fix to ensure new channels are always properly announced, and fixes an edge case related to zero conf channels.

Verifying the Release

In order to verify the release, you'll need to have gpg or gpg2 installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:

curl https://raw.githubusercontent.com/lightningnetwork/lnd/master/scripts/keys/roasbeef.asc | gpg --import


Once you have the required PGP keys, you can verify the release (assuming manifest-roasbeef-v0.15.3-beta.sig and manifest-v0.15.3-beta.txt are in the current directory) with:

gpg --verify manifest-roasbeef-v0.15.3-beta.sig manifest-v0.15.3-beta.txt


You should see the following if the verification was successful:

gpg: Signature made Mon Oct 17 15:18:02 2022 PDT
gpg:                using RSA key 60A1FA7DA5BFF08BDCBBE7903BBD59E99B280306
gpg: Good signature from &#34;Olaoluwa Osuntokun <laolu32@gmail.com>&#34; [ultimate]


That will verify the signature of the manifest file, which ensures integrity and authenticity of the archive you've downloaded locally containing the binaries. Next, depending on your operating system, you should then re-compute the sha256 hash of the archive with shasum -a 256 <filename>, compare it with the corresponding one in the manifest file, and ensure they match exactly.

Verifying the Release Timestamp

From this new version onwards, in addition time-stamping the git tag with OpenTimeStamps, we'll also now timestamp the manifest file along with its signature. Two new files are now included along with the rest of our release artifacts: manifest-roasbeef-v0.15.3-beta.txt.asc.ots.

Assuming you have the opentimestamps client installed locally, the timestamps can be verified with the following commands:

ots verify manifest-roasbeef-v0.15.3-beta.sig.ots -f manifest-roasbeef-v0.15.3-beta.sig


Alternatively, the open timestamps website can be used to verify timestamps if one doesn't have a bitcoind instance accessible locally.

These timestamps should give users confidence in the integrity of this release even after the key that signed the release expires.

Verifying the Release Binaries

Our release binaries are fully reproducible. Third parties are able to verify that the release binaries were produced properly without having to trust the release manager(s). See our reproducible builds guide for how this can be achieved. The release binaries are compiled with go1.18.2, which is required by verifiers to arrive at the same ones. They include the following build tags: autopilotrpc, signrpc, walletrpc, chainrpc, invoicesrpc, neutrinorpc, routerrpc, watchtowerrpc, monitoring, peersrpc, kvdb_postrgres, and kvdb_etcd. Note that these are already included in the release script, so they do not need to be provided.

The make release command can be used to ensure one rebuilds with all the same flags used for the release. If one wishes to build for only a single platform, then make release sys=<os-arch> tag=<tag> can be used.

Finally, you can also verify the tag itself with the following command:

$git verify-tag v0.15.3-beta gpg: Signature made Mon 17 Oct 2022 05:55:01 PM UTC using RSA key ID 9B280306 gpg: Good signature from &#34;Olaoluwa Osuntokun <laolu32@gmail.com>&#34;  Verifying the Docker Images To verify the lnd and lncli binaries inside the docker images against the signed, reproducible release binaries, there is a verification script in the image that can be called (before starting the container for example): $ docker run --rm --entrypoint=&#34;&#34; lightninglabs/lnd:v0.15.3-beta /verify-install.sh v0.15.3-beta
$OK=$?
$if [ &#34;$OK&#34; -ne &#34;0&#34; ]; then echo &#34;Verification failed!&#34;; exit 1; done
$docker run lightninglabs/lnd [command-line options]  Building the Contained Release Users are able to rebuild the target release themselves without having to fetch any of the dependencies. In order to do so, assuming that vendor.tar.gz and lnd-source-v0.15.3-beta.tar.gz are in the current directory, follow these steps: tar -xvzf vendor.tar.gz tar -xvzf lnd-source-v0.15.3-beta.tar.gz GO111MODULE=on go install -v -mod=vendor -ldflags &#34;-X github.com/lightningnetwork/lnd/build.Commit=v0.15.3-beta&#34; ./cmd/lnd GO111MODULE=on go install -v -mod=vendor -ldflags &#34;-X github.com/lightningnetwork/lnd/build.Commit=v0.15.3-beta&#34; ./cmd/lncli  The -mod=vendor flag tells the go build command that it doesn't need to fetch the dependencies, and instead, they're all enclosed in the local vendor directory. Additionally, it's now possible to use the enclosed release.sh script to bundle a release for a specific system like so: make release sys=&#34;linux-arm64 darwin-amd64&#34;  ⚡️⚡️⚡️ OK, now to the rest of the release notes! ⚡️⚡️⚡️ Release Notes https://github.com/lightningnetwork/lnd/blob/v0-15-3-branch/docs/release-notes/release-notes-0.15.3.md Contributors (Alphabetical Order) 2022-10-17 lnd v0.14.4-beta This release is a back port of the chain synchronization bug fix to the v0.14.x-beta series. Database Migrations This release contains no database migrations. Verifying the Release In order to verify the release, you'll need to have gpg or gpg2 installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already: curl https://raw.githubusercontent.com/lightningnetwork/lnd/master/scripts/keys/roasbeef.asc | gpg --import  Once you have the required PGP keys, you can verify the release (assuming manifest-roasbeef-v0.14.4-beta.sig and manifest-v0.14.4-beta.txt are in the current directory) with: gpg --verify manifest-roasbeef-v0.14.4-beta.sig manifest-v0.14.4-beta.txt  You should see the following if the verification was successful: gpg: Signature made Wed Sep 30 17:35:20 2020 PDT gpg: using RSA key 60A1FA7DA5BFF08BDCBBE7903BBD59E99B280306 gpg: Good signature from &#34;Olaoluwa Osuntokun <laolu32@gmail.com>&#34; [ultimate]  That will verify the signature of the manifest file, which ensures integrity and authenticity of the archive you've downloaded locally containing the binaries. Next, depending on your operating system, you should then re-compute the sha256 hash of the archive with shasum -a 256 <filename>, compare it with the corresponding one in the manifest file, and ensure they match exactly. Verifying the Release Timestamp From this new version onwards, in addition time-stamping the git tag with OpenTimeStamps, we'll also now timestamp the manifest file along with its signature. Two new files are now included along with the rest of our release artifacts: manifest-roasbeef-v0.14.4-beta.txt.asc.ots. Assuming you have the opentimestamps client installed locally, the timestamps can be verified with the following commands: ots verify manifest-roasbeef-v0.14.4-beta.sig.ots -f manifest-roasbeef-v0.14.4-beta.sig  Alternatively, the open timestamps website can be used to verify timestamps if one doesn't have a bitcoind instance accessible locally. These timestamps should give users confidence in the integrity of this release even after the key that signed the release expires. Verifying the Release Binaries Our release binaries are fully reproducible. Third parties are able to verify that the release binaries were produced properly without having to trust the release manager(s). See our reproducible builds guide for how this can be achieved. The release binaries are compiled with go1.17.3, which is required by verifiers to arrive at the same ones. They include the following build tags: autopilotrpc, signrpc, walletrpc, chainrpc, invoicesrpc, routerrpc, watchtowerrpc and monitoring. Note that these are already included in the release script, so they do not need to be provided. The make release command can be used to ensure one rebuilds with all the same flags used for the release. If one wishes to build for only a single platform, then make release sys=<os-arch> tag=<tag> can be used. Finally, you can also verify the tag itself with the following command: $ git verify-tag v0.14.4-beta
gpg: Signature made Tue Sep 15 18:55:00 2020 PDT
gpg:                using RSA key 60A1FA7DA5BFF08BDCBBE7903BBD59E99B280306
gpg: Good signature from &#34;Olaoluwa Osuntokun <laolu32@gmail.com>&#34; [ultimate]


Verifying the Docker Images

To verify the lnd and lncli binaries inside the docker images against the signed, reproducible release binaries, there is a verification script in the image that can be called (before starting the container for example):

$docker run --rm --entrypoint=&#34;&#34; lightninglabs/lnd:v0.14.4-beta /verify-install.sh v0.14.4-beta$ OK=$?$ if [ &#34;$OK&#34; -ne &#34;0&#34; ]; then echo &#34;Verification failed!&#34;; exit 1; done$ docker run lightninglabs/lnd [command-line options]


Building the Contained Release

Users are able to rebuild the target release themselves without having to fetch any of the dependencies. In order to do so, assuming that vendor.tar.gz and lnd-source-v0.14.4-beta.tar.gz are in the current directory, follow these steps:

tar -xvzf vendor.tar.gz
tar -xvzf lnd-source-v0.14.4-beta.tar.gz
GO111MODULE=on go install -v -mod=vendor -ldflags &#34;-X github.com/lightningnetwork/lnd/build.Commit=v0.14.4-beta&#34; ./cmd/lnd
GO111MODULE=on go install -v -mod=vendor -ldflags &#34;-X github.com/lightningnetwork/lnd/build.Commit=v0.14.4-beta&#34; ./cmd/lncli


The -mod=vendor flag tells the go build command that it doesn't need to fetch the dependencies, and instead, they're all enclosed in the local vendor directory.

Additionally, it's now possible to use the enclosed release.sh script to bundle a release for a specific system like so:

make release sys=&#34;linux-arm64 darwin-amd64&#34;


⚡️⚡️⚡️ OK, now to the rest of the release notes! ⚡️⚡️⚡️

Contributors (Alphabetical Order)

• Olaoluwa Osuntokun
2022-10-14

RFC

type rfc # title date status
bip bip-0389 [New BIP 389] Multipath descriptors 2022-10-19 Update
bolt routing gossip BOLT 7: Onion message support (features 38/39) 2022-10-19 Update
bolt X Lightning Specification Meeting 2022/10/10 2022-10-19 Closed
bolt peer protocol bolt2: fee_range clarification 2022-10-17 Update
bolt X Splicing into a musig2 funding output 2022-10-20 Update
bolt X Ability to set inbound and outbound fees 2022-10-20 Update
slip X Adding Peer coin in 718 (previously unreserved) 2022-10-19 Closed
slip slip-0044 Update slip-0044.md 2022-10-17 Merged
slip slip-0032 BIP-32 for BLS signature 2022-10-17 Update
slip X SLIP-xxx signing data with trezor 2022-10-15 Update