Releases: ecadlabs/signatory
Release Notes: v1.1.9 (Patch Release)
Fixes:
- Paris DAL Attestation Fix: Resolved an issue where bakers running a DAL node with attestations experienced errors due to the
gotez
library not handling DAL attestation operations. #508 - Attestation Added to Allowed Operations in Tests: Adjusted test configurations to ensure that DAL attestation operations are correctly handled and tested. #509
Updates:
- Upgraded
gotez
library to version 2.1.2, which addresses theunknown tag 23
error when processing DAL attestations.
Important Notes:
- For bakers running DAL nodes with attestations, ensure that the
attestation_with_dal
operation is included in the signatory configurationallow:
block to permit signing ofattestation_with_dal
operations. - Prior to this fix, bakers attempting to use signatory for DAL attestations likely encountered this error in the logs:
[{"id":"failure","kind":"temporary","msg":"gotez: unknown tag 23"}]
This release is primarily targeted at bakers who need to run DAL attestations smoothly with Signatory.
Binaries and Docker Images:
- Binaries are available on the GitHub Release page.
- Official Docker images are available on Docker Hub for x86 and ARM architectures:
docker pull ecadlabs/signatory:v1.1.9
v1.1.8
Signatory Release Notes 1.1.8
We are excited to announce the release of Signatory version 1.1.8! This update brings new features and important improvements:
New Features
Support for Tezos Protocol Paris
Signatory now includes support for Tezos Protocol Paris. For more information on this protocol, please visit the Tezos Protocol Paris documentation.
Policy Settings for Attestation and Commitment Operations
This release adds support for setting policy on attestation_with_dal
and dal_publish_commitment
operations, providing more control and flexibility in these processes.
Improvements
Dependency Updates
All relevant Go dependencies have been updated to their latest versions, ensuring improved stability, performance, and security.
Additional Information
- Website: Signatory Website
- Twitter/X Handle: @signatoryio
Thank you for your continued support and feedback. We hope you find these updates valuable and look forward to your continued contributions to the Signatory project.
v1.1.8-beta2
Changelog
- c9add9a gotez v2.0.6
v1.1.8-RC0
v1.1.8-beta1
Changelog
- 5464986 gotez version bump
v1.1.7 Oxford2 support
We are pleased to announce the release of Signatory version 1.1.7! This update includes several important enhancements and improvements:
New Features
Support for Tezos Protocol Oxford2
Signatory now includes support for Tezos Protocol Oxford2. For more information on this protocol, please visit the Tezos Protocol Oxford2 documentation.
Improvements
Dependency Updates
All Go dependencies have been updated to their latest versions, ensuring improved stability and security.
Integration Tests for Hashicorp Vault
We have added integration tests for Hashicorp Vault, enhancing our testing suite and ensuring better reliability and performance in secure secret management.
Gotez Library Update
Signatory has been updated to use version 2 of the Gotez library, which is also produced by ECAD Labs Inc. The Gotez library provides comprehensive binary encoding/decoding for Tezos binary data encodings. For more information, please visit the Gotez GitHub repository.
Additional Information
- Website: Signatory Website
- Twitter/X Handle: @signatoryio
Thank you for your continued support and feedback. We hope you find these updates valuable and look forward to your continued contributions to the Signatory project.
Signatory Team
Changelog
v1.1.6-rc
v1.1.5
Summary
We're thrilled to roll out this latest release, which brings a game-changing feature: Hashicorp Vault integration as a key store! This paves the way for more secure and efficient signing operations. This release also includes a slew of bug fixes and enhancements that make the system more robust than ever.
Hashicorp Vault Support
Signatory can now integrate with Hashicorp Vault as a remote backend for signing operations. Setting this up is a breeze—just configure Signatory with the necessary Vault details such as address
, roleID
, secretID
, and transitConfig
. For step-by-step instructions on how to run a development Vault and set up Signatory, check out our Vault Documentation.
A huge shoutout to Dzianis Andreyenka@denisandreenko for contributing this awesome feature.
Multistage Docker Builds
We've made a significant upgrade to our build process by implementing Docker multistage builds and cache busting techniques. These changes have not only slimmed down our Docker images by approximately 25% but also expedited the build process noticeably.
Special thanks to Dzianis Andreyenka@denisandreenko for spearheading these improvements.
What's Changed
- docs update gcp kms vault native authentication by @stephengaudet in #438
- Bump github.com/aws/aws-sdk-go from 1.44.319 to 1.44.323 by @dependabot in #436
- replace slash with hyphen for valid image tags by @stephengaudet in #444
- Bump github.com/go-playground/validator/v10 from 10.15.0 to 10.15.1 by @dependabot in #440
- Bump google.golang.org/api from 0.136.0 to 0.138.0 by @dependabot in #441
- Bump github.com/aws/aws-sdk-go from 1.44.323 to 1.44.328 by @dependabot in #442
- Bump github.com/google/uuid from 1.3.0 to 1.3.1 by @dependabot in #443
- hashicorp vault support by @denisandreenko in #439
- Update testenvs by @stephengaudet in #450
- multistage build (enhancement) by @denisandreenko in #447
- chore: updated go dependencies by @GImbrailo in #468
New Contributors
- @denisandreenko made their first contribution in #439
- @GImbrailo made their first contribution in #468
Changelog
- a9d6ef6 Bump github.com/aws/aws-sdk-go from 1.44.319 to 1.44.323 (#436)
- 652ee43 Bump github.com/aws/aws-sdk-go from 1.44.323 to 1.44.328 (#442)
- 9573818 Bump github.com/go-playground/validator/v10 from 10.15.0 to 10.15.1 (#440)
- be801b2 Bump github.com/google/uuid from 1.3.0 to 1.3.1 (#443)
- c3c407b Bump google.golang.org/api from 0.136.0 to 0.138.0 (#441)
- b6d5be8 Update integration test docker-compose.yml
- a70c527 Update testenvs (#450)
- 50d6129 chore: updated go dependencies (#468)
- ddf37fa hashicorp vault support (#439)
- 17caf86 multistage build (enhancement) (#447)
- e96fd26 replace slash with hyphen for valid image tags (#444)
- cd4f380 update gcp kms vault native authentication (#438)
Full Changelog: v1.1.4...v1.1.5
v1.1.4
Changelog
- 0fc5162 Bump github.com/aws/aws-sdk-go from 1.44.305 to 1.44.318 (#430)
- cc2c737 Bump github.com/go-playground/validator/v10 from 10.14.1 to 10.15.0 (#429)
- 0cd8391 Bump golang.org/x/oauth2 from 0.10.0 to 0.11.0 (#428)
- 97cd7e1 Bump golang.org/x/term from 0.10.0 to 0.11.0 (#427)
- 1ac0b0c Coverage focused testcases (#426)
- 7374c12 Upgrade go to version v1.21.0 and all dependencies (#433)
- e6b1529 avoid device or resource busy error (#437)
v1.1.4-rc
Changelog
- 0fc5162 Bump github.com/aws/aws-sdk-go from 1.44.305 to 1.44.318 (#430)
- cc2c737 Bump github.com/go-playground/validator/v10 from 10.14.1 to 10.15.0 (#429)
- 0cd8391 Bump golang.org/x/oauth2 from 0.10.0 to 0.11.0 (#428)
- 97cd7e1 Bump golang.org/x/term from 0.10.0 to 0.11.0 (#427)
- 1ac0b0c Coverage focused testcases (#426)
- 7374c12 Upgrade go to version v1.21.0 and all dependencies (#433)
- 38f44c3 avoid device or resource busy error