Releases: lightninglabs/chantools
v0.11.2
Changelog
- Bug fixes
Verifying the Release
In order to verify the release, you'll need to have gpg
or gpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import guggero
's key from keybase:
curl https://keybase.io/guggero/pgp_keys.asc | gpg --import
You should now be able to list all of guggero's keys:
gpg --list-keys --with-subkey-fingerprints F4FC70F07310028424EFC20A8E4256593F177720
Once you have his PGP key you can verify the release (assuming manifest-v0.11.2.sig
and manifest-v0.11.2.txt
are in the current directory) with:
gpg --verify manifest-v0.11.2.sig manifest-v0.11.2.txt
You should see the following if the verification was successful:
gpg: Signature made Mi 29 Jul 2020 14:59:19 CEST
gpg: using RSA key 6E01EEC9656903B0542B8F1003DB6322267C373B
gpg: Good signature from "Oliver Gugger <gugger@gmail.com>" [ultimate]
Primary key fingerprint: F4FC 70F0 7310 0284 24EF C20A 8E42 5659 3F17 7720
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Make sure the key used for the signature is listed in the output of the gpg --list-keys
command from above.
Next, depending on your operating system you should then re-calculate the sha256
sum of the binary, and compare that with the following hashes (which are
cat manifest-v0.11.2.txt
One can use the shasum -a 256 <file name here>
tool in order to re-compute the sha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
Finally, you can also verify the tag itself with the following command:
git verify-tag v0.11.2
v0.11.1
Changelog
- Bug fixes
Verifying the Release
In order to verify the release, you'll need to have gpg
or gpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import guggero
's key from keybase:
curl https://keybase.io/guggero/pgp_keys.asc | gpg --import
You should now be able to list all of guggero's keys:
gpg --list-keys --with-subkey-fingerprints F4FC70F07310028424EFC20A8E4256593F177720
Once you have his PGP key you can verify the release (assuming manifest-v0.11.1.sig
and manifest-v0.11.1.txt
are in the current directory) with:
gpg --verify manifest-v0.11.1.sig manifest-v0.11.1.txt
You should see the following if the verification was successful:
gpg: Signature made Mi 29 Jul 2020 14:59:19 CEST
gpg: using RSA key 6E01EEC9656903B0542B8F1003DB6322267C373B
gpg: Good signature from "Oliver Gugger <gugger@gmail.com>" [ultimate]
Primary key fingerprint: F4FC 70F0 7310 0284 24EF C20A 8E42 5659 3F17 7720
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Make sure the key used for the signature is listed in the output of the gpg --list-keys
command from above.
Next, depending on your operating system you should then re-calculate the sha256
sum of the binary, and compare that with the following hashes (which are
cat manifest-v0.11.1.txt
One can use the shasum -a 256 <file name here>
tool in order to re-compute the sha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
Finally, you can also verify the tag itself with the following command:
git verify-tag v0.11.1
v0.11.0
Changelog
- Use Amboss API for zombie recovery matching
- Add
p2tr
account compatibility inclosepoolaccount
- Fix bug in
sweeptimelockmanual
(#63 by @ziggie1984) - Add new
recoverloopin
command (#66 by @sputn1ck)
Verifying the Release
In order to verify the release, you'll need to have gpg
or gpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import guggero
's key from keybase:
curl https://keybase.io/guggero/pgp_keys.asc | gpg --import
You should now be able to list all of guggero's keys:
gpg --list-keys --with-subkey-fingerprints F4FC70F07310028424EFC20A8E4256593F177720
Once you have his PGP key you can verify the release (assuming manifest-v0.11.0.sig
and manifest-v0.11.0.txt
are in the current directory) with:
gpg --verify manifest-v0.11.0.sig manifest-v0.11.0.txt
You should see the following if the verification was successful:
gpg: Signature made Mi 29 Jul 2020 14:59:19 CEST
gpg: using RSA key 6E01EEC9656903B0542B8F1003DB6322267C373B
gpg: Good signature from "Oliver Gugger <gugger@gmail.com>" [ultimate]
Primary key fingerprint: F4FC 70F0 7310 0284 24EF C20A 8E42 5659 3F17 7720
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Make sure the key used for the signature is listed in the output of the gpg --list-keys
command from above.
Next, depending on your operating system you should then re-calculate the sha256
sum of the binary, and compare that with the following hashes (which are
cat manifest-v0.11.0.txt
One can use the shasum -a 256 <file name here>
tool in order to re-compute the sha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
Finally, you can also verify the tag itself with the following command:
git verify-tag v0.11.0
v0.10.7
Changelog
- Add new
triggerforceclose
command
Verifying the Release
In order to verify the release, you'll need to have gpg
or gpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import guggero
's key from keybase:
curl https://keybase.io/guggero/pgp_keys.asc | gpg --import
You should now be able to list all of guggero's keys:
gpg --list-keys --with-subkey-fingerprints F4FC70F07310028424EFC20A8E4256593F177720
Once you have his PGP key you can verify the release (assuming manifest-v0.10.7.sig
and manifest-v0.10.7.txt
are in the current directory) with:
gpg --verify manifest-v0.10.7.sig manifest-v0.10.7.txt
You should see the following if the verification was successful:
gpg: Signature made Mi 29 Jul 2020 14:59:19 CEST
gpg: using RSA key 6E01EEC9656903B0542B8F1003DB6322267C373B
gpg: Good signature from "Oliver Gugger <gugger@gmail.com>" [ultimate]
Primary key fingerprint: F4FC 70F0 7310 0284 24EF C20A 8E42 5659 3F17 7720
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Make sure the key used for the signature is listed in the output of the gpg --list-keys
command from above.
Next, depending on your operating system you should then re-calculate the sha256
sum of the binary, and compare that with the following hashes (which are
cat manifest-v0.10.7.txt
One can use the shasum -a 256 <file name here>
tool in order to re-compute the sha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
Finally, you can also verify the tag itself with the following command:
git verify-tag v0.10.7
v0.10.6
Changelog
walletinfo
: add--dumpaddrs
flag.derivekey
+genimportscript
: add support for P2TR addresses.
Verifying the Release
In order to verify the release, you'll need to have gpg
or gpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import guggero
's key from keybase:
curl https://keybase.io/guggero/pgp_keys.asc | gpg --import
You should now be able to list all of guggero's keys:
gpg --list-keys --with-subkey-fingerprints F4FC70F07310028424EFC20A8E4256593F177720
Once you have his PGP key you can verify the release (assuming manifest-v0.10.6.sig
and manifest-v0.10.6.txt
are in the current directory) with:
gpg --verify manifest-v0.10.6.sig manifest-v0.10.6.txt
You should see the following if the verification was successful:
gpg: Signature made Mi 29 Jul 2020 14:59:19 CEST
gpg: using RSA key 6E01EEC9656903B0542B8F1003DB6322267C373B
gpg: Good signature from "Oliver Gugger <gugger@gmail.com>" [ultimate]
Primary key fingerprint: F4FC 70F0 7310 0284 24EF C20A 8E42 5659 3F17 7720
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Make sure the key used for the signature is listed in the output of the gpg --list-keys
command from above.
Next, depending on your operating system you should then re-calculate the sha256
sum of the binary, and compare that with the following hashes (which are
cat manifest-v0.10.6.txt
One can use the shasum -a 256 <file name here>
tool in order to re-compute the sha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
Finally, you can also verify the tag itself with the following command:
git verify-tag v0.10.6
v0.10.5
Changelog
dropchannelgraph
: re-add own channels into graph, log warning messages instead of aborting.sweeptimelockmanual
: allow configuring number of keys and number of updates to try while brute-forcing.- maintenance: dockerize linter, add GitHub CI.
- bump
lnd
compatibility tov0.15.1-beta
.
Verifying the Release
In order to verify the release, you'll need to have gpg
or gpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import guggero
's key from keybase:
curl https://keybase.io/guggero/pgp_keys.asc | gpg --import
You should now be able to list all of guggero's keys:
gpg --list-keys --with-subkey-fingerprints F4FC70F07310028424EFC20A8E4256593F177720
Once you have his PGP key you can verify the release (assuming manifest-v0.10.5.sig
and manifest-v0.10.5.txt
are in the current directory) with:
gpg --verify manifest-v0.10.5.sig manifest-v0.10.5.txt
You should see the following if the verification was successful:
gpg: Signature made Mi 29 Jul 2020 14:59:19 CEST
gpg: using RSA key 6E01EEC9656903B0542B8F1003DB6322267C373B
gpg: Good signature from "Oliver Gugger <gugger@gmail.com>" [ultimate]
Primary key fingerprint: F4FC 70F0 7310 0284 24EF C20A 8E42 5659 3F17 7720
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Make sure the key used for the signature is listed in the output of the gpg --list-keys
command from above.
Next, depending on your operating system you should then re-calculate the sha256
sum of the binary, and compare that with the following hashes (which are
cat manifest-v0.10.5.txt
One can use the shasum -a 256 <file name here>
tool in order to re-compute the sha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
Finally, you can also verify the tag itself with the following command:
git verify-tag v0.10.5
v0.10.4
Changelog
- Fixes another bug that lead to some keys being different from
lnd
's sometimes.
Verifying the Release
In order to verify the release, you'll need to have gpg
or gpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import guggero
's key from keybase:
curl https://keybase.io/guggero/pgp_keys.asc | gpg --import
You should now be able to list all of guggero's keys:
gpg --list-keys --with-subkey-fingerprints F4FC70F07310028424EFC20A8E4256593F177720
Once you have his PGP key you can verify the release (assuming manifest-v0.10.4.sig
and manifest-v0.10.4.txt
are in the current directory) with:
gpg --verify manifest-v0.10.4.sig manifest-v0.10.4.txt
You should see the following if the verification was successful:
gpg: Signature made Mi 29 Jul 2020 14:59:19 CEST
gpg: using RSA key 6E01EEC9656903B0542B8F1003DB6322267C373B
gpg: Good signature from "Oliver Gugger <gugger@gmail.com>" [ultimate]
Primary key fingerprint: F4FC 70F0 7310 0284 24EF C20A 8E42 5659 3F17 7720
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Make sure the key used for the signature is listed in the output of the gpg --list-keys
command from above.
Next, depending on your operating system you should then re-calculate the sha256
sum of the binary, and compare that with the following hashes (which are
cat manifest-v0.10.4.txt
One can use the shasum -a 256 <file name here>
tool in order to re-compute the sha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
Finally, you can also verify the tag itself with the following command:
git verify-tag v0.10.4
v0.10.3
Changelog
- Fixes another bug that lead to some keys being different from
lnd
's sometimes.
Verifying the Release
In order to verify the release, you'll need to have gpg
or gpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import guggero
's key from keybase:
curl https://keybase.io/guggero/pgp_keys.asc | gpg --import
You should now be able to list all of guggero's keys:
gpg --list-keys --with-subkey-fingerprints F4FC70F07310028424EFC20A8E4256593F177720
Once you have his PGP key you can verify the release (assuming manifest-v0.10.3.sig
and manifest-v0.10.3.txt
are in the current directory) with:
gpg --verify manifest-v0.10.3.sig manifest-v0.10.3.txt
You should see the following if the verification was successful:
gpg: Signature made Mi 29 Jul 2020 14:59:19 CEST
gpg: using RSA key 6E01EEC9656903B0542B8F1003DB6322267C373B
gpg: Good signature from "Oliver Gugger <gugger@gmail.com>" [ultimate]
Primary key fingerprint: F4FC 70F0 7310 0284 24EF C20A 8E42 5659 3F17 7720
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Make sure the key used for the signature is listed in the output of the gpg --list-keys
command from above.
Next, depending on your operating system you should then re-calculate the sha256
sum of the binary, and compare that with the following hashes (which are
cat manifest-v0.10.3.txt
One can use the shasum -a 256 <file name here>
tool in order to re-compute the sha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
Finally, you can also verify the tag itself with the following command:
git verify-tag v0.10.3
v0.10.2
Changelog
- Fixes a bug in the key derivation that lead to some keys being different from
lnd
's sometimes. See af563bb for more details.
Verifying the Release
In order to verify the release, you'll need to have gpg
or gpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import guggero
's key from keybase:
curl https://keybase.io/guggero/pgp_keys.asc | gpg --import
You should now be able to list all of guggero's keys:
gpg --list-keys --with-subkey-fingerprints F4FC70F07310028424EFC20A8E4256593F177720
Once you have his PGP key you can verify the release (assuming manifest-v0.10.2.sig
and manifest-v0.10.2.txt
are in the current directory) with:
gpg --verify manifest-v0.10.2.sig manifest-v0.10.2.txt
You should see the following if the verification was successful:
gpg: Signature made Mi 29 Jul 2020 14:59:19 CEST
gpg: using RSA key 6E01EEC9656903B0542B8F1003DB6322267C373B
gpg: Good signature from "Oliver Gugger <gugger@gmail.com>" [ultimate]
Primary key fingerprint: F4FC 70F0 7310 0284 24EF C20A 8E42 5659 3F17 7720
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Make sure the key used for the signature is listed in the output of the gpg --list-keys
command from above.
Next, depending on your operating system you should then re-calculate the sha256
sum of the binary, and compare that with the following hashes (which are
cat manifest-v0.10.2.txt
One can use the shasum -a 256 <file name here>
tool in order to re-compute the sha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
Finally, you can also verify the tag itself with the following command:
git verify-tag v0.10.2
v0.10.1
Changelog
- Add
closepoolaccount
command.
Verifying the Release
In order to verify the release, you'll need to have gpg
or gpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import guggero
's key from keybase:
curl https://keybase.io/guggero/pgp_keys.asc | gpg --import
You should now be able to list all of guggero's keys:
gpg --list-keys --with-subkey-fingerprints F4FC70F07310028424EFC20A8E4256593F177720
Once you have his PGP key you can verify the release (assuming manifest-v0.10.1.sig
and manifest-v0.10.1.txt
are in the current directory) with:
gpg --verify manifest-v0.10.1.sig manifest-v0.10.1.txt
You should see the following if the verification was successful:
gpg: Signature made Mi 29 Jul 2020 14:59:19 CEST
gpg: using RSA key 6E01EEC9656903B0542B8F1003DB6322267C373B
gpg: Good signature from "Oliver Gugger <gugger@gmail.com>" [ultimate]
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Make sure the key used for the signature is listed in the output of the gpg --list-keys
command from above.
Next, depending on your operating system you should then re-calculate the sha256
sum of the binary, and compare that with the following hashes (which are
cat manifest-v0.10.1.txt
One can use the shasum -a 256 <file name here>
tool in order to re-compute the sha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
Finally, you can also verify the tag itself with the following command:
git verify-tag v0.10.1