Proposal to elect new release rc--2024-04-24_23-01

Hello there!

We are happy to announce that voting is now open for a new IC release.
The NNS proposal is here: IC NNS Proposal 129493.

Here is a summary of the changes since the last release:

Release Notes for release-2024-04-24_23-01-base (80e0363393ea26a36b77e8c75f7f183cb521f67f)

Changelog since git revision abcea3eff0be52dc5328e71de98288991de854bf

Features:

  • cabcd2297 Consensus(schnorr): Generalize pre-signatures over ECDSA and Schnorr
  • 5c30c2286 Consensus(schnorr): Add new types for tSchnorr pre-signatures
  • e96215814 Crypto: Separate purge queue per transcript threshold
  • c3f028272 Execution,Message Routing: Also validate Response deadlines
  • 7acd03147 Execution,Runtime: Persist logs across canister upgrades during happy path
  • 1f0ff0910 Interface,Consensus(schnorr): Add generalized pre-signature types to block payload proto
  • 5fa5b9d4a Message Routing: Introduce hard limit for number of files per page map in LSMT
  • 2b5e3922a Message Routing: Validate slices before insertion into CertifiedSlicePool
  • 36523578c Node: Add build-time check to SetupOS
  • a444cf909 Runtime: Support for wasm64

Bugfixes:

  • b561dbdf3 Consensus: Sleep early to give IPv4 time to configure before logging
  • 60c07a58a Consensus: remove consensus attribute
  • f6415e04c Execution,Runtime: Fix checking heap delta invariant
  • 05000d470 Node: Fix writing metrics “type” in metrics functions and consolidate metrics functions
  • 7b9868747 Runtime,Execution: Use existing system state when executing the start function on a canister

Performance improvements:

  • 2553e4792 Crypto: add benchmarks for threshold Schnorr

Chores:

  • 847abcf9f Consensus(schnorr): Populate MasterPublicKeyId in EcdsaReshareRequest
  • 4e8d1384d Execution: Update error message when calling fetch_canister_logs from canisters
  • 344d0a458 Interface,Consensus(consensus): Remove unneeded fields of ConsensusResponse
  • 2ba705d9a Message Routing: Some additional metrics for merging
  • 796da1812 Networking: migrate cup endpoint to axum
  • ede7a3ea0 Runtime(RUN): Upgrade wasmparser and wasm-encoder
  • dda82cce8 Runtime: Cleanup old metering

Refactoring:

  • e50700544 Consensus: Restructure ECDSA types module to allow addition of Schnorr
  • 9f5e68a46 Crypto: measure complete local vault calls in metrics
  • 1a9b39756 Execution,Runtime: Refactor WASM benchmarks before adding the SIMD benchmarks
  • 1b2d37a47 Networking: remove redundant code in the artifact manager
  • 3cd4c205e Networking: delete more unused code when constructing the P2P/Consensus stack
  • 680bfc742 Networking: simplify the creation of the p2p/consensus stack
  • 176994927 Node,IDX,T&V: Consolidate rootfs file pools
  • 192e1557e Node: Migrate rootfs files into initial manifest map
  • 936a3ef6f Node: Consolidate and organize duplicated mount-generator code

Tests:

  • ce749479f Consensus: Do validate the CUP when the latest state height exceeds the CUP’s height
  • 33415f9e7 Crypto: add more tSchnorr verify_combined_sig tests
  • 50e943c84 Crypto: add a tSchnorr combine_sig_shares test
  • a99d18c63 Crypto: add more tSchnorr verify_sig_share tests
  • 8ffc5ae9b Crypto: add more tSchnorr create_sig_share tests
  • 4140afe55 Crypto: add basic tests for tBIP340 in crypto component
  • 0ef1d3d22 Execution,Runtime: add testing consensus queue invariant
  • 8354b8a25 Execution,Runtime: add more-asserts to execution environment tests
  • 6c404992f Message Routing,T&V: enable DTS in all StateMachine tests by default
  • bedd13dbc Message Routing,Runtime: Add test for the metrics fields of MergeCandidate

Other changes:

  • 3e93018c4 Consensus,Networking,Interface: remove the unused filter functionality
  • ba91f3f7c Execution,Consensus: Fix query stats metric
  • 97655bb0c Execution,Message Routing,Interface: Compatibility tests for enums persisted as part of the replicated state
  • b8dcd48df Execution,Runtime: Implement canister snapshot delete
  • 15d92850a Execution,Runtime: List canister snapshots
  • ecdacdbaf Execution,Message Routing: Remove snapshot_ids field from protobuf
  • f6c874a0b Message Routing,Runtime: Fix slice size
  • 7928bbad3 Message Routing,Runtime: Improve page copying performance.
  • e979f6188 Node: Reduce logging across images
  • 4e2c5a85b Node: Updating container base images refs [2024-04-22-2113]
  • 9f5edcbc9 Node: Add config path for sysfs, configure hugepages
  • cfc230d63 Node: Fix bug in local base targets
  • ade3e329b Node: Updating container base images refs [2024-04-19-0649]
  • 1d742b780 Node: Updating container base images refs [2024-04-18-0834]
  • 36311266f Node: Up the connection limit per host for public metrics.
  • 6eb32e079 Node,Execution,Runtime,Consensus,IDX,T&V: Activate Query Stats
  • e8a2db243 Runtime,Execution,Interface: Actionable Error Message Types
  • b5561e63e Runtime,Execution: SIMD: Add support for v128 globals

IC-OS Verification

To build and verify the IC-OS disk image, run:

# From https://github.com/dfinity/ic#verifying-releases
sudo apt-get install -y curl && curl --proto '=https' --tlsv1.2 -sSLO https://raw.githubusercontent.com/dfinity/ic/80e0363393ea26a36b77e8c75f7f183cb521f67f/gitlab-ci/tools/repro-check.sh && chmod +x repro-check.sh && ./repro-check.sh -c 80e0363393ea26a36b77e8c75f7f183cb521f67f

The two SHA256 sums printed above from a) the downloaded CDN image and b) the locally built image, must be identical, and must match the SHA256 from the payload of the NNS proposal.

3 Likes

Hello there!

We are happy to announce that voting is now open for a new IC release.
The NNS proposal is here: IC NNS Proposal 129494.

Here is a summary of the changes since the last release:

Release Notes for release-2024-04-24_23-01-storage-layer (5e285dcaf77db014ac85d6f96ff392fe461945f5)

Changelog since git revision 80e0363393ea26a36b77e8c75f7f183cb521f67f

Features:

  • 5e285dcaf Interface: Enable new storage layer

IC-OS Verification

To build and verify the IC-OS disk image, run:

# From https://github.com/dfinity/ic#verifying-releases
sudo apt-get install -y curl && curl --proto '=https' --tlsv1.2 -sSLO https://raw.githubusercontent.com/dfinity/ic/5e285dcaf77db014ac85d6f96ff392fe461945f5/gitlab-ci/tools/repro-check.sh && chmod +x repro-check.sh && ./repro-check.sh -c 5e285dcaf77db014ac85d6f96ff392fe461945f5

The two SHA256 sums printed above from a) the downloaded CDN image and b) the locally built image, must be identical, and must match the SHA256 from the payload of the NNS proposal.

1 Like

Images for both proposals are reproducible on my machine, see both results in screenshots below.

Proposal #129493 - 80e0363393ea26a36b77e8c75f7f183cb521f67f

Proposal #129494 - 5e285dcaf77db014ac85d6f96ff392fe461945f5

2 Likes

Hey @DRE-Team @sat @Luka @pietrodimarco @msumme @dmanu @Manu @christian @nikola-milosa

There are a series of excellent questions that have been asked by @Lorimer on the General Public channel of the CodeGov community on OpenChat. Here is a link. I think many of these questions are best answered by the DFINITY team. Would you please take a look and respond as you think is appropriate?

A little background…Lorimer has become extremely active on Taggr over the last several months as a reviewer for code changes. Professionally, he is a full stack web2 developer who has become very interested in the web3 movement and IC. He enjoys reviewing code and web3 governance is one of his favorite topics. He is familiar with Rust and is further developing experience with it through is reviews of Taggr changes. It seems there is a good chance that he will become a reviewer for the CodeGov team for the work we do reviewing Replica Version Management proposals or the work we might start doing to review System Canister Management proposals. At this point, he is feeling his way around NNS governance and trying to better understand IC replica update work process and the role of the CodeGov team. Hence, any feedback you can provide regarding his questions would be greatly appreciated. I also plan to ask DFINITY to invite him to the dfinity<>codegov channel on Slack since many of his questions are similar in nature to topics of discussion there in the past as well.

Thanks for your help!

2 Likes

Reviewers for the CodeGov project have completed our review of these replica updates.

Proposal ID: 129493
Vote: ADOPT
Full report on OpenChat

Proposal ID: 129494
Vote: ADOPT
Full report on OpenChat

At the time of this comment on the forum there are still 2 days left in the voting period, which means there is still plenty of time for others to review the proposal and vote independently.

We had several very good reviews of the Release Notes on these proposals by @Zane, @cyberowl, @ZackDS, @massimoalbarello, @ilbert, and @hpeebles. The IC-OS Verification was also performed by @tiago89. I recommend folks talk a look and see the excellent work that was performed on these reviews by the entire CodeGov team. Feel free to comment here or in the thread of each respective proposal in our community on OpenChat if you have any questions or suggestions about these reviews.

1 Like