Voting for a new IC release - 2024-01-25_14-09

Hello there!

We are happy to announce that voting is now open for a new IC release and the retirement of old replica version 5c60feaf3d64a745b9a44aa61d44b91d6921541b. The NNS proposal is here: IC NNS Proposal 127461.

Here is a summary of the changes since the last release:

## Features:

  • [ae14ceb79] Boundary Nodes,Node: some nginx-related tweaks, cleanups
  • [9c2eb38f4] Boundary Nodes,Node: Further improve logging, add more fields
  • [5c16cf3d2] Consensus(ecdsa): Fill oldest registry version in use by replicated state
  • [7374d9298] Crypto: Add support for unmasked random IDKG transcripts
  • [c49d40680] Execution,Runtime: Add fetch_canister_logs stub to the management canister API
  • [4bb93cbc9] Execution,Runtime: Add log_visibility to canister_settings
  • [130a4a6af] Execution,Runtime: Query Cache: Initial composite query support
  • [1e942c61b] Networking,Crypto(fuzzing): Implement arbitrary for the callservice fuzzer
  • [91d670548] Node(metrics): permit access to GuestOS version through metrics-proxy.
  • [5413ab16d] Node(telemetry): enable proxying of certain replica metrics from GuestOS to HostOS.

## Bugfixes:

  • [2c8721428] Boundary Nodes,Node: update bouncer, config
  • [3858240d4] Consensus: Log error during CUP making if get_state_at fails
  • [1dce834f7] Consensus: Make certification lookups more efficient (Part 2)
  • [d88a1bd92] Execution,Runtime: Track large Wasm assembly charge
  • [37b70b4dc] Networking(state_sync_manger): Join all outstanding task downloads.
  • [363b3e25d] Node: - Retry ethtool parsing - Fixes SetupOS installation failuresin npm

## Chores:

  • [1c35b20b9] Boundary Nodes,Node(ic-boundary): update ic-boundary args
  • [97c4b3256] Consensus: remove resolve_sig_inputs_refs
  • [b315a1724] Networking: build query service with builder and expose it
  • [b5859f990] Node: Move IPv4 connectivity check to be a separate service
  • [84e4f37ed] Node: Remove ipv6_subnet parameter remnants
  • [037419050] Runtime: Sync wasmparser and wasm-encoder to wasmtime

## Refactoring:

  • [ca65605e2] Crypto: remove unused code and the custom error for failed TLS public key creation

## Tests:

  • [6fdf6d194] Message Routing,T&V: add node signing keys to StateMachine tests
  • [c4c864897] Message Routing,T&V: expose submitting SignedIngress in StateMachine tests
  • [2aa7514bc] Message Routing,T&V: derive subnet IDs and keys from seeds in StateMachine tests
  • [b398704c6] Networking(consensus_manager): fix flakiness in unit tests
  • [d83a79d4e] Runtime: Remove extra test block in integration test

## Other changes:

  • [35bb6c0ee] Boundary Nodes,Node: refactor nginx config
  • [261b6a947] Consensus,Execution,Message Routing(crypto): extract time test utilities into separate crate
  • [fd9304538] Consensus,Execution,Runtime,Interface: Make Time method names more idiomatic
  • [f63f066d7] Execution,T&V: Revert " Enable chunked install"
  • [42cfbcff4] Execution,Runtime: Enable chunked install
  • [8d03521ee] T&V,IDX,Node(k8s-testnets): merge k8s into tests package
  • [da9fc0553] Interface,Consensus: Fix QueryStatsFeatureGate
  • [76f5ebf17] Message Routing: () read api_boundary_nodes from the registry
  • [d24bf43e6] Node: Updating container base images refs [2024-01-24-1007]
  • [1c069ced6] Node: SEV Cleanup
  • [954e4a850] Node: Updating container base images refs [2024-01-23-0736]
  • [69386e157] Node,T&V: () Add domain at node registration
  • [d43bca767] Runtime: Improve DTS slicing for memory copy and remove from system subnets
  • [cfd9466de] Runtime: Allocate memory as requested by Wasmtime
  • [273b11aef] Runtime: Remove LinearMemory trait

IC-OS Verification

To build and verify the IC-OS disk image, run:

# From https://github.com/dfinity/ic#verifying-releases
sudo apt-get install -y curl && curl --proto '=https' --tlsv1.2 -sSLO https://raw.githubusercontent.com/dfinity/ic/5c60feaf3d64a745b9a44aa61d44b91d6921541b/gitlab-ci/tools/repro-check.sh && chmod +x repro-check.sh && ./repro-check.sh -c 5c60feaf3d64a745b9a44aa61d44b91d6921541b

The two SHA256 sums printed above from a) the downloaded CDN image and b) the locally built image, must be identical, and must match the SHA256 from the payload of the NNS proposal.

1 Like

And this week we also have another special build with the new p2p consensus layer enabled. This feature was deployed last week to a number of subnets and performed very well.

Reviewers for the CodeGov project have completed our review of these replica updates.

Proposal ID: 127461
Vote: ADOPT
Full report: CodeGov community Replica Version Management Reviews channel on OpenChat

Proposal ID: 127463
Vote: ADOPT
Full report: CodeGov community Replica Version Management Reviews channel on OpenChat

At the time of this comment on the forum there are still 2 days left in the voting period, which means there is still plenty of time for others to review the proposal and vote independently.

We had several very good reviews of the Release Notes on these proposals by @Zane, @cyberowl, @ZackDS, @massimoalbarello, @ilbert, @Gekctek, and @hpeebles. The IC-OS Verification was also performed by @jwiegley and @tiago89. I recommend folks talk a look and see the excellent work that was performed on these reviews by the entire CodeGov team. Feel free to comment here or in the thread of each respective proposal in our community on OpenChat if you have any questions or suggestions about these reviews.

1 Like

@nikola-milosa @eichhorl

I just wanted to ping you about questions here and here on GitHub that @cyberowl posed regarding commits 3858240d4 and 76f5ebf17, respecively. Here is a direct link to his review. He is concerned about the wrong ordering for an Error log as well as the wrong error for api_bn_id.