Releases: mantlenetworkio/mantle-v2
1.1.0 Sepolia Everest
Sepolia Everest Release
This release has optimized the way in which the Mantle network accesses EigenDA. We have introduced the EigenDA Proxy component, developed by the EigenDA team. Furthermore, we have enabled S3 and Redis caching for the internally deployed EigenDA Proxy, thereby enhancing the stability of the Mantle network. Additionally, we have changed the maximum size of the submitted EigenDA blob from 2MB to 4MB.
Changelog
- Change the maximum size of the submitted EigenDA blob from 2MB to 4MB (#184)
- EigenDA Proxy integration (#185)
Docker Images
https://hub.docker.com/u/mantlenetworkio
- mantlenetworkio/mantle-op-node:(v1.1.0)
1.0.2
This release mainly optimizes the logic of Op-Batcher DA submission.
- Optimized the logic related to the submission of EigenDA.
- Added the ability to switch between EigenDA and Ethereum Blob based on configuration.
- Added verification for the commitment returned by EigenDA.
This version was forked from Optimism v1.1.0 .
Changelog
op-batcher: optimizes DA submission #179
Docker Images
https://hub.docker.com/r/mantlenetworkio/op-node/tags
- mantlenetworkio/op-node:v1.0.2
1.0.1
1.0.0
This release includes several important functionalities such as using MNT as the native token, implementing Mantle DA as the DA layer, and includes several bug fixes to improve system security and stability.
This version was forked from Optimism v1.1.0 .
Changelog
0.5.0
This release includes several important functionalities such as using MNT as the native token, implementing Mantle DA as the DA layer, and complement of migration tool for Mantle upgrade.
It's forked from the Release version at v1.1.0.
Changelog
- Uses MNT as the Native Token and Gas Token, replacing Ether. #2 #11
- Adds Mantle DA as the DA layer. #4 #9 #29
- Enhances the Migration Tool to facilitate network upgrades of Mantle OVM versions. #19 #20
- Introduces the gas-oracle module to record the ETH/MNT ratio, utilized for fee calculation and collection. #41
- Supports the use of HSM (Hardware Security Module) for custody of crucial accounts in modules like op-proposer, op-batcher, etc. #43 #55
- Improves end-to-end testing and code unit test coverage. #18 #38 #39