Scroll down
Close -

RSK Fingerroot 5.3.0 is Here

Published on: 5 October, 2023

We are pleased to announce the release of the latest version of the RSKj Fingerroot client, now accessible in the RSKj GitHub repository. This update introduces several enhancements to the client’s JSON-RPC interface, along with notable improvements in performance and the resolution of a few non-critical bugs.

While this upgrade is optional, we strongly encourage users to update their nodes to the most recent version for an enhanced experience and to benefit from the latest improvements.

What changes are included in RSK Fingerroot 5.3.0?

A non-comprehensive list of changes included in this version is:

  • Introducing support for `blockNumber` and `blockID` arguments in the `eth_estimateGas` JSON-RPC method in #2080.
  • Ignore replaced transactions in pending transactions gas cost calculations in #2105.
  • Fix the response format on the `eth_hashrate` JSON-RPC method in #2074.
  • Get rid of manual command-line arguments parsing and introduce `–help` and `–version` command-line flags using the Picocli framework in #2027.
  • Show the `rsk_protocolVersion` JSON-RPC method return value as hexadecimal in #2134.
  • Support the `input` field in JSON-RPC requests for compatibility with the Web3js framework library in #2075.
  • Increased receipts cache size and reduced blooms block size in #2127.

You can find a complete list of the changes introduced in the corresponding GitHub milestone.

How do I upgrade to version 5.3.0?

There are no special considerations for upgrading to this version. Users are simply required to download and update their RSKj node; no additional tasks are necessary.

RSKj Fingerroot 5.3.0’s sha256 sum is a9d5c6080aecd96c849e153dd4648072323c772f860c0c4fd812a321fc18ae90 rskj-core-5.3.0-FINGERROOT-all.jar. See the reproducible builds guide for further details.

How do I report problems with this version?

It’s essential for us to know any problem you may have while running Fingerroot 5.3.0. Please reach out on the Rootstock Discord Server or by creating issues in the RSK GitHub repository.

How do I report security vulnerabilities?

If you find a security issue, please contact us at security@rsk.co, or report it through IOVlabs’ bug bounty program. We reward security experts, software developers, and hackers who dedicate time and effort to improving and protecting the RSK platform.

Do you have further questions?

Please get in touch with us through our Rootstock Discord Server for technical questions and support.

You can also reach out with any feedback you would like to share with us through our social media channels and forums:

Twitter: https://twitter.com/rootstock_io

Discord: https://discord.gg/rootstock-842021106956238848

Telegram: https://t.me/rskofficialcommunity