Skip to content

Releases: cosmos/ibc-apps

polytone v1.1.0

13 Aug 18:48
5780375
Compare
Choose a tag to compare

What's Changed

Original Implementation

https://github.com/DA0-DA0/polytone/releases/tag/v1.1.0

ibc-rate-limiting v7.0.0

23 Jul 21:35
295cc86
Compare
Choose a tag to compare

Summary

The module is meant as a safety control in the event of a bug, attack, or economic failure of an external zone. It prevents massive inflows or outflows of IBC tokens in a short time frame.

Imported from Stride-Labs/ibc-rate-limiting.

Implementation

require (
    github.com/cosmos/ibc-apps/modules/rate-limiting/v7 v7.0.0
)

Review the README for further integration instructions and app setup.

ibc-rate-limiting v8.0.0

22 Jul 16:12
fcb70dd
Compare
Choose a tag to compare

Summary

The module is meant as a safety control in the event of a bug, attack, or economic failure of an external zone. It prevents massive inflows or outflows of IBC tokens in a short time frame.

Imported from Stride-Labs/ibc-rate-limiting.

Implementation

require (
    github.com/cosmos/ibc-apps/modules/rate-limiting/v8 v8.0.0
)

Review the README for further integration instructions and app setup.

packet-forward-middleware v8.0.2

04 Apr 21:39
508e57d
Compare
Choose a tag to compare

Note

This release includes the patch for the Mandrake vulnerability

We recommend that you upgrade to the patched version, create a new release for your chain binary, and coordinate an upgrade with validators as soon as reasonable.

In addition to patching packet-forward-middleware, it is imperative that you check the balances of each escrow account against the total supply of each asset on the associated counterparty chain. Failure to verify parity between the escrow accounts and the counterparty total supply can result in a type of Denial-of-Service where users may not be able to unwind their assets through your chain. You can use our escrow checker tool or whatever means you deem fit to validate these balances against the counterparty total supply. If a discrepancy is found, you will need to build an upgrade handler that mints and transfers assets to the escrow account(s) with the discrepancy. Strangelove has provided an example upgrade handler or you can see the upgrade handler used by the Cosmos Hub.

What's Changed

  • Remove gogo/protobuf replace directive in async-icq/v8 by @Taztingo in #168
  • fix: mint and transfer funds back to escrow account on timeout or ack error by @jtieri in #170

Full Changelog: middleware/packet-forward-middleware/v8.0.1...middleware/packet-forward-middleware/v8.0.2

packet-forward-middleware v7.1.3

04 Apr 21:39
9f47ed5
Compare
Choose a tag to compare

Note

This release includes the patch for the Mandrake vulnerability

We recommend that you upgrade to the patched version, create a new release for your chain binary, and coordinate an upgrade with validators as soon as reasonable.

In addition to patching packet-forward-middleware, it is imperative that you check the balances of each escrow account against the total supply of each asset on the associated counterparty chain. Failure to verify parity between the escrow accounts and the counterparty total supply can result in a type of Denial-of-Service where users may not be able to unwind their assets through your chain. You can use our escrow checker tool or whatever means you deem fit to validate these balances against the counterparty total supply. If a discrepancy is found, you will need to build an upgrade handler that mints and transfers assets to the escrow account(s) with the discrepancy. Strangelove has provided an example upgrade handler or you can see the upgrade handler used by the Cosmos Hub.

What's Changed

Full Changelog: middleware/packet-forward-middleware/v7.1.2...middleware/packet-forward-middleware/v7.1.3

packet-forward-middleware v6.1.2

04 Apr 21:39
8e503d4
Compare
Choose a tag to compare

Note

This release includes the patch for the Mandrake vulnerability

We recommend that you upgrade to the patched version, create a new release for your chain binary, and coordinate an upgrade with validators as soon as reasonable.

In addition to patching packet-forward-middleware, it is imperative that you check the balances of each escrow account against the total supply of each asset on the associated counterparty chain. Failure to verify parity between the escrow accounts and the counterparty total supply can result in a type of Denial-of-Service where users may not be able to unwind their assets through your chain. You can use our escrow checker tool or whatever means you deem fit to validate these balances against the counterparty total supply. If a discrepancy is found, you will need to build an upgrade handler that mints and transfers assets to the escrow account(s) with the discrepancy. Strangelove has provided an example upgrade handler or you can see the upgrade handler used by the Cosmos Hub.

What's Changed

  • [BP: release/v6 <- #102] Spelling, grammar, and formatting fixes. by @mergify in #111
  • [BP: release/v6 <- #88] test: use non-deprecated gomock package & fix unit tests by @mergify in #115
  • [BP: release/v6 <- #118] rename: router -> packetforward by @mergify in #121
  • [BP: release/v6 <- #70] Add warning to ibc-hooks docs by @mergify in #125
  • [BP: release/v6 <- #132] chore: export the GetReceiver function by @mergify in #135
  • [BP: release/v6 <- #86] fix!: queries that panic should return ack-err by @mergify in #139
  • fix: mint and transfer funds back to escrow account on timeout or ack error by @jtieri in #172

Full Changelog: middleware/packet-forward-middleware/v6.1.1...middleware/packet-forward-middleware/v6.1.2

packet-forward-middleware v5.2.2

04 Apr 21:39
5099c03
Compare
Choose a tag to compare

Note

This release includes the patch for the Mandrake vulnerability

We recommend that you upgrade to the patched version, create a new release for your chain binary, and coordinate an upgrade with validators as soon as reasonable.

In addition to patching packet-forward-middleware, it is imperative that you check the balances of each escrow account against the total supply of each asset on the associated counterparty chain. Failure to verify parity between the escrow accounts and the counterparty total supply can result in a type of Denial-of-Service where users may not be able to unwind their assets through your chain. You can use our escrow checker tool or whatever means you deem fit to validate these balances against the counterparty total supply. If a discrepancy is found, you will need to build an upgrade handler that mints and transfers assets to the escrow account(s) with the discrepancy. Strangelove has provided an example upgrade handler or you can see the upgrade handler used by the Cosmos Hub.

What's Changed

  • [BP: release/v5 <- #88] test: use non-deprecated gomock package & fix unit tests by @mergify in #114
  • [BP: release/v5 <- #118] rename: router -> packetforward by @mergify in #120
  • [BP: release/v5 <- #70] Add warning to ibc-hooks docs by @mergify in #124
  • [BP: release/v5 <- #132] chore: export the GetReceiver function by @mergify in #134
  • [BP: release/v5 <- #86] fix!: queries that panic should return ack-err by @mergify in #138
  • fix: mint and transfer funds back to escrow account on timeout or ack error by @jtieri in #173

Full Changelog: middleware/packet-forward-middleware/v5.2.1...middleware/packet-forward-middleware/v5.2.2

packet-forward-middleware v4.1.2

04 Apr 21:39
88b2246
Compare
Choose a tag to compare

Note

This release includes the patch for the Mandrake vulnerability

We recommend that you upgrade to the patched version, create a new release for your chain binary, and coordinate an upgrade with validators as soon as reasonable.

In addition to patching packet-forward-middleware, it is imperative that you check the balances of each escrow account against the total supply of each asset on the associated counterparty chain. Failure to verify parity between the escrow accounts and the counterparty total supply can result in a type of Denial-of-Service where users may not be able to unwind their assets through your chain. You can use our escrow checker tool or whatever means you deem fit to validate these balances against the counterparty total supply. If a discrepancy is found, you will need to build an upgrade handler that mints and transfers assets to the escrow account(s) with the discrepancy. Strangelove has provided an example upgrade handler or you can see the upgrade handler used by the Cosmos Hub.

What's Changed

  • [BP: release/v4 <- #88] test: use non-deprecated gomock package & fix unit tests by @mergify in #113
  • [BP: release/v4 <- #118] rename: router -> packetforward by @mergify in #119
  • [BP: release/v4 <- #70] Add warning to ibc-hooks docs by @mergify in #123
  • [BP: release/v4 <- #132] chore: export the GetReceiver function by @mergify in #133
  • [BP: release/v4 <- #86] fix!: queries that panic should return ack-err by @mergify in #137
  • fix: mint and transfer funds back to escrow account on timeout or ack error by @jtieri in #174

Full Changelog: middleware/packet-forward-middleware/v4.1.1...middleware/packet-forward-middleware/v4.1.2

packet-forward-middleware v8.0.1

19 Feb 19:17
f055ce5
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: middleware/packet-forward-middleware/v8.0.0...middleware/packet-forward-middleware/v8.0.1

async-icq v8.0.0

11 Jan 18:37
b152a63
Compare
Choose a tag to compare

Highlights

What's Changed

New Contributors

Full Changelog: modules/async-icq/v7.1.1...modules/async-icq/v8.0.0