Releases: cosmos/ibc-apps
polytone v1.1.0
ibc-rate-limiting v7.0.0
Summary
The module is meant as a safety control in the event of a bug, attack, or economic failure of an external zone. It prevents massive inflows or outflows of IBC tokens in a short time frame.
Imported from Stride-Labs/ibc-rate-limiting.
Implementation
require (
github.com/cosmos/ibc-apps/modules/rate-limiting/v7 v7.0.0
)
Review the README for further integration instructions and app setup.
ibc-rate-limiting v8.0.0
Summary
The module is meant as a safety control in the event of a bug, attack, or economic failure of an external zone. It prevents massive inflows or outflows of IBC tokens in a short time frame.
Imported from Stride-Labs/ibc-rate-limiting.
Implementation
require (
github.com/cosmos/ibc-apps/modules/rate-limiting/v8 v8.0.0
)
Review the README for further integration instructions and app setup.
packet-forward-middleware v8.0.2
Note
This release includes the patch for the Mandrake vulnerability
We recommend that you upgrade to the patched version, create a new release for your chain binary, and coordinate an upgrade with validators as soon as reasonable.
In addition to patching packet-forward-middleware, it is imperative that you check the balances of each escrow account against the total supply of each asset on the associated counterparty chain. Failure to verify parity between the escrow accounts and the counterparty total supply can result in a type of Denial-of-Service where users may not be able to unwind their assets through your chain. You can use our escrow checker tool or whatever means you deem fit to validate these balances against the counterparty total supply. If a discrepancy is found, you will need to build an upgrade handler that mints and transfers assets to the escrow account(s) with the discrepancy. Strangelove has provided an example upgrade handler or you can see the upgrade handler used by the Cosmos Hub.
What's Changed
- Remove gogo/protobuf replace directive in async-icq/v8 by @Taztingo in #168
- fix: mint and transfer funds back to escrow account on timeout or ack error by @jtieri in #170
Full Changelog: middleware/packet-forward-middleware/v8.0.1...middleware/packet-forward-middleware/v8.0.2
packet-forward-middleware v7.1.3
Note
This release includes the patch for the Mandrake vulnerability
We recommend that you upgrade to the patched version, create a new release for your chain binary, and coordinate an upgrade with validators as soon as reasonable.
In addition to patching packet-forward-middleware, it is imperative that you check the balances of each escrow account against the total supply of each asset on the associated counterparty chain. Failure to verify parity between the escrow accounts and the counterparty total supply can result in a type of Denial-of-Service where users may not be able to unwind their assets through your chain. You can use our escrow checker tool or whatever means you deem fit to validate these balances against the counterparty total supply. If a discrepancy is found, you will need to build an upgrade handler that mints and transfers assets to the escrow account(s) with the discrepancy. Strangelove has provided an example upgrade handler or you can see the upgrade handler used by the Cosmos Hub.
What's Changed
- update PFM integration docs by @Reecepbcups in #147
- Add PFM example by @bd21 in #145
- feat: auto label pull request by @Reecepbcups in #148
- fix: mint and transfer funds back to escrow account on timeout or ack error by @jtieri in #171
Full Changelog: middleware/packet-forward-middleware/v7.1.2...middleware/packet-forward-middleware/v7.1.3
packet-forward-middleware v6.1.2
Note
This release includes the patch for the Mandrake vulnerability
We recommend that you upgrade to the patched version, create a new release for your chain binary, and coordinate an upgrade with validators as soon as reasonable.
In addition to patching packet-forward-middleware, it is imperative that you check the balances of each escrow account against the total supply of each asset on the associated counterparty chain. Failure to verify parity between the escrow accounts and the counterparty total supply can result in a type of Denial-of-Service where users may not be able to unwind their assets through your chain. You can use our escrow checker tool or whatever means you deem fit to validate these balances against the counterparty total supply. If a discrepancy is found, you will need to build an upgrade handler that mints and transfers assets to the escrow account(s) with the discrepancy. Strangelove has provided an example upgrade handler or you can see the upgrade handler used by the Cosmos Hub.
What's Changed
[BP: release/v6 <- #102]
Spelling, grammar, and formatting fixes. by @mergify in #111[BP: release/v6 <- #88]
test: use non-deprecated gomock package & fix unit tests by @mergify in #115[BP: release/v6 <- #118]
rename:router
->packetforward
by @mergify in #121[BP: release/v6 <- #70]
Add warning to ibc-hooks docs by @mergify in #125[BP: release/v6 <- #132]
chore: export the GetReceiver function by @mergify in #135[BP: release/v6 <- #86]
fix!: queries that panic should returnack-err
by @mergify in #139- fix: mint and transfer funds back to escrow account on timeout or ack error by @jtieri in #172
Full Changelog: middleware/packet-forward-middleware/v6.1.1...middleware/packet-forward-middleware/v6.1.2
packet-forward-middleware v5.2.2
Note
This release includes the patch for the Mandrake vulnerability
We recommend that you upgrade to the patched version, create a new release for your chain binary, and coordinate an upgrade with validators as soon as reasonable.
In addition to patching packet-forward-middleware, it is imperative that you check the balances of each escrow account against the total supply of each asset on the associated counterparty chain. Failure to verify parity between the escrow accounts and the counterparty total supply can result in a type of Denial-of-Service where users may not be able to unwind their assets through your chain. You can use our escrow checker tool or whatever means you deem fit to validate these balances against the counterparty total supply. If a discrepancy is found, you will need to build an upgrade handler that mints and transfers assets to the escrow account(s) with the discrepancy. Strangelove has provided an example upgrade handler or you can see the upgrade handler used by the Cosmos Hub.
What's Changed
[BP: release/v5 <- #88]
test: use non-deprecated gomock package & fix unit tests by @mergify in #114[BP: release/v5 <- #118]
rename:router
->packetforward
by @mergify in #120[BP: release/v5 <- #70]
Add warning to ibc-hooks docs by @mergify in #124[BP: release/v5 <- #132]
chore: export the GetReceiver function by @mergify in #134[BP: release/v5 <- #86]
fix!: queries that panic should returnack-err
by @mergify in #138- fix: mint and transfer funds back to escrow account on timeout or ack error by @jtieri in #173
Full Changelog: middleware/packet-forward-middleware/v5.2.1...middleware/packet-forward-middleware/v5.2.2
packet-forward-middleware v4.1.2
Note
This release includes the patch for the Mandrake vulnerability
We recommend that you upgrade to the patched version, create a new release for your chain binary, and coordinate an upgrade with validators as soon as reasonable.
In addition to patching packet-forward-middleware, it is imperative that you check the balances of each escrow account against the total supply of each asset on the associated counterparty chain. Failure to verify parity between the escrow accounts and the counterparty total supply can result in a type of Denial-of-Service where users may not be able to unwind their assets through your chain. You can use our escrow checker tool or whatever means you deem fit to validate these balances against the counterparty total supply. If a discrepancy is found, you will need to build an upgrade handler that mints and transfers assets to the escrow account(s) with the discrepancy. Strangelove has provided an example upgrade handler or you can see the upgrade handler used by the Cosmos Hub.
What's Changed
[BP: release/v4 <- #88]
test: use non-deprecated gomock package & fix unit tests by @mergify in #113[BP: release/v4 <- #118]
rename:router
->packetforward
by @mergify in #119[BP: release/v4 <- #70]
Add warning to ibc-hooks docs by @mergify in #123[BP: release/v4 <- #132]
chore: export the GetReceiver function by @mergify in #133[BP: release/v4 <- #86]
fix!: queries that panic should returnack-err
by @mergify in #137- fix: mint and transfer funds back to escrow account on timeout or ack error by @jtieri in #174
Full Changelog: middleware/packet-forward-middleware/v4.1.1...middleware/packet-forward-middleware/v4.1.2
packet-forward-middleware v8.0.1
What's Changed
New Contributors
Full Changelog: middleware/packet-forward-middleware/v8.0.0...middleware/packet-forward-middleware/v8.0.1
async-icq v8.0.0
Highlights
What's Changed
- Update async-icq to ibc-go/v8. by @Taztingo in #151
- fix: async-icq v8 ci by @Reecepbcups in #157
New Contributors
Full Changelog: modules/async-icq/v7.1.1...modules/async-icq/v8.0.0