Skip to content

Releases: cosmos/ibc-apps

packet-forward-middleware v8.1.0

22 Nov 18:02
64c5cd5
Compare
Choose a tag to compare

Summary

Updates to PFM include dependency upgrades to IBC v8.1.1 and Cosmos SDK v0.50.5, aligning log messages with function names, and removing the unused refundTimeout parameter. Additionally, The ability to take a fee for each forwarded packet has been removed, simplifying the middleware's functionality. Lastly, a fix was implemented to properly remove timed out in-flight transactions from the blockchain's state, addressing a potential storage leak.

What's Changed

New Contributors

Full Changelog: middleware/packet-forward-middleware/v8.0.2...middleware/packet-forward-middleware/v8.1.0

packet-forward-middleware v7.2.0

22 Nov 22:44
3a75835
Compare
Choose a tag to compare

Summary

Packet Forward Middleware has removed the ability to take a fee for each forwarded packet, simplifying the middleware's functionality. Additionally, a fix was implemented to properly remove timed out in-flight transactions from the blockchain's state, addressing a potential storage leak.

What's Changed

  • refactor: backport changes to remove the ability to take a fee for each forwarded packet by @jtieri in #210
  • [BP: release/v7 <- #216] refactor: remove processed key and handling code by @mergify in #218
  • [BP: release/v7 <- #222] feat: add storage leak test by @mergify in #223

Full Changelog: middleware/packet-forward-middleware/v7.1.3...middleware/packet-forward-middleware/v7.2.0

polytone v1.1.0

13 Aug 18:48
5780375
Compare
Choose a tag to compare

What's Changed

Original Implementation

https://github.com/DA0-DA0/polytone/releases/tag/v1.1.0

ibc-rate-limiting v7.0.0

23 Jul 21:35
295cc86
Compare
Choose a tag to compare

Summary

The module is meant as a safety control in the event of a bug, attack, or economic failure of an external zone. It prevents massive inflows or outflows of IBC tokens in a short time frame.

Imported from Stride-Labs/ibc-rate-limiting.

Implementation

require (
    github.com/cosmos/ibc-apps/modules/rate-limiting/v7 v7.0.0
)

Review the README for further integration instructions and app setup.

ibc-rate-limiting v8.0.0

22 Jul 16:12
fcb70dd
Compare
Choose a tag to compare

Summary

The module is meant as a safety control in the event of a bug, attack, or economic failure of an external zone. It prevents massive inflows or outflows of IBC tokens in a short time frame.

Imported from Stride-Labs/ibc-rate-limiting.

Implementation

require (
    github.com/cosmos/ibc-apps/modules/rate-limiting/v8 v8.0.0
)

Review the README for further integration instructions and app setup.

packet-forward-middleware v8.0.2

04 Apr 21:39
508e57d
Compare
Choose a tag to compare

Note

This release includes the patch for the Mandrake vulnerability

We recommend that you upgrade to the patched version, create a new release for your chain binary, and coordinate an upgrade with validators as soon as reasonable.

In addition to patching packet-forward-middleware, it is imperative that you check the balances of each escrow account against the total supply of each asset on the associated counterparty chain. Failure to verify parity between the escrow accounts and the counterparty total supply can result in a type of Denial-of-Service where users may not be able to unwind their assets through your chain. You can use our escrow checker tool or whatever means you deem fit to validate these balances against the counterparty total supply. If a discrepancy is found, you will need to build an upgrade handler that mints and transfers assets to the escrow account(s) with the discrepancy. Strangelove has provided an example upgrade handler or you can see the upgrade handler used by the Cosmos Hub.

What's Changed

  • Remove gogo/protobuf replace directive in async-icq/v8 by @Taztingo in #168
  • fix: mint and transfer funds back to escrow account on timeout or ack error by @jtieri in #170

Full Changelog: middleware/packet-forward-middleware/v8.0.1...middleware/packet-forward-middleware/v8.0.2

packet-forward-middleware v7.1.3

04 Apr 21:39
9f47ed5
Compare
Choose a tag to compare

Note

This release includes the patch for the Mandrake vulnerability

We recommend that you upgrade to the patched version, create a new release for your chain binary, and coordinate an upgrade with validators as soon as reasonable.

In addition to patching packet-forward-middleware, it is imperative that you check the balances of each escrow account against the total supply of each asset on the associated counterparty chain. Failure to verify parity between the escrow accounts and the counterparty total supply can result in a type of Denial-of-Service where users may not be able to unwind their assets through your chain. You can use our escrow checker tool or whatever means you deem fit to validate these balances against the counterparty total supply. If a discrepancy is found, you will need to build an upgrade handler that mints and transfers assets to the escrow account(s) with the discrepancy. Strangelove has provided an example upgrade handler or you can see the upgrade handler used by the Cosmos Hub.

What's Changed

Full Changelog: middleware/packet-forward-middleware/v7.1.2...middleware/packet-forward-middleware/v7.1.3

packet-forward-middleware v6.1.2

04 Apr 21:39
8e503d4
Compare
Choose a tag to compare

Note

This release includes the patch for the Mandrake vulnerability

We recommend that you upgrade to the patched version, create a new release for your chain binary, and coordinate an upgrade with validators as soon as reasonable.

In addition to patching packet-forward-middleware, it is imperative that you check the balances of each escrow account against the total supply of each asset on the associated counterparty chain. Failure to verify parity between the escrow accounts and the counterparty total supply can result in a type of Denial-of-Service where users may not be able to unwind their assets through your chain. You can use our escrow checker tool or whatever means you deem fit to validate these balances against the counterparty total supply. If a discrepancy is found, you will need to build an upgrade handler that mints and transfers assets to the escrow account(s) with the discrepancy. Strangelove has provided an example upgrade handler or you can see the upgrade handler used by the Cosmos Hub.

What's Changed

  • [BP: release/v6 <- #102] Spelling, grammar, and formatting fixes. by @mergify in #111
  • [BP: release/v6 <- #88] test: use non-deprecated gomock package & fix unit tests by @mergify in #115
  • [BP: release/v6 <- #118] rename: router -> packetforward by @mergify in #121
  • [BP: release/v6 <- #70] Add warning to ibc-hooks docs by @mergify in #125
  • [BP: release/v6 <- #132] chore: export the GetReceiver function by @mergify in #135
  • [BP: release/v6 <- #86] fix!: queries that panic should return ack-err by @mergify in #139
  • fix: mint and transfer funds back to escrow account on timeout or ack error by @jtieri in #172

Full Changelog: middleware/packet-forward-middleware/v6.1.1...middleware/packet-forward-middleware/v6.1.2

packet-forward-middleware v5.2.2

04 Apr 21:39
5099c03
Compare
Choose a tag to compare

Note

This release includes the patch for the Mandrake vulnerability

We recommend that you upgrade to the patched version, create a new release for your chain binary, and coordinate an upgrade with validators as soon as reasonable.

In addition to patching packet-forward-middleware, it is imperative that you check the balances of each escrow account against the total supply of each asset on the associated counterparty chain. Failure to verify parity between the escrow accounts and the counterparty total supply can result in a type of Denial-of-Service where users may not be able to unwind their assets through your chain. You can use our escrow checker tool or whatever means you deem fit to validate these balances against the counterparty total supply. If a discrepancy is found, you will need to build an upgrade handler that mints and transfers assets to the escrow account(s) with the discrepancy. Strangelove has provided an example upgrade handler or you can see the upgrade handler used by the Cosmos Hub.

What's Changed

  • [BP: release/v5 <- #88] test: use non-deprecated gomock package & fix unit tests by @mergify in #114
  • [BP: release/v5 <- #118] rename: router -> packetforward by @mergify in #120
  • [BP: release/v5 <- #70] Add warning to ibc-hooks docs by @mergify in #124
  • [BP: release/v5 <- #132] chore: export the GetReceiver function by @mergify in #134
  • [BP: release/v5 <- #86] fix!: queries that panic should return ack-err by @mergify in #138
  • fix: mint and transfer funds back to escrow account on timeout or ack error by @jtieri in #173

Full Changelog: middleware/packet-forward-middleware/v5.2.1...middleware/packet-forward-middleware/v5.2.2

packet-forward-middleware v4.1.2

04 Apr 21:39
88b2246
Compare
Choose a tag to compare

Note

This release includes the patch for the Mandrake vulnerability

We recommend that you upgrade to the patched version, create a new release for your chain binary, and coordinate an upgrade with validators as soon as reasonable.

In addition to patching packet-forward-middleware, it is imperative that you check the balances of each escrow account against the total supply of each asset on the associated counterparty chain. Failure to verify parity between the escrow accounts and the counterparty total supply can result in a type of Denial-of-Service where users may not be able to unwind their assets through your chain. You can use our escrow checker tool or whatever means you deem fit to validate these balances against the counterparty total supply. If a discrepancy is found, you will need to build an upgrade handler that mints and transfers assets to the escrow account(s) with the discrepancy. Strangelove has provided an example upgrade handler or you can see the upgrade handler used by the Cosmos Hub.

What's Changed

  • [BP: release/v4 <- #88] test: use non-deprecated gomock package & fix unit tests by @mergify in #113
  • [BP: release/v4 <- #118] rename: router -> packetforward by @mergify in #119
  • [BP: release/v4 <- #70] Add warning to ibc-hooks docs by @mergify in #123
  • [BP: release/v4 <- #132] chore: export the GetReceiver function by @mergify in #133
  • [BP: release/v4 <- #86] fix!: queries that panic should return ack-err by @mergify in #137
  • fix: mint and transfer funds back to escrow account on timeout or ack error by @jtieri in #174

Full Changelog: middleware/packet-forward-middleware/v4.1.1...middleware/packet-forward-middleware/v4.1.2