Skip to content

build(deps): bump github.com/nspcc-dev/neo-go from 0.78.3 to 0.98.5#209

Closed
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/go_modules/github.com/nspcc-dev/neo-go-0.98.5
Closed

build(deps): bump github.com/nspcc-dev/neo-go from 0.78.3 to 0.98.5#209
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/go_modules/github.com/nspcc-dev/neo-go-0.98.5

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot Bot commented on behalf of github May 16, 2022

Bumps github.com/nspcc-dev/neo-go from 0.78.3 to 0.98.5.

Release notes

Sourced from github.com/nspcc-dev/neo-go's releases.

Neutralization

An urgent update to fix the same security issue that was fixed in 3.1.0.1 C# node release. Please upgrade as soon as possible, resynchronization is not needed for mainnet.

Bugs fixed:

  • GAS emission now happens after NEO transfer is finished (#2488)

Mesmerization

An urgent release to fix incompatibility with mainnet at block 1528989. The actual pair of problems leading to inability to process this block occurred earilier than that, so to fix this you need to resynchronize your node. Fixed node is confirmed to have identical state as 3.1.0 C# node up to block 1529810.

Bugs fixed:

  • StdLib itoa() implementation emitted uppercase letters instead of lowercase (#2478)
  • StdLib jsonDeserialize() implementation couldn't handle properly integers larger than 64-bit signed (#2478)

Liquidation

This is a hotfix release to fix t4 testnet incompatibility at block 1589202. The actual problem was found and fixed during 0.99.0 development cycle, but 0.99.0 is expected to be incompatible with t4 testnet. This release allows to continue working with it as well as mainnet (and contains some other fixes for known problems). It does not require resynchronizing a node.

Improvements:

  • double call to WSClient.Close() method won't cause a panic (#2420)

Bugs fixed:

  • Rules scope considered as invalid in binary representation (#2452)
  • incorrect compressed P2P message could lead to panic (#2409)
  • notary-assisted transaction could be in inconsistent state on the Notary node (#2424)
  • WSClient panics if request is made after connection breakage (#2450)
  • Rules scope JSON representation wasn't compatible with C# implementation (#2466)
  • JSONized Rules scope could only contain 15 conditions instead of 16 (#2466)

Karstification

We've decided to release one more 3.1.0-compatible version bringing all of the new features and bug fixes made (along with complete support for Windows platform) before going into full 3.2.0 compatibility. It's important for us to give you more stable and flexible environment for the ongoing hackathon. Contract bindings generator might be very useful for anyone operating with already deployed contracts written in other languages, while the node itself can now be configured for lightweight operation, keeping only the data relevant for the past MaxTraceableBlocks, no more and no less. Current public networks don't benefit from it yet with their large MaxTraceableBlocks setting, but they're growing every day and it's just a matter of time when this feature will start making a difference. And sorry, but this release is again faster than the previous one.

We recommend updating, but if your node is not public and you don't specifically want to play with new things brought by it you might as well wait for the next one. It requires resynchronization and 0.99.0 will do too because of planned protocol changes.

New features:

  • protocol extension allowing to change the number of validators in existing network (#2334)
  • MPT garbage collection mechanism allowing to store a set of latest MPTs, RemoveUntraceableBlocks setting now activates it by default unless KeepOnlyLatestState is used (#2354, #2360)
  • NEP-11/NEP-17 transfer data garbage collection (#2363)
  • Go bindings generator based on contract manifests (#2349, #2359)

Behavior changes:

  • some RPC client functions for divisible NEP-11 changed signatures using slice of bytes now instead of strings for IDs (#2351)
  • heavily refactored storage and dao package interfaces (#2364, #2366)
  • support for Go 1.18 added, 1.15 dropped (#2369)

Improvements:

  • additional CLI tests (#2341)
  • defer statement is now compiled more effectively (#2345)
  • defer statement can be used in conditional branches now (#2348)
  • new tests for divisible NEP-11 contract (#2351)
  • all tests failing on Windows platform are fixed (#2353)

... (truncated)

Changelog

Sourced from github.com/nspcc-dev/neo-go's changelog.

0.98.5 "Neutralization" (13 May 2022)

An urgent update to fix the same security issue that was fixed in 3.1.0.1 C# node release. Please upgrade as soon as possible, resynchronization is not needed for mainnet.

Bugs fixed:

  • GAS emission now happens after NEO transfer is finished (#2488)

0.98.4 "Mesmerization" (11 May 2022)

An urgent release to fix incompatibility with mainnet at block 1528989. The actual pair of problems leading to inability to process this block occurred earilier than that, so to fix this you need to resynchronize your node. Fixed node is confirmed to have identical state as 3.1.0 C# node up to block 1529810.

Bugs fixed:

  • StdLib itoa() implementation emitted uppercase letters instead of lowercase (#2478)
  • StdLib jsonDeserialize() implementation couldn't handle properly integers larger than 64-bit signed (#2478)

0.98.3 "Liquidation" (07 May 2022)

This is a hotfix release to fix t4 testnet incompatibility at block 1589202. The actual problem was found and fixed during 0.99.0 development cycle, but 0.99.0 is expected to be incompatible with t4 testnet. This release allows to continue working with it as well as mainnet (and contains some other fixes for known problems). It does not require resynchronizing a node.

Improvements:

  • double call to WSClient.Close() method won't cause a panic (#2420)

Bugs fixed:

  • Rules scope considered as invalid in binary representation (#2452)
  • incorrect compressed P2P message could lead to panic (#2409)
  • notary-assisted transaction could be in inconsistent state on the Notary node (#2424)
  • WSClient panics if request is made after connection breakage (#2450)
  • Rules scope JSON representation wasn't compatible with C# implementation (#2466)
  • JSONized Rules scope could only contain 15 conditions instead of 16 (#2466)

0.98.2 "Karstification" (21 Mar 2022)

We've decided to release one more 3.1.0-compatible version bringing all of the new features and bug fixes (along with complete support for Windows platform) made before going into full 3.2.0 compatibility. It's important for us to give you more stable and flexible environment for the ongoing hackathon. Contract

... (truncated)

Commits
  • d385c6e CHANGELOG: release 0.98.5
  • 85fe111 neo: mint GAS after NEO transfer processing
  • 2f037f1 CHANGELOG: fix typo
  • 93bab55 CHANGELOG: here comes 0.98.4
  • 621db8c stackitem: allow to unJSONize big numbers (>int64), fix #2477
  • 3d1a81d native: std.itoa uses lower-cased letters, fix #2476
  • 711e217 rpc/notary: make this branch mergeable with master
  • 64710fc ROADMAP: update it somewhat
  • 0b05007 CHANGELOG: release 0.98.3
  • 7dc0404 transaction: fix maxSubitems handling in JSON scope unmarshaller
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [github.com/nspcc-dev/neo-go](https://github.com/nspcc-dev/neo-go) from 0.78.3 to 0.98.5.
- [Release notes](https://github.com/nspcc-dev/neo-go/releases)
- [Changelog](https://github.com/nspcc-dev/neo-go/blob/master/CHANGELOG.md)
- [Commits](nspcc-dev/neo-go@v0.78.3...v0.98.5)

---
updated-dependencies:
- dependency-name: github.com/nspcc-dev/neo-go
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot Bot requested a review from zengchen221 as a code owner May 16, 2022 16:01
@dependabot dependabot Bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels May 16, 2022
@dependabot @github
Copy link
Copy Markdown
Contributor Author

dependabot Bot commented on behalf of github Jun 6, 2022

Superseded by #215.

@dependabot dependabot Bot closed this Jun 6, 2022
@dependabot dependabot Bot deleted the dependabot/go_modules/github.com/nspcc-dev/neo-go-0.98.5 branch June 6, 2022 16:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update Go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants