Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bsc #1

Open
wants to merge 97 commits into
base: master
Choose a base branch
from
Open

Bsc #1

wants to merge 97 commits into from

Conversation

recmo
Copy link
Owner

@recmo recmo commented Feb 17, 2021

No description provided.

unclezoro and others added 30 commits May 20, 2020 11:44
Signed-off-by: fudongbai <296179868@qq.com>
[R4R]add gov/tokenHub/RelayerIncentivize contracts to the init list and apply  strict condition for system transaction
[R4R]fix validator failed to sync a block produced by itself,  resolve ethereum#3
[R4R] modify params for Parlia consensus with 21 validators
[R4R]add gas limit check in parlia implement
[R4R]remove redundant gaslimit check
[R4R]add cross chain contract to system contract
[R4R] Prepare for release v1.0.0-beta.0
unclezoro and others added 30 commits November 17, 2020 17:19
[R4R]add change log for release v1.0.4
[R4R]fix potential deadlock of pub/sub module
…21793)

* Bit boundary fix for the DAG generation routine

* Fix unnecessary conversion warnings

Co-authored-by: Sergey Pavlov <spavlov@gmail.com>
…hereum#21601)

* tried to fix

* fix for js api

* fix for nil pointer ex

* rev space

* rev space

* input call formatter
* accounts/abi: fix a bug in getTypeSize method

e.g. for "Tuple[2]" type, the element of the array is a tuple type and the size of the tuple may not be 32.

* accounts/abi: add unit test of getTypeSize method
The database panicked for invalid IPs. This is usually no problem
because all code paths leading to node DB access verify the IP, but it's
dangerous because improper validation can turn this panic into a DoS
vulnerability. The quick fix here is to just turn database accesses
using invalid IP into a noop. This isn't great, but I'm planning to
remove the node DB for discv5 long-term, so it should be fine to have
this quick fix for half a year.

Fixes ethereum#21849
This fixes a deadlock that could occur when a response packet arrived
after a call had already received enough responses and was about to
signal completion to the dispatch loop.

Co-authored-by: Felix Lange <fjl@twurst.com>
[R4R] Add `x-forward-for` log message when handle message failed
[R4R]support fork id in header; elegant upgrade
[R4R] security patch from go-ethereum
* apply mirror sync upgrade

remove 0x

update rialto genesis hash

update tokenhub code

* update tokenhub code

* update relayer incentive contract code

* update upgrade height and remove mainnet upgrade
* appay mirror/sync fork to main-net; release for 1.0.6

* fix upgrade do not work
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.