ampleforth-contracts
ampleforth-contracts copied to clipboard
Bump @openzeppelin/contracts-upgradeable from 4.7.3 to 4.9.6
Bumps @openzeppelin/contracts-upgradeable from 4.7.3 to 4.9.6.
Release notes
Sourced from @openzeppelin/contracts-upgradeable's releases.
v4.9.6
Base64: Fix issue where dirty memory located just after the input buffer is affecting the result. (#4926)v4.9.5
Multicall: Patch duplicatedAddress.functionDelegateCall.v4.9.4
ERC2771ContextandContext: Introduce a_contextPrefixLength()getter, used to trim extra information appended tomsg.data.Multicall: Make aware of non-canonical context (i.e.msg.senderis not_msgSender()), allowing compatibility withERC2771Context.v4.9.3
Note This release contains a fix for GHSA-g4vp-m682-qqmp.
ERC2771Context: Return the forwarder address whenever themsg.dataof a call originating from a trusted forwarder is not long enough to contain the request signer address (i.e.msg.data.lengthis less than 20 bytes), as specified by ERC-2771. (#4481)ERC2771Context: Prevent revert in_msgData()when a call originating from a trusted forwarder is not long enough to contain the request signer address (i.e.msg.data.lengthis less than 20 bytes). Return the full calldata in that case. (#4484)v4.9.2
Note This release contains a fix for https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-wprv-93r4-jj2p.
MerkleProof: Fix a bug inprocessMultiProofandprocessMultiProofCalldatathat allows proving arbitrary leaves if the tree contains a node with value 0 at depth 1.v4.9.1
Note This release contains a fix for https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-5h3x-9wvq-w4m2.
Governor: Add a mechanism to restrict the address of the proposer using a suffix in the description.v4.9.0
ReentrancyGuard: Add a_reentrancyGuardEnteredfunction to expose the guard status. (#3714)ERC721Wrapper: add a new extension of theERC721token which wraps an underlying token. Deposit and withdraw guarantee that the ownership of each token is backed by a corresponding underlying token with the same identifier. (#3863)EnumerableMap: add akeys()function that returns an array containing all the keys. (#3920)Governor: add a publiccancel(uint256)function. (#3983)Governor: Enable timestamp operation for blockchains without a stable block time. This is achieved by connecting a Governor's internal clock to match a voting token's EIP-6372 interface. (#3934)Strings: addequalmethod. (#3774)IERC5313: Add an interface for EIP-5313 that is now final. (#4013)IERC4906: Add an interface for ERC-4906 that is now Final. (#4012)StorageSlot: Add support forstringandbytes. (#4008)Votes,ERC20Votes,ERC721Votes: support timestamp checkpointing using EIP-6372. (#3934)ERC4626: Add mitigation to the inflation attack through virtual shares and assets. (#3979)Strings: addtoStringmethod for signed integers. (#3773)ERC20Wrapper: Make theunderlyingvariable private and add a public accessor. (#4029)EIP712: add EIP-5267 support for better domain discovery. (#3969)AccessControlDefaultAdminRules: Add an extension ofAccessControlwith additional security rules for theDEFAULT_ADMIN_ROLE. (#4009)SignatureChecker: AddisValidERC1271SignatureNowfor checking a signature directly against a smart contract using ERC-1271. (#3932)
... (truncated)
Changelog
Sourced from @openzeppelin/contracts-upgradeable's changelog.
4.9.6 (2024-02-29)
Base64: Fix issue where dirty memory located just after the input buffer is affecting the result. (#4929)4.9.5 (2023-12-08)
Multicall: Make aware of non-canonical context (i.e.msg.senderis not_msgSender()), allowing compatibility withERC2771Context. Patch duplicatedAddress.functionDelegateCallin v4.9.4 (removed).4.9.3 (2023-07-28)
ERC2771Context: Return the forwarder address whenever themsg.dataof a call originating from a trusted forwarder is not long enough to contain the request signer address (i.e.msg.data.lengthis less than 20 bytes), as specified by ERC-2771. (#4481)ERC2771Context: Prevent revert in_msgData()when a call originating from a trusted forwarder is not long enough to contain the request signer address (i.e.msg.data.lengthis less than 20 bytes). Return the full calldata in that case. (#4484)4.9.2 (2023-06-16)
MerkleProof: Fix a bug inprocessMultiProofandprocessMultiProofCalldatathat allows proving arbitrary leaves if the tree contains a node with value 0 at depth 1.4.9.1 (2023-06-07)
Governor: Add a mechanism to restrict the address of the proposer using a suffix in the description.4.9.0 (2023-05-23)
ReentrancyGuard: Add a_reentrancyGuardEnteredfunction to expose the guard status. (#3714)ERC721Wrapper: add a new extension of theERC721token which wraps an underlying token. Deposit and withdraw guarantee that the ownership of each token is backed by a corresponding underlying token with the same identifier. (#3863)EnumerableMap: add akeys()function that returns an array containing all the keys. (#3920)Governor: add a publiccancel(uint256)function. (#3983)Governor: Enable timestamp operation for blockchains without a stable block time. This is achieved by connecting a Governor's internal clock to match a voting token's EIP-6372 interface. (#3934)Strings: addequalmethod. (#3774)IERC5313: Add an interface for EIP-5313 that is now final. (#4013)IERC4906: Add an interface for ERC-4906 that is now Final. (#4012)StorageSlot: Add support forstringandbytes. (#4008)Votes,ERC20Votes,ERC721Votes: support timestamp checkpointing using EIP-6372. (#3934)ERC4626: Add mitigation to the inflation attack through virtual shares and assets. (#3979)Strings: addtoStringmethod for signed integers. (#3773)ERC20Wrapper: Make theunderlyingvariable private and add a public accessor. (#4029)EIP712: add EIP-5267 support for better domain discovery. (#3969)AccessControlDefaultAdminRules: Add an extension ofAccessControlwith additional security rules for theDEFAULT_ADMIN_ROLE. (#4009)SignatureChecker: AddisValidERC1271SignatureNowfor checking a signature directly against a smart contract using ERC-1271. (#3932)SafeERC20: Add aforceApprovefunction to improve compatibility with tokens behaving like USDT. (#4067)ERC1967Upgrade: removed contract-wideoz-upgrades-unsafe-allow delegatecallannotation, replaced by granular annotation inUUPSUpgradeable. (#3971)ERC20Wrapper: self wrapping and deposit by the wrapper itself are now explicitly forbidden. (#4100)ECDSA: optimize bytes32 computation by using assembly instead ofabi.encodePacked. (#3853)ERC721URIStorage: Emit ERC-4906MetadataUpdatein_setTokenURI. (#4012)ShortStrings: Added a library for handling short strings in a gas efficient way, with fallback to storage for longer strings. (#4023)SignatureChecker: Allow return data length greater than 32 from EIP-1271 signers. (#4038)UUPSUpgradeable: added granularoz-upgrades-unsafe-allow-reachableannotation to improve upgrade safety checks on latest version of the Upgrades Plugins (starting with@openzeppelin/[email protected]). (#3971)Initializable: optimize_disableInitializersby using!=instead of<. (#3787)Ownable2Step: makeacceptOwnershippublic virtual to enable usecases that require overriding it. (#3960)UUPSUpgradeable.sol: Change visibility to the functionsupgradeToandupgradeToAndCallfromexternaltopublic. (#3959)
... (truncated)
Commits
2d081f2Transpile dc44c9f12492017Transpile a6286d0fa40cb0bTranspile bd325d564c73bfaTranspile ad6a5b6831f9fb9Transpile 88ac712ef55babcTranspile a83918df5bc5999Transpile 98c7a4cf152b820Transpile 0ed435b7f34a3a7Transpile 17c1a3a43d4c0d5Transpile fd81a96f- Additional commits viewable in compare view
You can trigger a rebase of this PR by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the Security Alerts page.
Note Automatic rebases have been disabled on this pull request as it has been open for over 30 days.