build(deps): bump @openzeppelin/contracts from 4.9.6 to 5.0.2
Bumps @openzeppelin/contracts from 4.9.6 to 5.0.2.
Release notes
Sourced from @openzeppelin/contracts's releases.
v5.0.2
Base64: Fix issue where dirty memory located just after the input buffer is affecting the result. (#4926)v5.0.1
ERC2771ContextandContext: Introduce a_contextPrefixLength()getter, used to trim extra information appended tomsg.data.Multicall: Make aware of non-canonical context (i.e.msg.senderis not_msgSender()), allowing compatibility withERC2771Context.v5.0.0
Additions Summary
The following contracts and libraries were added:
AccessManager: A consolidated system for managing access control in complex systems.
AccessManaged: A module for connecting a contract to an authority in charge of its access control.GovernorTimelockAccess: An adapter for time-locking governance proposals using anAccessManager.AuthorityUtils: A library of utilities for interacting with authority contracts.GovernorStorage: A Governor module that stores proposal details in storage.ERC2771Forwarder: An ERC2771 forwarder for meta transactions.ERC1967Utils: A library with ERC1967 events, errors and getters.Nonces: An abstraction for managing account nonces.MessageHashUtils: A library for producing digests for ECDSA operations.Time: A library with helpers for manipulating time-related objects.Removals Summary
The following contracts, libraries, and functions were removed:
Address.isContract(because of its ambiguous nature and potential for misuse)Checkpoints.HistoryCountersERC20SnapshotERC20VotesCompERC165Storage(in favor of inheritance based approach)ERC777ERC1820ImplementerGovernorVotesCompGovernorProposalThreshold(deprecated since 4.4)PaymentSplitterPullPaymentSafeMathSignedSafeMathTimersTokenTimelock(in favor ofVestingWallet)- All escrow contracts (
Escrow,ConditionalEscrowandRefundEscrow)- All cross-chain contracts, including
AccessControlCrossChainand all the vendored bridge interfaces- All presets in favor of OpenZeppelin Contracts Wizard
These removals were implemented in the following PRs: #3637, #3880, #3945, #4258, #4276, #4289
... (truncated)
Changelog
Sourced from @openzeppelin/contracts's changelog.
5.0.2 (2024-02-29)
Base64: Fix issue where dirty memory located just after the input buffer is affecting the result. (#4926)5.0.1 (2023-12-07)
ERC2771ContextandContext: Introduce a_contextPrefixLength()getter, used to trim extra information appended tomsg.data.Multicall: Make aware of non-canonical context (i.e.msg.senderis not_msgSender()), allowing compatibility withERC2771Context.5.0.0 (2023-10-05)
Additions Summary
The following contracts and libraries were added:
AccessManager: A consolidated system for managing access control in complex systems.
AccessManaged: A module for connecting a contract to an authority in charge of its access control.GovernorTimelockAccess: An adapter for time-locking governance proposals using anAccessManager.AuthorityUtils: A library of utilities for interacting with authority contracts.GovernorStorage: A Governor module that stores proposal details in storage.ERC2771Forwarder: An ERC2771 forwarder for meta transactions.ERC1967Utils: A library with ERC1967 events, errors and getters.Nonces: An abstraction for managing account nonces.MessageHashUtils: A library for producing digests for ECDSA operations.Time: A library with helpers for manipulating time-related objects.Removals Summary
The following contracts, libraries, and functions were removed:
Address.isContract(because of its ambiguous nature and potential for misuse)Checkpoints.HistoryCountersERC20SnapshotERC20VotesCompERC165Storage(in favor of inheritance based approach)ERC777ERC1820ImplementerGovernorVotesCompGovernorProposalThreshold(deprecated since 4.4)PaymentSplitterPullPaymentSafeMathSignedSafeMathTimersTokenTimelock(in favor ofVestingWallet)- All escrow contracts (
Escrow,ConditionalEscrowandRefundEscrow)- All cross-chain contracts, including
AccessControlCrossChainand all the vendored bridge interfaces- All presets in favor of OpenZeppelin Contracts Wizard
... (truncated)
Commits
dbb6104Release v5.0.2 (#4928)26b4b60Port Base64 tests to truffle (#4926)d4ec278List every contract in each API doc section (#4848)f7bb988Replace Defender Admin with Transaction Proposals (#4804)e53f81bRemove Governor's guide ERC6372 disclaimer for Tally (#4801)01ef448Release v5.0.1 (#4785)9ce0340Make Multicall context-aware4eb67a4Closeaccess-control.adoccode block (#4726) (#4727)83330a6AddAccessManagerguide (#4691) (#4724)ab967b8Update the "utilities" documentation page (#4678)- Additional commits viewable in compare view
You can trigger a rebase of this PR by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the Security Alerts page.
Note Automatic rebases have been disabled on this pull request as it has been open for over 30 days.