- Ante handler to check frozen tokens movement
- Add network properties for ENABLE_TOKEN_WHITELIST / ENABLE_TOKEN_BLACKLIST
- Add permissions for creation and vote on blacklist and whitelist change of tokens
- Added CLI command to submit proposal to change blacklist and whitelist
- Added CLI command to query current blacklist and whitelist
- Network Properties management code modification for boolean properties
- Now when the proposal passes it enter ins status Enactment.
- Add proposal to create a Role.
- Fix GetTxProposalUpsertDataRegistry and make it appear on client.
- Fix and clean some CLI commands (proposal upsert token rates, proposal upsert token alias, proposal upsert data registry).
- Validators query to include mischance.
- Tokens alias/rate query.
- Voters/votes query.
- Mischance querying CLI command
- genutil module to handle validator status
- CLI utility command to get valcons address from account address
- ValidatorJoined hook that's derivated from Cosmos SDK's
ValidatorBonded
hook
- GRPC query for proposals
- GRPC query for validators + validator_signing_infos
- Problem with ClaimValidator and PubKey encoding due to protocol buff Any type.
- Fix bug that made that you can vote when the proposal ended.
- When a proposal does not reach quorum it ends being Quorum not reached.
- Proposal voting time and enactment time now are defined in seconds.
- It shows the votes that a proposal has on client query.
- Custom evidence module to jail a double signed validator
- CLI command for writing proposal to unjail a validator
- CLI command for setting max jail time network property proposal
- CLI command to set poor network messages
- CLI command to query poor network messages
- Add POOR_NETWORK_MAX_BANK_TX_SEND feature for poor network for restriction (only bond denom is allowed)
- Reject feature for not allowed messages on poor network
- CLI command GetTxProposalUpsertTokenAliasCmd and GetTxProposalUpsertTokenRatesCmd are now exposed.
- CLI command to get ValAddress from AccAddress
- Added custom slashing module for validator's block signing info management, inactivate, activate, pause, unpause
- Added validator performance calculator using
rank
andstreak
- Upgraded Cosmos SDK to v0.40.0 (stargate)
- Old staking, slashing, evidence, distribution module
- Added GRPC query for Data Reference Registry.
- Update response caching for data references. (KIP_47.1)
- Added file hosting feature. (KIP_47.1)
- Update Cosmos SDK to v0.40.0-rc4.
- Proposal to upsert the Token Rates. (CLI too)
- Added a wrapper to register messages with function metadata.
- Added function_id for message types.
- Registered function meta for existing messages.
- Added INTERX api for Kira functions list.
- Added INTERX api for INTERX functions list.
- Proposal to upsert the Token Aliases KIP_24. (CLI too)
- Proposal to upsert the Data Registry. (CLI too)
- Proposal to change Network Properties. (CLI too)
- Now it is more generic to be able to add new proposals in the complete flow.
KIP_8
- Added grpc gateway
- Added status, balances, transaction hash queries
- Added transaction encode/broadcast
- Added response format
KIP_9
- Added endpoint whitelist
KIP_48
- Added INTERX faucet
KIP_47
- Added response caching
KIP_32
- Added withdraws, deposits
- Added CLI for querying proposals / individual proposal
- Added CLI for querying votes / individual vote
- Added CLI for querying whitelisted proposal voters
- Updated genesis actor initialization process
- Updated proposal end time and enactment time
- Fixed end blocker concert not registered issue for MsgClaimValidator
- There is a new permission for all role related changes. PermUpsertRole.
- Proposal is now a generic type, the Content part is what changes between different proposal types.
- Added CLI command to upsert token rates per denom
- Added CLI commands to query token rates
- Implemented feeprocessing module for new fee processing logic
- Implemented foreign currency fee payment
- We can propose to SetPermissions to an actor.
- We can vote a proposal to SetPermissions to an actor.
- Added proposal endtime and proposal enactment time into the network properties.
- The keeper has method to get all Actors by witelisted permission.
- The keeper has method to get All actors that have specific role.
- The keeper has method to get all roles that have a whitelist permission.
- Big refactor on the way Role and Permissions are stored.
- In keeper we don't expose SetPermissionsForRole anymore.
- Added CLI command to send a SetPermission proposal.
- Added CLI command to vote a SetPermission proposal.
-
Now Role and Permissions are persisted differently in order to be able to get actors by permission and actors by role.
-
Now the commands for all Governance module is simplified in a better hierarchical style.
Available Commands:
councilor Councilor subcommands
permission Permission subcommands
proposal Proposal subcommands
role Role subcommands
- Added CLI command to upsert token alias per symbol
- Added CLI commands to query token aliases per symbol and denom
- Added CLI command to query all token aliases
- Modified execution fee to use transaction type as identifier
- Modified min/max fee range to [100 - 1'000'000] in ukex
- Added CLI command to change execution fee per message type
- Added CLI command to change transaction fee range
- Added CLI command to query execution fee
- Added CLI command to query transaction fee range
- Added CLI command to remove blacklist permissions into a specific role.
- Added CLI command to create new role.
- Added CLI command to assign new role.
- Added CLI command to remove assignation for a role.
- Updated cosmos SDK to last version of 17th september .
- Added CLI command to claim governance seat.
- Added CLI command to set whitelist permissions into a specific role.
- Added CLI command to set blacklist permissions into a specific role.
- Added CLI command to remove whitelist permissions into a specific role.
- Added CLI command to Set Blacklist Permissions too.
- Module CustomGov defines in genesis by default Permissions by roles Validator (0x2) and Sudo (0x1).
- Now the roles are validated when taking some action. It checks if the user has permissions either in the role or individually.
- Add command to add whitelist permissions to an address, that address is included in theNetworkActor registry with the specified permission added.
- Now the user that generates the network has AddPermissions by default, so he is the only one that can add permissions into the registry.
- Now the ClaimValidator message takes care that the user has ClaimValidator permissions, if he the user does not have, it fails.