-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proposed 2.2.0-rc2 #5018
Proposed 2.2.0-rc2 #5018
Commits on Apr 29, 2024
-
Update list of maintainers: (XRPLF#4984)
I am resigning from my role as maintainer of the `rippled` codebase. Please update repository permissions accordingly, prior to merging this pull request. Thanks to everyone who has contributed, especially those whom I had the opportunity to closely collaborate with.
Configuration menu - View commit details
-
Copy full SHA for dccf3f4 - Browse repository at this point
Copy the full SHA dccf3f4View commit details
Commits on May 1, 2024
-
Remove flow assert: (XRPLF#5009)
Rounding in the payment engine is causing an assert to sometimes fire with "dust" amounts. This is causing issues when running debug builds of rippled. This issue will be addressed, but the assert is no longer serving its purpose.
Configuration menu - View commit details
-
Copy full SHA for 5aa1106 - Browse repository at this point
Copy the full SHA 5aa1106View commit details
Commits on May 2, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 7612805 - Browse repository at this point
Copy the full SHA 7612805View commit details -
Configuration menu - View commit details
-
Copy full SHA for f650949 - Browse repository at this point
Copy the full SHA f650949View commit details
Commits on May 9, 2024
-
Price Oracle: validate input parameters and extend test coverage: (XR…
…PLF#5013) * Price Oracle: validate input parameters and extend test coverage: Validate trim, time_threshold, document_id are valid Int, UInt, or string convertible to UInt. Validate base_asset and quote_asset are valid currency. Update error codes. Extend Oracle and GetAggregatePrice unit-tests. Denote unreachable coverage code. * Set one-line LCOV_EXCL_LINE * Move ledger_entry tests to LedgerRPC_test.cpp * Add constants for "None" * Fix LedgerRPC test --------- Co-authored-by: Scott Determan <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f4da2e3 - Browse repository at this point
Copy the full SHA f4da2e3View commit details
Commits on May 13, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 244ac5e - Browse repository at this point
Copy the full SHA 244ac5eView commit details
Commits on May 14, 2024
-
Add the fixAMMOfferRounding amendment: (XRPLF#4983)
* Fix AMM offer rounding and low quality LOB offer blocking AMM: A single-path AMM offer with account offer on DEX, is always generated starting with the takerPays first, which is rounded up, and then the takerGets, which is rounded down. This rounding ensures that the pool's product invariant is maintained. However, when one of the offer's side is XRP, this rounding can result in the AMM offer having a lower quality, potentially causing offer generation to fail if the quality is lower than the account's offer quality. To address this issue, the proposed fix adjusts the offer generation process to start with the XRP side first and always rounds it down. This results in a smaller offer size, improving the offer's quality. Regardless if the offer has XRP or not, the rounding is done so that the offer size is minimized. This change still ensures the product invariant, as the other generated side is the exact result of the swap-in or swap-out equations. If a liquidity can be provided by both AMM and LOB offer on offer crossing then AMM offer is generated so that it matches LOB offer quality. If LOB offer quality is less than limit quality then generated AMM offer quality is also less than limit quality and the offer doesn't cross. To address this issue, if LOB quality is better than limit quality then use LOB quality to generate AMM offer. Otherwise, don't use the quality to generate AMM offer. In this case, limitOut() function in StrandFlow limits the out amount to match strand's quality to limit quality and consume maximum AMM liquidity.
Configuration menu - View commit details
-
Copy full SHA for 2705109 - Browse repository at this point
Copy the full SHA 2705109View commit details
Commits on May 16, 2024
-
Fix adjustAmountsByLPTokens():
The fix is to return the actual adjusted lp tokens and amounts by the function.
Configuration menu - View commit details
-
Copy full SHA for 2a25f58 - Browse repository at this point
Copy the full SHA 2a25f58View commit details -
Fix offer crossing via single path AMM with transfer fee:
Single path AMM offer has to factor in the transfer in rate when calculating the upper bound quality and the quality function because single path AMM's offer quality is not constant. This fix factors in the transfer fee in BookStep::adjustQualityWithFees().
Configuration menu - View commit details
-
Copy full SHA for 7f6a079 - Browse repository at this point
Copy the full SHA 7f6a079View commit details -
Fix last Liquidity Provider withdrawal:
Due to the rounding, LPTokenBalance of the last Liquidity Provider (LP), might not match this LP's trustline balance. This fix sets LPTokenBalance on last LP withdrawal to this LP's LPToken trustline balance.
Configuration menu - View commit details
-
Copy full SHA for 15390be - Browse repository at this point
Copy the full SHA 15390beView commit details -
Configuration menu - View commit details
-
Copy full SHA for d5e5c3c - Browse repository at this point
Copy the full SHA d5e5c3cView commit details