Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Proposed 2.3.0-b1 #5050

Merged
merged 20 commits into from
Jun 21, 2024
Merged

Proposed 2.3.0-b1 #5050

merged 20 commits into from
Jun 21, 2024

Conversation

seelabs
Copy link
Collaborator

@seelabs seelabs commented Jun 20, 2024

High Level Overview of Change

This is a beta for the 2.2.0 release.

Highlights:

The base branch is release. All releases (including betas) go in release. This PR will be merged with --ff-only (not squashed or rebased, and not using the GitHub UI) to both release and develop.

Context of Change

This introduces

  • the fixEnforceNFTokenTrustline amendment to fix interactions between NFTokenOffers and trust lines.
  • the featureNFTokenMintOffer amendment to allow creating NFTokenOffer in a NFTokenMint transaction.
  • the fixReducedOffersV2 amendment to prevent offers from blocking order books.

Type of Change

  • Release

API Impact

No API impact.

thejohnfreeman and others added 20 commits June 11, 2024 13:26
…RPLF#5027)

* Add trap_tx_hash command line option

This new option can be used only if replay is also enabled. It takes a transaction hash from the ledger loaded for replay, and will cause a specific line to be hit in Transactor.cpp, right before the selected transaction is applied.
Add missed coma in 'exportes_sources'
…5032)

Fixes issue XRPLF#4937.

The fixReducedOffersV1 amendment fixed certain forms of offer
modification that could lead to blocked order books.  Reduced
offers can block order books if the effective quality of the
reduced offer is worse than the quality of the original offer
(from the perspective of the taker). It turns out that, for
small values, the quality of the reduced offer can be
significantly affected by the rounding mode used during
scaling computations.

Issue XRPLF#4937 identified an additional code path that modified
offers in a way that could lead to blocked order books.  This
commit changes the rounding in that newly located code path so
the quality of the modified offer is never worse than the
quality of the offer as it was originally placed.

It is possible that additional ways of producing blocking
offers will come to light.  Therefore there may be a future
need for a V3 amendment.
Fix interactions between NFTokenOffers and trust lines.

Since the NFTokenAcceptOffer does not check the trust line that
the issuer receives as a transfer fee in the NFTokenAcceptOffer,
if the issuer deletes the trust line after NFTokenCreateOffer,
the trust line is created for the issuer by the
NFTokenAcceptOffer.  That's fixed.

Resolves XRPLF#4925.
* Change order of checks in amm_info

* Change amm_info error message in API version 3

* Change amm_info error tests
- Remove CMake module "MultiConfig".
- Update clang-format configuration, CodeCov configuration,
  levelization script.
- Replace source lists in CMake with globs.
Copy link

codecov bot commented Jun 20, 2024

Codecov Report

Attention: Patch coverage is 90.62500% with 3 lines in your changes missing coverage. Please review.

Project coverage is 71.3%. Comparing base (2df6356) to head (ef02893).

Additional details and impacted files

Impacted file tree graph

@@            Coverage Diff            @@
##           release   #5050     +/-   ##
=========================================
+ Coverage     71.1%   71.3%   +0.2%     
=========================================
  Files          796     796             
  Lines        66997   66987     -10     
  Branches     11005   10889    -116     
=========================================
+ Hits         47639   47761    +122     
+ Misses       19358   19226    -132     
Files Coverage Δ
include/xrpl/basics/BasicConfig.h 87.7% <ø> (ø)
include/xrpl/basics/Buffer.h 100.0% <ø> (ø)
include/xrpl/basics/ByteUtilities.h 100.0% <ø> (ø)
include/xrpl/basics/CompressionAlgorithms.h 0.0% <ø> (ø)
include/xrpl/basics/CountedObject.h 100.0% <ø> (ø)
include/xrpl/basics/DecayingSample.h 87.9% <ø> (ø)
include/xrpl/basics/Expected.h 100.0% <ø> (ø)
include/xrpl/basics/FeeUnits.h 90.1% <ø> (ø)
include/xrpl/basics/IOUAmount.h 100.0% <ø> (ø)
include/xrpl/basics/LocalValue.h 100.0% <ø> (ø)
... and 156 more

... and 1260 files with indirect coverage changes

Impacted file tree graph

Copy link
Collaborator

@scottschurr scottschurr left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Builds with clang, passes unit tests, syncs and stops gracefully on my Intel Mac. 👍

@seelabs seelabs merged commit ef02893 into XRPLF:release Jun 21, 2024
27 checks passed
legleux added a commit to legleux/validator-keys-tool that referenced this pull request Jun 22, 2024
legleux added a commit to ripple/validator-keys-tool that referenced this pull request Jun 28, 2024
* Changed required for XRPLF/rippled#5050

* clang-format

* Update clang-format
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

10 participants