Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency @openzeppelin/contracts to v4 [SECURITY] - autoclosed #1125

Closed

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Feb 11, 2022

Mend Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
@openzeppelin/contracts (source) 2.5.1 -> 4.7.2 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2021-46320

In OpenZeppelin <=v4.4.0, initializer functions that are invoked separate from contract creation (the most prominent example being minimal proxies) may be reentered if they make an untrusted non-view external call. Once an initializer has finished running it can never be re-executed. However, an exception put in place to support multiple inheritance made reentrancy possible, breaking the expectation that there is a single execution.

CVE-2022-35915

Impact

The target contract of an EIP-165 supportsInterface query can cause unbounded gas consumption by returning a lot of data, while it is generally assumed that this operation has a bounded cost.

Patches

The issue has been fixed in v4.7.2.

References

https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3587

For more information

If you have any questions or comments about this advisory, or need assistance deploying a fix, email us at [email protected].


Release Notes

OpenZeppelin/openzeppelin-contracts (@​openzeppelin/contracts)

v4.7.2

Compare Source

  • LibArbitrumL2, CrossChainEnabledArbitrumL2: Fixed detection of cross-chain calls for EOAs. Previously, calls from EOAs would be classified as cross-chain calls. (#​3578)
  • GovernorVotesQuorumFraction: Fixed quorum updates so they do not affect past proposals that failed due to lack of quorum. (#​3561)
  • ERC165Checker: Added protection against large returndata. (#​3587)

v4.7.1

Compare Source

  • SignatureChecker: Fix an issue that causes isValidSignatureNow to revert when the target contract returns ill-encoded data. (#​3552)
  • ERC165Checker: Fix an issue that causes supportsInterface to revert when the target contract returns ill-encoded data. (#​3552)

v4.7.0

Compare Source

  • TimelockController: Migrate _call to _execute and allow inheritance and overriding similar to Governor. (#​3317)
  • CrossChainEnabledPolygonChild: replace the require statement with the custom error NotCrossChainCall. (#​3380)
  • ERC20FlashMint: Add customizable flash fee receiver. (#​3327)
  • ERC4626: add an extension of ERC20 that implements the ERC4626 Tokenized Vault Standard. (#​3171)
  • SafeERC20: add safePermit as mitigation against phantom permit functions. (#​3280)
  • Math: add a mulDiv function that can round the result either up or down. (#​3171)
  • Math: Add a sqrt function to compute square roots of integers, rounding either up or down. (#​3242)
  • Strings: add a new overloaded function toHexString that converts an address with fixed length of 20 bytes to its not checksummed ASCII string hexadecimal representation. (#​3403)
  • EnumerableMap: add new UintToUintMap map type. (#​3338)
  • EnumerableMap: add new Bytes32ToUintMap map type. (#​3416)
  • SafeCast: add support for many more types, using procedural code generation. (#​3245)
  • MerkleProof: add multiProofVerify to prove multiple values are part of a Merkle tree. (#​3276)
  • MerkleProof: add calldata versions of the functions to avoid copying input arrays to memory and save gas. (#​3200)
  • ERC721, ERC1155: simplified revert reasons. (#​3254, (#​3438))
  • ERC721: removed redundant require statement. (#​3434)
  • PaymentSplitter: add releasable getters. (#​3350)
  • Initializable: refactored implementation of modifiers for easier understanding. (#​3450)
  • Proxies: remove runtime check of ERC1967 storage slots. (#​3455)
Breaking changes
  • Initializable: functions decorated with the modifier reinitializer(1) may no longer invoke each other.

v4.6.0

Compare Source

  • crosschain: Add a new set of contracts for cross-chain applications. CrossChainEnabled is a base contract with instantiations for several chains and bridges, and AccessControlCrossChain is an extension of access control that allows cross-chain operation. (#​3183)
  • AccessControl: add a virtual _checkRole(bytes32) function that can be overridden to alter the onlyRole modifier behavior. (#​3137)
  • EnumerableMap: add new AddressToUintMap map type. (#​3150)
  • EnumerableMap: add new Bytes32ToBytes32Map map type. (#​3192)
  • ERC20FlashMint: support infinite allowance when paying back a flash loan. (#​3226)
  • ERC20Wrapper: the decimals() function now tries to fetch the value from the underlying token instance. If that calls revert, then the default value is used. (#​3259)
  • draft-ERC20Permit: replace immutable with constant for _PERMIT_TYPEHASH since the keccak256 of string literals is treated specially and the hash is evaluated at compile time. (#​3196)
  • ERC1155: Add a _afterTokenTransfer hook for improved extensibility. (#​3166)
  • ERC1155URIStorage: add a new extension that implements a _setURI behavior similar to ERC721's _setTokenURI. (#​3210)
  • DoubleEndedQueue: a new data structure that supports efficient push and pop to both front and back, useful for FIFO and LIFO queues. (#​3153)
  • Governor: improved security of onlyGovernance modifier when using an external executor contract (e.g. a timelock) that can operate without necessarily going through the governance protocol. (#​3147)
  • Governor: Add a way to parameterize votes. This can be used to implement voting systems such as fractionalized voting, ERC721 based voting, or any number of other systems. The params argument added to _countVote method, and included in the newly added _getVotes method, can be used by counting and voting modules respectively for such purposes. (#​3043)
  • Governor: rewording of revert reason for consistency. (#​3275)
  • Governor: fix an inconsistency in data locations that could lead to invalid bytecode being produced. (#​3295)
  • Governor: Implement IERC721Receiver and IERC1155Receiver to improve token custody by governors. (#​3230)
  • TimelockController: Implement IERC721Receiver and IERC1155Receiver to improve token custody by timelocks. (#​3230)
  • TimelockController: Add a separate canceller role for the ability to cancel. (#​3165)
  • Initializable: add a reinitializer modifier that enables the initialization of new modules, added to already initialized contracts through upgradeability. (#​3232)
  • Initializable: add an Initialized event that tracks initialized version numbers. (#​3294)
  • ERC2981: make royaltyInfo public to allow super call in overrides. (#​3305)
Upgradeability notice
  • TimelockController: (Action needed) The upgrade from <4.6 to >=4.6 introduces a new CANCELLER_ROLE that requires set up to be assignable. After the upgrade, only addresses with this role will have the ability to cancel. Proposers will no longer be able to cancel. Assigning cancellers can be done by an admin (including the timelock itself) once the role admin is set up. To do this, we recommend upgrading to the TimelockControllerWith46MigrationUpgradeable contract and then calling the migrateTo46 function.
Breaking changes
  • Governor: Adds internal virtual _getVotes method that must be implemented; this is a breaking change for existing concrete extensions to Governor. To fix this on an existing voting module extension, rename getVotes to _getVotes and add a bytes memory argument. (#​3043)
  • Governor: Adds params parameter to internal virtual _countVote method; this is a breaking change for existing concrete extensions to Governor. To fix this on an existing counting module extension, add a bytes memory argument to _countVote. (#​3043)
  • Governor: Does not emit VoteCast event when params data is non-empty; instead emits VoteCastWithParams event. To fix this on an integration that consumes the VoteCast event, also fetch/monitor VoteCastWithParams events. (#​3043)
  • Votes: The internal virtual function _getVotingUnits was made view (which was accidentally missing). Any overrides should now be updated so they are view as well.

v4.5.0

Compare Source

  • ERC2981: add implementation of the royalty standard, and the respective extensions for ERC721 and ERC1155. (#​3012)
  • GovernorTimelockControl: improve the state() function to have it reflect cases where a proposal has been canceled directly on the timelock. (#​2977)
  • Preset contracts are now deprecated in favor of Contracts Wizard. (#​2986)
  • Governor: add a relay function to help recover assets sent to a governor that is not its own executor (e.g. when using a timelock). (#​2926)
  • GovernorPreventLateQuorum: add new module to ensure a minimum voting duration is available after the quorum is reached. (#​2973)
  • ERC721: improved revert reason when transferring from wrong owner. (#​2975)
  • Votes: Added a base contract for vote tracking with delegation. (#​2944)
  • ERC721Votes: Added an extension of ERC721 enabled with vote tracking and delegation. (#​2944)
  • ERC2771Context: use immutable storage to store the forwarder address, no longer an issue since Solidity >=0.8.8 allows reading immutable variables in the constructor. (#​2917)
  • Base64: add a library to parse bytes into base64 strings using encode(bytes memory) function, and provide examples to show how to use to build URL-safe tokenURIs. (#​2884)
  • ERC20: reduce allowance before triggering transfer. (#​3056)
  • ERC20: do not update allowance on transferFrom when allowance is type(uint256).max. (#​3085)
  • ERC20: add a _spendAllowance internal function. (#​3170)
  • ERC20Burnable: do not update allowance on burnFrom when allowance is type(uint256).max. (#​3170)
  • ERC777: do not update allowance on transferFrom when allowance is type(uint256).max. (#​3085)
  • ERC777: add a _spendAllowance internal function. (#​3170)
  • SignedMath: a new signed version of the Math library with max, min, and average. (#​2686)
  • SignedMath: add an abs(int256) method that returns the unsigned absolute value of a signed value. (#​2984)
  • ERC1967Upgrade: Refactor the secure upgrade to use ERC1822 instead of the previous rollback mechanism. This reduces code complexity and attack surface with similar security guarantees. (#​3021)
  • UUPSUpgradeable: Add ERC1822 compliance to support the updated secure upgrade mechanism. (#​3021)
  • Some more functions have been made virtual to customize them via overrides. In many cases this will not imply that other functions in the contract will automatically adapt to the overridden definitions. People who wish to override should consult the source code to understand the impact and if they need to override any additional functions to achieve the desired behavior.
Breaking changes
  • ERC1967Upgrade: The function _upgradeToAndCallSecure was renamed to _upgradeToAndCallUUPS, along with the change in security mechanism described above.
  • Address: The Solidity pragma is increased from ^0.8.0 to ^0.8.1. This is required by the account.code.length syntax that replaces inline assembly. This may require users to bump their compiler version from 0.8.0 to 0.8.1 or later. Note that other parts of the code already include stricter requirements.

v4.4.2

Compare Source

Bugfixes
  • GovernorCompatibilityBravo: Fix error in the encoding of calldata for proposals submitted through the compatibility interface with explicit signatures. (#​3100)

v4.4.1

Compare Source

  • Initializable: change the existing initializer modifier and add a new onlyInitializing modifier to prevent reentrancy risk. (#​3006)
Breaking change

It is no longer possible to call an initializer-protected function from within another initializer function outside the context of a constructor. Projects using OpenZeppelin upgradeable proxies should continue to work as is, since in the common case the initializer is invoked in the constructor directly. If this is not the case for you, the suggested change is to use the new onlyInitializing modifier in the following way:

 contract A {
-    function initialize() public   initializer { ... }
+    function initialize() internal onlyInitializing { ... }
 }
 contract B is A {
     function initialize() public initializer {
         A.initialize();
     }
 }

v4.4.0

Compare Source

  • Ownable: add an internal _transferOwnership(address). (#​2568)
  • AccessControl: add internal _grantRole(bytes32,address) and _revokeRole(bytes32,address). (#​2568)
  • AccessControl: mark _setupRole(bytes32,address) as deprecated in favor of _grantRole(bytes32,address). (#​2568)
  • AccessControlEnumerable: hook into _grantRole(bytes32,address) and _revokeRole(bytes32,address). (#​2946)
  • EIP712: cache address(this) to immutable storage to avoid potential issues if a vanilla contract is used in a delegatecall context. (#​2852)
  • Add internal _setApprovalForAll to ERC721 and ERC1155. (#​2834)
  • Governor: shift vote start and end by one block to better match Compound's GovernorBravo and prevent voting at the Governor level if the voting snapshot is not ready. (#​2892)
  • GovernorCompatibilityBravo: consider quorum an inclusive rather than exclusive minimum to match Compound's GovernorBravo. (#​2974)
  • GovernorSettings: a new governor module that manages voting settings updatable through governance actions. (#​2904)
  • PaymentSplitter: now supports ERC20 assets in addition to Ether. (#​2858)
  • ECDSA: add a variant of toEthSignedMessageHash for arbitrary length message hashing. (#​2865)
  • MerkleProof: add a processProof function that returns the rebuilt root hash given a leaf and a proof. (#​2841)
  • VestingWallet: new contract that handles the vesting of Ether and ERC20 tokens following a customizable vesting schedule. (#​2748)
  • Governor: enable receiving Ether when a Timelock contract is not used. (#​2849)
  • GovernorTimelockCompound: fix ability to use Ether stored in the Timelock contract. (#​2849)

v4.3.3

Compare Source

  • ERC1155Supply: Handle totalSupply changes by hooking into _beforeTokenTransfer to ensure consistency of balances and supply during IERC1155Receiver.onERC1155Received calls.

v4.3.2

Compare Source

  • UUPSUpgradeable: Add modifiers to prevent upgradeTo and upgradeToAndCall being executed on any contract that is not the active ERC1967 proxy. This prevents these functions being called on implementation contracts or minimal ERC1167 clones, in particular.

v4.3.1

Compare Source

  • TimelockController: Add additional isOperationReady check.

v4.3.0

Compare Source

  • ERC2771Context: use private variable from storage to store the forwarder address. Fixes issues where _msgSender() was not callable from constructors. (#​2754)
  • EnumerableSet: add values() functions that returns an array containing all values in a single call. (#​2768)
  • Governor: added a modular system of Governor contracts based on GovernorAlpha and GovernorBravo. (#​2672)
  • Add an interfaces folder containing solidity interfaces to final ERCs. (#​2517)
  • ECDSA: add tryRecover functions that will not throw if the signature is invalid, and will return an error flag instead. (#​2661)
  • SignatureChecker: Reduce gas usage of the isValidSignatureNow function for the "signature by EOA" case. (#​2661)

v4.2.0

Compare Source

  • ERC20Votes: add a new extension of the ERC20 token with support for voting snapshots and delegation. (#​2632)
  • ERC20VotesComp: Variant of ERC20Votes that is compatible with Compound's Comp token interface but restricts supply to uint96. (#​2706)
  • ERC20Wrapper: add a new extension of the ERC20 token which wraps an underlying token. Deposit and withdraw guarantee that the total supply is backed by a corresponding amount of underlying token. (#​2633)
  • Enumerables: Improve gas cost of removal in EnumerableSet and EnumerableMap.
  • Enumerables: Improve gas cost of lookup in EnumerableSet and EnumerableMap.
  • Counter: add a reset method. (#​2678)
  • Tokens: Wrap definitely safe subtractions in unchecked blocks.
  • Math: Add a ceilDiv method for performing ceiling division.
  • ERC1155Supply: add a new ERC1155 extension that keeps track of the totalSupply of each tokenId. (#​2593)
  • BitMaps: add a new BitMaps library that provides a storage efficient datastructure for uint256 to bool mapping with contiguous keys. (#​2710)
Breaking Changes
  • ERC20FlashMint is no longer a Draft ERC. (#​2673))

How to update: Change your import paths by removing the draft- prefix from @openzeppelin/contracts/token/ERC20/extensions/draft-ERC20FlashMint.sol.

See Releases and Stability: Drafts.

v4.1.0

Compare Source

  • IERC20Metadata: add a new extended interface that includes the optional name(), symbol() and decimals() functions. (#​2561)
  • ERC777: make reception acquirement optional in _mint. (#​2552)
  • ERC20Permit: add a _useNonce to enable further usage of ERC712 signatures. (#​2565)
  • ERC20FlashMint: add an implementation of the ERC3156 extension for flash-minting ERC20 tokens. (#​2543)
  • SignatureChecker: add a signature verification library that supports both EOA and ERC1271 compliant contracts as signers. (#​2532)
  • Multicall: add abstract contract with multicall(bytes[] calldata data) function to bundle multiple calls together (#​2608)
  • ECDSA: add support for ERC2098 short-signatures. (#​2582)
  • AccessControl: add an onlyRole modifier to restrict specific function to callers bearing a specific role. (#​2609)
  • StorageSlot: add a library for reading and writing primitive types to specific storage slots. (#​2542)
  • UUPS Proxies: add UUPSUpgradeable to implement the UUPS proxy pattern together with EIP1967Proxy. (#​2542)
Breaking changes

This release includes two small breaking changes in TimelockController.

  1. The onlyRole modifier in this contract was designed to let anyone through if the role was granted to address(0),
    allowing the possibility to to make a role "open", which can be used for EXECUTOR_ROLE. This modifier is now
    replaced by AccessControl.onlyRole, which does not have this ability. The previous behavior was moved to the
    modifier TimelockController.onlyRoleOrOpenRole.
  2. It was possible to make PROPOSER_ROLE an open role (as described in the previous item) if it was granted to
    address(0). This would affect the schedule, scheduleBatch, and cancel operations in TimelockController.
    This ability was removed as it does not make sense to open up the PROPOSER_ROLE in the same way that it does for
    EXECUTOR_ROLE.

v4.0.0

Compare Source

  • Now targeting the 0.8.x line of Solidity compilers. For 0.6.x (resp 0.7.x) support, use version 3.4.0 (resp 3.4.0-solc-0.7) of OpenZeppelin.
  • Context: making _msgData return bytes calldata instead of bytes memory (#​2492)
  • ERC20: removed the _setDecimals function and the storage slot associated to decimals. (#​2502)
  • Strings: addition of a toHexString function. (#​2504)
  • EnumerableMap: change implementation to optimize for key → value lookups instead of enumeration. (#​2518)
  • GSN: deprecate GSNv1 support in favor of upcoming support for GSNv2. (#​2521)
  • ERC165: remove uses of storage in the base ERC165 implementation. ERC165 based contracts now use storage-less virtual functions. Old behavior remains available in the ERC165Storage extension. (#​2505)
  • Initializable: make initializer check stricter during construction. (#​2531)
  • ERC721: remove enumerability of tokens from the base implementation. This feature is now provided separately through the ERC721Enumerable extension. (#​2511)
  • AccessControl: removed enumerability by default for a more lightweight contract. It is now opt-in through AccessControlEnumerable. (#​2512)
  • Meta Transactions: add ERC2771Context and a MinimalForwarder for meta-transactions. (#​2508)
  • Overall reorganization of the contract folder to improve clarity and discoverability. (#​2503)
  • ERC20Capped: optimize gas usage by enforcing the check directly in _mint. (#​2524)
  • Rename UpgradeableProxy to ERC1967Proxy. (#​2547)
  • ERC777: optimize the gas costs of the constructor. (#​2551)
  • ERC721URIStorage: add a new extension that implements the _setTokenURI behavior as it was available in 3.4.0. (#​2555)
  • AccessControl: added ERC165 interface detection. (#​2562)
  • ERC1155: make uri public so overloading function can call it using super. (#​2576)
Bug fixes for beta releases
  • AccessControlEnumerable: Fixed renounceRole not updating enumerable set of addresses for a role. (#​2572)
How to upgrade from 3.x

Since this version has moved a few contracts to different directories, users upgrading from a previous version will need to adjust their import statements. To make this easier, the package includes a script that will migrate import statements automatically. After upgrading to the latest version of the package, run:

npx openzeppelin-contracts-migrate-imports

Make sure you're using git or another version control system to be able to recover from any potential error in our script.

How to upgrade from 4.0-beta.x

Some further changes have been done between the different beta iterations. Transitions made during this period are configured in the migrate-imports script. Consequently, you can upgrade from any previous 4.0-beta.x version using the same script as described in the How to upgrade from 3.x section.

v3.4.2

Compare Source

  • TimelockController: Add additional isOperationReady check.

v3.4.1

Compare Source

  • ERC721: made _approve an internal function (was private).

v3.4.0

Compare Source

  • BeaconProxy: added new kind of proxy that allows simultaneous atomic upgrades. (#​2411)
  • EIP712: added helpers to verify EIP712 typed data signatures on chain. (#​2418)
  • ERC20Permit: added an implementation of the ERC20 permit extension for gasless token approvals. (#​2237)
  • Presets: added token presets with preminted fixed supply ERC20PresetFixedSupply and ERC777PresetFixedSupply. (#​2399)
  • Address: added functionDelegateCall, similar to the existing functionCall. (#​2333)
  • Clones: added a library for deploying EIP 1167 minimal proxies. (#​2449)
  • Context: moved from contracts/GSN to contracts/utils. (#​2453)
  • PaymentSplitter: replace usage of .transfer() with Address.sendValue for improved compatibility with smart wallets. (#​2455)
  • UpgradeableProxy: bubble revert reasons from initialization calls. (#​2454)
  • SafeMath: fix a memory allocation issue by adding new SafeMath.tryOp(uint,uint)→(bool,uint) functions. SafeMath.op(uint,uint,string)→uint are now deprecated. (#​2462)
  • EnumerableMap: fix a memory allocation issue by adding new EnumerableMap.tryGet(uint)→(bool,address) functions. EnumerableMap.get(uint)→string is now deprecated. (#​2462)
  • ERC165Checker: added batch getSupportedInterfaces. (#​2469)
  • RefundEscrow: beneficiaryWithdraw will forward all available gas to the beneficiary. (#​2480)
  • Many view and pure functions have been made virtual to customize them via overrides. In many cases this will not imply that other functions in the contract will automatically adapt to the overridden definitions. People who wish to override should consult the source code to understand the impact and if they need to override any additional functions to achieve the desired behavior.
Security Fixes
  • ERC777: fix potential reentrancy issues for custom extensions to ERC777. (#​2483)

If you're using our implementation of ERC777 from version 3.3.0 or earlier, and you define a custom _beforeTokenTransfer function that writes to a storage variable, you may be vulnerable to a reentrancy attack. If you're affected and would like assistance please write to [email protected]. Read more in the pull request.

v3.3.0

Compare Source

  • Now supports both Solidity 0.6 and 0.7. Compiling with solc 0.7 will result in warnings. Install the solc-0.7 tag to compile without warnings.
  • Address: added functionStaticCall, similar to the existing functionCall. (#​2333)
  • TimelockController: added a contract to augment access control schemes with a delay. (#​2354)
  • EnumerableSet: added Bytes32Set, for sets of bytes32. (#​2395)

v3.2.0

Compare Source

New features
  • Proxies: added the proxy contracts from OpenZeppelin SDK. (#​2335)
Proxy changes with respect to OpenZeppelin SDK

Aside from upgrading them from Solidity 0.5 to 0.6, we've changed a few minor things from the proxy contracts as they were found in OpenZeppelin SDK.

  • UpgradeabilityProxy was renamed to UpgradeableProxy.
  • AdminUpgradeabilityProxy was renamed to TransparentUpgradeableProxy.
  • Proxy._willFallback was renamed to Proxy._beforeFallback.
  • UpgradeabilityProxy._setImplementation and AdminUpgradeabilityProxy._setAdmin were made private.
Improvements
  • Address.isContract: switched from extcodehash to extcodesize for less gas usage. (#​2311)
Breaking changes
  • ERC20Snapshot: switched to using _beforeTokenTransfer hook instead of overriding ERC20 operations. (#​2312)

This small change in the way we implemented ERC20Snapshot may affect users who are combining this contract with
other ERC20 flavors, since it no longer overrides _transfer, _mint, and _burn. This can result in having to remove Solidity override(...) specifiers in derived contracts for these functions, and to instead have to add it for _beforeTokenTransfer. See Using Hooks in the documentation.

v3.1.0

Compare Source

New features
  • SafeCast: added functions to downcast signed integers (e.g. toInt32), improving usability of SignedSafeMath. (#​2243)
  • functionCall: new helpers that replicate Solidity's function call semantics, reducing the need to rely on call. (#​2264)
  • ERC1155: added support for a base implementation, non-standard extensions and a preset contract. (#​2014, #​2230)
Improvements
  • ReentrancyGuard: reduced overhead of using the nonReentrant modifier. (#​2171)
  • AccessControl: added a RoleAdminChanged event to _setAdminRole. (#​2214)
  • Made all public functions in the token preset contracts virtual. (#​2257)
Deprecations
  • SafeERC20: deprecated safeApprove. (#​2268)

v3.0.2

Compare Source

Improvements
  • Added SPX license identifier to all contracts. (#​2235)

v3.0.1

Compare Source

Bugfixes
  • ERC777: fixed the _approve internal function not validating some of their arguments for non-zero addresses. (#​2213)

v3.0.0

Compare Source

New features
  • AccessControl: new contract for managing permissions in a system, replacement for Ownable and Roles. (#​2112)
  • SafeCast: new functions to convert to and from signed and unsigned values: toUint256 and toInt256. (#​2123)
  • EnumerableMap: a new data structure for key-value pairs (like mapping) that can be iterated over. (#​2160)
Breaking changes
  • ERC721: burn(owner, tokenId) was removed, use burn(tokenId) instead. (#​2125)
  • ERC721: _checkOnERC721Received was removed. (#​2125)
  • ERC721: _transferFrom and _safeTransferFrom were renamed to _transfer and _safeTransfer. (#​2162)
  • Ownable: removed _transferOwnership. (#​2162)
  • PullPayment, Escrow: withdrawWithGas was removed. The old withdraw function now forwards all gas. (#​2125)
  • Roles was removed, use AccessControl as a replacement. (#​2112)
  • ECDSA: when receiving an invalid signature, recover now reverts instead of returning the zero address. (#​2114)
  • Create2: added an amount argument to deploy for contracts with payable constructors. (#​2117)
  • Pausable: moved to the utils directory. (#​2122)
  • Strings: moved to the utils directory. (#​2122)
  • Counters: moved to the utils directory. (#​2122)
  • SignedSafeMath: moved to the math directory. (#​2122)
  • ERC20Snapshot: moved to the token/ERC20 directory. snapshot was changed into an internal function. (#​2122)
  • Ownable: moved to the access directory. (#​2120)
  • Ownable: removed isOwner. (#​2120)
  • Secondary: removed from the library, use Ownable instead. (#​2120)
  • Escrow, ConditionalEscrow, RefundEscrow: these now use Ownable instead of Secondary, their external API changed accordingly. (#​2120)
  • ERC20: removed _burnFrom. (#​2119)
  • Address: removed toPayable, use payable(address) instead. (#​2133)
  • ERC777: _send, _mint and _burn now use the caller as the operator. (#​2134)
  • ERC777: removed _callsTokensToSend and _callTokensReceived. (#​2134)
  • EnumerableSet: renamed get to at. (#​2151)
  • ERC165Checker: functions no longer have a leading underscore. (#​2150)
  • ERC721Metadata, ERC721Enumerable: these contracts were removed, and their functionality merged into ERC721. (#​2160)
  • ERC721: added a constructor for name and symbol. (#​2160)
  • ERC20Detailed: this contract was removed and its functionality merged into ERC20. (#​2161)
  • ERC20: added a constructor for name and symbol. decimals now defaults to 18. (#​2161)
  • Strings: renamed fromUint256 to toString (#​2188)

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/npm-@openzeppelin/contracts-vulnerability branch 3 times, most recently from 569a84c to 90c900a Compare February 14, 2022 23:20
@renovate renovate bot force-pushed the renovate/npm-@openzeppelin/contracts-vulnerability branch 4 times, most recently from dede8ba to 70b96a9 Compare February 26, 2022 03:15
@renovate renovate bot force-pushed the renovate/npm-@openzeppelin/contracts-vulnerability branch 6 times, most recently from 28bc0c8 to 65a250a Compare March 6, 2022 08:14
@renovate renovate bot force-pushed the renovate/npm-@openzeppelin/contracts-vulnerability branch 8 times, most recently from aa55791 to 9381412 Compare March 14, 2022 22:01
@renovate renovate bot force-pushed the renovate/npm-@openzeppelin/contracts-vulnerability branch 3 times, most recently from 06ff626 to 7c4f171 Compare March 21, 2022 20:39
@renovate renovate bot force-pushed the renovate/npm-@openzeppelin/contracts-vulnerability branch 4 times, most recently from d4c0fb3 to 13c7314 Compare March 28, 2022 21:00
@renovate renovate bot force-pushed the renovate/npm-@openzeppelin/contracts-vulnerability branch 2 times, most recently from 88a8550 to 9568826 Compare April 4, 2022 20:19
@renovate renovate bot force-pushed the renovate/npm-@openzeppelin/contracts-vulnerability branch 7 times, most recently from dc01fd9 to dd52f5b Compare October 9, 2022 18:22
@renovate renovate bot force-pushed the renovate/npm-@openzeppelin/contracts-vulnerability branch 7 times, most recently from 6f7fc3b to 271f048 Compare October 17, 2022 22:55
@renovate renovate bot force-pushed the renovate/npm-@openzeppelin/contracts-vulnerability branch 5 times, most recently from bb8fffd to 85e357f Compare October 24, 2022 03:32
@renovate renovate bot changed the title Update dependency @openzeppelin/contracts to v4 [SECURITY] Update dependency @openzeppelin/contracts to v4 [SECURITY] - autoclosed Apr 3, 2024
@renovate renovate bot closed this Apr 3, 2024
@renovate renovate bot deleted the renovate/npm-@openzeppelin/contracts-vulnerability branch April 3, 2024 13:25
@renovate renovate bot changed the title Update dependency @openzeppelin/contracts to v4 [SECURITY] - autoclosed Update dependency @openzeppelin/contracts to v4 [SECURITY] Apr 3, 2024
@renovate renovate bot reopened this Apr 3, 2024
@renovate renovate bot restored the renovate/npm-@openzeppelin/contracts-vulnerability branch April 3, 2024 15:37
@renovate renovate bot force-pushed the renovate/npm-@openzeppelin/contracts-vulnerability branch from 85e357f to 3023c59 Compare April 3, 2024 15:37
@renovate renovate bot changed the title Update dependency @openzeppelin/contracts to v4 [SECURITY] Update dependency @openzeppelin/contracts to v4 [SECURITY] - autoclosed Aug 6, 2024
@renovate renovate bot closed this Aug 6, 2024
@renovate renovate bot deleted the renovate/npm-@openzeppelin/contracts-vulnerability branch August 6, 2024 07:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants