-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New release #104
Merged
New release #104
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Release back
Co-authored-by: Jesus Lanchas <jesus.lanchas@daureos.com>
Co-authored-by: Jesus Lanchas <jesus.lanchas@daureos.com>
[VEN-2638]: Deployment of SingleTokenConverters on Ethereum And Sepolia
## [2.3.0-dev.1](v2.2.0...v2.3.0-dev.1) (2024-06-20) ### Features * updating deployment files ([2331045](2331045)) * updating deployment files ([a2ff8de](a2ff8de)) * updating deployment files ([3df1a06](3df1a06)) * updating deployment files ([6cee196](6cee196)) * updating deployment files ([8657319](8657319)) ### Bug Fixes * deployment scripts ([c5aaf2b](c5aaf2b)) * typo in file name ([5e00e66](5e00e66)) * USDT Etherum approval ([5a04ca7](5a04ca7))
[VEN-2686]: PSR deployment on zksync sepolia
## [2.3.0-dev.2](v2.3.0-dev.1...v2.3.0-dev.2) (2024-08-14) ### Features * PSR deployment on zksync sepolia ([88197ea](88197ea)) * updating deployment files ([5fd48dd](5fd48dd)) ### Bug Fixes * remove unnecessary comment ([ac7f495](ac7f495)) * remove unnecessary external dependency from hardhat config ([fddb63d](fddb63d)) * remove unused dependency ([1f44f5c](1f44f5c))
Problem: Venus still uses Governance to cover some shortfall positions, especially in the core pool. With the current implemetation of the risk fund, it is not possible to use custom flows for covering the debts – it requires a normal VIP and transfers funds directly to the pool's Comptroller. It is not always sufficient, e.g. we may need to repay a borrow in a specific vToken rather than fund the pool's Comptroller. We may also need to use a critical or a fast-track timelock to perform this operation as this might be time-sensitive. Solution: * Integrate access controls to sweepTokenFromProol * Allow specifying a custom receiver address as long as the call passes through the access control checks
…ntrol [VEN-2718]: Add access controls and receiver to sweepTokenFromPool
## [2.3.0-dev.3](v2.3.0-dev.2...v2.3.0-dev.3) (2024-09-05) ### Features * add access controls and receiver to sweepTokenFromPool ([d34bf38](d34bf38)) * updating deployment files ([285b27e](285b27e))
[VEN-2746]: PSR deployments on zksync
[VEN-2670]: bump dependencies with venus packages
## [2.3.0-dev.5](v2.3.0-dev.4...v2.3.0-dev.5) (2024-09-10) ### Features * bump dependencies with venus packages ([8f22d7f](8f22d7f))
gleiser-oliveira
approved these changes
Sep 10, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
It includes: