Crates.io | ibc-core-connection |
lib.rs | ibc-core-connection |
version | 0.56.0 |
source | src |
created_at | 2023-11-23 23:32:36.631878 |
updated_at | 2024-11-15 14:38:59.868228 |
description | Maintained by `ibc-rs`, contains the implementation of the ICS-03 Connection Semantics and re-exports essential data structures and domain types from `ibc-core-connection-types` crate. |
homepage | |
repository | https://github.com/cosmos/ibc-rs |
max_upload_size | |
id | 1046603 |
size | 37,309 |
This is the top-level library that re-exports the Inter-Blockchain Communication (IBC) core modules as a meta-crate. It serves to simplify the process of importing and integrating various IBC core modules into your blockchain.
IBC is a distributed protocol that enables communication between distinct sovereign blockchains and IBC core is the part of the protocol that handles the transport, authentication, and ordering (TAO) of data packets.
The structure within the ibc-core
crate is designed to provide flexibility for
external users. You can choose to utilize the entire ibc-core
crate, or
selectively import specific libraries. From there, you also have the flexibility
of bringing in an entire sub-module (e.g. the ibc-core-client
crate), or only
a module's associated data structures (e.g. ibc-core-client-types
).
This versatility empowers hosts, including chain integrators, relayers, or any IBC tooling projects, to build their solution on top of the layers that best suit their particular requirements.
Currently, the ibc-core
crate contains the implementation of the following IBC
core specifications:
This crate diverges from the ICS specification in a number of ways. See below for more details.
ICS-24 (Host Requirements) gives the following requirement about the module system that the host state machine must support:
The host state machine must support a module system, whereby self-contained, potentially mutually distrusted packages of code can safely execute on the same ledger [...].
This crate currently does not support mutually distrusted packages. That is, modules on the host state machine are assumed to be fully trusted. In practice, this means that every module has either been written by the host state machine developers, or fully vetted by them.
ICS-05 (Port Allocation) requires the host system to support either object-capability reference or source authentication for modules.
In the former object-capability case, the IBC handler must have the ability to generate object-capabilities, unique, opaque references which can be passed to a module and will not be duplicable by other modules. [...] In the latter source authentication case, the IBC handler must have the ability to securely read the source identifier of the calling module, a unique string for each module in the host state machine, which cannot be altered by the module or faked by another module.
This crate currently requires neither of the host system. Since modules are assumed to be trusted, there is no need for this object capability system that protects resources for potentially malicious modules.
For more background on this, see this issue.
ICS-05 (Port Allocation) requires the IBC handler to permit transferring ownership of a port and releasing a port.
We currently support neither.
The standard gives the ability for modules to acknowledge packets asynchronously. This allows modules to receive the packet, but only applying the changes at a later time (after which they would write the acknowledgement).
We currently force applications to process the packets as part of
onRecvPacket()
. If you need asynchronous acknowledgements for your
application, please open an issue.
Note that this still makes us 100% compatible with ibc-go
.
IBC is specified in English in the cosmos/ibc repo. Any protocol changes or clarifications should be contributed there.
If you're interested in contributing, please take a look at the CONTRIBUTING guidelines. We welcome and appreciate community contributions!