Crates.io | ibc-relayer-types |
lib.rs | ibc-relayer-types |
version | 0.29.4 |
source | src |
created_at | 2022-10-28 11:36:43.130051 |
updated_at | 2024-11-20 15:41:14.422612 |
description | Implementation of the Inter-Blockchain Communication Protocol (IBC). This crate comprises the main data structures and on-chain logic. |
homepage | |
repository | https://github.com/informalsystems/hermes |
max_upload_size | |
id | 700372 |
size | 657,194 |
See the ibc-rs repo root for more detailed information on how this crate can be used.
Implementation of the Inter-Blockchain Communication Protocol (IBC) module.
See documentation on docs.rs.
This crate diverges from the ICS specification in a number of ways. See below for more details.
ICS 24 (Host Requirements) gives the following requirement about the module system that the host state machine must support:
The host state machine must support a module system, whereby self-contained, potentially mutually distrusted packages of code can safely execute on the same ledger [...].
This crate currently does not support mutually distrusted packages. That is, modules on the host state machine are assumed to be fully trusted. In practice, this means that every module has either been written by the host state machine developers, or fully vetted by them.
ICS 5 (Port Allocation) requires the host system to support either object-capability reference or source authentication for modules.
In the former object-capability case, the IBC handler must have the ability to generate object-capabilities, unique, opaque references which can be passed to a module and will not be duplicable by other modules. [...] In the latter source authentication case, the IBC handler must have the ability to securely read the source identifier of the calling module, a unique string for each module in the host state machine, which cannot be altered by the module or faked by another module.
This crate currently requires neither of the host system. Since modules are assumed to be trusted, there is no need for this object capability system that protects resources for potentially malicious modules.
For more background on this, see this issue.
ICS 5 (Port Allocation) requires the IBC handler to permit transferring ownership of a port and releasing a port.
We currently support neither.
Copyright © 2021 Informal Systems Inc. and ibc-rs authors.
Licensed under the Apache License, Version 2.0 (the "License"); you may not use the files in this repository except in compliance with the License. You may obtain a copy of the License at
https://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.