Skip to content

Commit

Permalink
Updating version to 1.13.2
Browse files Browse the repository at this point in the history
  • Loading branch information
djosse authored Aug 15, 2024
1 parent f255ae1 commit 69a0cef
Showing 1 changed file with 48 additions and 0 deletions.
48 changes: 48 additions & 0 deletions docs/migration/injective-canonical-chain-13-2.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,48 @@
# Injective v1.13.2 Upgrade 🥷

## Upgrade Guide


This is a software upgrade proposal for Injective. If passed, [Proposal 424](https://hub.injective.network/proposals/424/) would commit the Injective Chain to halt at block [82830000](https://www.mintscan.io/injective/blocks/82830000) (approximately 15:00 UTC on Thursday August 20th 2024) and resume with the v1.13.2 version of the application binary.

Validators can find a step-by-step guide on the upgrade procedure in the long-form [proposal](https://docs.injective.network/nodes/validators/mainnet/canonical-chain-upgrade/canonical-1.13.2).

Validators should also upgrade the peggo version.

### Versions

| Binary | Version |Commit Hash
| -------- | ------- |------- |
| injectived | v1.13.2 |XXXX|
| peggo | v1.13.2 |XXXX|

`Go version 1.22`

Verify you're using the correct version by running the below commands:
```bash
injectived version
peggo version
```

```bash
docker run public.ecr.aws/l9h3g6c6/injective-core:v1.13.2 injectived version
docker run public.ecr.aws/l9h3g6c6/peggo:v1.13.2 peggo version
```

### 🐳 Docker

Docker images have support for both `amd64` and `arm64` architectures.

| Image | Description |
| -------- | ------- |
| public.ecr.aws/l9h3g6c6/injective-core:v1.13.2 | Debian image |
| public.ecr.aws/l9h3g6c6/peggo:v1.13.2 | Alpine image |

### 🕊️ Download Binaries

```bash
wget https://github.com/InjectiveLabs/injective-chain-releases/releases/download/v1.13.2-XXXXX/linux-amd64.zip
unzip linux-amd64.zip
sudo mv injectived peggo /usr/bin
sudo mv libwasmvm.x86_64.so /usr/lib
```

0 comments on commit 69a0cef

Please sign in to comment.