Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: add updates to support libp2p 2.0 #2

Merged
merged 1 commit into from
Nov 10, 2024

Conversation

maschad
Copy link
Member

@maschad maschad commented Nov 10, 2024

Description

Closes #1

Updates the connectionEncryption to connectionEncrypters given the breaking changes introduced in libp2p 2.0 + linting fixes

Notes and Open Questions

@achingbrain what's the best way to test these changes

Change checklist

  • I have performed a self-review of my own code
  • I have made corresponding changes to the documentation if necessary (this includes comments as well)
  • I have added tests that prove my fix is effective or that my feature works

@achingbrain achingbrain merged commit b70aeac into libp2p:main Nov 10, 2024
4 checks passed
github-actions bot pushed a commit that referenced this pull request Nov 11, 2024
## 1.0.0 (2024-11-11)

### Features

* initial import ([426b7f6](426b7f6))

### Bug Fixes

* add updates to support libp2p 2.0 ([#2](#2)) ([b70aeac](b70aeac))
* create defered promise with reject prop ([ad853c6](ad853c6))

### Trivial Changes

* add tests to ensure there are no regressions ([#3](#3)) ([e22b313](e22b313))
* Update .github/pull_request_template.md [skip ci] ([f8cbf0e](f8cbf0e))
* Update .github/workflows/semantic-pull-request.yml [skip ci] ([a211fb1](a211fb1))
* Update .github/workflows/stale.yml [skip ci] ([0c3c438](0c3c438))

### Documentation

* replace invalid character ([08d25a8](08d25a8))
Copy link

🎉 This PR is included in version 1.0.0 🎉

The release is available on:

Your semantic-release bot 📦🚀

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

connectionEncryption should be updated to connectionEncrypters
2 participants