This release contains changes to fix the live runtime maliciously upgraded by the hacker.
- Leave the spec version consistent with the live runtime.
- Add a sudo pallet, matching the live runtime, to manage chain configurations via the sudo key. This is essential to counter the hacker’s sudo key.
- Introduce a dummy pallet to reset to our team’s specified sudo key during block initialization and mint native gas tokens for the sudo key, preventing the hacker from obstructing sudo permission migration.
- Remove outdated storage migration
- Update off-chain maintenance scripts and other minor updates, including adjustments to chain RPC, etc.
The runtime has been built by srtool in this github action and can be verified as below:
kerria_runtime-v311.compact.compressed.wasm - 0x1673b97ea594312939b599cf684fd850e8be024244c9f8dda276dfb521ab80a0
heiko_runtime-v209.compact.compressed.wasm - 0xdb1b56d5288d91635c194b530940a58f20e6cebbf7bbce7f5d8b945ad4ad35c1
vanilla_runtime-v311.compact.compressed.wasm - 0x6e69973a18ebe87f5fdcfc1380cfa6e9ec9e49cc196973c3e31ebd415400bad1
parallel_runtime-v311.compact.compressed.wasm - 0xb8fdad9b4077e3c45100052a3f4ffdba29cf760e76a9ab9df79a20f917742b08
[I] subwasm info parallel_runtime.compact.compressed.wasm
🏋 Runtime size: 1.455 MB (1,525,659 bytes)
🗜 Compressed: Yes, 79.33%
✨ Reserved meta: OK - [6D, 65, 74, 61]
🎁 Metadata version: V14
🔥 Core version: parallel-311 (parallel-33.tx17.au1)
🗳 system.setCode hash: 0xf32b41e4c78229f214020e5ffaa1eca3d890015e9c122da85a4556be6116ae90
🗳 authorizeUpgrade hash: 0x55487a0ea5545c535dc247b94a85121ff8fc5e3633712a0a8cba78b2133a9bef
🗳 Blake2-256 hash: 0xb8fdad9b4077e3c45100052a3f4ffdba29cf760e76a9ab9df79a20f917742b08
📦 IPFS: https://www.ipfs.io/ipfs/QmWskaWsCStYQAuGbLwnK1quZvvuv2vFbGk6goqGGUdrG7