-
Notifications
You must be signed in to change notification settings - Fork 215
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Restrict members access to critical tables #806
Comments
I think we should look at this from the perspective of preserving invariants, beyond Lua's type system abilities and beyond the KV's interface |
Now that we issue new shares on consortium updates, etc., we should definitely make sure that members cannot |
@jumaffre yes, this is otherwise a serious issue! |
With governance proposals being restricted to pre-defined constitution functions, and a safe set of default actions, I don't think this is a problem anymore, since:
|
Follow up from: #797 (comment)
Flexible governance allows members to perform a virtually-unlimited set of operations on the white-listed tables in the KV. And even if we provide a sensible default white-list, the constitution may allow this white-list to be updated (e.g. via unanimity of members).
This causes issues in terms of:
ccf.users
table. However, theccf.user_certs
andccf.values
tables should also be updated. (This particular point may be addressed by providing a richer KV API.)This should be addressed by (at least) documenting these restrictions.
The text was updated successfully, but these errors were encountered: