-
Notifications
You must be signed in to change notification settings - Fork 115
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ADR 0004: Runtime Governance #3284
Conversation
06e56f4
to
b64da28
Compare
37b1a96
to
ed6039d
Compare
b64da28
to
a257cc1
Compare
|
||
Registering a runtime may require sufficient stake in either the owning entity's | ||
(when entity governance is used) or the runtime's (when runtime governance is | ||
used) escrow account. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what is the workflow for creating a runtime with runtime governance? do you create it that way, and it's immediately suspended and then you do something? or maybe you create it under entity governance, and you transfer some tokens and then you update it to runtime governance?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You can escrow tokens to the runtime account before registering the runtime itself. And then you can register it with runtime governance directly.
docs/adr/0004-runtime-governance.md
Outdated
|
||
Additionally it also introduces an additional safeguard for (all) runtime | ||
descriptor updates -- a configurable delay period after which any modifications | ||
to a runtime descriptor take effect instead of them taking effect immediately. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what does this safeguard against?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In theory it would give users time to e.g., move tokens out of the runtime in case they don't agree with the upgrade (security parameter change/MRENCLAVE change/etc.). Of course there are ways to prevent this, so it may not be worth adding the complexity.
ed6039d
to
c653da3
Compare
ba3a25f
to
bcc2f9f
Compare
c653da3
to
6cf0773
Compare
bcc2f9f
to
25b1b0e
Compare
6cf0773
to
d23d2f7
Compare
Hi, I would like to request a feature of the runtime governance. Is it possible to limit the number of compute nodes per entity? As a ParaTime developer, we will encounter the following issues if the number of compute nodes per entity is not limited:
|
d23d2f7
to
b6f9b83
Compare
4c5be3e
to
0b2325e
Compare
b6f9b83
to
2a9c80b
Compare
0b2325e
to
b3d6930
Compare
2a9c80b
to
11151cb
Compare
b3d6930
to
3ee37f4
Compare
11151cb
to
da9fcb1
Compare
3ee37f4
to
a8cb147
Compare
a8cb147
to
9b8f590
Compare
da9fcb1
to
7ac17e6
Compare
9b8f590
to
4566321
Compare
30e50b2
to
d386605
Compare
ce517e1
to
9a4a61f
Compare
9a4a61f
to
348c154
Compare
See #2515