Skip to content
This repository has been archived by the owner on Feb 28, 2021. It is now read-only.

Multisig runtime governance #572

Open
CodeSandwich opened this issue Jul 6, 2020 · 1 comment
Open

Multisig runtime governance #572

CodeSandwich opened this issue Jul 6, 2020 · 1 comment
Assignees
Milestone

Comments

@CodeSandwich
Copy link
Contributor

The runtime updates are possible with only one privileged key: the one set in sudo pallet.

We need to be able to require signatures from an arbitrary number of keys from a set of privileged keys.

This may be possible with the sudo pallet, but if not, at least it will be a good base for alterations.

This is a temporary trust improvement, the end goal will probably be making the network self-governing.

@CodeSandwich CodeSandwich added this to the MainNet milestone Jul 6, 2020
@geigerzaehler
Copy link

This may be possible with the sudo pallet, but if not, at least it will be a good base for alterations.

We should avoid the sudo pallet. It allows a valid author to impersonate any user. Instead we should provide only a dedicated message that updates the runtime code.

@geigerzaehler geigerzaehler modified the milestones: MainNet, Next Testnet Jul 8, 2020
@geigerzaehler geigerzaehler self-assigned this Jul 24, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants