-
Notifications
You must be signed in to change notification settings - Fork 86
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reject unsupported transactions #182
Comments
Rather than adding complexity in the off-chain ledger, we could add those checks where they belong, in the on-chain ledger interface, and prevent |
We consider pausing this effort, after solving the first requirement, and revisit this when we have more feedback for or against this feature. |
We discussed this again and realize that the most important bit of this would be
We aim to create a follow-up/alternative feature which mostly focuses on that and delays snapshot signing instead of rejecting transactions. This would allow minting "outside of snapshots", i.e. not having snapshots covering the txs with minted tokens, unless they are burned. |
Created #370 to capture more directly the security concern of unclosable Heads, whereas this item here aims at improving the UX on unsupported transactions. |
Closed in favor of #370 |
What & Why
Although the ledger implementation used in the
hydra-node
is the same as incardano-node
, not all ledger rules make sense in a Hydra Head. For example, stake pool registrations and submitting delegation certificates have no meaning on Layer 2.Furthermore, there are still some temporary gaps (#196) which need to be closed and corner-cases of PlutusV1 shortcomings (byron addresses). To provide a good user experience, these transactions shall be filtered at the API, but also need to be checked for when receiving them from another
hydra-node
.Requirements
Tasks
Restricted Tx
with a safe interface for constructing transactions that are valid with respect to Hydra heads limitations (see above).Tx
in theClientInput
API with their restricted type.Tx
on the network side, to prevent other peers from sending wrong transactions to usThe text was updated successfully, but these errors were encountered: