Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Handle case where a validator isn't ready for signer rotations #943

Open
JesseAbram opened this issue Jul 16, 2024 · 1 comment
Open

Handle case where a validator isn't ready for signer rotations #943

JesseAbram opened this issue Jul 16, 2024 · 1 comment
Assignees

Comments

@JesseAbram
Copy link
Member

Edge case of not enough validators for signer rotation, currently handled by not allowing them to rotate (probably should also force a proactive refresh)

@ameba23
Copy link
Contributor

ameba23 commented Jul 17, 2024

Not sure if this is the right issue to discuss this, but re: the proposal of not letting a current signer leave if the validator set is too small to have someone else to replace them:

I guess this should never happen if we as an organisation run a number of validators ourselves which is greater than n.

But for the case that for some reason the active ones go down because of some attack, i guess we should be ready to deploy some more to allow members of the signing committee run by others to leave if they want to. Its is a really undesirable situation to have people holding keyshares who want to leave but can't.

@HCastano HCastano changed the title How to Handle if not a validator ready for signer roatations Handle case where a validator isn't ready for signer rotations Sep 9, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: 🌝 Soon
Development

No branches or pull requests

2 participants