Skip to content

Feat: LIP-32 - GateSeal v2.0 #85

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 4 commits into
base: develop
Choose a base branch
from
Draft

Feat: LIP-32 - GateSeal v2.0 #85

wants to merge 4 commits into from

Conversation

Alexvozhak
Copy link

Please do not use LIP-32. It's booked for GateSeal v2.0

@Alexvozhak Alexvozhak requested a review from a team as a code owner June 4, 2025 18:50
@Alexvozhak Alexvozhak marked this pull request as draft June 4, 2025 18:50
Copy link
Contributor

@TheDZhon TheDZhon left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👀

### Overview

GateSeal V2 will retain the one-time activation logic but allow:
- An initial expiry up to 3 years (set at deployment),
Copy link
Contributor

@TheDZhon TheDZhon Jun 5, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- An initial expiry up to 3 years (set at deployment),
- An initial expiry up to 1 year (set at deployment),
- An overall expiry up to 5 years (set at deployment),

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We have N prolongations, so why do we need a cap in the contract? It seems like an extra precaution.

Copy link
Contributor

@TheDZhon TheDZhon Jun 6, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

want to limit the overall duration of the same instance still to avoid some possibly forgotten stuff

- Public method `prolong()` will be gated by internal checks:
- `not activated`
- `not expired`
- `prolongations_remaining > 0`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- `prolongations_remaining > 0`
- `prolongations_remaining > 0`
- can't be called more than once for the current period
- can't be called earlier than 1 mo before the currently assigned expiration


GateSeal V2 will retain the one-time activation logic but allow:
- An initial expiry up to 3 years (set at deployment),
- Up to N prolongations (e.g., 5), each increasing validity by up to 6 months,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Up to N prolongations (e.g., 5), each increasing validity by up to 6 months,
- Up to N prolongations (e.g., 5), each increasing validity by up to 6 months (set at deployment),

### Overview

GateSeal V2 will retain the one-time activation logic but allow:
- An initial expiry up to 3 years (set at deployment),
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We have N prolongations, so why do we need a cap in the contract? It seems like an extra precaution.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants