Weekly Sync - 13 August 2024 #2846
Replies: 2 comments
-
|
Beta Was this translation helpful? Give feedback.
0 replies
-
Re-worked my telemetry packet count PR to capture metrics on the sending node. It's waiting additional reviews and a bit more of a write up from me about all our learning along the way. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Please add agenda items below and give your weekly update in a comment. Thank you!
Agenda
Discussions
Incoming Payments without Specified Amount & AML Concerns
An actionable incoming payment is one that a receiving ASE can choose to accept or cancel.
@mkurapov raised the need for actionable incoming payments, which has been highlighted in the PCH work. Sometimes accounts have tiered KYC so not all accounts meet the regulatory requirements for receiving large funds. This is even more true in cross-border scenarios.
In cases where the receiving account may not be able to accept the payment due to constraints such as regulatory limits or Anti-Money Laundering (AML) / Know Your Customer (KYC) requirements, or simply because the account is not in good standing, it is better to fail early in the process.
In order to fail early:
Unique Open Payment Keys for Wallet Addresses
Rafiki currently allows multiple wallet addresses to share the same public/private key. We have no uniqueness checks.
@sabineschaller raised concerns about whether the same public key should be used across multiple wallet addresses, especially when they belong to different accounts.
However it is no easy task to try and differentiate between keys being assigned to different wallet addresses that are for the same account, or for different accounts.
Not to mention, that one person can hold different accounts and in that case it would still seem okay for them to manage their keys as they wish.
Also, even if we did try enforce uniqueness we can only do that per ASE. If the same keys are being used in two different accounts but those accounts are at different ASEs we have no way to enforce that uniqueness.
@raducristianpopa argued that, similar to SSH keys, this should be up to the user, and it’s not Rafiki’s responsibility to enforce uniqueness.
Decision: There should at least be checks to not add the same key more than once for the same wallet address. Sabine is working on a migration file to delete duplicate keys associated with a single wallet address.
Performance Testing for Subsequent/Concurrent Outgoing Payments
Web Monetization (Web Mo) has encountered performance issues with outgoing payments. These are asset scale 9 payments, where an outgoing payment (without quote) is created every second. They seem to have a linear increase in response times with subsequent payments that get slower erratically. There is ongoing work to find what is causing the issue. @raducristianpopa asks that we add performance tests that test repeated outgoing payments from one account and see how the performance tracks with subsequent payments.
Currently we’ve been working on load testing creating outgoing payments. But would also like to be mindful of whether we’d get different behavior from testing the Admin API calls versus the Open Payment routes themselves.
Decision: We’ll put it on the roadmap.
Update on Rafiki Work Week Tracks
Plans are still preliminary
Changes:
Rafiki Work doc can be found here.
Final decisions on these issues will be made by the following Tuesday, considering who all will be participating and how the current work week progresses.
Beta Was this translation helpful? Give feedback.
All reactions