No prior context really, just me being short on details because I felt
they were pretty irrelevant,
yes I was assuming mark meant something akin to meters in the
KeyKOS/EROS sense, or the gas
sense of blockchain. My point is that besides the obvious low-level
system tie-in of allocation/resource accounting
meters are a fairly general concept of adding a predicate check onto
an unsealer.
Without that low-level tie-in they can be made a general purpose concept.
Many CI systems for instance have a series of static analysis checks,
and code formatting checks.
all of which must pass for committing to be allowed.
When implemented as a general wrapper around a capability, this looks
much like metering in reverse,
where access is to the "commit" capability acts like a null cap, until
the code formatting checks, and the static analysis
checks all reach consensus that the "commit" capability should
actually be non-null.
A simple way to implement that is using a counter that increases and
returns a non null cap once the counter has
reached the consensus limit. In this case it doesn't really require a
meter tree, but can be some sort of wrapper cap
around CRUD
> To view this discussion visit
https://groups.google.com/d/msgid/cap-talk/CAAP%3D3QNtHaUmPT9LPcXQsyYCkVnRxeKu5p-FLbArNfVzugzrPA%40mail.gmail.com.