Trust signature constrained input states by public key (not hash)

Description

The current implementation of Signature Constraints enforces a "hash-based" strictness check upon verifying and validating transactions with input states constrained by different versions of the same Signed CorDapp (signed by the same public key).

The following exception is observed when violating this condition:

This strictness control requires every Node in a network to install every Version of a Signed CorDapp to consumed older versioned states.

This story proposed relaxing the above control such that any Node consuming a transaction with older versioned signature-contrained inputs will trust those states if the Signing Key of these matches the Signing Key of the latest installed Version of that same CorDapp on a node.

This story was raised as a follow-up to the Corda 4.0 QA Test:
https://r3-cev.atlassian.net/browse/R3T-1745

Status

Assignee

James Higgs

Reporter

Jose Coll

Labels

Feature Team

Corda Core

Story Points

6

Fix versions

Ported to...

Corda 4.3
Corda Enterprise 4.1
Corda Enterprise 4.3

Priority

Medium

Sprint

None

Affects versions

Configure