Skip to main content

SanchoNet governance actions

CIP-1694 describes seven types of governance actions.

ActionDescription
1. Motion of no-confidenceA motion to create a state of no-confidence in the current constitutional committee
2. New constitutional committee and/or threshold and/or term limitsModifications to the members of the constitutional committee, signature threshold, or term limits
3. Updates to the constitutionModifications to the off-chain constitution, recorded as an on-chain hash of the text document
4. Hard fork initiationA non-backward compatible upgrade of the network, which requires a prior software upgrade
5. Protocol parameter changesAny change to one or more updatable protocol parameters, excluding changes to major protocol versions ('hard forks')
6. Treasury withdrawalsTreasury withdrawals are sub-categorized into small, medium, or large and are determined by the amount of lovelace to be withdrawn.
7. InfoAn action that doesn't have any on-chain impact except for being recorded on-chain.

Each type of governance action represents a distinct feature within cardano-node and cardano-cli. As such, they will be rolled out in phases, coinciding with the integration of each feature.

Governance Action Enactment Process

Any ada holder can submit a governance action. Once on chain, specific governance groups need to vote on the action depending on its type. The following table details the ratification requirements for each governance action scenario. The columns represent:

  • Governance action type
    The type of governance action. Note that the protocol parameter updates are grouped into four categories.

  • Constitutional committee (abbrev. CC)
    A value of ✓ indicates that the constitutional committee must approve this action.
    A value of - means that constitutional committee votes do not apply.

  • DReps
    The DRep vote threshold that must be met as a percentage of active voting stake.

  • SPOs
    The SPO vote threshold which must be met as a percentage of the stake held by all stake pools.
    A value of - means that SPO votes do not apply.

Governance action typeCCDRepsSPOs
1. Motion of no-confidence-$P_1$$Q_1$
2a. Update committee/threshold (normal state)-$P_{2a}$$Q_{2a}$
2b. Update committee/threshold (state of no-confidence)-$P_{2b}$$Q_{2b}$
3. New Constitution or Guardrails Script$P_3$-
4. Hard-fork initiation$P_4$$Q_4$
5a. Protocol parameter changes, network group$P_{5a}$-
5b. Protocol parameter changes, economic group$P_{5b}$-
5c. Protocol parameter changes, technical group$P_{5c}$-
5d. Protocol parameter changes, governance group$P_{5d}$-
6. Treasury withdrawal$P_6$-

| 7. Info

Each of these thresholds is a governance parameter. There is one additional threshold, Q5, related to security relevant protocol parameters:

The security relevant protocol parameters are:

  • maxBlockBodySize
  • maxTxSize
  • maxBlockHeaderSize
  • maxValueSize
  • maxBlockExecutionUnits
  • txFeePerByte
  • txFeeFixed
  • utxoCostPerByte
  • govActionDeposit
  • minFeeRefScriptCostPerByte

To get ratified, a governance action needs to accumulate enough votes according to the specified thresholds. A governance action expires if it does not receive enough votes during its governance action lifetime.

Ratified governance actions are automatically enacted at the epoch boundary following their ratification.

The only exception is when a "Motion of No Confidence" is enacted prior to the enactment of other actions. In that case, the ratified but not yet enacted actions are not enacted. Instead, these actions are put back for voting for the remainder of their lifetime. If a new committee is elected before these actions expire, they can still be ratified, but the new committee must approve them.

Governance action lifecycle

Check out the Tutorials and Voting on governance actions to learn how to create and vote on governance actions.