Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Network Seednodes/Trust Anchor Bootstrapping #780

Closed
amydevs opened this issue Jul 29, 2024 · 2 comments
Closed

Network Seednodes/Trust Anchor Bootstrapping #780

amydevs opened this issue Jul 29, 2024 · 2 comments
Labels
development Standard development

Comments

@amydevs
Copy link
Contributor

amydevs commented Jul 29, 2024

Specification

According to #779, there needs to be a Trust Anchor that exists to mint ClaimNetworkAuthority tokens.

As the Trust Anchor is simply some entity containing state with a public key and private key in order to mint ClaimNetworkAuthority tokens, a user can simply store their public/private key in some secrets manager. Since we are building one, one can just use a Polykey Seednode that is designated to being the Trust Authority. Or the Trust Authority could be simply some state stored in a database or on disk.

Anyhow, seednodes are bootstrapped with the authority to delegate ClaimNetworkAccess tokens by being given a ClaimNetworkAuthority token.

The ClaimNetworkAuthority token is generated by the Trust Anchor and passed to each seednode through an environment variable.

Additional context

#779

Tasks

  1. ...
  2. ...
  3. ...
@amydevs amydevs added the development Standard development label Jul 29, 2024
Copy link

linear bot commented Jul 29, 2024

@tegefaulkes
Copy link
Contributor

I'm closing this issue. It will be covered by #781 and #784

@tegefaulkes tegefaulkes closed this as not planned Won't fix, can't repro, duplicate, stale Aug 14, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
development Standard development
Development

No branches or pull requests

2 participants