-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unify UCAN API endpoints #325
Comments
this is a little related to #182 |
#status today will address feedback on this PR adding initial functionality: #334 (review) |
#status you can now issue |
#status I will update it to use new ucanto functionality to do the proxying without issuing a new delegation - #383 |
… and not sign proxyInvocation. using features coming in ucanto 4.2.0 Motivation: * #325 * simplify access-api ucanto proxy using features added to ucanto in storacha/ucanto#199 * previously, the technique used to proxy the invocation was to issue a new invocation (i.e. `proxyInvocation`) in the proxy server, and then send that to the upstream. This had at least two limitations: 1. required the proxy server to be configured with a `options.signer` to sign the `proxyInvocation` 2. for functional use in access-api and proxying upload-api, this proxy `options.signer` also had to be configured pretty much identically to the ucanto verifier with same did on the upstream, including requiring both to have the same private key * now * you don't need an `options.signer` at all! so you definitely don't need one creating signatures with the same private key as the upstream Steps * [x] release ucanto 4.2.0 storacha/ucanto#200 * [x] update this source branch package.json + pnpm locks to upgrade ucanto to 4.2.0 * [x] ensure `tsc` + tests pass here
#status In general after above work, you should be able to issue ucan invocations only against the deployed access-api. If they are |
… and not sign proxyInvocation. using features coming in ucanto 4.2.0 Motivation: * #325 * simplify access-api ucanto proxy using features added to ucanto in storacha/ucanto#199 * previously, the technique used to proxy the invocation was to issue a new invocation (i.e. `proxyInvocation`) in the proxy server, and then send that to the upstream. This had at least two limitations: 1. required the proxy server to be configured with a `options.signer` to sign the `proxyInvocation` 2. for functional use in access-api and proxying upload-api, this proxy `options.signer` also had to be configured pretty much identically to the ucanto verifier with same did on the upstream, including requiring both to have the same private key * now * you don't need an `options.signer` at all! so you definitely don't need one creating signatures with the same private key as the upstream Steps * [x] release ucanto 4.2.0 storacha/ucanto#200 * [x] update this source branch package.json + pnpm locks to upgrade ucanto to 4.2.0 * [x] ensure `tsc` + tests pass here
Motivation:
To Do
Problem
Solution
can
of invocation, determine backend ucanto service that can handle it, i.e. upload-api or access-apiNice to Have
did:web:web3.storage
did document links to the ucanto api via service endpointaud
ofdid:web:web3.storage
to the URL you should send ucanto invocations to:aud
- fordid:web:web3.storage
, this means GET https://web3.storage/.well-known/did.json"service"
property for a service endpoint of typeucanto
aud
, which you need anyway to create the ucan invocation.Decisions
✅ What should the URL be of the unified ucanto endpoint?
Status
Ideas
@web3-storage/api
handler. This is kinda nice as it enhances our existing/legacy API URL with ability to handle ucanto http requests by proxing to the new microservices.✅ Should the unified UCAN API endpoint respond to websocket connections?
Status
Context
w3access create-space
, when it will connect to websocket to find out when the email has been confirmedProblem
Considerations
Solutions Considered
#access-api
and/or service of typew3protocol.web3.storage/services/access-api
The text was updated successfully, but these errors were encountered: