-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
116 hackathon rkvst implementation #28
Conversation
…ITT service Signed-off-by: JAG-UK <[email protected]>
Signed-off-by: JAG-UK <[email protected]>
Signed-off-by: JAG-UK <[email protected]>
Signed-off-by: JAG-UK <[email protected]>
Signed-off-by: JAG-UK <[email protected]>
Signed-off-by: JAG-UK <[email protected]>
Signed-off-by: JAG-UK <[email protected]>
Signed-off-by: JAG-UK <[email protected]>
Signed-off-by: JAG-UK <[email protected]>
from pathlib import Path | ||
import json | ||
import cbor2 | ||
#from cose.messages import CoseMessage |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
maybe remove comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will do
|
||
# Grab credentials from the enviroment | ||
# TODO: we should support container storage and protected local file storage too | ||
# TODO: we shold support unauthenticated connections for public read calls |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I had similar question, it seems like all api operations probably want some access control.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Doing something sophisticated here needs resolution on the Registration Policies and Identifiers discussions I think. The signer of the Signed Statement is not necessarily the caller of the API (in fact, will never be in my book, otherwise you'll be reusing keys in a naughty way ;-) so there's some unpicking to do here.
But yes at the moment all API calls do have authentication on them. My comment is that I think certain things could be relaxed in future when more of the API and surrounding concepts are fleshed out.
#rkvst_receipt = rkvst_mocks.mock_receipt | ||
|
||
# TODO: This is just neat debug. Get the JSON form of the receipt | ||
receipt_file_path = f'{entry_id}.receipt.json' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we should really document a json form for them, we do something similar
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Happy to contribute this. Where do you think we should put it? I'd imagine just a subsection the API portion of the architecture doc.
Working RKVST back end implementation from 116 Hackathon, updated and works on free production SaaS.