Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: content serve authorization #205

Merged
merged 2 commits into from
Dec 19, 2024
Merged

feat: content serve authorization #205

merged 2 commits into from
Dec 19, 2024

Conversation

fforbeck
Copy link
Member

@fforbeck fforbeck commented Dec 13, 2024

Context

We must ensure that the space owner delegates the space/content/serve/* capability to the Gateway. This delegation allows the Gateway to serve content and log egress events appropriately.

Changes

I've updated the CLI to enable the new gateway content serve authorization flow when creating a space. This is a breaking change because now the user is forced to provide the DIDs of the Content Serve services, and the service endpoint, or skip the authorization flow.

Related Issues

@fforbeck fforbeck requested review from travis and alanshaw December 13, 2024 12:43
@fforbeck fforbeck self-assigned this Dec 13, 2024
@fforbeck fforbeck changed the title feat!: content serve authorization feat: content serve authorization Dec 18, 2024
@fforbeck fforbeck force-pushed the feat/content-serve-auth branch from 313b8ff to 81823ba Compare December 19, 2024 22:42
@fforbeck fforbeck force-pushed the feat/content-serve-auth branch from 81823ba to 5f8f49b Compare December 19, 2024 22:55
@fforbeck fforbeck merged commit 34efff2 into main Dec 19, 2024
1 check passed
@fforbeck fforbeck deleted the feat/content-serve-auth branch December 19, 2024 23:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Update the w3 CLI to create the new delegation when a new space is created
2 participants