-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
content-discovery: content claim protocol handlers #743
Comments
We also considered doing something more abstract described in invocation router document. If we go this route we would essentially accept invocations to arbitrary audience (that were pre-registered) and index received invocations for them. Tradeoff with this approach is that:
Although perhaps it would be a good idea to allow |
I get what you're saying here and I think I'm ready to agree with you on this. I think a We could still build this as a generic system though, we'll just need to define one extra index whenever we get as |
Oh, and we need to define what the |
The It is only the same for the root of delegation chain, rest of the delegation chain will retain the |
Goal
Goal is to spin up a content-claims UCAN based protocol so our internal systems can publish signed claims about UnixFS files about which cars underlying blocks are in and where those CARs are located. Details of the actual UCAN capabilities are drafted in content-claims spec
Task
Create another UCAN handlers for
assert/location
,assert/inclusion
andassert/partition
capabilities that return{}
to invocations with a provisioned (one that has web3.storage provider) space DID.Nuances
My initial draft used space DID in the
with
/rsc
field which @mikeal has changed toCID
. We can not useCID
s as they need to be URIs but we probably could derive them. However ucanto will not allow you to publishwith
a resource that you do not own, however we could provide a hook to allow invocations for the specific URL schema that we could use forCIDs
.That said I still maintain opinion that using space DID there and utilizing separate field for the subject
CID
is a better design, because it allows us to decide who owns that claim. Please note thatiss
is not the same, because I could delegate you capability to make claims on my behalf, yet I'm the responsible actor not the one issuing the claims.I think rational for @mikeal's change was to make generic indexing possible of arbitrary invocations, which I think is a good idea but I thing that we should just allocate another field (as in IPLD schema, but probably same one across all claims maybe
subject
orabout
) and build our indexers around it. We could later figure out how to utilizersc
/with
field instead, but after we have time to do a careful deliberation.The text was updated successfully, but these errors were encountered: