Skip to content

Conversation

@Gozala
Copy link
Contributor

@Gozala Gozala commented Feb 21, 2025

Changes here implements operation signing and verification. All operations are represented (roughly) as UCAN invocations and signed by a memory consumer key. Provider currently only verifies that:

  1. Invoked operations is included in signed authorization.
  2. That signature is from the invocation issuer.

Also please note that:

  1. This implementation does not check whether issuer has authority over space (this will be built in the future on top).
  2. This implementation does net yet integrate common-identity and simply uses web native ed25519 keys. Integration with common-identity will be add as followup.

@Gozala Gozala changed the title chore: save current draft feat: signing and verification of memory transaction Feb 25, 2025
@Gozala Gozala merged commit 3d8b119 into main Mar 4, 2025
4 checks passed
@Gozala Gozala deleted the feat/signed-transactions branch March 4, 2025 20:11
@sentry
Copy link

sentry bot commented Mar 6, 2025

Suspect Issues

This pull request was deployed and Sentry observed the following issues:

  • ‼️ TypeError: Cannot read properties of undefined (reading 'pipeThrough') ?(/Users/jakedahn/common/labs/typescript/packag... View Issue

Did you find this useful? React with a 👍 or 👎

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants