-
Notifications
You must be signed in to change notification settings - Fork 5
Closed
Labels
developmentStandard developmentStandard developmentr&d:polykey:core activity 3Peer to Peer Federated HierarchyPeer to Peer Federated Hierarchy
Milestone
Description
Specification
- The ACL stores permissions for gestalts and actions
- The CLI should expose the ACL permissions/actions to the
pk identitiesfor gestalts andpk vaultsfor vaults - This means being able to set permissions and to show/introspect the permissions available
- The permissions are structured as sets of actions
- Gestalts:
- notify
- scan
- Vaults:
- pull
- clone
- Gestalts:
- Users must be able to set a permission idempotently, and to unset a permission idempotently
- Setting and unsetting of permissions to should map to semantic subcommands
- Or the setting and unsetting of permissions can be its own acl-specific subcommands
Actions
The actions we may want to take are:
- set, Set a specific permission, EG notify, scan.
- del, delete permissions.
- get, get the permission that is set,
- list, List all that have permissions, maybe list specific permissions too?
Command domain.
We can add the commands to the vaults and identities domains. the commands in this case will take the form of.
PK gestalts trust set <ID> <permission>or
PK gestalts trust --action set --ID <ID> --permmission <permission>.
However we can make a new command domain just for trust and have a subcommand for each action.
PK trust setGestalt --ID <ID> --permission <permission>
PK trust listGestalt --ID <ID> --permission <permission>
Tasks
- Determine if we want to create a trust command domain or add trust commands to vaults and identities.
- create GRPC commands.
- identities
- getGestaltActionsByNode
- getGestaltActionsByIdentity
- setGestaltActionByNode
- setGestaltActionByIdentity
- unsetGestaltActionByNode
- unsetGestaltActionByIdentity
- vaults
- vaultsShare
- vaultsPermissions
- identities
- create CLI commands.
- (subject to change based on decision)
- pk identities trust: handles set, delete, get
- pk identities allow: fine grain permissions, set, delete, get
- pk identities list: list gestalts + permissions.
- (subject to change based on decision)
- tests
- grpc
- getGestaltActionsByNode
- getGestaltActionsByIdentity
- setGestaltActionByNode
- setGestaltActionByIdentity
- unsetGestaltActionByNode
- unsetGestaltActionByIdentity
- vaultsShare
- vaultsPermissions
- CLI
- pk identities trust
- pk identities allow
- pk identities list
- vaults share (set, unset)
- vaults Permissions (get)
- grpc
notes:
- pk identities list-trust: list permissions. Might be part of identities list. We'd have to list complete gestalts to have a complete picture anyway.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
developmentStandard developmentStandard developmentr&d:polykey:core activity 3Peer to Peer Federated HierarchyPeer to Peer Federated Hierarchy