This repository was archived by the owner on Mar 26, 2025. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 146
GAIA Access-Control #431
Copy link
Copy link
Open
Labels
enhancementIterations on existing features or infrastructure.Iterations on existing features or infrastructure.featureBrand new functionality. New pages, workflows, endpoints, etc.Brand new functionality. New pages, workflows, endpoints, etc.
Description
Currently the Gaia Access Control for files is defined as such:
"Access control in a gaia storage hub is performed on a per-address basis. Writes to URLs /store/
/ are only allowed if the writer can demonstrate that they control that address. This is achieved via an authentication token, which is a message signed by the private-key associated with that address. The message itself is a challenge-text, returned via the /hub_info/ endpoint."After researching and interviewing various people, we came to the conclusion, that it would be beneficial for Gaia and every party involved, that the access control system is extended in such a way, that one user can grant access to their files to other users.
Additionally it should also be possible to write data on behalf of a user.
Note: it should NOT be possible to read data, only to write data
https://github.com/amark/gun
https://gun.eco/
https://ceramic.network/
LDAP type service as discussed in Slack
The process should look as follows:
- Create / run a data base (one of the mentioned above)
- Look up (in code) where Gaia implements the access control
- Find a way to “overwrite” / add the data base permission layer
Metadata
Metadata
Assignees
Labels
enhancementIterations on existing features or infrastructure.Iterations on existing features or infrastructure.featureBrand new functionality. New pages, workflows, endpoints, etc.Brand new functionality. New pages, workflows, endpoints, etc.