-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: adrs: governance: Policies #8
Labels
Comments
johnandersen777
added a commit
that referenced
this issue
Nov 2, 2024
Related: #8 Related: slsa-framework/slsa#977 Related: slsa-framework/slsa#873 Signed-off-by: John Andersen <johnandersen777@protonmail.com>
johnandersen777
added a commit
that referenced
this issue
Nov 9, 2024
… maintainers yaml Related: #8 Signed-off-by: John Andersen <johnandersen777@protonmail.com>
johnandersen777
added a commit
that referenced
this issue
Nov 9, 2024
Related: #8 Signed-off-by: John Andersen <johnandersen777@protonmail.com>
johnandersen777
added a commit
to publicdomainrelay/example-policy-maintainers
that referenced
this issue
Nov 9, 2024
Related: publicdomainrelay/reference-implementation#8 Signed-off-by: John Andersen <johnandersen777@protonmail.com>
This was referenced Nov 24, 2024
johnandersen777
added a commit
to publicdomainrelay/example-policy-maintainers
that referenced
this issue
Dec 1, 2024
Related: publicdomainrelay/reference-implementation@0028a6e Related: publicdomainrelay/reference-implementation#15 Related: publicdomainrelay/reference-implementation#8 Signed-off-by: John Andersen <johnandersen777@protonmail.com>
johnandersen777
added a commit
to publicdomainrelay/federation-git
that referenced
this issue
Dec 1, 2024
Related: publicdomainrelay/reference-implementation#15 Related: publicdomainrelay/reference-implementation#8 Related: intel/dffml#1315 Signed-off-by: John Andersen <johnandersen777@protonmail.com>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Matthew 6:24 DAO - peer to peer with purely with policy doc enforced by signers and verifiers on pull. Remember that we have local directory copy of repo, local federation sync (offline/online) and then federated servers (online).
We may not need KERI's crypto based duplicity detection if we use receipts from each index for those involved in transaction.
It's policy updating code updating policy (using cue bindings for typescript via deno within exec from policy)
Then you're Federating that
Pull Requests
CI/CD
Indexes
Look into cue modules to see if they assist as they are already ORAS for registry (then add SCITT to secure the modules in ad-hoc registries)
actions: write
uses
and so forth to keep as much out of the workflows as possible, as their updates are more difficult to modify in an automated fashion.with/inputs
can be taken from files (YAML -> yq -> step.step-id-name.outputs.selected-value(s) -> optionally toJSON)uses
)uses
)uses
generation of new modules, policy, modifications to policyThe text was updated successfully, but these errors were encountered: