Currently,
Solutions:
We, at INFURA, really need to work on some kind of implementation for authentication of the API. This element, indeed, has a priority a little higher than developing ipfs-cluster 馃槵.
I know @jbenet you told me that _IPFS daemon is not meant that way_. But the need is there, to provide a daemon to people to upload and pin files. I had a quick conversation at DevCon2 with @whyrusleeping, and was suggested to build a specification, to discuss and implement.
So my question: Where do we move this conversation, so I can start a specification and implement it? In this repository? In ipfs/specs?
Thank you y gracias por la paciencia, los 煤ltimos meses han sido una locura!
HJ.-
There is also https://github.com/ipfs/go-ipfs/issues/1532
@Kubuxu Cool. @jbenet told me there was a more mature issue. So, that was it 馃槃
Thanks!
I like this a lot.
Any update on this ? For now, we just put the IPFS API behind a wireguard but that can be very profitable to have a way to add auth in the IPFS API for ACL.
No. The current way to do this is to stick an NGINX proxy out in front of the API and authenticate with that.
If I understand correctly, the current setup means anyone on localhost is privileged to interact with the API?
Most helpful comment
We, at INFURA, really need to work on some kind of implementation for authentication of the API. This element, indeed, has a priority a little higher than developing
ipfs-cluster馃槵.I know @jbenet you told me that _IPFS daemon is not meant that way_. But the need is there, to provide a daemon to people to upload and pin files. I had a quick conversation at DevCon2 with @whyrusleeping, and was suggested to build a specification, to discuss and implement.
So my question: Where do we move this conversation, so I can start a specification and implement it? In this repository? In
ipfs/specs?Thank you y gracias por la paciencia, los 煤ltimos meses han sido una locura!
HJ.-