# Platform protocol ![status:wip](https://img.shields.io/badge/status-wip-orange.svg?style=flat-square) [![hackmd-github-sync-badge](https://hackmd.io/Zb7gjpLsQn2w3a3JUvnFcw/badge)](https://hackmd.io/Zb7gjpLsQn2w3a3JUvnFcw) ## Abstract Thinking about users in web2 terms introduces unfortunate limitations and seem to be a poor fit for User Controlled Authorization Network ([UCAN][]). #### Capabilities In web2 user _(which could be an individual or an organization)_ directly correlates to a (name) space _(usually behind a walled garden)_ they're given access to. In this model user signs into their space using credentials or a server issued (secret) token to gain an access to set of capabilities with-in bound (name) space. > If there is notion of sharing capabilities it's usually limited & very domain specific. Sharing across applications is extremely rare and usually invoves large cross-organisational efforts. With [UCAN][] based authorization model things are different. User creates a (name)space _(addressed by [did:key][] URI)_ locally and can delegates any set of capabilities to the user agent _(also addressed by [did:key][] URI)_ which acts on their behalf. This allows an agent to invoke any of the delegated capabilities or to delegate them to _another_ user agent, so they could invoke them. This model enables wide range of possibilities that are difficult to impossible in web2 model. Capabilities are the protocol and there for sharing and interop at every layer is the baseline. Inevitably this brakes 1 to 1 correlation between users and spaces. Instead user may have access to multitude of spaces (that they either own or were delegated capabilities to) and multitude of users may have access to the same space. > Implications of this are tremendous, we are no longer building an apps behind walled gardens, but rather tap into the rich network of information with self describing protocols #### Providers As we have above established users create, own and manage access to their space through the capabilities that can be delegated. However owning a `store/add` capability to some `did:key:zAlice` space does not magically let me store data in that space. Something needs to provide `store/add` capability. User can contract "storage provider" and add it to their (or anyone elses space) in turn making it possible for a anyone with `store/add` capability for a space with a store provider to store some data. Providers are like plugable services that you add a space so they can handle capabilities they provide when they are invoked. #### Funding Direct correlation between user and a space in Web 2 model leads to a system in which users fund their space (by money or their privacy). Decoupling users from spaces enables all kinds of funding strategies. I can hire storage provider and add it to my space, but I also can hire a provider and add it to some common goods space I would like to financially support. Just like every capability can be shared, just the same every space can be crowd funded, because we decoupled space from the capability providers. ## Specification The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). ### Space #### Representation Any valid [did:key][] identifier SHOULD represent a valid space. Unknown space that has no capability providers and therefor system will deny service. Attempt to store data into such space MAY fail because space has no storage provider. #### Ownership Space is a resource that MUST be addressed by the [did:key][] URI. It is owned by the (corresponding) private key holder. Any [UCAN][] capabilty for the space resource MUST be issued by the owner _([UCAN][] `iss` MUST be equal to `with` of the capability)_ or it's delegate _([UCAN][] MUST have a proof chain leading to delegation from owner)_. This implies that [UCAN][] invocations on a space resource CAN be validated by verifying: 1. Signatures, time bounds and principal aligment of the delegation chain. 2. Root `issuer` is the same DID as a resource (`with` field) of the invoked capability. #### Creation User (agent) CAN create a new space by generating a [keypair][public key cryptography] and deriving a valid [did:key][] identifier from it. :::warning It is RECOMMENDED that user facing applications create a _space_ for a new user with [ED25519][] keypair & delegate capabilties to it to a local agent whos DID is derived from another [non-extractable keypair](https://developer.mozilla.org/en-US/docs/Web/API/CryptoKey#cryptokey.extractable). This grants agent access to a space without reusing it's key or a risks of it been compromised. ::: ```ts // illurstartion of the space to agent delegation { iss: "did:key:zSpace", aud: "did:key:zAgent", exp: null, // delegation never expires // allows did:key:zAgent to do anything with did:key:zSpace att: [{ with: "did:key:zSpace", can: "*" }] } ``` It is also RECOMMENDED that user facing applications provide a way for a user to grant agent an access to their space if they already have one. #### Setup As we have established space creater is an owner and has a full authority to delegate whatever capabilities to others. However unless space has an active provider of the capabilities no invocation of them could succeed. To make capabilities usable on needs to obtain a provider and add it to desired space. For example user could obtain "free" provider from web3.storage which provides `storage/*` capabilities allowing up to 5GiB of storage. ```graphviz digraph { node [fontname=Menlo, shape=oval, margin="0.2 0", arrowhead=diamond] subgraph space { "did:key:zAliceSpace"-> { node [shape=invhouse, margin="0.4, 0"] "store/*", "name/*", "upload/*" } } subgraph providers { node [shape=box3d, margin="0.8, 0", style=filled, color="lightgrey"] {"store/*", "name/*", "upload/*"}->"did:dns:free.web3.storage" {"store/*", "upload/*"}->"did:dns:nft.storage" label = "process #2" } } ``` #### Provider protocol The "free" provider setup describes a more general framework for unlocking various capabilities. It is RECOMMENDED to follow outlined `provider/*` protocol even though some domain specific details may vary. ##### `provider/get` Users agent MAY get a "free" storage provider by invoking self-issued `provider/get` capability ```ts! { iss: "did:key:zAgent", aud: "did:dns:web3.storage", att: [{ can: "provider/get", with: "did:key:zAgent", nb: { // did of the provider provider: "did:dns:free.web3.storage" // Getting certain providers may require // additional input. In case of "free" provider // only additional information is verifiable // identity of the user credential: "mailto:alice@web.mail", } }] } ``` ###### get `with` Getting a some providers MAY only be possible with a resource that meets certain requirements. Payed providers would require that invocation resource has a payment provider for billing. Free providers on the other hand MAY allow invocation with arbitrary resource. ###### get `nb.provider` The agent MUST provide `nb.provider` field with a DID of the provider it wants to get. ###### get `nb.consumer` The agent MAY specify `nb.consumer` field with a DID of the space provider is requested for. :::warning If `nb.consumer` is omitted it implies request for a provider that can be added arbitrary number of consumers. Some providers MAY be denied when `nb.consumer` is omitted because service may limit number of providers per user. ::: ```ts! { iss: "did:key:zAgent", aud: "did:dns:web3.storage", att: [{ can: "provider/get", with: "did:key:zAgent", nb: { // did of the provider provider: "did:dns:free.web3.storage" // did of the space consumer: "did:key:zSpace" // Signup process may require require contract // specific input. In case of "free" provider // service just asks for verifable identity // in the `nb.credential` field credential: "mailto:alice@web.mail", } }] } ``` ###### get `nb...` Getting certain providers MAY require additional `nb` fields. ###### get `nb.credential` To get a "free" provider invocation MUST set `nb.credential` field to a _verifiable credential_ of the user. It MUST be a valid `mailto:` URI where user can receive an email with terms of service. :::info Please note that URIs are used so that other types of verifiable credentials could be supported in the future ::: ##### `consumer/add` Agent MAY be delegated `consumer/add` capability, allowing it to add consumer space by invoking it. ```ts! { iss: "did:dns:web3.storage", aud: "did:key:zAgent", att:[ { can: "consumer/add", with: "did:dns:free.web3.storage", nb: { // link to "provider/get" invocation request: { "/": "bafy...signup" }, credential: "mailto:alice@web.mail", } } ], prf: [ { iss: "did:dns:free.web3.storage", aud: "did:dns:web3.storage", att: [ { can: "consumer/add", with: "did:dns:free.web3.storage", nb: { credential: "mailto:*" } } ] } ] } ``` ###### add `aud` Capability MUST be delegated back to the `iss` of the [`provider/get`][] request. ###### add `with` Capability resource MUST be DID that is same as [`nb.provider`](#get-nbprovider) of the corresponding [`provider/get`][] invocation. ###### add `nb.consumer` If `nb.consumer` is set, it MUST match [`nb.consumer`](#get-consumer) of the [`provider/get`][] request. If request omitted it, delegation MUST omit field as well. If request did specify `nb.consumer` delegation still MAY omit it if it wishes to allow adding multiple consumers to the delegated provider. :::danger Omiting `nb.consumer` would allow delegate to add arbitrary number of consumers to the provider ::: ###### add `nb.request` Issuer MUST set `nb.request` field to the corresponding link (CID) of the [`provider/get`][] invocation. ###### add `nb...` Providers MAY impose various other constraints using `nb` filds of the `consumer/add` capability, usually they would mirror [`nb`](#get_nb) fields of the corresponding [`provider/get`][] request. ###### add `nb.credential` Issuer MAY set `nb.credential` field to to resrict type of _verifiable credentials_ that may be used, for example `mailto:` URIs. ##### `consumer/add` invocation Delegate MAY invoke [`consumer/add`] capability to add a consumer space to the provider. It automatically adds provider to the consumer space, making provider provided capabilities invokable by authorized agents. :::info Please not that while providers may add consumers without their consent, that will not affect consumers in any way since unless provider is used it has no effect on space. ::: ```ts! { iss: "did:key:zAgent", aud: "did:dns:web3.storage", att: [ { can: "consumer/add", with: "did:dns:free.web3.storage", nb: { target: "did:key:zSpace" // link to "provider/signup" invocation request: { "/": "bafy...signup" }, credential: "mailto:alice@web.mail", } } ], prf: [ { iss: "did:dns:web3.storage", aud: "did:key:zAgent", att:[ { can: "consumer/add", with: "did:dns:free.web3.storage", nb: { // link to "provider/signup" invocation signup: { "/": "bafy...signup" }, credential: "mailto:alice@web.mail", } } ], prf: [ { iss: "did:dns:free.web3.storage", aud: "did:dns:web3.storage", att: [ { can: "consumer/add", with: "did:dns:free.web3.storage", nb: { credential: "mailto:*" } } ] } ] } ] } ``` ##### `provider/publish` In the future we plan to define set of `provider` capabilities that will allow author to specify capabilities it provides, terms of service and various other details. In the meantime publishing providers in not supported, however existing providers do impose specific terms and limitations. For example following terms are imposed by `did:dns:free.web3.storage` provider: 1. Provided `store/*` capabilities are limited to 5GiB of storage. 2. Agent MUST specify `nb.consumer` in [`provider/get`] invocation to enforce single consumer space per user limitation. ##### `provider/add` In typical flow user agent requests [`provider/get`] to get [`consumer/add`][] capability delegated which it then invokes to add a desired [`nb.consumer`] space. ```sequence "did:key:zAgent"->"did:dns:provider.store": provider/get "did:dns:provider.store"->"did:key:zAgent": consumer/add "did:key:zAgent"->"did:dns:web3.storage": consumer/add ``` More simplified flow exists when provider is needed for specific space consumer through `provider/add` capability which is exact equivalent of [`provider/get`] except [`nb.consumer`][] is required. On succesful invocation handler takes care of invoking [`consumer/add`] instead of delegating it back to agent removivg need for extra roundtrip ```sequence "did:key:zAgent"->"did:dns:provider.store": provider/add "did:dns:provider.store"->"did:dns:web3.storage": consumer/add ``` Handler MAY embed [`provider/add`](#provideradd-invocation) invocation link in the verification email so that clicking it will automatically add consumer space to the provider. #### Payment protocol ##### Add payment provider User agent MAY add a payment provider using a credit card information. ```ts! { iss: "did:key:zAgent", aud: "did:dns:web3.storage", att: [{ can: "provider/add", with: "did:key:zAgent", nb: { provider: "did:dns:pay.web3.storage", consumer: "did:key:zSpace", /* data is the linked CBOR block that has been encrypted with a symmetric key inside the `cypher`. We inline here for simplicity */ credential: { type: 'card', card: { number: '4242424242424242', exp_month: 9, exp_year: 2023, cvc: '314', } } /* symmetric key encrypted with a public key of the `aud` so only private key holder is able to decrypt */ cypher: ".....", } }], } ``` On success payment provider is added to the consumer space allowing an owner or a delegate to invoke and delegate `payment/*` capabilities. :::warning Service MAY instead, or in addition to, create out of bound payment method setup flow to avoid capturing sensitive data like card info. ::: ##### Add payed provider When space has a payment provider it's owner or delegate can invoke [`provider/add`] and [`provider/get`] capabilities to add providers that require payments. > Example below illustrates Alice adding a "Lite plan" to Bob's space on her expense. ```ts! { iss: "did:key:zAgent", aud: "did:dns:web3.storage", att: [{ can: "provider/add", with: "did:key:zAlice", nb: { // 30GiB storage plan provider: "did:dns:lite.web3.storage" // Space to add storage provider to consumer: "did:key:zBob" } }] prf: [{ iss: "did:key:zAlice", aud: "did:key:zAgent", att: [{ can: "*", with: "did:key:zAlice" }] }] } ``` [did:key]:https://w3c-ccg.github.io/did-method-key/ [UCAN]:https://github.com/ucan-wg/spec/#57-revocation [ACL]:https://en.wikipedia.org/wiki/Access-control_list [public key cryptography]:https://en.wikipedia.org/wiki/Public-key_cryptography [`provider/get`]:#providerget [`consumer/add`]:#consumeradd [`provider/add`]:#provideradd-delegation [`nb.consumer`]:#add-consumer [payment method]:https://stripe.com/docs/api/payment_methods/object [Ed25519]:https://en.wikipedia.org/wiki/EdDSA#Ed25519