You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/Getting-Started/polykey-cli/bootstrapping.md
+24-14Lines changed: 24 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,8 +24,17 @@ encryption and decryption of all node state and secret data managed by Polykey.
24
24
You will be prompted to provide a root password. This password encrypts the root
25
25
key.
26
26
27
-
:::note Remember to keep your password in a secure location as you will need it
28
-
each time you start the Polykey agent. :::
27
+
:::note Note
28
+
29
+
Remember to keep your password in a secure location as you will need it each time you start the Polykey agent.
30
+
31
+
:::
32
+
33
+
:::important
34
+
35
+
Bootstrapping also returns a **recovery code**. This code is required to recover a node with the same ID, so it is critical that you store it safely and securely. If lost, node identity recovery will not be possible.
36
+
37
+
:::
29
38
30
39
### Starting the Polykey Agent
31
40
@@ -64,7 +73,8 @@ If the Polykey agent does not terminate properly, you can force quit the process
64
73
through the Activity Monitor on your machine. If you encounter this or any other
65
74
issue, please consider making a
66
75
[bug report](https://github.com/MatrixAI/Polykey-CLI/issues/new/choose) to help
67
-
improve Polykey.
76
+
improve Polykey. Please make sure to check for existing issues before creating a
77
+
new one.
68
78
69
79
## Check Agent Status
70
80
@@ -80,19 +90,19 @@ including its connectivity and activity within the network.
Copy file name to clipboardExpand all lines: docs/Getting-Started/polykey-cli/claiming-digital-identities.md
+17-9Lines changed: 17 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
# Claiming Digital Identities: Establishing Identity Linkages in Polykey
1
+
# Establishing Identity Linkages in Polykey
2
2
3
3
In Polykey, claiming a digital identity is a crucial step that allows users to
4
4
establish their identity across various platforms and link these identities to
@@ -8,7 +8,7 @@ cryptographic link to a publicly verifiable location.
8
8
9
9
This tutorial will guide you through the steps to authenticate with GitHub and
10
10
claim an identity using Polykey, enhancing security and streamlining identity
11
-
verification, making it easier for other users to discover and trust your nodes.
11
+
verification, making it easier for other users to discover and trust your nodes. Currently, we only support github as an identity provider, but we plan to add more in the future.
Making sure to replace `0e1addd9855a` with your corresponding image ID.
409
417
410
418
```shell
411
-
docker run -it 0e1addd9855a agent start --background -np /tmp/polykey
419
+
$ docker run -it 0e1addd9855a agent start --background -np /tmp/polykey
412
420
WARNING: The requested image's platform (linux/amd64) does not match the detected host platform (linux/arm64/v8) and no specific platform was requested
413
421
✔ Enter new password … *
414
422
✔ Confirm new password … *
@@ -418,7 +426,7 @@ clientHost 127.0.0.1
418
426
clientPort 45509
419
427
agentHost ::
420
428
agentPort 37468
421
-
recoveryCode net elephant gentle eight pulp oyster panther sing own autumn silly whip simple warfare daughter pepper detail bachelor awkward forget ignore cream silly raw
429
+
recoveryCode (random text recovery code goes here)
Copy file name to clipboardExpand all lines: docs/Getting-Started/polykey-cli/managing-multiple-nodes.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,10 +2,7 @@
2
2
3
3
Managing multiple local
4
4
5
-
nodes in Polykey can serve various purposes. For example, you might maintain one
6
-
node for personal projects and another for professional work. This segregation
7
-
ensures that the vaults and their respective contents remain distinct based on
8
-
their usage context.
5
+
nodes in Polykey can serve various purposes. For example, you might maintain one node for personal projects and another for professional work. This segregation ensures that the vaults and their respective contents remain distinct based on their usage context.
9
6
10
7
This approach is particularly advantageous for demonstrations or training
11
8
purposes, as it allows you to simulate sharing vaults between two nodes on the
@@ -41,8 +38,12 @@ node we are starting an agent for. If unsure of the syntax to use for command
41
38
operations, adding the --help at the end of each subcommand provides useful
42
39
context.
43
40
44
-
:::note If a node has not been created before, initializing the Polykey agent
45
-
for it will also initiate the bootstrap process. :::
41
+
:::note Note
42
+
43
+
If a node has not been created before, initializing the Polykey agent
44
+
for it will also initiate the bootstrap process.
45
+
46
+
:::
46
47
47
48
When working with multiple nodes, specifying the node path in each command can
48
49
become cumbersome. To streamline this process in your terminal shell session,
0 commit comments