@@ -329,7 +329,7 @@ envelope format "$TARGET"
329329| "sshSigningKeyText": "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOiOtuf9hwDBjNXyjvjHMKeLQKyzT8GcH3tLvHNKrXJe BRadvoc8@Mac.attlocal.net"
330330| "sshSigningKeysURL": URI(https://api.github.com/users/BRadvoc8/ssh_signing_keys)
331331| 'conformsTo': URI(https://github.com)
332- | 'date': "2026-03-11T09:21 -10:00"
332+ | 'date': "2026-03-18T11:55 -10:00"
333333| 'verifiableAt': URI(https://api.github.com/users/BRadvoc8)
334334| ]
335335```
@@ -383,6 +383,7 @@ echo "GitHub edge details:"
383383envelope format "$EDGE"
384384
385385| GitHub edge details:
386+ |
386387| "account-credential-github" [
387388| 'isA': "foaf:OnlineAccount"
388389| 'source': XID(5f1c3d9e)
@@ -393,7 +394,7 @@ envelope format "$EDGE"
393394| "sshSigningKeyText": "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOiOtuf9hwDBjNXyjvjHMKeLQKyzT8GcH3tLvHNKrXJe BRadvoc8@Mac.attlocal.net"
394395| "sshSigningKeysURL": URI(https://api.github.com/users/BRadvoc8/ssh_signing_keys)
395396| 'conformsTo': URI(https://github.com)
396- | 'date': "2026-03-11T09:21 -10:00"
397+ | 'date': "2026-03-18T11:55 -10:00"
397398| 'verifiableAt': URI(https://api.github.com/users/BRadvoc8)
398399| ]
399400| ]
@@ -420,9 +421,15 @@ identified by 'source'). "
420421
421422Now that you've done all the work of creating an edge, linking it to Amira's XID is extremely simple:
422423```
423- XID_WITH_EDGE=$(envelope xid edge add $SIGNED_EDGE $XID)
424+ XID_WITH_EDGE=$(envelope xid edge add \
425+ --verify inception \
426+ $SIGNED_EDGE $XID)
424427```
425- This is a prime example of how simple ` envelope xid ` commands are when you don't have to decrypt and re-encrypt as part of the process.
428+
429+ As in §2.1, we've verified the original inception signature, but we
430+ haven't bother to re-sign yet, because we haven't finalized the new
431+ edition of the XID.
432+
426433
427434```
428435echo "XID with GitHub edge:"
@@ -443,7 +450,7 @@ envelope format "$XID_WITH_EDGE"
443450| "sshSigningKeyText": "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOiOtuf9hwDBjNXyjvjHMKeLQKyzT8GcH3tLvHNKrXJe BRadvoc8@Mac.attlocal.net"
444451| "sshSigningKeysURL": URI(https://api.github.com/users/BRadvoc8/ssh_signing_keys)
445452| 'conformsTo': URI(https://github.com)
446- | 'date': "2026-03-11T09:21 -10:00"
453+ | 'date': "2026-03-18T11:55 -10:00"
447454| 'verifiableAt': URI(https://api.github.com/users/BRadvoc8)
448455| ]
449456| ]
@@ -465,11 +472,13 @@ recursive metadata.
465472
466473By adding the GitHub edge, you've created a new edition of Amira's
467474XID. Since you plan to publish it, that means you must update the
468- provenance mark
475+ provenance mark (and as usual, sign the new XID, which requires
476+ decrypting and re-encrypting everything).
469477
470478```
471479XID_WITH_EDGE=$(envelope xid provenance next \
472480 --password "$PASSWORD" \
481+ --sign inception \
473482 --private encrypt \
474483 --generator encrypt \
475484 --encrypt-password "$PASSWORD" \
@@ -484,8 +493,7 @@ You should also create a public view of the new XID that elides all the
484493sensitive keys:
485494
486495```
487- PUBLIC_XID_WITH_EDGE=$(envelope xid export --private elide --generator
488- elide "$XID_WITH_EDGE")
496+ PUBLIC_XID_WITH_EDGE=$(envelope xid export --private elide --generator elide "$XID_WITH_EDGE")
489497```
490498
491499This is what you'll send to DevReviewer for their review, which we'll
0 commit comments