Skip to content

Commit 165351f

Browse files
bordumbclaude
andcommitted
docs: fix command mismatches in getting-started guides
Replace non-existent CLI commands with actual ones: - `auths attestation issue` → `auths device link` - `auths verify-commit` → `auths verify` - `auths sign --file` → `auths sign` (positional arg) - `auths id init` → `auths id create` - `auths device revoke <did>` → `auths device revoke --device-did --key` - `auths verify --attestation-chain` → `auths verify` (positional arg) Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
1 parent 0d176b4 commit 165351f

3 files changed

Lines changed: 13 additions & 16 deletions

File tree

docs/getting-started/delegation.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -47,11 +47,10 @@ The human's attestation has no `delegated_by` — this is the root of the chain.
4747
The human creates a scoped, time-limited attestation granting specific capabilities to an agent:
4848

4949
```bash
50-
auths attestation issue \
51-
--subject did:key:z6MkAgentDevice... \
52-
--signer-type Agent \
50+
auths device link \
51+
--device-did did:key:z6MkAgentDevice... \
52+
--key my-key \
5353
--capabilities "sign:commit,deploy:staging" \
54-
--delegated-by did:keri:EHuman123... \
5554
--expires-in 24h
5655
```
5756

@@ -103,7 +102,7 @@ The sub-agent's capabilities are a strict subset of the parent agent's. The expi
103102
When a relying party receives a signed artifact, it verifies the full attestation chain using `verify_chain()`:
104103

105104
```bash
106-
auths verify --attestation-chain chain.json
105+
auths verify chain.json
107106
```
108107

109108
The verifier checks, from leaf to root:

docs/getting-started/identity-lifecycle.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ An Auths identity moves through distinct phases: creation, device linking, key r
66

77
```mermaid
88
stateDiagram-v2
9-
[*] --> Inception: auths id init
9+
[*] --> Inception: auths id create
1010
Inception --> Active: Identity created<br/>KEL seq 0
1111
Active --> Active: Link device<br/>IXN event anchors attestation
1212
Active --> Rotated: Rotate keys<br/>ROT event, KEL seq +1
@@ -22,7 +22,7 @@ stateDiagram-v2
2222
Identity creation generates two Ed25519 keypairs and writes a single inception event to the Key Event Log.
2323

2424
```
25-
auths id init --alias my-key
25+
auths id create --local-key-alias my-key
2626
```
2727

2828
What happens internally:
@@ -121,7 +121,7 @@ After rotation:
121121
When a device is compromised or decommissioned, its attestation is revoked. Revocation is a signed event: the identity key signs a new attestation with the `revoked_at` field set.
122122

123123
```
124-
auths device revoke <device-did>
124+
auths device revoke --device-did <DEVICE_DID> --key <KEY_ALIAS>
125125
```
126126

127127
The revoked attestation replaces the original at the same Git ref path. The revocation is anchored in the KEL via an interaction event. After revocation, signatures from that device will fail verification (the verifier checks the `revoked_at` field).

docs/getting-started/sharing-your-identity.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -99,28 +99,26 @@ This gives the runner its own `did:keri` identity and device key, independent of
9999
A human operator issues an attestation granting the CI agent specific capabilities:
100100

101101
```bash
102-
auths attestation issue \
103-
--subject did:key:z6MkCIRunner... \
104-
--signer-type Workload \
102+
auths device link \
103+
--device-did did:key:z6MkCIRunner... \
104+
--key my-key \
105105
--capabilities "sign:commit,sign:release" \
106-
--delegated-by did:keri:EHumanAdmin... \
107106
--expires-in 7d
108107
```
109108

110109
The attestation:
111110

112-
- Uses `signer_type: Workload` to identify this as an automated process
113111
- Grants only `sign:commit` and `sign:release` — not `deploy:production` or `manage_members`
114112
- Expires in 7 days, requiring periodic re-authorization
115-
- Includes `delegated_by` linking back to the authorizing human
113+
- Links back to the authorizing human's identity through the attestation chain
116114

117115
### Agent signs artifacts
118116

119117
The CI agent signs commits and releases using its own key:
120118

121119
```bash
122120
git commit -S -m "Release v2.1.0"
123-
auths sign --file release-v2.1.0.tar.gz
121+
auths sign release-v2.1.0.tar.gz
124122
```
125123

126124
Every signature is traceable through the attestation chain: `CI runner → human admin → organization`.
@@ -130,7 +128,7 @@ Every signature is traceable through the attestation chain: `CI runner → human
130128
Any verifier can validate the agent's work by checking the full chain:
131129

132130
```bash
133-
auths verify-commit HEAD
131+
auths verify HEAD
134132
```
135133

136134
The verifier confirms: the commit was signed by a device with a valid attestation, the attestation was issued by an authorized human, and the capabilities include `sign:commit`.

0 commit comments

Comments
 (0)