►
A
A
A
A
We
should
be
able
to
should
be
able
to
just
use
the
same
key
and
kind
of
do.
The
same
kind
of
pure
did
trick
right
where
peer
did
remember
the
purity
id
spec,
how
that
that,
basically.
A
B
A
A
A
B
A
A
Okay,
so
that
could
be
interesting.
This
could
get
interesting
as
we
do.
You
know
different.
You
know
this
could
be
interesting
as
we
link
our
dids
to
in
cluster
setups,
so
it
could
be
interesting
as
we
get
into
oidc
and
auth
within
jobs
within
kcp,
okay,
cool
that
could
be
great
right.
Then
we
could
basically
spin
up
microservices
and
they
could
have
their
relationship
with
the
with
the
did
via
you
know,
all
of
the
the
credential
manager
stuff
that
exists
within
kubernetes
already
right.
A
So
if
you
have
non-uh
dffml
services
that
want
to
consume
anything
in
web3,
because
the
ffml
will
proxy
it
for
you,
then
you're
going
to
you
know
very
easily
be
able
to
do
that
via
these
web
identifiers
or
web
distributed
identifiers.
Okay.
So,
but
back
back
to
the
problem
at
hand,
so
I
think
we're
just
going
to
encode
the
key
just
because
I
I
I
I'm
you
know,
I
don't
have
all
the
time
in
the
world.
So,
let's
see.
A
A
A
All
right,
let's
print
some
more
stuff.
So
what
did
we
just
do?
I
just
made
the
print
function
a
little
more
ergonomic
here,
so
that
we
can.
We
can
just
print
a
bunch
of
stuff
so
print
these
two
files
we're
just
going
to
get
down.
A
A
B
A
A
A
Form:
okay,
a
common
question
among
programmers
in
devops
is,
if
it's
possible,
to
convert
into
a
pem
format,
as
you
might
have
guessed
reading
the
previous
sections.
The
answer
is:
no.
The
pump
format
for
private
keys
uses
pkcs
number
five,
so
it
only
supports
the
standard
implementation
of
pbkdf2.
A
So
that's
critical.
Thank
god.
A
A
A
A
All
right,
so
this
is
great,
so
let's
go
ahead
and
copy
this,
let's
figure
out
how
to
use
this.
B
A
B
A
A
A
A
Then
what
are
we
cached,
download,
yeah,
okay,
so
we're
gonna.
Do
all
this
cash
download
stuff
right
same
thing?
A
A
Oh,
it's
much
better
when
these
are
split
out.
I
don't
want
to
run
the
auto
formatter
right
now,
though,
usually
we
would,
but
I
haven't
been
running
it
because
I
haven't
had
time
to
set
it
anything
up.
So
once
again
one
computer
dies,
the
other
computer
dies,
one
computer.
Does
the
other
computer
dies?
It's
like.
I
can't
get
one
computer
that
won't
die
for
more
than
five
minutes.
It
feels
like.
A
A
A
A
A
All
right
download
that
all
right,
so
this
is
our
signature
file,
so
we're
going
to
need
to
download
a
signature
file.
Where
is
that?
What
is
this
dot?
Sig?
Okay,
we've
got
sig
urls
here
too,
so
then
we're
going
to
need
our
entity64.sig,
so
we're
going
to
need
cache
download
for
that.
So
we
have
both
cache
download
and
cache.
A
A
A
So
you
can
run
a
command
from
vim.
I
found
out
about
this
recently
right,
so
we
can
type
curl
fso
really
set
no
paste
pipe
sha
384,
some
all
right
and
we
can
say
dot
arrow
arrow.
A
A
Now,
if
only
we
could
make
it
async,
that
would
be
nice
and
we
could
go
around
and
do
these
just
all
day.
A
A
B
A
A
A
A
And
we
want
to
verify
this
archive
path,
so
we
should
say
to
do
security.
A
Add
in
cosine
validation
during
or
before
after
download
before.
B
A
A
B
B
A
A
A
A
I'm
just
going
to
pass
this,
I'm
just
going
to
hard
code!
This
thing:
okay,
where
how
far
are
we
even
from
doing
this?
Okay?
Yeah?
I
can
know
we
can
do
this.
Okay,.
B
B
B
Strips
here,
your
path.
A
A
A
A
A
So
split
that
and
run
cell
dot
parent
dot.
What
is
called
step
ca?
A
B
A
A
And
now
yeah
we'll
return
the
first
element,
because
there
should
only
be
one
and
then
we
should
say
yeah.
Let's
see
if
I
can
execute
that.
Okay,
too
many
positional
arguments
were
provided
to
step
ca.
So.