Update docs to reflect current implementation status

Metacrypt SSH CA, transit, and user-to-user engines are all implemented
(not planned). MCR is at phase 13. MCDSL package list was incomplete.
Added mcns (CoreDNS precursor) to project map and dependency graph.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
2026-03-25 22:28:11 -07:00
parent 168ceb2c07
commit 78ff48efcb
2 changed files with 21 additions and 13 deletions

View File

@@ -50,8 +50,9 @@ the spec disagree, one of them has a bug.
Metacircular infrastructure is built from six core components, plus a shared
standard library (**MCDSL**) that provides the common patterns all services
depend on (auth integration, database setup, config loading, TLS server
bootstrapping, CSRF, snapshots):
depend on (auth integration, database setup, config loading, HTTP/gRPC server
bootstrapping, CSRF, web session management, health checks, snapshots, and
service directory archiving):
- **MCIAS** — Identity and access. The root of trust for all other services.
Handles authentication, token issuance, role management, and login policy
@@ -220,15 +221,18 @@ HashiCorp Vault.
support. This is how every service in the platform gets its TLS
certificates.
- **SSH CA.** (Planned.) SSH certificate signing for host and user
certificates, replacing static SSH key management.
- **SSH CA.** SSH certificate signing for host and user certificates,
replacing static SSH key management. Signing profiles, Key Revocation List
(KRL) support, gRPC/REST APIs, and web UI.
- **Transit encryption.** (Planned.) Encrypt and decrypt data without exposing
keys to the caller. Envelope encryption for services that need to protect
- **Transit encryption.** Encrypt and decrypt data without exposing keys to
the caller. Symmetric encryption with versioned key management, signing,
and HMAC operations. Envelope encryption for services that need to protect
data at rest without managing their own key material.
- **User-to-user encryption.** (Planned.) End-to-end encryption between users,
with key management handled by Metacrypt.
- **User-to-user encryption.** End-to-end encryption between users, with key
management handled by Metacrypt. ECDH key exchange with AES-256-GCM
encryption.
**Seal/unseal model:** Metacrypt starts sealed. An operator provides a password
which derives (via Argon2id) a key-wrapping key, which decrypts the master
@@ -250,8 +254,8 @@ core.
operations on which engine mounts. Priority-based evaluation, default deny,
admin bypass. See Metacrypt's `POLICY.md` for the full model.
**Status:** Implemented. CA engine complete with ACME support. SSH CA, transit,
and user-to-user engines planned.
**Status:** Implemented. All four engine types complete — CA (with ACME
support), SSH CA, transit encryption, and user-to-user encryption.
---
@@ -281,7 +285,7 @@ serves the container images that MCP deploys across the platform.
is scheduled, MCP tells the node's agent which image to pull and where to get
it. MCR sits behind an MC-Proxy instance for TLS routing.
**Status:** Implemented. Phase 12 (web UI) complete.
**Status:** Implemented. Phase 13 (deployment artifacts) complete.
---
@@ -370,7 +374,9 @@ services can use stable DNS names in their configs (e.g.,
`mcias.svc.mcp.metacircular.net` in `[mcias] server_url`) that survive
migration without config changes.
**Status:** Not yet implemented.
**Status:** Not yet implemented. A CoreDNS precursor currently serves the
internal zones (`svc.mcp.metacircular.net` and `mcp.metacircular.net`) as an
interim solution until the full MCNS service is built.
---