Certificates, logs, and interfaces as shared artifacts.
Boundary objects compress multi-party truth into a transportable artifact: logs, deltas, proofs.
Applied: attach constraints to each boundary object; reject payloads that cannot be replayed deterministically.
Logs, certificates, manifests, proofs, hashes, attestations.
Operators, validators, clients, auditors, automated agents.
Key exchange, signature validation, replication, audit trails.
These are operational invariants worth protecting.
Set A records to the front door. The boundary object is the zone entry.
CA challenges via HTTP-01; proof lives at /.well-known/acme-challenge/.
Front door routes by Host header; upstreams remain HTTP.
| Artifact | Constraint | Replay | Verifier |
|---|---|---|---|
| SSH key | Signature verifies against pk | Auth trace | sshd |
| DNS A | Zone ownership | Resolver cache | recursive DNS |
| Cert | Chain to CA | Handshake | client TLS |
| Log | Append-only | Audit replay | auditor |
Common fractures where boundary objects fail the ritual.
Keep a repair note attached to every object that required mutation or override.
Boundary objects show up as the glue between infrastructure and meaning.
Replay: the act of verifying an artifact by re-running its rules.
Constraint: a rule that narrows valid interpretations.
Boundary: a portable artifact that stabilizes multi-party truth.