Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Is WAC-Allow part of the solid spec? #170

Closed
Otto-AA opened this issue May 6, 2019 · 8 comments
Closed

Is WAC-Allow part of the solid spec? #170

Otto-AA opened this issue May 6, 2019 · 8 comments

Comments

@Otto-AA
Copy link

Otto-AA commented May 6, 2019

I've seen that the node-solid-server implemented a WAC-Allow header for identifying which access is granted for the requested resource. Is this also part of the solid api spec, or just a feature of this specific implementation?

Related issue in NSS: nodeSolidServer/node-solid-server#246

@csarven
Copy link
Member

csarven commented Aug 21, 2019

It will be briefly picked up by the Solid Ecosystem: https://github.com/solid/specification and probably in/through App Authorization Panel: https://github.com/solid/app-authorization-panel/

In the meantime, I'd suggest further implementation experience (based off servers and apps built by different parties), as well as UCs.

I suggest following up in those repos/groups for ongoing work.

If this answer is satisfactory, please feel free to close this issue.

@RubenVerborgh
Copy link
Contributor

It is in the current draft spec at https://github.com/solid/solid-spec/blob/103b1e027356bd525e4cad0138e8288f4881df39/api-rest.md#wac-allow-headers

As @csarven says, will be discussed in https://github.com/solid/specification. Some people (like myself, even though I wrote it) are not in favor of this header.

@csarven
Copy link
Member

csarven commented Aug 21, 2019

dokieli may be partly to blame on having an application detect what's "writable" before performing a write operation (use cases: linkeddata/dokieli#96 , linkeddata/dokieli#137 and bugging @dmitrizagidulin endlessly), but not necessarily the exact implementation of it :)

I don't particularly like a one-off header for this either.. or parsing the header value like in WAC-Allow. Should be simpler and easily extensible right?

@Otto-AA
Copy link
Author

Otto-AA commented Apr 22, 2020

Has there been an update on this? I didn't find the discussion on solid/specification.

@csarven
Copy link
Member

csarven commented Apr 23, 2020

Thanks @Otto-AA for the reminder. Moving this issue to solid/specification for further consideration. I think we acknowledge at least one case where applications can be more efficient. Whether the solution lies on WAC-Allow and exactly how is something we can also review in context of other affordances.

@csarven csarven transferred this issue from solid/solid-spec Apr 23, 2020
@csarven csarven added this to the ~Candidate Recommendation milestone Apr 23, 2020
@RubenVerborgh
Copy link
Contributor

Let's also have an issue for the problem; as this is just one possible solution. Other solutions include the Link header.

@csarven
Copy link
Member

csarven commented Apr 23, 2020

Transferred #171 as the original problem.

@csarven
Copy link
Member

csarven commented Nov 29, 2020

Proposal/requirements merged via PR #210 . See further details/discussion on concerns of this header, as well as use cases for different permission groups. Implementation feedback is always useful/welcome. Please follow up with new issues/proposals.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Done
Development

No branches or pull requests

3 participants