-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make explicit in spec that when a default resource is served for a container, server should check ACL for that resource #36
Comments
The way I understand it this level of detail shouldn't be in the spec (as discussed in solid/solid-spec#134). So I'll close this issue as well. |
Indeed, and there is already mention of possible antipatterns in this spec, so there is precedent for pointing out what shouldn't be done. |
The authority of a resource determines what the resource refers to - generic or specific. The server manages the association of an ACL resource to a resource, sets any constraints on authorization rules, and determines the requirements of an operation on a resource (which may be conforming to a specific protocol). WAC describes the authorization process, does not restrict, distinguish or relate #access-object resources that is of the kind generic or specific. I suggest that whether a server associates the same ACL resource to both resource and representation URLs, and whether an ACL resource's Authorization can be checked to match a resource or a representation URL is specified elsewhere (e.g. the Solid Protocol) or deemed to be implementation specific. |
As a continuation of solid/solid-spec#134, we might want to make it explicit in this spec that the server should check the default resource's ACL.
Examples:
The text was updated successfully, but these errors were encountered: