Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How to use the WAC-Allow header on auxiliary resources? #313

Closed
RubenVerborgh opened this issue Sep 21, 2021 · 2 comments
Closed

How to use the WAC-Allow header on auxiliary resources? #313

RubenVerborgh opened this issue Sep 21, 2021 · 2 comments
Assignees
Labels
doc: Protocol status: Nominated An issue that has been nominated for the next monthly milestone topic: authorization topic: auxiliary resources

Comments

@RubenVerborgh
Copy link
Contributor

RubenVerborgh commented Sep 21, 2021

No description provided.

@csarven
Copy link
Member

csarven commented Sep 21, 2021

However, it does not specify what should happen for auxiliary resources, in particular for ACL resources.

Auxiliary resources are ... resources.

Should auxiliary resources have a WAC-Allow header?

I'd say that the MUST text for resource applies for auxiliary resources as well. That was intended but we can consider why it shouldn't be.

If yes, should the returned values reflect access control on the resource or the auxiliary resource?

However it is defined for a given an auxiliary resource. For the description resource (target of describedby), it would be the same as the subject resource (the described resource). For ACL resources, it'd would be the same as the ACL resource.

In the case of ACL, should we list Control, or all permissions?

List the permissions the agent/client is allowed. That'd be accurate and simplest I think. If you are checking about whether Control alone is sufficient, I believe it is. It doesn't need to be extended to include RWA.

@csarven
Copy link
Member

csarven commented Sep 21, 2021

Good issue.

Shall we list that explicitly in the spec though?

I agree, it'd be worthwhile.

Thinking:
If Control is allowed on resource, then ACL resource's WAC-Allow should include user="read write control" public="". But I can also see it working with just "control". If in the future only "read" or "read write" are used ({for reasons}), that can mean that the ACL resource can be modified but the ACL resource can't be controlled (e.g., having its own ACL). See below:

Some broader considerations while we work this out:

@csarven csarven added status: Nominated An issue that has been nominated for the next monthly milestone and removed status: Waiting for Commenter labels Sep 21, 2021
@csarven csarven added this to the ~First Public Working Draft milestone Sep 22, 2021
@csarven csarven self-assigned this Oct 6, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
doc: Protocol status: Nominated An issue that has been nominated for the next monthly milestone topic: authorization topic: auxiliary resources
Projects
None yet
Development

No branches or pull requests

2 participants