Skip to content

Clarify what happens with semantically invalid WebAC resources #56

Closed
@acoburn

Description

@acoburn

In the Web Access Control inheritance algorithm, there is an example describing how an implementation would enforce ACL rules. The key text appears not to be whether an ACL resource exists or not but whether there are any permissions to inherit. The example also states:

if any such authorizations are found, the process stops there and no other statements apply

This implies that some statements can be ignored. For example, it appears that an inherited Authorization lacking an acl:default should be ignored. What is the minimal RDF shape of a semantically valid, inheritable acl:Authorization? Would this qualify as an inheritable Authorization:

<#auth> acl:accessTo <./> ;
     acl:agentClass foaf:Agent;
     acl:default <./> .

(this would, effectively, revoke all access to all users).

What happens if the acl at https://example.com/pod/resource/.acl is:

<#auth> acl:accessTo <https://other1.example.com/> ;
    acl:agentClass foaf:Agent ;
    acl:default <https://other2.example.com/> .

Should that Authorization be ignored?

What about:

<#auth> acl:accessTo "Everything" ;
   acl:agentClass foaf:Agent ;
   acl:default "do what I mean" .

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions