Skip to content

Comments

Bulk adding some requirements not being identified#209

Open
renyuneyun wants to merge 6 commits intow3c:mainfrom
renyuneyun:patch-3
Open

Bulk adding some requirements not being identified#209
renyuneyun wants to merge 6 commits intow3c:mainfrom
renyuneyun:patch-3

Conversation

@renyuneyun
Copy link
Contributor

@renyuneyun renyuneyun commented Aug 23, 2025

As promised in the meeting last week, here are some missing requirements I'm aware of.

  • Numbering is deliberately incorrect, for review.
  • Story group is also deliberately ???, for review.

Preview | Diff

Comment on lines 255 to 258
99. <dfn>App-Independent Resource Permission</dfn> — The protocol shall allow sharing resources to other users, while allowing those users to use apps/clients of their choice to access the shared resource. The data owner shall be able to limit the apps/clients that can access the resources, or not to limit.

Issues: [#120](https://github.com/w3c/lws-ucs/issues/120)
Stories: ??? (Data sharing? Permission? Access control?)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is more appropriate as a user story which the existing authorisation requirement links to.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fine with that, will do.

Comment on lines 260 to 264
99. <dfn>Externalizing Permission Checking</dfn> — The protocol shall provide a means for a permitted Service to verify (read/write/etc) permission of a User, based on configuration (e.g. `.acl`/`.acr`) in the Storage. This is for reducing functionality/burden from the Service, to make them as small as possible.

Issues: [#92](https://github.com/w3c/lws-ucs/issues/92)
Stories: ??? (Access Control?)

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is an implementation detail and should not be a requirement of the spec.

Copy link
Contributor Author

@renyuneyun renyuneyun Sep 13, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Probably also a user story / use case for the Authorization requirement. It's not just a "detail", but a specific feature request for the protocol that needs to be intentionally designed.

Comment on lines 265 to 268
99. <dfn>Creator Recording & Creator-Based Permission</dfn> — The permission model shall support defining permissions for the "creator of a resource", such as "creator of a resource can delete the resource". The creator is dynamic, especially for a public-writable container, and thus cannot be pre-defined. Consequently, this also requires the protocol to record the creator of a resource to satisfy this permission.

Issues: [#144](https://github.com/w3c/lws-ucs/issues/144)
Stories: ??? (Access Control?)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is more appropriate as a user story which the existing authorisation requirement links to.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fine with that. Will merge these into that part, and rewrite the PR.

Comment on lines 245 to 248
99. <dfn>User/Pod Customizable API Endpoints</dfn> — The protocol shall provide a mechanism to support users (pod owners) to assign customized API endpoints, or service providers for certain activities/operations/protocols. This is a generic mechanism, enabling many non-essential but useful features, for some but not all users. This allows the user to "integrate" custom features to their Storage without imposing noticable performance issue for the underlying server.

Issues: [#202](https://github.com/w3c/lws-ucs/issues/207), and many UCs (maybe) not classified as essential / classified as out of scope of LWS Spec. For example, alternative data "layouts" [#106](https://github.com/w3c/lws-ucs/issues/106), [#97](https://github.com/w3c/lws-ucs/issues/97), [#98](https://github.com/w3c/lws-ucs/issues/97); query interface [#45](https://github.com/w3c/lws-ucs/issues/45), [#152](https://github.com/w3c/lws-ucs/issues/152); arbitrary forms of policy engine [#81](https://github.com/w3c/lws-ucs/issues/81), [#82](https://github.com/w3c/lws-ucs/issues/82), [#72](https://github.com/w3c/lws-ucs/issues/72), [#60](https://github.com/w3c/lws-ucs/issues/60), [DToU](https://me.ryey.icu/solid-dtou/dtou-spec.html); facilitating operations requiring a "service", [#3](https://github.com/w3c/lws-ucs/issues/3)
Stories: ??? (Extensibility?)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This requirement is too abstract to merge as-is; there is no clear path as to what the consequences are from a spec-writing perspective.

The term "Pod" should also not be used in any specification documents.

Copy link
Contributor Author

@renyuneyun renyuneyun Sep 13, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have got a different set of ideas in structuring and positioning it (and others) after re-reading the existing requirements, when choosing the priorities. Will rewrite the PR.

Comment on lines 270 to 273
99. <dfn>Anonymous Identity Recognition</dfn> — The protocol shall provide a way to differentiate between different anonymous users, especially to assign different permissions to them (e.g. creator-based permission).

Issues: [#144](https://github.com/w3c/lws-ucs/issues/144)
Stories: ??? (Identity?)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is more appropriate as a user story which the existing authorisation requirement links to.

Having spoken to @acoburn @hzbarcea @ebremer - this is a complex area, and expect it to be difficult to natively support this in the specification.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe as part of authentication requirement, rather than authorization requirement? Or both, maybe.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants