Title: Return 'wac-allowed' HTTP header with GET & HEAD responses · Issue #246 · nodeSolidServer/node-solid-server · GitHub
Open Graph Title: Return 'wac-allowed' HTTP header with GET & HEAD responses · Issue #246 · nodeSolidServer/node-solid-server
X Title: Return 'wac-allowed' HTTP header with GET & HEAD responses · Issue #246 · nodeSolidServer/node-solid-server
Description: Problem/Motivation There is currently no easy way for solid client code to determine if the current user has read/write/delete etc access to a given resource (short of reading and parsing the ACL chain, which is both discouraged, and not...
Open Graph Description: Problem/Motivation There is currently no easy way for solid client code to determine if the current user has read/write/delete etc access to a given resource (short of reading and parsing the ACL c...
X Description: Problem/Motivation There is currently no easy way for solid client code to determine if the current user has read/write/delete etc access to a given resource (short of reading and parsing the ACL c...
Opengraph URL: https://github.com/nodeSolidServer/node-solid-server/issues/246
X: @github
Domain: github.com
{"@context":"https://schema.org","@type":"DiscussionForumPosting","headline":"Return 'wac-allowed' HTTP header with GET \u0026 HEAD responses","articleBody":"**Problem/Motivation**\r\n\r\nThere is currently no easy way for solid client code to determine if the current user has read/write/delete etc access to a given resource (short of reading and parsing the ACL chain, which is both discouraged, and not always possible due to ACL limitations on the `.acl` files themselves). (See [solid/#45 - No way to find out if user is authorized to write to a container](https://github.com/solid/solid/issues/45) for context.)\r\n\r\n**Proposed Solution**\r\n\r\nAn easy solution to this would be to add support to LDNode for the following:\r\n\r\nWith every response, the server should include an additional `WAC-Allowe:` header in the HTTP response.\r\n\r\nFor example, doing an unauthenticated HEAD request on a public read-only resource, would yield:\r\n\r\n```\r\nWAC-Allow: user=\"read\", public=\"read\"\r\n```\r\n\r\nDoing an HEAD request (while authenticated) to a resource you have full read/write/control access to:\r\n\r\n```\r\nWAC-Allow: user=\"read;write;control\", public=\"\"\r\n```\r\n\r\n(Note the `public=\"\"` part -- the empty string denotes no access.)","author":{"url":"https://github.com/dmitrizagidulin","@type":"Person","name":"dmitrizagidulin"},"datePublished":"2016-02-12T16:35:39.000Z","interactionStatistic":{"@type":"InteractionCounter","interactionType":"https://schema.org/CommentAction","userInteractionCount":5},"url":"https://github.com/246/node-solid-server/issues/246"}
| route-pattern | /_view_fragments/issues/show/:user_id/:repository/:id/issue_layout(.:format) |
| route-controller | voltron_issues_fragments |
| route-action | issue_layout |
| fetch-nonce | v2:7be4b87d-8ce5-3f11-0db7-62d1a1f8570c |
| current-catalog-service-hash | 81bb79d38c15960b92d99bca9288a9108c7a47b18f2423d0f6438c5b7bcd2114 |
| request-id | CECE:13E147:8E852C6:B9E30E7:6975AAF9 |
| html-safe-nonce | 1f3a09715e398f953555bde24a8dd37efedcc2edbb58996cfd79adf2c95cd739 |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJDRUNFOjEzRTE0Nzo4RTg1MkM2OkI5RTMwRTc6Njk3NUFBRjkiLCJ2aXNpdG9yX2lkIjoiNzY1MDk0MTQ1ODgwNjMxOTg2NSIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9 |
| visitor-hmac | fde6e477ab0ac09faf3e644ccc7c96fd3cb9fe3adf0200d995e286683dcfc224 |
| hovercard-subject-tag | issue:133285292 |
| github-keyboard-shortcuts | repository,issues,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | / |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/_view_fragments/issues/show/nodeSolidServer/node-solid-server/246/issue_layout |
| twitter:image | https://opengraph.githubassets.com/c3599eac373a4e580f4d31ed2c18de2a7e16c40b534d7d9f172a1c80016f62d4/nodeSolidServer/node-solid-server/issues/246 |
| twitter:card | summary_large_image |
| og:image | https://opengraph.githubassets.com/c3599eac373a4e580f4d31ed2c18de2a7e16c40b534d7d9f172a1c80016f62d4/nodeSolidServer/node-solid-server/issues/246 |
| og:image:alt | Problem/Motivation There is currently no easy way for solid client code to determine if the current user has read/write/delete etc access to a given resource (short of reading and parsing the ACL c... |
| og:image:width | 1200 |
| og:image:height | 600 |
| og:site_name | GitHub |
| og:type | object |
| og:author:username | dmitrizagidulin |
| hostname | github.com |
| expected-hostname | github.com |
| None | 4a4bf5f4e28041a9d2e5c107d7d20b78b4294ba261cab243b28167c16a623a1f |
| turbo-cache-control | no-preview |
| go-import | github.com/nodeSolidServer/node-solid-server git https://github.com/nodeSolidServer/node-solid-server.git |
| octolytics-dimension-user_id | 104446421 |
| octolytics-dimension-user_login | nodeSolidServer |
| octolytics-dimension-repository_id | 24306004 |
| octolytics-dimension-repository_nwo | nodeSolidServer/node-solid-server |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | false |
| octolytics-dimension-repository_network_root_id | 24306004 |
| octolytics-dimension-repository_network_root_nwo | nodeSolidServer/node-solid-server |
| turbo-body-classes | logged-out env-production page-responsive |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | 488b30e96dfd057fbbe44c6665ccbc030b729dde |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
Links:
Viewport: width=device-width