...
Please squash a bug!
Expand Jira server DuraSpace JIRA columns key,summary,type,created,updated,due,assignee,reporter,priority,status,resolution maximumIssues 20 jqlQuery filter=13122 serverId c815ca92-fd23-34c2-8fe3-956808caf8c5 Tickets resolved this week:
Expand Jira server DuraSpace JIRA columns key,summary,type,created,updated,due,assignee,reporter,priority,status,resolution maximumIssues 20 jqlQuery filter=13111 serverId c815ca92-fd23-34c2-8fe3-956808caf8c5 Tickets created this week:
Expand Jira server DuraSpace JIRA columns key,summary,type,created,updated,due,assignee,reporter,priority,status,resolution maximumIssues 20 jqlQuery filter=13029 serverId c815ca92-fd23-34c2-8fe3-956808caf8c5
Minutes
- Brief discussion about Amherst College's acrepo apache camel services: https://gitlab.amherst.edu/acdc/repository-extension-services
- perhaps more conversation about what these are at a later meeting.
- Peter Eichman's and James Creel's groups are using them.
- Accessing Modeshape layer WebACFilter: issue
- adding Acl:append checking - there are some difference in how Acl:append works in POST: for example you can post to a RDF source but not a non-RDF source. In looking up the nodes in modeshape, via spring configuration, things are not actually getting injected into the WebACFilter. Peter may have been using the wrong configuration file to do this with.
- WebAC code is in the WebACFilter - but perhaps some of the checks belong in the FedoraLdp class, so that access to node data is readily available. Concern with doing that is that authorization would be split between to two places and do we want authorization that close to the HTTP API core?
- WebAC is like a shield around the HTTP interface. Maybe a way to make a call that's unfiltered? We need to be able to distinguish requests that need to be filtered and ones that do not (internal requests), to ensure they are not going through the authorization chain again. One solution could be internal admin credentials?
- What about cases where authorization is not just happening out front - ie. cases like recursive delete. That's an area where authorization checks might need to happen outside/after the WebACFilter.
- Someone to create Jira ticket for looking at WebAC and recursive deletes where authorization might be different for child nodes.
- one possibility is that a recursive delete will delete what user is authorized to delete – or reject the request outright if one of the paths is not authorized.
- Andrew pointed out that moving the WebACFilter stuff into the HTTP layer is more out of necessity rather than architectural design –
- A more sound/maintainable approach by having the filter do it all, but barrier is getting the injection of fedora objects to work correctly
- Downside of generating more HTTP traffic when we're already inside the server isn't ideal
- Jared brought up the hidden user approach - an internally credentialed (hidden) user whose requests are always just accepted by server. Perhaps tie it to the servers IP, so they are only locally generated requests.
- Short term plan - move some WebACFilter stuff closer to the HTTP layer. Danny will look at this some. Fresh eyes on this welcome.
- Fedora 5.0.0 Preparation Tasks
- CTS – all the tests are stubbed out now.
- Documentation changes have slowed down. Still work to do there.
- Outstanding PR's awaiting review from folks - just one current one: https://github.com/fcrepo4/fcrepo4/pull/1386
- some JIRA tickets just need to be closed (the PR's were merged already)
- JIRA tickets:
- Bethany will look at
and wrap it up this week.Jira server DuraSpace JIRA columns key,summary,type,created,updated,due,assignee,reporter,priority,status,resolution serverId c815ca92-fd23-34c2-8fe3-956808caf8c5 key FCREPO-2801 - There are just 10 issues left for the 5.0 API alignment.
- Looked at
Jira server DuraSpace JIRA columns key,summary,type,created,updated,due,assignee,reporter,priority,status,resolution serverId c815ca92-fd23-34c2-8fe3-956808caf8c5 key FCREPO-2637 - Does it still apply? How do we want to approach this? This was based on a use case where some resources ought to be public and not require authorization. Aaron B. thinks it's still pertinent. This was to see if the refactor for Shiro changes this behavior. This question is still open.
- There is code in the WebACFilter that supports authorizing unauthenticated requests. The bigger question is how to send unauthenticated requests - right now that's being handled by something external to the web app – ie front end talking to shib or the handled by the servlet container. It's either everything is authenticated or nothing is. Having Shiro might open up options in the future, for authentication, with the ability to configure Shiro authentication realms (a potential long term solution).
- Fedora will do the right thing when an unauthenticated user makes a request - acl is still checked.
- Aaron B. will re-scope the ticket to documentation: documenting where the repository stands on working with this feature.
- How are folks tying into things like shibboleth? Aaron's group is using a proxy-ized path.
- Bethany will look at
- LTS update: the policy has been voted in by Fedora Leadership and is now in effect.
Actions
- Danny to explore inserting a macro into documentation for Fedora version.
- Send email to community seeing who is interested in reviving OAI
Jira server DuraSpace JIRA columns key,summary,type,created,updated,due,assignee,reporter,priority,status,resolution serverId c815ca92-fd23-34c2-8fe3-956808caf8c5 key FCREPO-2637 Aaron B. will re-scope to be a documentation issue: - Bethany will look at this ticket and wrap it up this week:
Jira server DuraSpace JIRA columns key,summary,type,created,updated,due,assignee,reporter,priority,status,resolution serverId c815ca92-fd23-34c2-8fe3-956808caf8c5 key FCREPO-2801
...
Future Agenda Topics:
- Amherst College's acrepo apache camel services: https://gitlab.amherst.edu/acdc/repository-extension-services
- Reviving OAI