Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1.  Brief discussion about Amherst College's acrepo apache camel services: https://gitlab.amherst.edu/acdc/repository-extension-services
    1. perhaps more conversation about what these are at a later meeting. 
    2. Peter Eichman's and James Creel's groups are using them.
  2. Accessing Modeshape layer WebACFilter:  issue
    1. adding Acl:append checking - there are some difference in how Acl:append works in POST: for example you can post to a RDF source but not a non-RDF source.   In looking up the nodes in modeshape, via spring configuration, things are not actually getting injected into the webac filterWebACFilter.  Peter may have been using the wrong configuration file to do this with. 
    2. webac WebAC code is in the WebACFilter - but perhaps some of the checks belong in the FedoraLdp class, so that access to node data is readily available.  Concern with doing that is that authorization would be split between to two places and do we want authorization that close to the HTTP API core? 
    3. webac WebAC is like a shield around the HTTP interface.  Maybe a way to make a call that's unfiltered?  We need to be able to distinguish requests that need to be filtered and ones that do not (internal requests), to ensure they are not going through the authorization chain again.   One solution could be internal admin credentials?Current approach is to pull in modeshape (fedora repo impl) to resolve question of what type of RDF resource it is.   That resource is not currently being injected into the webac.  Possible not configuring the correct spring file. 
    4. What about cases where authorization is not just happening out front - ie. cases like recursive delete.   That's an area where authorization checks might need to happen outside/after of the WebACFilter.
      1. Someone to create Jira ticket for looking at WebAC and recursive deletes where authorization might be different for child nodes. 
      2. one possibility is that a recursive delete will delete what user is authorized to delete – or reject the request outright if one of the paths is not authorized.
    5. Andrew pointed out that moving the WebACFilter stuff into the HTTP layer is more out of necessity rather than architectural design – 
      1. A more sound/maintainable approach by having the filter do it all, but barrier is getting the injection of fedora objects to work correctly
      2. Downside of generating more HTTP traffic when we're already inside the server isn't ideal
    6. Jared brought up the wizardOfOz approach ( hidden user ) approach - an internally credentialed (hidden) user whose requests are always just accepted by server. Perhaps tie it to the servers IP, so they are only locally generated requests. 
    7. Short term plan - move some WebACFilter stuff closer to the HTTP layer.  Danny will look at this some.  Fresh eyes on this welcome. 
  3.  Fedora 5.0.0 Preparation Tasks
    1. CTS – all the tests are stubbed out now.  
    2. Documentation changes have slowed down.  Still work to do there. 
    3. Outstanding PR's awaiting review from folks - just one current one: https://github.com/fcrepo4/fcrepo4/pull/1386
      1. some JIRA tickets just need to be closed (the PR's were merged already)
    4. JIRA tickets: 
      1. Bethany will look at  
        Jira
        serverDuraSpace JIRA
        columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
        serverIdc815ca92-fd23-34c2-8fe3-956808caf8c5
        keyFCREPO-2801
          and wrap it up this week. 
      2. There are just 10 issues left for the 5.0 API alignment. 
      3. Looked at 
        Jira
        serverDuraSpace JIRA
        columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
        serverIdc815ca92-fd23-34c2-8fe3-956808caf8c5
        keyFCREPO-2637
        1. Does it still apply?  How do we want to approach this?  This was based on a use case where some resources ought to be public and not require authorization.  Aaron B. thinks it's still pertinent.  This was to see if the refactor for Shiro changes this behavior.  This question is still open.    
        2. There is code in the WebACFilter that supports authorizing unauthenticated requests.   The bigger question is how to send unauthenticated requests - right now that's being handled by something external to the web app – ie front end talking to shib or the handled by the servlet container.   It's either everything is authenticated or nothing is.   Having Shiro might open up options in the future, for authentication, with the ability to configure Shiro authentication realms  (a potential long term solution). 
        3. Fedora will do the right thing when an unauthenticated user makes a request - acl is still checked.
          1.  Aaron B.  will re-scope it the ticket to documentation: documenting where the repository stands on working with this feature. 
        4. How are folks tying into things like shibboleth - Aaron's group is using a proxy-ized path. 
  4. LTS update:  the policy has been voted in by Fedora Leadership and is now in effect.

...