-
Notifications
You must be signed in to change notification settings - Fork 17
Proposal for the OCM Address format #268
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proposal for the OCM Address format #268
Conversation
7952806 to
42376cb
Compare
|
BTW what is the Sharing User compared to the Sending Party ? Should we replace the FQDN by some OCM Server Address consisting of |
709cd61 to
30f3834
Compare
Following discussion in cs3org#237 and cs3org#244
30f3834 to
f104d19
Compare
mickenordin
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this is good!
glpatcern
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good, but at this point I propose to make the following change:
Co-authored-by: Giuseppe Lo Presti <[email protected]>
|
Based on the discussion in #270 I believe it at least heps with parsing ambiguity and validating the share notification I can think of an example based on this PR: in case of This is better to go on a new PR where we can talk more about it's design but it worth to mention it here. |
|
I also just noticed something "fun", this is the ocm address as presented by owncloud 10 from surfbox, where I am logged in with my eduid.nl account:
notice the path at the end of the hostname. Shoudl we infact allow that? That will make instances installed in subpaths work. |
Discovery via the .well-known/ocm path is not possible in a subfolder, how should discovery behave in the case of subfolders? |
I agree there is a gap where users or implementations need to know if a certain OCM Address identifies a user, group or federation to be able to fill the If we make that part of the OCM Address we should drop the "group:" or "federation:" prefixes might already be contained in the existing opaque strings so that would be a breaking change. If we do that, I would be strongly in favor of making OCM Addresses a URI, with "group" and "federation" as URI scheme instead of defining something which looks like an URI but isn't. I'm wondering if we can avoid needing the SendingServer to know it the recipient is a user, group or federation if we leave that distinction completely to the ReceivingServer (requiring a shared namespace on the ReceivingServer where a Group can't have the same name as a user) |
I suppose, what we should do in case we receive such an OCM-address is to try https://surfdrive.surf.nl/.well-known/ocm and then fall back to the legacy endpoint at https://surfdrive.surf.nl/files/ocm-provider/ (which in fact, is what current implementations do as the first action) |
I agree, the blocker for making OCM addresses RFC7565 is the breaking change in already established user shares.
|
I would like to avoid having a centralized registry of federations if possible, because that makes it less of a federation and more of a distributed system, the sending server could of course be made to provide additional information about the federated share it wants to set up, and act as a proxy, but again, that just means sending multiple user or group shares to a multitude of servers. We should investigate what Nextcloud does with the federation share type before proceeding more with this line of inquery I think. |
|
Based on Nextcloud sources create share and notification They use * send server-to-server share to remote server
*
* @param string $token
* @param string $shareWith
* @param string $name
* @param string $remoteId
* @param string $owner
* @param string $ownerFederatedId
* @param string $sharedBy
* @param string $sharedByFederatedId
* @param int $shareType (can be a remote user or group share)In the notification it would change them to correct identifies for OCM in here which finally sends the share in here The share type is either And this is for the remote group, see Nextcloud doesn't use I have a feeling I'm not searching the right places |
…ry Process Co-authored-by: Giuseppe Lo Presti <[email protected]>
Co-authored-by: Giuseppe Lo Presti <[email protected]>
glpatcern
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this changeset can go ahead as is. The current discussion about the semantic of group/federated sharing will surely continue in #270 but it's beyond this PR.
MahdiBaghbani
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! Thanks Matthias
Following discussion in #237 and #244