-
Notifications
You must be signed in to change notification settings - Fork 304
Running Test Implementations of Solid compatible servers
Kingsley Idehen edited this page Jun 4, 2018
·
41 revisions
URI | Owner | server | server mode | Linked issue numbers | Interop Test Status | PodDescription |
---|---|---|---|---|---|---|
https://kidehen6.solid.openlinksw.com:8443/public/ | @kidehen | NSS | TLS | Pass | ||
https://kidehen7.solid.openlinksw.com:8444/public/ | @kidehen | NSS | OIDC | Pass | ||
https://solid.turnguard.com:8440/public/ | @turnguard_twitter | NSS 4.0.5 | TLS | Pass | https://solid.turnguard.com:8440/public/pods#pod | |
https://solid.turnguard.com:8444/public/ | @turnguard_twitter | NSS 4.0.5 | OIDC | ? | https://solid.turnguard.com:8444/public/pods#pod | |
https://drive.verborgh.org/public/RWWCrewQA/ | @RubenVerborgh | NSS 4.0.8 | OIDC | Pass | ||
https://ruben-just-works.solid.community/ | @RubenVerborgh | NSS 4.0.8 | OIDC | |||
https://timbl.com/timbl/Public/Test/2018/RWWCrew%20only/ | @timbl | NSS | OIDC | |||
https://melvin.solid.live/public/RWWCrew/ | @melvincarvalho | NSS 4.0.8 | OIDC | |||
https://justin.janeirodigital.exchange/RWWCrew/ | @justinwb | NSS 4.0.8 | OIDC |
The ACL described below has been used to enable read-write access on the pods above for the group of developers (the #RWWCrew
) listed in the ACL. You can request addition of your WebID, to participate in this interop effort.
@prefix acl: <http://www.w3.org/ns/auth/acl#> .
@prefix foaf: <http://xmlns.com/foaf/0.1/> .
# The owner has all permissions
<#owner>
a acl:Authorization ;
acl:agent <../profile/card#me> ; # PUT YOUR OWN WEBID HERE
acl:accessTo <./> ;
acl:defaultForNew <./> ;
acl:mode acl:Read ,
acl:Write ,
acl:Control .
# The public has read permissions
<#public>
a acl:Authorization ;
acl:agentClass foaf:Agent ;
acl:accessTo <./> ;
acl:defaultForNew <./> ;
acl:mode acl:Read .
# The RWWCrew has read/write permissions
<#RWWCrew>
a acl:Authorization;
acl:agent <https://ldp.turnguard.com/turnguard#me> ,
<https://www.w3.org/People/Berners-Lee/card#i> ,
<https://melvincarvalho.com/#me> ,
<https://melvin.solid.live/profile/card#me> ,
<https://ruben.verborgh.org/profile/#me> ,
<https://ruben-just-works.solid.community/profile/card#me> ,
<https://id.myopenlink.net/DAV/home/KingsleyUyiIdehen/Public/kingsley.ttl#this> ,
<https://kingsley.idehen.net/public_home/kidehen/profile.ttl#i> ,
<https://kidehen5.solid.openlinksw.com:8444/profile/card#me> ,
<https://kidehen6.solid.openlinksw.com:8443/profile/card#me> ,
<https://kidehen7.solid.openlinksw.com:8444/profile/card#me> ,
<https://kidehen8.solid.openlinksw.com:8444/profile/card#me>,
<http://id.myopenlink.net/DAV/home/smalinin/YouID/Sergey_Malinin_Fb/profile.ttl#identity> ,
<https://id.myopenlink.net/DAV/home/KingsleyUyiIdehen/Public/software-agent.ttl#i> ,
<https://justin.janeirodigital.exchange/profile/card#me> ,
<http://csarven.ca/#i> ;
acl:accessTo <./> ;
acl:defaultForNew <./> ;
acl:mode acl:Read ,
acl:Write .
Note: An account on a TLS-only-mode server will not enable log in for an OIDC-mode server.
-
logging in with WebID-TLS
- creating a meetulator
- creating a chat in the meetulator
- adding to the chat you created
- adding to a chat someone else made
- creating a meetulator
-
logging in with WebID-OIDC
- creating a meetulator
- creating a chat in the meetulator
- adding to the chat
- adding to a chat someone else made
- creating a meetulator