Skip to content

Commit f1431e8

Browse files
committed
Update to reflect the use of defaultForNew
1 parent c7ff6fe commit f1431e8

File tree

1 file changed

+7
-11
lines changed

1 file changed

+7
-11
lines changed

README.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ documents called *Access Control List Resources* (or simply *ACLs*).
7373
The WAC system assumes that web documents are placed in hierarchical containers
7474
or folders. For convenience, users do not have to specify permissions on each
7575
individual resource -- they can simply set permissions on a container, add a
76-
[`acl:defaultForNew`](#default-inherited-authorizations) predicate, and have all
76+
[`acl:default`](#default-inherited-authorizations) predicate, and have all
7777
of the resources in that container [inherit](#acl-inheritance-algorithm) those
7878
permissions.
7979

@@ -164,13 +164,13 @@ A request (to read or write) has arrived for a document located at
164164
`/documents/papers/` container (in which the document resides) has its own
165165
ACL resource (here, `/documents/papers/.acl`). If it finds that, the server
166166
reads each authorization in the container's ACL, and if any of them contain an
167-
`acl:defaultForNew` predicate, the server will use them (as if they were
167+
`acl:default` predicate, the server will use them (as if they were
168168
specified in `paper1.acl`). Again, if any such authorizations are found, the
169169
process stops there and no other statements apply.
170170
3. If the document's container has no ACL resource of its own, the search
171171
continues upstream, in the *parent* container. The server would check if
172172
`/documents/.acl` exists, and then `/.acl`, until it finds some authorizations
173-
that contain `acl:defaultForNew`.
173+
that contain `acl:default`.
174174
4. Since the root container (here, `/`) MUST have its own ACL resource, the
175175
server would use the authorizations there as a last resort.
176176

@@ -488,9 +488,9 @@ be able to change their access levels at a later point (since they retain
488488
As previously mentioned, not every document needs its own individual ACL
489489
resource and its own authorizations. Instead, one can can create an
490490
Authorization for a container (in the container's own ACL resource), and then
491-
use the `acl:defaultForNew` predicate to denote that any resource within that
491+
use the `acl:default` predicate to denote that any resource within that
492492
container will *inherit* that authorization. To put it another way, if an
493-
Authorization contains `acl:defaultForNew`, it will be applied *by default* to
493+
Authorization contains `acl:default`, it will be applied *by default* to
494494
any resource in that container.
495495

496496
You can override the default inherited authorization for any resource by
@@ -512,16 +512,12 @@ An example ACL for a container would look something like:
512512
acl:Write,
513513
acl:Control;
514514
515-
# defaultForNew says: this authorization (the statements above)
515+
# default says: this authorization (the statements above)
516516
# will also be inherited by any resource within that container
517517
# that doesn't have its own ACL.
518-
acl:defaultForNew <https://alice.databox.me/docs/>.
518+
acl:default <https://alice.databox.me/docs/>.
519519
```
520520

521-
**Note:** The `acl:defaultForNew` predicate will soon be renamed to
522-
`acl:default`, both in the specs and in implementing servers. The semantics, as
523-
described here, will remain the same
524-
525521
## See also
526522

527523
[Background on CORS](https://solid.github.io/web-access-control-spec/Background)

0 commit comments

Comments
 (0)