13:55:43 RRSAgent has joined #lws 13:55:47 logging to https://www.w3.org/2026/03/09-lws-irc 13:55:47 https://github.com/w3c-cg/threat-modeling/issues/16 -> Issue 16 Agenda: 2026-03-10 (by simoneonofri) 13:55:47 Luke has joined #lws 13:56:10 acoburn has changed the topic to: Linked Web Storage WG - 9 March 2026 - https://www.w3.org/events/meetings/a19ab7dc-1753-433d-bac5-64e3ad8c0a43/20260309T100000/ 13:56:20 zakim, start meeting 13:56:20 RRSAgent, make logs Public 13:56:22 please title this meeting ("meeting: ..."), acoburn 13:56:33 meeting: Linked Web Storage 13:56:46 agenda: https://www.w3.org/events/meetings/a19ab7dc-1753-433d-bac5-64e3ad8c0a43/20260309T100000/#agenda 13:56:46 clear agenda 13:56:46 agenda+ Introduction and announcements 13:56:46 agenda+ Issue -> triage https://github.com/w3c/lws-protocol/issues 13:56:46 agenda+ Timeframe for FPWD 13:56:46 agenda+ Remaining priorities for WG: test suite, access requests, notifications, type index 13:56:49 agenda+ Web-CID -> Authentication Suite https://github.com/w3c/lws-protocol/pull/96 13:56:52 agenda+ Former editors -> section https://w3c.github.io/lws-protocol/lws10-core/ 13:56:52 chair: acoburn 13:56:55 agenda+ -> Container pagination https://github.com/w3c/lws-protocol/pull/82 scope 13:57:19 rrsagent, make minutes 13:57:20 I have made the request to generate https://www.w3.org/2026/03/09-lws-minutes.html acoburn 13:57:45 previous meeting: https://www.w3.org/2026/03/02-lws-minutes.html 13:57:58 next meeting: https://www.w3.org/2026/03/16-lws-minutes.html 13:58:06 rrsagent, make minutes 13:58:07 I have made the request to generate https://www.w3.org/2026/03/09-lws-minutes.html acoburn 14:00:22 present+ 14:00:27 present+ 14:00:56 gibsonf1 has joined #lws 14:01:01 present+ 14:01:10 TallTed has joined #lws 14:01:22 bendm has joined #lws 14:01:45 laurens has joined #lws 14:01:47 present+ 14:01:54 present+ 14:01:54 scribe: laurens 14:02:41 present+ 14:03:48 yes, 2 more weeks; back to "normal" on 30 March (at least for us in Europe) 14:03:49 dmitriz has joined #lws 14:04:10 eBremer has joined #lws 14:04:10 zakim, open agendum 1 14:04:10 agendum 1 -- Introduction and announcements -- taken up [from agendabot] 14:04:19 present+ 14:04:26 present+ 14:04:36 present+ 14:04:41 acoburn: Any announcements? Or changes in affiliation? 14:05:02 present+ jessew 14:05:12 jeswr: We have a face-to-face meeting taking place on April 27th and 28th at the ODI Offices near Kings Place in London. 14:05:28 ... We also have the Solid symposium on April 30th and May 1st. 14:05:39 ... Finally, there is also a Solid hackathon that week. 14:06:11 I have made the request to generate https://www.w3.org/2026/03/09-lws-minutes.html TallTed 14:06:28 acoburn: Jesse is encouraging everyone in the community to block out April 27th through May 1st. 14:06:38 jeswr has joined #lws 14:06:47 zakim, open agendum 2 14:06:47 agendum 2 -- Issue -> triage https://github.com/w3c/lws-protocol/issues -- taken up [from agendabot] 14:07:03 acoburn: There is one new issue to discuss. 14:07:24 ... Issue #95 in the lws-protocol repository. 14:07:25 https://github.com/w3c/lws-protocol/issues/95 -> Issue 95 Specify Container representation to be compound representation (by damooo) 14:07:49 ... It asks a container to be specified as both a sever-managed and user-managed resource. 14:08:05 ... I believe from the F2F that containers would be server managed data. 14:08:18 ... I don't think we were going to specify it as being compound. 14:08:23 q+ 14:08:29 ... Is #95 out of-scope for LWS or not? 14:08:33 ack next 14:08:59 gibsonf1: If a client makes an RDF request on a container would they receive everything? 14:09:17 acoburn: Right now containers are defined as including information on all contained resources. 14:09:21 LWS in-person meeting (Location ODI Offices, Kings Place, Kings Cross, London): April 27 - April 28 14:09:21 ODI Hackathon (pre-registration at https://theodi.org/news-and-events/news/announcing-the-solid-symposium-2026/): April 27 (afternoon) - April 29 14:09:21 Solid Symposium (https://sosy2026.eu/): April 30 - May 1 14:09:36 ... Let's say in addition you want to add a name and other data to the container. 14:09:51 ... At present that would not go into the container resource itself but into an auxiliary resource. 14:10:18 gibsonf1: So a standard GET on a container will not return basics about that resource? 14:10:41 acoburn: Think of a container like a folder in a filesystem. 14:10:57 ... When you perform a GET you receive a list in the body of the resources contained in that container. 14:11:10 ... That is what we define today as part of the representation. 14:11:25 gibsonf1: That is a real problem. 14:11:43 ... If I perform a GET on a container, that returns a JSON with the content of the container. 14:12:01 acoburn: Currently you get a JSON response with the container contents and minimal metadata. 14:12:12 ... Additionally there is a linkset resource associated with the container. 14:12:24 ... Which can contain user defined and server defined link relations. 14:12:51 ... To e.g. auxiliary resources. So the linkset allows for arbitrary (with some constraints) links to other resources. 14:13:10 gibsonf1: This breaks the Solid approach to getting RDF on a resource GET. 14:13:35 ... In our case a container could be a system that contains other systems. 14:14:04 acoburn: Currently we are only triaging this issue. So we should probably assign a "needs-discussion" label here. 14:14:35 gibsonf1: There is an Accept that you send on the GET request. 14:14:41 acoburn: That is part of HTTP. 14:15:01 ... We require that a server support a specific mediatype (application/lws+json). 14:15:10 ... A server may do content negotiation on that resource. 14:16:25 zakim, open agendum 3 14:16:25 agendum 3 -- Timeframe for FPWD -- taken up [from agendabot] 14:17:00 acoburn: Typically specifications start with an editor's draft. 14:17:11 ... And after some time you move into a first public working draft. 14:17:37 ... It is a signal that (while still being a draft) it is a publication which begins a process 14:17:50 ... of patent exclusion 14:18:23 ... If there is IP in the draft exclusion requests can be made. This starts at the FPWD. 14:18:34 ... This process takes a couple of months. 14:18:58 ... Our charter expires in September, so we want to finish this patent exclusion process before that. 14:19:20 ... We are probably going to need an extension anyway, but it would be good to move along to FPWD. 14:19:32 pchampin: A first public working draft is still a draft. 14:19:45 ... We shouldn't be shy or wait for the content of the specification to be more mature. 14:19:54 ... Some groups publish an empty FPWD. 14:20:02 ... Just to have a stake in the ground. 14:20:20 ... We still need to improve a lot in the spec, but we should release early and often. 14:20:40 ... It does not yet represent consensus of the WG other than consensus that we should put something out there. 14:21:00 ... Our editor's draft is already visible today. 14:21:14 ... But it does start this patent exclusion call. 14:22:10 ryey has joined #lws 14:22:14 present+ 14:22:34 acoburn: I have two resolutions ready, one on the core specification and one on the authentication suites. 14:22:38 PROPOSED: The LWS WG shall publish the FPWD of the core LWS specification 14:22:49 +1 14:22:49 +1 14:22:54 +1 14:22:54 +1 14:22:55 +1 14:23:00 +1 14:23:14 +1 14:23:15 +1 14:23:17 +1 (with small change to pagination pr) 14:23:51 Ahh, sorry +1 14:24:09 acoburn: It looks like we have solid consensus 14:24:11 RESOLVED: The LWS WG shall publish the FPWD of the core LWS specification 14:24:13 https://github.com/w3c-cg/threat-modeling/issues/16 -> Issue 16 Agenda: 2026-03-10 (by simoneonofri) 14:24:39 PROPOSED: The LWS WG shall publish the various authentication suites as FPWD documents 14:24:48 +1 14:24:49 +1 14:24:52 +1 14:24:57 +1 14:24:57 +1 14:25:03 +1 14:25:04 +1 14:25:34 Core specification: https://w3c.github.io/lws-protocol/lws10-core/ 14:25:49 OpenID: https://w3c.github.io/lws-protocol/lws10-authn-openid/ 14:25:59 SAML: https://w3c.github.io/lws-protocol/lws10-authn-saml/ 14:26:08 SSI-CID: https://w3c.github.io/lws-protocol/lws10-authn-ssi-cid 14:26:17 SSI-DID-KEY: https://w3c.github.io/lws-protocol/lws10-authn-ssi-did-key 14:27:19 +1 (after fixing some seeming editorial issues?) 14:27:19 acoburn: We also have consensus for the authentication suites. 14:27:41 +! 14:27:44 +1 14:28:23 PROPOSED: The LWS WG shall publish the various authentication suites as FPWD documents: https://w3c.github.io/lws-protocol/lws10-authn-openid/, https://w3c.github.io/lws-protocol/lws10-authn-saml/, https://w3c.github.io/lws-protocol/lws10-authn-ssi-cid, https://w3c.github.io/lws-protocol/lws10-authn-ssi-did-key 14:28:52 RESOLVED: The LWS WG shall publish the various authentication suites as FPWD documents: https://w3c.github.io/lws-protocol/lws10-authn-openid/, https://w3c.github.io/lws-protocol/lws10-authn-saml/, https://w3c.github.io/lws-protocol/lws10-authn-ssi-cid, https://w3c.github.io/lws-protocol/lws10-authn-ssi-did-key 14:29:56 zakim, open agendum 4 14:29:56 agendum 4 -- Remaining priorities for WG: test suite, access requests, notifications, type index -- taken up [from agendabot] 14:30:19 acoburn: We have about 6 months left in the charter. 14:30:27 ... We are very much interested in renewing the charter. 14:30:46 ... We need to set priorities for both the next six months and think about what comes after. 14:31:01 ... Probably after those six months the focus will be on implementation. 14:31:14 ... But by September the contents of LWS should be mostly complete. 14:31:40 ... We have a couple of things that haven't been taken up: test suite, access requests & grants, notifications, server-managed type index. 14:31:55 ... Some other issues still need attention like pagination, multiple containment, ... 14:32:03 ... But the foundation is already there for containment. 14:32:15 ... However on these topics we haven't started working yet. 14:32:34 ... Are these still the right priorities? Are we missing anything? 14:32:53 q+ 14:32:59 ack next 14:33:11 +1 on type search (and I can write a proposal up for it) 14:33:27 ryey: For test suites, do we test the server implementation? Or also the client? 14:33:52 acoburn: We are primarily specifying a protocol. 14:34:06 ... Any entity for which we're specifying behaviour we would want to test. 14:34:23 do we have a use case defined for type index? 14:34:29 ... We're primarily focusing on server behaviour. 14:34:47 ... So that will be our focus in testing. And will give the greatest benefit. 14:35:02 ... But we could also have tests for client behaviour. But that might be more complicated. 14:35:51 "conformant by assertion" 14:36:22 acoburn: That's the test suite. 14:36:35 ... I see gibsonf1 giving a +1 on type index. 14:36:40 q+ to state access request & grant is authorization server, and may be too far for the timeline, notifications seems manageable in the timeline, for server-managed type index I would suggest an extensible system (and happy to read gibsonf1's suggestion) 14:36:45 ... The main use case is data discovery. 14:37:02 ... I don't have a specific reference, but we do have cases for that. 14:37:06 ack next 14:37:07 bendm, you wanted to state access request & grant is authorization server, and may be too far for the timeline, notifications seems manageable in the timeline, for server-managed 14:37:07 ... type index I would suggest an extensible system (and happy to read gibsonf1's suggestion) 14:37:23 bendm: Test suite is something we must do. 14:37:42 ... Access request & grant is related to authz service so farther from storage and thus less of a priority. 14:37:50 ... Notifications seems manageable in the timeline. 14:38:00 ... A server-managed type index will be hard to agree upon. 14:38:04 q+ 14:38:11 ack next 14:38:11 ... So an extensible system will be needed. 14:38:28 gibsonf1: On the type index, I'm not thinking of it as a way of indexing things 14:38:38 ... but as a search on types. 14:38:52 ... A request would be one or more types which can be intersected. 14:39:15 acoburn: That would be great. As soon as we have a proposal we can discuss further. 14:39:31 ... We will have to define the scope and requirements as a group. 14:40:07 ... Please let one of the chairs know as soon as you have something ready. 14:40:19 ... With respect to access requests & grants Inrupt is very interested. 14:40:34 ... I could probably bring something to the group by next week. 14:40:41 q+ 14:41:00 q+ to ask about "type" in type index and lack of RDF-native support 14:41:09 ack next 14:41:18 q+ to say we're also very interested in access request and grants, we can also bring something to collaborate on, I'm just wondering how large of a specification that will add to v1.0 14:42:02 ack next 14:42:03 ryey, you wanted to ask about "type" in type index and lack of RDF-native support 14:42:07 q+ additional grants and request ack 14:42:11 laurens: Access Requests & grants is very important still and resolves a severe lack of the solid protoocl. 14:42:22 ryey: I would agree on the access requests & grants. 14:42:41 ... We are talking about type indexes, but as we've dropped the RDF support 14:42:49 ... What do we mean by the type of a resource? 14:43:09 acoburn: This would probably be part of the scope of type indexes. 14:43:22 ... In an LWS storage there will be both RDF and non-RDF resources. 14:43:32 How can we support as broad a category as possible. 14:43:43 ... Types could be represented as part of the linkset. 14:44:00 q? 14:44:04 ack next 14:44:05 bendm, you wanted to say we're also very interested in access request and grants, we can also bring something to collaborate on, I'm just wondering how large of a specification 14:44:05 ... that will add to v1.0 14:44:17 bendm: Access requests & grants are super important. 14:44:28 ... But it will be a new and big thing to add to the specification. 14:44:39 ... So the question is how far we want to go. 14:44:51 ... I might be wrong and it might be more straightforward. 14:45:09 ... I just wonder if it wouldn't be better to scope ourselves. 14:45:19 acoburn: I have tried to keep this as minimal as possible. 14:45:35 ... So the goal for access requests & grants would be to be as lightweight as we can. 14:45:56 bendm: I do think notifications are very important, as it allows for extensibility. 14:46:02 q? 14:46:48 uvdsl has joined #lws 14:47:08 luke: The access requests & grants seems to be one of the most user unfriendly things that is in place right now. 14:47:17 ... So it is important in terms of adoption to add this. 14:47:43 acoburn: I'm not hearing anything new. 14:47:56 ... Only concerns on access requests & grants and their complexity. 14:48:14 ... We need to make sure there are individuals in the WG actively working on these items. 14:48:14 present+ 14:48:31 (sorry for joining just before the end :) ) 14:48:37 ... If anyone else wants to collaborate on access requests, let me know. 14:48:58 ... gibsonf1 has indicated interest in working on type indexes. If anyone else is interested, get in touch. 14:49:03 ... That leaves test suite and notifications. 14:49:22 q+ to comment on test suite 14:49:28 ack next 14:49:29 dmitriz, you wanted to comment on test suite 14:49:29 ... I am happy to contribute to notifications, but would be happy to have some assistance. 14:49:40 dmitriz: The test suite is a special case 14:49:58 ... The W3C policy tends to strongly encourage multiple interoperable implementations. 14:50:11 ... So it is an existential item to get anything out of the door. 14:50:26 q+ 14:50:54 rrsagent, make minutes 14:50:56 I have made the request to generate https://www.w3.org/2026/03/09-lws-minutes.html uvdsl 14:51:06 jeswr: There is a grant from NLNet 14:51:14 ... That has been granted to ODI for a test suite. 14:51:21 ... That will be worked on. 14:51:48 acoburn: It would be wonderful if we have some collaboration on writing that test suite. 14:52:10 ack next 14:52:21 gibsonf1: There is a solid test suite group currently active 14:52:28 ... Wouldn't it make sense to bring them in. 14:52:40 acoburn: They have a test suite written using Karate 14:52:49 ... We could build on there work, so that would be great. 14:52:57 zakim, open agendum 5 14:52:57 agendum 5 -- Web-CID -> Authentication Suite https://github.com/w3c/lws-protocol/pull/96 -- taken up [from agendabot] 14:53:27 acoburn: This PR proposes another authentication suite. 14:53:39 ... uvdsl could you provide an introduction to this PR. 14:53:46 ... So that we can discuss and vote on it next week. 14:54:18 uvdsl: This proposal is currently on agent identification, not authentication. 14:54:26 ... As identification is a fundamental component of authentication. 14:54:28 https://github.com/w3c/lws-protocol/issues/57 14:54:28 https://github.com/w3c/lws-protocol/issues/57 -> https://github.com/w3c/lws-protocol/issues/57 14:54:48 ... Following #57 I was tasked to define a conformance profile on agent identification. 14:54:49 https://github.com/w3c/lws-protocol/issues/57 -> Issue 57 Agent Identification (by uvdsl) [ready-for-pr] 14:55:01 https://uvdsl.solid.aifb.kit.edu/spec/lws/ident-cid-web/draft.html 14:55:03 ... My approach is to define the mechanism for dereferencing a CID by a client. 14:55:23 ... The specification should be implementable and lean. 14:55:34 ... Such that it can be used in the existing authentication suites. 14:56:11 acoburn: I encourage everyone to look at this PR. 14:56:40 ... With that we are out of time. 14:56:44 ... Any last thoughts? 14:57:00 zakim, draft minutes 14:57:00 I don't understand 'draft minutes', laurens 14:57:32 rrsagent, draft minutes 14:57:33 I have made the request to generate https://www.w3.org/2026/03/09-lws-minutes.html acoburn 14:58:29 present+ jeswr 14:58:46 rrsagent, make minutes 14:58:47 I have made the request to generate https://www.w3.org/2026/03/09-lws-minutes.html acoburn 14:59:33 acoburn has left #lws 21:37:30 Zakim, end meeting 21:37:30 As of this point the attendees have been acoburn, eBremer, AZ, laurens, gibsonf, pchampin, uvdsl, Luke, RazaN, bendm, ryey, TallTed, dmitriz, jessew, !, jeswr 21:37:33 RRSAgent, please draft minutes 21:37:34 I have made the request to generate https://www.w3.org/2026/03/09-lws-minutes.html Zakim 21:37:40 I am happy to have been of service, TallTed; please remember to excuse RRSAgent. Goodbye 21:37:40 Zakim has left #lws 21:37:46 RRSAgent, bye 21:37:46 I see no action items