Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Refactor examples to use DataIntegrityProof #59

Merged
merged 3 commits into from Oct 9, 2022

Conversation

msporny
Copy link
Member

@msporny msporny commented Oct 1, 2022

This PR updates the examples to align with the new DataIntegrityProof section.


Preview | Diff

@msporny msporny requested a review from mprorock as a code owner October 1, 2022 18:28
@msporny msporny changed the base branch from main to msporny-cs-add-dip October 1, 2022 18:28
Copy link
Member

@TallTed TallTed left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

One word change. "Examplary" suggests "superlative" which I don't think is intended. "Example" does echo the earlier part of the sentence, but I think that's OK.

index.html Outdated
<a>proof type</a> to produce a verifiable digital proof by canonicalizing the
input data using the JSON Canonicalization Scheme [[RFC8785]] and then
digitally signing it using an Ed25519 elliptic curve signature.
The proof example above suggests an exemplary <code>json-signature-2022</code>
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
The proof example above suggests an exemplary <code>json-signature-2022</code>
The proof example above suggests an example <code>json-signature-2022</code>

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

index.html Outdated
<a>proof type</a> to produce a verifiable digital proof by canonicalizing the
input data using the JSON Canonicalization Scheme [[RFC8785]] and then
digitally signing it using an Ed25519 elliptic curve signature.
The proof example above suggests an exemplary <code>json-signature-2022</code>
Copy link
Member Author

@msporny msporny Oct 3, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
The proof example above suggests an exemplary <code>json-signature-2022</code>
The proof example above suggests a fictitious <code>json-signature-2022</code>

@TallTed what about "ficticious" instead? It's closer to what I was intending. We're trying to convey that "the thing above doesn't exist, we're only using it as an example that presumptively does X and Y."

On the other hand, I don't really like starting the spec out with a fictitious example.

As a related aside, one of the concepts that's attempting to be conveyed is "You don't have to use Linked Data to use Data Integrity. Data Integrity works for both plain 'ol JSON as well as JSON-LD (or YAML, CBOR, etc. -- but that's a stretch and we might tackle in a few years if DI is successful) ." ... but perhaps we should really spell that out instead of having people trying to read between the lines.

Thoughts?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm OK with fictitious, tho optimally that fiction would carry through all layers, so the fictitious example looks as real as possible, while NOT being real (and having any descriptions that exist for any entities used also indicate that fictitiousness).

This is one of the reasons I fight to use reserved example domain names, phone numbers, etc., wherever they're meant to appear functional for the functionality we need while not carrying through to the physical world.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What if we were to rename json-signature-2022 to example-signature-2022? Would that be better?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Much!

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fixed in 0bcd83c.

Copy link
Contributor

@dlongley dlongley left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approving assuming Ted's suggestions will go in -- and please note the comment I made. Thanks!

index.html Outdated
{
"@context": ["https://w3id.org/security/data-integrity/v1"],
"type": "DataIntegritySignature",
"@context": ["https://w3id.org/security/suites/data-integrity/v1"],
Copy link
Contributor

@dlongley dlongley Oct 4, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The context URL: https://w3id.org/security/data-integrity/v1 is actually correct (today, anyway).

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fixed in f336809.

Copy link
Contributor

@mprorock mprorock left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

approved, but agree with Ted on example name changes

Base automatically changed from msporny-cs-add-dip to main October 9, 2022 16:54
@msporny msporny force-pushed the msporny-dip-refactor-examples branch from f26d7c1 to 47f25eb Compare October 9, 2022 17:12
@msporny msporny force-pushed the msporny-dip-refactor-examples branch from 47f25eb to 8b456c4 Compare October 9, 2022 17:13
@msporny
Copy link
Member Author

msporny commented Oct 9, 2022

Editorial, multiple reviews, changes requested and made, no objections, merging.

@msporny msporny merged commit 45e25a7 into main Oct 9, 2022
@msporny msporny deleted the msporny-dip-refactor-examples branch October 9, 2022 17:19
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants