New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refactor examples to use DataIntegrityProof #59
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
One word change. "Examplary" suggests "superlative" which I don't think is intended. "Example" does echo the earlier part of the sentence, but I think that's OK.
index.html
Outdated
<a>proof type</a> to produce a verifiable digital proof by canonicalizing the | ||
input data using the JSON Canonicalization Scheme [[RFC8785]] and then | ||
digitally signing it using an Ed25519 elliptic curve signature. | ||
The proof example above suggests an exemplary <code>json-signature-2022</code> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The proof example above suggests an exemplary <code>json-signature-2022</code> | |
The proof example above suggests an example <code>json-signature-2022</code> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
See https://github.com/w3c/vc-data-integrity/pull/59/files#r986298535 for an alternate suggestion.
index.html
Outdated
<a>proof type</a> to produce a verifiable digital proof by canonicalizing the | ||
input data using the JSON Canonicalization Scheme [[RFC8785]] and then | ||
digitally signing it using an Ed25519 elliptic curve signature. | ||
The proof example above suggests an exemplary <code>json-signature-2022</code> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The proof example above suggests an exemplary <code>json-signature-2022</code> | |
The proof example above suggests a fictitious <code>json-signature-2022</code> |
@TallTed what about "ficticious" instead? It's closer to what I was intending. We're trying to convey that "the thing above doesn't exist, we're only using it as an example that presumptively does X and Y."
On the other hand, I don't really like starting the spec out with a fictitious example.
As a related aside, one of the concepts that's attempting to be conveyed is "You don't have to use Linked Data to use Data Integrity. Data Integrity works for both plain 'ol JSON as well as JSON-LD (or YAML, CBOR, etc. -- but that's a stretch and we might tackle in a few years if DI is successful) ." ... but perhaps we should really spell that out instead of having people trying to read between the lines.
Thoughts?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm OK with fictitious
, tho optimally that fiction would carry through all layers, so the fictitious example looks as real as possible, while NOT being real (and having any descriptions that exist for any entities used also indicate that fictitiousness).
This is one of the reasons I fight to use reserved example
domain names, phone numbers, etc., wherever they're meant to appear functional for the functionality we need while not carrying through to the physical world.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What if we were to rename json-signature-2022
to example-signature-2022
? Would that be better?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Much!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed in 0bcd83c.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approving assuming Ted's suggestions will go in -- and please note the comment I made. Thanks!
index.html
Outdated
{ | ||
"@context": ["https://w3id.org/security/data-integrity/v1"], | ||
"type": "DataIntegritySignature", | ||
"@context": ["https://w3id.org/security/suites/data-integrity/v1"], |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The context URL: https://w3id.org/security/data-integrity/v1 is actually correct (today, anyway).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed in f336809.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
approved, but agree with Ted on example name changes
21c29d2
to
b78794d
Compare
f26d7c1
to
47f25eb
Compare
47f25eb
to
8b456c4
Compare
Editorial, multiple reviews, changes requested and made, no objections, merging. |
This PR updates the examples to align with the new
DataIntegrityProof
section.Preview | Diff