- From: Marc Hadley <Marc.Hadley@Sun.COM>
- Date: Wed, 05 Jan 2005 16:58:47 -0500
- To: Francisco Curbera <curbera@us.ibm.com>
- Cc: public-ws-addressing-request@w3.org, Rich Salz <rsalz@datapower.com>, public-ws-addressing@w3.org
On Jan 5, 2005, at 4:37 PM, Francisco Curbera wrote:
>
> The problem is defining what we mean by that ("ref props are anyhting
> but
> opaque").
Actually I think the problem is our current claim that refps are opaque
;-). Its clear from several problems that have surfaced that refps are
not opaque, a user of an EPR needs some knowledge of their structure to
avoid constructing messages that are invalid in one or more ways.
> Opaqueness as an operating principle is important to protect
> service requester interoperability.
I agree that it would be desirable, I'm just pointing out that it has
not been achieved. This is a difficult problem to solve when a
recipient is required to include an XML fragment verbatim in their
messages and, IMO, is made worse when that XML fragment is required to
be a SOAP header.
> Requesters that start making their own
> assumptions about ref. props. are setting themselves for a nasty
> surprise
> when the server decides it needs to issue a different EPR for those
> clients. In this sense, maintaining the opacity principle is very
> important.
>
Can you give me an example of what you mean by the above ? Here's a
counter example: I have an EPR with a refp whose QName I happen to
understand. I know that the 'serviceId' attribute of the root element
of the refp is of type id so I make sure not to create any other ids
with the same value in messages I send to that EPR. What problem am I
causing by taking advantage of my understanding of the refp structure ?
Perhaps we mean different things by opaque. For me it implies that I
don't need to know anything about the contents to use it successfully
(like a HTTP cookie).
Marc.
> A different thing is whether people will treat EPRs as they treat URIs,
> sometimes assuming an encoding pattern - which is essentially an
> extension
> of the requester-provider contract. Nothing in the spec prevents that
> today.
>
> As for the ID problem, Jonathan pointed out already that this problem
> exists whenever xml fragments are embedded into XML documents, and is
> not
> an exclusive WS-Addressing problem.
>
> Paco
>
>
>
>
>
> Marc Hadley
> <Marc.Hadley@Sun.COM> To: Rich
> Salz <rsalz@datapower.com>
> Sent by: cc:
> public-ws-addressing@w3.org
> public-ws-addressing-req Subject: Re:
> xml:id and opacity of refp's
> uest@w3.org
>
>
> 01/05/2005 04:18 PM
>
>
>
>
>
>
> The lack of opacity has also emerged on other threads (e.g. [1]). I
> think we need to accept that refps are anything but opaque in any real
> sense of the word.
>
> Marc.
>
> [1] http://www.w3.org/mid/684C1D92-3CB9-11D9-B7E8-000A95BC8D92@Sun.COM
>
> On Dec 21, 2004, at 7:15 PM, Rich Salz wrote:
>
>>
>> Dims posted a message ("just thinking out loud here...") that included
>> a
>> snippet of an EPR with a DSIG in it. It just brought to mind an
>> issue.
>>
>> One of XML's validity constraints is that attributes of type ID have
>> unique values. In order to not generate invalid XML, a program that
>> uses
>> the refp's from an EPR must scan them to make sure that the ID
>> attributes
>> that *it* generates are unique. This violates opacity, but without
>> that
>> violation a client cannot be sure of generating valid messages.
>>
>> Further, while xml:id is useful, there are still many ID attributes in
>> other namespaces. This requires even deeper knowledge and inspection
>> by the EPR recipient, further ripping away opacity. It's a hard
>> problem,
>> of course, since there is no guarantee that the EPR recipient will
>> even
>> *know* what the ID attributes are inside a refp.
>>
>> Short of probabilistic values for ID attributes (viz., MIME separators
>> for
>> multipart), opacity must be broken.
>> /r$
>> --
>> Rich Salz Chief Security Architect
>> DataPower Technology http://www.datapower.com
>> XS40 XML Security Gateway http://www.datapower.com/products/xs40.html
>> XML Security Overview
>> http://www.datapower.com/xmldev/xmlsecurity.html
>>
>>
>>
> ---
> Marc Hadley <marc.hadley at sun.com>
> Web Technologies and Standards, Sun Microsystems.
>
>
>
>
>
>
---
Marc Hadley <marc.hadley at sun.com>
Web Technologies and Standards, Sun Microsystems.
Received on Wednesday, 5 January 2005 21:58:51 UTC