summaryrefslogtreecommitdiff
path: root/examples/muck/muck.md
diff options
context:
space:
mode:
Diffstat (limited to 'examples/muck/muck.md')
-rw-r--r--examples/muck/muck.md36
1 files changed, 11 insertions, 25 deletions
diff --git a/examples/muck/muck.md b/examples/muck/muck.md
index b074424..0a28020 100644
--- a/examples/muck/muck.md
+++ b/examples/muck/muck.md
@@ -1,12 +1,3 @@
----
-title: Muck JSON storage server and API
-author: Lars Wirzenius
-date: work in progress
-bindings: [muck.yaml]
-impls:
- python: [muck.py]
-...
-
Introduction
=============================================================================
@@ -95,24 +86,19 @@ This chapter lists high level requirements for Muck.
Each requirement here is given a unique mnemonic id for easier
reference in discussions.
-**SimpleOps**
-
-: Muck must be simple to install and operate. Installation should be
- installing a .deb package, configuration by setting the public key
- for token signing of the authentication server.
-
-**Fast**
-
-: Muck must be fast. The speed requirement is that Muck must be able
- to handle at least 100 concurrent clients, creating 1000 objects
- each, and then retrieving each object, and then deleting each
- object, and all of this must happen in no more than ten minutes
- (600 seconds). Muck and the clients should run on different
- virtual machines.
+**SimpleOps** --- Muck must be simple to install and operate.
+ Installation should be installing a .deb package, configuration by
+ setting the public key for token signing of the authentication
+ server.
-**Secure**
+**Fast** --- Muck must be fast. The speed requirement is that Muck
+ must be able to handle at least 100 concurrent clients, creating
+ 1000 objects each, and then retrieving each object, and then
+ deleting each object, and all of this must happen in no more than
+ ten minutes (600 seconds). Muck and the clients should run on
+ different virtual machines.
-: Muck must allow access only by an authenticated client
+**Secure** --- Muck must allow access only by an authenticated client
representing a data subject, and must only allow that client to
access objects owned by the data subject, unless the client has
super privileges. The data subject specifies, via the access