{"id":48,"date":"2024-01-31T16:16:43","date_gmt":"2024-01-31T16:16:43","guid":{"rendered":"https:\/\/shaynepatelcybersecurityportfolio.online\/?p=48"},"modified":"2024-01-31T16:16:43","modified_gmt":"2024-01-31T16:16:43","slug":"file-permissions-in-linux","status":"publish","type":"post","link":"https:\/\/shaynepatelcybersecurityportfolio.online\/?p=48","title":{"rendered":"File Permissions in Linux"},"content":{"rendered":"\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">This Linux project was when I was getting my Google&#8217;s Cybersecurity Certificate. The course had many hands on labs paired up with the content for learning&#8217;s.  As you follow along, I&#8217;ll provide details at every section of the lab and the overview to begin with. Keep in mind, these labs were written as if I was part of a fictional team and organization.<\/mark><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Project Description<\/strong><\/h3>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">The research team at my organization needs to update the file permissions for certain files and directories within the <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">projects<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"> directory. The permissions do not currently reflect the level of authorization that should be given. Checking and updating these permissions will help keep their system secure. To complete this task, I performed the following tasks:<\/mark><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Check file and directory details<\/strong><\/h3>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">The following code demonstrates how I used Linux commands to determine the existing permissions set for a specific directory in the file system.<\/mark><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"468\" height=\"152\" src=\"https:\/\/shaynepatelcybersecurityportfolio.online\/wp-content\/uploads\/2024\/01\/image.png\" alt=\"\" class=\"wp-image-50\" style=\"width:682px;height:auto\" srcset=\"https:\/\/shaynepatelcybersecurityportfolio.online\/wp-content\/uploads\/2024\/01\/image.png 468w, https:\/\/shaynepatelcybersecurityportfolio.online\/wp-content\/uploads\/2024\/01\/image-300x97.png 300w\" sizes=\"auto, (max-width: 468px) 100vw, 468px\" \/><\/figure>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">The first line of the screenshot displays the command I entered, and the other lines display the output. The code lists all contents of the <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">projects<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"> directory. I used the ls command with the <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">-la<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"> option to display a detailed listing of the file contents that also returned hidden files. The output of my command indicates that there is one directory named <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">drafts<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">, one hidden file named <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">.project_x.txt<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">, and five other project files. The 10-character string in the first column represents the permissions set on each file or directory.<\/mark><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Describe the permissions string<\/strong><\/h3>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-7484b87cd847d47628f48b8d69f81e74\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">The 10-character string can be deconstructed to determine who is authorized to access the file and their specific permissions. The characters and what they represent are as follows:<\/mark><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"><strong>1st character<\/strong>: This character is either a <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">d<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"> or hyphen (<\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">&#8211;<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">) and indicates the file type. If it\u2019s a <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">d<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">, it\u2019s a directory. If it\u2019s a hyphen (<\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">&#8211;<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">), it\u2019s a regular file.<\/mark><\/li>\n\n\n\n<li><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"><strong>2nd-4th characters<\/strong>:<\/mark> <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">These characters indicate the read (<\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">r<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">), write (<\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">w<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">), and execute (<\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">x<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">) permissions for the user. When one of these characters is a hyphen (<\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">&#8211;<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">) instead, it indicates that this permission is not granted to the user.<\/mark><\/li>\n\n\n\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">5th-7th characters: <\/mark><\/strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">These characters indicate the read (<\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">r<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">), write (<\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">w<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">), and execute (<\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">x<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">) permissions for the group. When one of these characters is a hyphen (<\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">&#8211;<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">) instead, it indicates that this permission is not granted for the group.<\/mark><\/li>\n\n\n\n<li><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"><strong>8th-10th characters: <\/strong>These characters indicate the read (<\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">r<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">), write (<\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">w<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">), and execute (<\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">x<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">) permissions for other. This owner type consists of all other users on the system apart from the user and the group. When one of these characters is a hyphen (<\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">&#8211;<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">) instead, that indicates that this permission is not granted for other.<\/mark><\/li>\n<\/ul>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-f962c03e5f832803c9aa3ce62919f082\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">For example, the file permissions for <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">project_t.txt<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"> are <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">-rw-rw-r&#8211;<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">. Since the first character is a hyphen (<\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">&#8211;<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">), this indicates that <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">project_t.txt<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"> is a file, not a directory. The second, fifth, and eighth characters are all <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">r<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">, which indicates that user, group, and other all have read permissions. The third and sixth characters are <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">w<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">, which indicates that only the user and group have write permissions. No one has execute permissions for <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">project_t.txt<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">.<\/mark><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Change file permissions <\/strong><\/h3>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-f84db185134dac6330c5041febd8fc04\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">The organization determined that other shouldn&#8217;t have write access to any of their files. To comply with this, I referred to the file permissions that I previously returned. I determined <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">project_k.txt<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"> must have the write access removed for other.<\/mark><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-916c20ea9ae0457661bf575193202e0b\">The following code demonstrates how I used Linux commands to do this:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"468\" height=\"162\" src=\"https:\/\/shaynepatelcybersecurityportfolio.online\/wp-content\/uploads\/2024\/01\/image-1.png\" alt=\"\" class=\"wp-image-51\" style=\"width:747px;height:auto\" srcset=\"https:\/\/shaynepatelcybersecurityportfolio.online\/wp-content\/uploads\/2024\/01\/image-1.png 468w, https:\/\/shaynepatelcybersecurityportfolio.online\/wp-content\/uploads\/2024\/01\/image-1-300x104.png 300w\" sizes=\"auto, (max-width: 468px) 100vw, 468px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-2b4a9aeee9969b8f5cf508f0e7405e2b\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">The first two lines of the screenshot display the commands I entered, and the other lines display the output of the second command. The <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">chmod<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"> command changes the permissions on files and directories. The first argument indicates what permissions should be changed, and the second argument specifies the file or directory. In this example, I removed write permissions from other for the <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">project_k.txt<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"> file. After this, I used <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">ls -la<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"> to review the updates I made.<\/mark><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Change file permissions on a hidden file<\/strong><\/h3>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-6de1f89717b154209fdd11c92fd53bd4\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">The research team at my organization recently archived <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">project_x.txt<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">. They do not want anyone to have write access to this project, but the user and group should have read access.<\/mark><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-351b059470bd18ae728932a9bb3fc162\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">The following code demonstrates how I used Linux commands to change the permissions:<\/mark><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"468\" height=\"165\" src=\"https:\/\/shaynepatelcybersecurityportfolio.online\/wp-content\/uploads\/2024\/01\/image-2.png\" alt=\"\" class=\"wp-image-52\" style=\"width:758px;height:auto\" srcset=\"https:\/\/shaynepatelcybersecurityportfolio.online\/wp-content\/uploads\/2024\/01\/image-2.png 468w, https:\/\/shaynepatelcybersecurityportfolio.online\/wp-content\/uploads\/2024\/01\/image-2-300x106.png 300w\" sizes=\"auto, (max-width: 468px) 100vw, 468px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-ebbea6acdfacbf134e2b6a4a3d080563\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">The first two lines of the screenshot display the commands I entered, and the other lines display the output of the second command. I know <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">.project_x.txt<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"> is a hidden file because it starts with a period (<\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">.<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">). In this example, I removed write permissions from the user and group, and added read permissions to the group. I removed write permissions from the user with <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">u-w<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">. Then, I removed write permissions from the group with <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">g-w<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">, and added read permissions to the group with <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">g+r<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">.<\/mark><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Change directory permissions<\/strong><\/h3>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-8dccf9e8047d3105361dc3a7062cb5ed\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">My organization only wants the <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">researcher2<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"> user to have access to the <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">drafts<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"> directory and its contents. This means that no one other than <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">researcher2<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"> should have execute permissions.<\/mark><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-351b059470bd18ae728932a9bb3fc162\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">The following code demonstrates how I used Linux commands to change the permissions:<\/mark><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"468\" height=\"162\" src=\"https:\/\/shaynepatelcybersecurityportfolio.online\/wp-content\/uploads\/2024\/01\/image-3.png\" alt=\"\" class=\"wp-image-53\" style=\"width:756px;height:auto\" srcset=\"https:\/\/shaynepatelcybersecurityportfolio.online\/wp-content\/uploads\/2024\/01\/image-3.png 468w, https:\/\/shaynepatelcybersecurityportfolio.online\/wp-content\/uploads\/2024\/01\/image-3-300x104.png 300w\" sizes=\"auto, (max-width: 468px) 100vw, 468px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-d3eebc26d4fa111e4a35f22f37d5b5e8\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">The first two lines of the screenshot display the commands I entered, and the other lines display the output of the second command. I previously determined that the group had execute permissions, so I used the <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">chmod<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"> command to remove them. The <\/mark><mark style=\"background-color:#abb8c3\" class=\"has-inline-color has-black-color\">researcher2<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"> user already had execute permissions, so they did not need to be added.<\/mark><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Summary<\/strong><\/h3>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-2c58b1713f6d8ea9ac2b40f9de6f67c6\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">I changed multiple permissions to match the level of authorization my organization wanted for files and directories in the projects directory. The first step in this was using ls -la to check the permissions for the directory. This informed my decisions in the following steps. I then used the chmod command multiple times to change the permissions on files and directories.<\/mark><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This Linux project was when I was getting my Google&#8217;s Cybersecurity Certificate. The course had many hands on labs paired up with the content for learning&#8217;s. As you follow along, I&#8217;ll provide details at every section of the lab and the overview to begin with. Keep in mind, these labs were written as if I [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-48","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/shaynepatelcybersecurityportfolio.online\/index.php?rest_route=\/wp\/v2\/posts\/48","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shaynepatelcybersecurityportfolio.online\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shaynepatelcybersecurityportfolio.online\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shaynepatelcybersecurityportfolio.online\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shaynepatelcybersecurityportfolio.online\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=48"}],"version-history":[{"count":5,"href":"https:\/\/shaynepatelcybersecurityportfolio.online\/index.php?rest_route=\/wp\/v2\/posts\/48\/revisions"}],"predecessor-version":[{"id":58,"href":"https:\/\/shaynepatelcybersecurityportfolio.online\/index.php?rest_route=\/wp\/v2\/posts\/48\/revisions\/58"}],"wp:attachment":[{"href":"https:\/\/shaynepatelcybersecurityportfolio.online\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=48"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shaynepatelcybersecurityportfolio.online\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=48"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shaynepatelcybersecurityportfolio.online\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=48"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}