[OAUTH-WG] Weekly github digest (OAuth Activity Summary)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 17 March 2024 09:01 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C79BC151082 for <oauth@ietfa.amsl.com>; Sun, 17 Mar 2024 02:01:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.705
X-Spam-Level:
X-Spam-Status: No, score=-6.705 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b="sBDf9W8I"; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b="sKmu7jYJ"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id owyMH1AKPXJI for <oauth@ietfa.amsl.com>; Sun, 17 Mar 2024 02:01:35 -0700 (PDT)
Received: from flow3-smtp.messagingengine.com (flow3-smtp.messagingengine.com [103.168.172.138]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0FEFEC14F601 for <oauth@ietf.org>; Sun, 17 Mar 2024 02:01:23 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailflow.nyi.internal (Postfix) with ESMTP id 7DEFE200258 for <oauth@ietf.org>; Sun, 17 Mar 2024 03:40:01 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sun, 17 Mar 2024 03:40:01 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:content-type:date:from:from:in-reply-to :mime-version:reply-to:subject:subject:to:to; s=fm3; t= 1710661201; x=1710668401; bh=sTrpNCji37R7ayOnOLiZI150thhQMLZigup SD6mM3zc=; b=sBDf9W8IpEWFvJ+OJ1iQWCM1xuvi0p0/DJOMzkUlzN/KR6paFSt QJuM/MoLpFkH5YnEdc+PUNSNolQRW/O9oMTEbkn8c6TysUAsJqMdXzOUtVyS1lcp Rp4vVI8WGxLRuP7c6OIfHE6slIO+p21WKFCH3v+TDo0t1nK7QvsPT5UX28xgCCE/ qiKEXUJAJUrC34XdNZ6Lri+uc6UP8wiVo9UlltHeJoHt+dZ3GIWFrP3sdRebgrHq kfVGXgibvHen7IyqzfnkgtUDP8MiWtDTIXA3KJ13zfVyYgJzKEiCE8vPCOvQhPgX yZrY4OKvjnia4nAfmbhir6m/NktT9nmelxA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:content-type:date :feedback-id:feedback-id:from:from:in-reply-to:mime-version :reply-to:subject:subject:to:to:x-me-proxy:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm2; t=1710661201; x= 1710668401; bh=sTrpNCji37R7ayOnOLiZI150thhQMLZigupSD6mM3zc=; b=s Kmu7jYJIN9W2lEy3G6/BksdQkN19bvZ+2SxZoyR3tdolHgMCrcKzVfuWw6iReU46 fy3JwP9vOly9qd2pVgNYBRxHh6Jm452j7BlDKhhSJ5EPDls8Ch6eyF6Q/X25Fwi7 iP7193km3bc43VuJTjveqe1rMSBJXtdT3PcCIg5zoYqzTfSorIGA/FEAiXj6Hrfq hMVDCzvHZbrEhcr43CwgV3ggSab48rX12h8KivETlC1m5ksPWr3JUoadw1RUgISZ R11LjtnAR1QGZwhABVfyBzrqgdKRlcSHpuEY6qo02fsCK74qLQsMCA429enb2mhV yNMMHRH9p0OvBC753HK8A==
X-ME-Sender: <xms:UZ72ZYRFxprnPMl_akFVBUfvIA86oVM-plNnHc4JXupkxhzxdy_Kpg> <xme:UZ72ZVxNht6h38FheV8qj9KLB6NbYHm8_sCoXlWTcYZWISFj_Zk5XwlSUTpx7EoAs FjYjmadJomcMhg_Bg>
X-ME-Received: <xmr:UZ72ZV3w33iXY6Ebwq6E7Wqnw_dRj6aIa2V1jnObIASUIG9ZgqiDq7LqD9HUUg>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvledrkeefgdduuddvucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucfpohcuuggrthgvuchfihgvlhguucdlgeelmdenog frhhhishhhihhnghdqifegvdehqdduuddtucdlfedttddmnecujfgurheptggghffvufes rgdttdertddtjeenucfhrhhomheptfgvphhoshhithhorhihucettghtihhvihhthicuuf humhhmrghrhicuuehothcuoeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeen ucggtffrrghtthgvrhhnpeehhedtteejtdehleeghedvteeghffgkefgtddvhfffjeehje dvvdfgveevueehtdenucffohhmrghinhepghhithhhuhgsrdgtohhmpdhgihhthhhusgdr uggvvhenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpe guohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:UZ72ZcBR7CmWORa6S06aKIOuU_2sgTOXx20VnVag9AiqgaTpuRC2BQ> <xmx:UZ72ZRgTVUSOLXJGaQdzM0aLknt9baLZJ7Dd-nyp0wQ7i16j6_hecw> <xmx:UZ72ZYpNZ3IY5EzhTS0T7jJIwHnmEA_MnVpvDwXlLMmPacEdFM8KRw> <xmx:UZ72ZUiRex9i_jk8ddYuGvmJOuVEmvPxMtOKCTEBO5-5uTj_9piCKQ> <xmx:UZ72ZRbVU1oUNGxm3iJi4yr5QP8xuiVvN74IiTgNzFh0lOBXlnFH-gH9BuU>
Feedback-ID: i1c3946f2:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <oauth@ietf.org>; Sun, 17 Mar 2024 03:40:01 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============5142044006677198209=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: oauth@ietf.org
Message-Id: <20240317090135.0FEFEC14F601@ietfa.amsl.com>
Date: Sun, 17 Mar 2024 02:01:23 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/7yvmRIJO2yN8kNIetuxPmLqdXkc>
Subject: [OAUTH-WG] Weekly github digest (OAuth Activity Summary)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Mar 2024 09:01:41 -0000



Events without label "editorial"

Issues
------
* oauth-wg/oauth-sd-jwt-vc (+0/-2/💬9)
  8 issues received 9 new comments:
  - #215 the wallet finding the user claims in the credential (2 by awoie)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/215 
  - #205 defining how DID can be used as user's indetifier (1 by awoie)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/205 
  - #194 Add output example (1 by bc-pi)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/194 [NEEDS PR] [wg-04] 
  - #192 Should `status` be a JWT header? (1 by awoie)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/192 [discuss] 
  - #191 Double check the spec that MAC is not prohibited (1 by awoie)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/191 [NEEDS PR] 
  - #144 examples for ARF. (1 by awoie)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/144 [wg-04] 
  - #121 Is the following a valid SD-JWT-VC or how can it be mapped to the SD-JWT-VC? (1 by awoie)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/121 [question] 
  - #114 Provide W3C VCDM transformation algorithm (1 by awoie)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/114 [discuss] 

  2 issues closed:
  - example for key binding https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/218 
  - Should `status` be a JWT header? https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/192 [discuss] 

* oauth-wg/oauth-cross-device-security (+1/-1/💬0)
  1 issues created:
  - Correct typo in Best Practices Section (by PieterKas)
    https://github.com/oauth-wg/oauth-cross-device-security/issues/120 

  1 issues closed:
  - Correct typo in Best Practices Section https://github.com/oauth-wg/oauth-cross-device-security/issues/120 



Pull requests
-------------
* oauth-wg/oauth-sd-jwt-vc (+2/-1/💬2)
  2 pull requests submitted:
  - feat: add SD-JWT VC Type Metadata based on https://github.dev/vcstu… (by awoie)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/220 
  - doc: improve description for a example of Key Binding JWT (by lukasjhan)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/219 

  1 pull requests received 2 new comments:
  - #219 doc: improve description for a example of Key Binding JWT (2 by bc-pi, lukasjhan)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/219 

  1 pull requests merged:
  - doc: improve description for a example of Key Binding JWT
    https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/219 

* oauth-wg/oauth-cross-device-security (+1/-1/💬0)
  1 pull requests submitted:
  - Corrected Typo (by PieterKas)
    https://github.com/oauth-wg/oauth-cross-device-security/pull/121 

  1 pull requests merged:
  - Corrected Typo
    https://github.com/oauth-wg/oauth-cross-device-security/pull/121 

* oauth-wg/oauth-selective-disclosure-jwt (+1/-1/💬1)
  1 pull requests submitted:
  - Add Kotlin & Swift implementations from EUDIW (by babisRoutis)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/415 

  1 pull requests received 1 new comments:
  - #414 Rework JSON Serialization section (1 by danielfett)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/414 

  1 pull requests merged:
  - Add Kotlin & Swift implementations from EUDIW
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/415 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/oauth-wg/oauth-browser-based-apps
* https://github.com/oauth-wg/oauth-identity-chaining
* https://github.com/oauth-wg/oauth-transaction-tokens
* https://github.com/oauth-wg/oauth-sd-jwt-vc
* https://github.com/oauth-wg/draft-ietf-oauth-resource-metadata
* https://github.com/oauth-wg/oauth-cross-device-security
* https://github.com/oauth-wg/oauth-selective-disclosure-jwt
* https://github.com/oauth-wg/oauth-v2-1