[OAUTH-WG] Weekly github digest (OAuth Activity Summary)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 03 March 2024 07:40 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC32BC14F6A2 for <oauth@ietfa.amsl.com>; Sat, 2 Mar 2024 23:40:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.705
X-Spam-Level:
X-Spam-Status: No, score=-6.705 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b="rkbMGHnr"; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b="pQp1l1p2"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nCiaKvoLuJgg for <oauth@ietfa.amsl.com>; Sat, 2 Mar 2024 23:40:15 -0800 (PST)
Received: from wfhigh8-smtp.messagingengine.com (wfhigh8-smtp.messagingengine.com [64.147.123.159]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 97CC3C14F6BE for <oauth@ietf.org>; Sat, 2 Mar 2024 23:39:51 -0800 (PST)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailfhigh.west.internal (Postfix) with ESMTP id 0915C18000C8 for <oauth@ietf.org>; Sun, 3 Mar 2024 02:39:45 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sun, 03 Mar 2024 02:39:46 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:content-type:date:from:from:in-reply-to :mime-version:reply-to:subject:subject:to:to; s=fm2; t= 1709451585; x=1709537985; bh=cAlTspbTcrmSq2ouvOgP70VAdfxg8lBPVxB Mz5DqyEw=; b=rkbMGHnrem08mucrHc8YRmWKCi+pEfxsglBgoicnk+oPaoOOufe DN/9Mbc2DtZvruwt0rjiWeGH7Ah917TMJzS6brOLmdGGO00HkQbpRyC3er7j0Uo0 lIL3BshaIerQNBdKe3Ew3E6HJFDYT2XTxKJbomZMCI3q+njgHUtfUNq9LhGeqKlG wHrOWcs3Hz4R5VNmDQNAffuD9ZmTOOdbIuZuMpiCKr7A68/AkXYxlVNB8CZtRT2O ip375dHnr7aLPJ6Zbk3l0E2V7LsYNf3olmRAV9xc3yzT5au8jIp65I3XXwavXSXy Qy1doil/AqZv9craJvpvfv9YNZStCGhJMwA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:content-type:date :feedback-id:feedback-id:from:from:in-reply-to:mime-version :reply-to:subject:subject:to:to:x-me-proxy:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm1; t=1709451585; x= 1709537985; bh=cAlTspbTcrmSq2ouvOgP70VAdfxg8lBPVxBMz5DqyEw=; b=p Qp1l1p2T71g8cidyCwjmfxUmiwahu188jbciHqrnrAVo+OHtLakqxJec6V4xmwgV yRqb22JyQsRHBbXvDMO6K+dAN/4yfTcnGRUUVNHD38p5WMG2VMwovLq9/YZ9e+dG i4wqJpHSAXgJN1THvIDqlyZx0zmMpcrZUYqt6Y2L8XUUiRKGtwLbENqqkBuxyR6F MDz08mwXLJ2E6QVcfvLrg5kDliJekjaeMWHCtwkLbPV2j9C+K4+j8RCOjd2Mio9b qj8aOaeyPQSbjXH1BIx6qM33lcbpZyT6ebMZH8M29dw8xEk8BUcDmvvpdv9NpAxe mnnzTXs5pTPTswWXc0hFg==
X-ME-Sender: <xms:QSnkZdmkLQ9377zdKO5Nw5oxw1j4yXfXjthUxWarnckN2xSVzP3OEA> <xme:QSnkZY1CjObhTTQDyxmpzwAhIQfFWxjo_eGftc5owdzKJnO799lJiwqJ_g77z9dDR fqm0HH41kUETuj5rw>
X-ME-Received: <xmr:QSnkZTpc38S1kbDw7q4phax6_61CGC2reVwPj0HU_YiY9VzCNNI-JUd8aSiS_9-RIN9rgsri_nt03wyDnaVsgxlHdwDz90d6MzQ3zMOinCGaGRiSV-3wwM2njvhUwOZAPZksfg>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvledrheeggddutdekucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucfpohcuuggrthgvuchfihgvlhguucdlgeelmdenuc fjughrpegtggfhvffusegrtddtredttdejnecuhfhrohhmpeftvghpohhsihhtohhrhicu tegtthhivhhithihucfuuhhmmhgrrhihuceuohhtuceoughopghnohhtpghrvghplhihse hmnhhothdrnhgvtheqnecuggftrfgrthhtvghrnhepkeefvdduteejvdefkeehieevuefg fefhteetveegffekffefteffvdelheduieetnecuffhomhgrihhnpehgihhthhhusgdrtg homhenucevlhhushhtvghrufhiiigvpedvnecurfgrrhgrmhepmhgrihhlfhhrohhmpegu ohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:QSnkZdnMURZM31YjyeN4NY_XE5u6hZxVKAjRsJUBYABDSyQs58_3ag> <xmx:QSnkZb3yLkFY4BpUamg9dOMlBgbL8iodyIk-MOHcWyfQzVNonAk9xw> <xmx:QSnkZcvENRygsIwW0NTBYeSvpUAGR464AjAai7xEXxBIU5x1FTDEgQ> <xmx:QSnkZU86eix_AysXJkB-O-3IXVwEIs1xNoB78c_ymVqiM9cJhJxF2NutlkE>
Feedback-ID: i1c3946f2:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <oauth@ietf.org>; Sun, 3 Mar 2024 02:39:45 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============6226010852029140985=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: oauth@ietf.org
Message-Id: <20240303073951.97CC3C14F6BE@ietfa.amsl.com>
Date: Sat, 02 Mar 2024 23:39:51 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/ZZ4_wR4FUL4wQi4wwmWvJDi8b9I>
Subject: [OAUTH-WG] Weekly github digest (OAuth Activity Summary)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Mar 2024 07:40:20 -0000



Events without label "editorial"

Issues
------
* oauth-wg/oauth-browser-based-apps (+0/-1/šŸ’¬1)
  1 issues received 1 new comments:
  - #35 Follow up on review for merged PR (1 by aaronpk)
    https://github.com/oauth-wg/oauth-browser-based-apps/issues/35 

  1 issues closed:
  - Follow up on review for merged PR https://github.com/oauth-wg/oauth-browser-based-apps/issues/35 

* oauth-wg/oauth-identity-chaining (+2/-0/šŸ’¬4)
  2 issues created:
  - Recommended media type for JWT Authorization Grant (by aaronpk)
    https://github.com/oauth-wg/oauth-identity-chaining/issues/85 
  - How does the AS know it should generate a JWT Authorization Grant formatted token? (by gffletch)
    https://github.com/oauth-wg/oauth-identity-chaining/issues/84 

  3 issues received 4 new comments:
  - #85 Recommended media type for JWT Authorization Grant (1 by bc-pi)
    https://github.com/oauth-wg/oauth-identity-chaining/issues/85 
  - #84 How does the AS know it should generate a JWT Authorization Grant formatted token? (2 by aaronpk, bc-pi)
    https://github.com/oauth-wg/oauth-identity-chaining/issues/84 
  - #79 Should we allow identity chaining with DPoP tokens? (1 by kburgin3)
    https://github.com/oauth-wg/oauth-identity-chaining/issues/79 

* oauth-wg/oauth-sd-jwt-vc (+1/-1/šŸ’¬8)
  1 issues created:
  - the wallet finding the user claims in the credential (by Sakurann)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/215 

  3 issues received 8 new comments:
  - #215 the wallet finding the user claims in the credential (1 by bc-pi)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/215 
  - #205 defining how DID can be used as user's indetifier (6 by awoie, cre8, paulbastian)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/205 
  - #191 Double check the spec that MAC is not prohibited (1 by bc-pi)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/191 [NEEDS PR] 

  1 issues closed:
  - Consider making cnf optional https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/196 

* oauth-wg/oauth-cross-device-security (+0/-4/šŸ’¬3)
  3 issues received 3 new comments:
  - #118 Add references to VC Presentation specs (1 by PieterKas)
    https://github.com/oauth-wg/oauth-cross-device-security/issues/118 
  - #116 More concrete normative requirements (1 by PieterKas)
    https://github.com/oauth-wg/oauth-cross-device-security/issues/116 
  - #100 Reference ISO mdl (1 by danielfett)
    https://github.com/oauth-wg/oauth-cross-device-security/issues/100 

  4 issues closed:
  - More concrete normative requirements https://github.com/oauth-wg/oauth-cross-device-security/issues/116 
  - Reference ISO mdl https://github.com/oauth-wg/oauth-cross-device-security/issues/100 
  - Add references to VC Presentation specs https://github.com/oauth-wg/oauth-cross-device-security/issues/118 
  - Rewrite formal analysis section https://github.com/oauth-wg/oauth-cross-device-security/issues/97 

* oauth-wg/oauth-selective-disclosure-jwt (+1/-3/šŸ’¬2)
  1 issues created:
  - disclosing age_equal_or_over not working (by bc-pi)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/409 

  2 issues received 2 new comments:
  - #393 Provide ABNF (1 by Sakurann)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/393 
  - #383 Remove mention of unspecified key binding methods (1 by bc-pi)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/383 [has-PR] 

  3 issues closed:
  - Change how VC formats are described https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/341 [has-PR] 
  - Audacious Presentations https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/395 [pending-close] 
  - Remove mention of unspecified key binding methods https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/383 [has-PR] 

* oauth-wg/oauth-v2-1 (+4/-0/šŸ’¬0)
  4 issues created:
  - Handling of colliding URI query parameter names (by SECtim)
    https://github.com/oauth-wg/oauth-v2-1/issues/171 
  - Ambigious text around whether `code_challenge` is required (by SECtim)
    https://github.com/oauth-wg/oauth-v2-1/issues/170 
  - Terminology: "relying party" vs. "client" (by SECtim)
    https://github.com/oauth-wg/oauth-v2-1/issues/169 
  - "Suprising" printing service example in introduction (by SECtim)
    https://github.com/oauth-wg/oauth-v2-1/issues/168 



Pull requests
-------------
* oauth-wg/oauth-browser-based-apps (+1/-1/šŸ’¬1)
  1 pull requests submitted:
  - Reworded text based on PR comments (by philippederyck)
    https://github.com/oauth-wg/oauth-browser-based-apps/pull/39 

  1 pull requests received 1 new comments:
  - #39 Reworded text based on PR comments (1 by aaronpk)
    https://github.com/oauth-wg/oauth-browser-based-apps/pull/39 

  1 pull requests merged:
  - Reworded text based on PR comments
    https://github.com/oauth-wg/oauth-browser-based-apps/pull/39 

* oauth-wg/oauth-sd-jwt-vc (+2/-2/šŸ’¬6)
  2 pull requests submitted:
  - Include disclosure of age_equal_or_over/18 in the PID example (by bc-pi)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/216 
  - Add PID example (by danielfett)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/214 

  3 pull requests received 6 new comments:
  - #214 Add PID example (2 by bc-pi)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/214 
  - #213 Clarify the optionality of the cnf claim (3 by awoie, bc-pi)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/213 
  - #170 Adding examples for ARF/mDL, fixes #144 (1 by danielfett)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/170 [DO NOT MERGE] 

  2 pull requests merged:
  - Add PID example
    https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/214 
  - Clarify the optionality of the cnf claim
    https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/213 

* oauth-wg/oauth-cross-device-security (+0/-3/šŸ’¬1)
  1 pull requests received 1 new comments:
  - #119 Added reference for Verifiable Credential Presentation to section 4 (1 by PieterKas)
    https://github.com/oauth-wg/oauth-cross-device-security/pull/119 

  3 pull requests merged:
  - Rewriting the formal methods section
    https://github.com/oauth-wg/oauth-cross-device-security/pull/98 
  - Provide actionable guidance on how to use this document
    https://github.com/oauth-wg/oauth-cross-device-security/pull/117 
  - Added reference for Verifiable Credential Presentation to section 4
    https://github.com/oauth-wg/oauth-cross-device-security/pull/119 

* oauth-wg/oauth-selective-disclosure-jwt (+6/-4/šŸ’¬5)
  6 pull requests submitted:
  - Fix PID example's age disclosure (by bc-pi)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/411 
  - more consistent treatment of a Disclosure vs its contents (by bc-pi)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/410 
  - Fix the PID example (by danielfett)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/408 
  - Update PID example (by danielfett)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/407 
  - doc: add owf sd-jwt typescript package (by lukasjhan)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/406 
  - be more explicit that VC examples do not define anything (by bc-pi)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/405 

  2 pull requests received 5 new comments:
  - #405 be more explicit that VC examples do not define anything (4 by Sakurann, bc-pi)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/405 
  - #394 Distinguish SD-JWT from SD-JWT+KB (1 by bc-pi)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/394 

  4 pull requests merged:
  - be more explicit that VC examples do not define anything
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/405 
  - Remove mention of unspecified key binding methods
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/404 
  - doc: add owf sd-jwt typescript package
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/406 
  - Update PID example
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/407 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/oauth-wg/oauth-browser-based-apps
* https://github.com/oauth-wg/oauth-identity-chaining
* https://github.com/oauth-wg/oauth-transaction-tokens
* https://github.com/oauth-wg/oauth-sd-jwt-vc
* https://github.com/oauth-wg/draft-ietf-oauth-resource-metadata
* https://github.com/oauth-wg/oauth-cross-device-security
* https://github.com/oauth-wg/oauth-selective-disclosure-jwt
* https://github.com/oauth-wg/oauth-v2-1