[OAUTH-WG] Weekly github digest (OAuth Activity Summary)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 27 October 2024 07:46 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A4A6C14F5ED for <oauth@ietfa.amsl.com>; Sun, 27 Oct 2024 00:46:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.705
X-Spam-Level:
X-Spam-Status: No, score=-1.705 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b="R8QtrWTp"; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b="hzAph7+u"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vRt1mWBpiV1P for <oauth@ietfa.amsl.com>; Sun, 27 Oct 2024 00:46:12 -0700 (PDT)
Received: from fhigh-a5-smtp.messagingengine.com (fhigh-a5-smtp.messagingengine.com [103.168.172.156]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D59C2C14F706 for <oauth@ietf.org>; Sun, 27 Oct 2024 00:46:11 -0700 (PDT)
Received: from phl-compute-01.internal (phl-compute-01.phl.internal [10.202.2.41]) by mailfhigh.phl.internal (Postfix) with ESMTP id 4E6BC114013A for <oauth@ietf.org>; Sun, 27 Oct 2024 03:39:54 -0400 (EDT)
Received: from phl-mailfrontend-02 ([10.202.2.163]) by phl-compute-01.internal (MEProxy); Sun, 27 Oct 2024 03:39:54 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:content-type:date:from:from:in-reply-to :mime-version:reply-to:subject:subject:to:to; s=fm1; t= 1730014794; x=1730101194; bh=LK+Sf8WwNeAet5FrqXABIJ3SDKBtRNwyDf3 e/oCPqwA=; b=R8QtrWTpsjW3MC7/xUVnRahV0TBc28SC5PNXNbwHBlsKJlPZJkp to0ViL7J2VAvAbfBuaOxR41AM6upQKYx1KGbwMixS7zZkxgtSkuQ/p3V2v/y1ocP xGFZGOucW2z41eA0EXDZTiDLeektqisY+eZQHRnqUm6ImCPdgFSGHGdhydUqiaTN 2LjrN5PELrsqWisHPmonkewZYSt7VXmCn8hidgCbR4qq3ZwXp9nyNa5VoYpcmn/4 Eb+YJK9ksxdYQ+3Hopj8OqjjSpVCQQoj6vRgzLpVbJCynRMW1QDqg2lur/6AKrW9 EooucDbX71XBCF4XiBHHRFpND3Fs6sy2eQQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:content-type:date :feedback-id:feedback-id:from:from:in-reply-to:mime-version :reply-to:subject:subject:to:to:x-me-proxy:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm3; t=1730014794; x= 1730101194; bh=LK+Sf8WwNeAet5FrqXABIJ3SDKBtRNwyDf3e/oCPqwA=; b=h zAph7+uEkGITen5QJrZofroBSSZFv74EtTksLLTHAW7Pnv56ElqKs9Mq/NGgz79c a8hrqpksQWBkp82xr2p/se/cmfzLmW2ESyVOdsJC+iv8chxk/sFT7kXt0SKO227t /sholopff/CxoB5BtjGYaw/WRThfBsaalHtdsmKOsiIaDWI2MaNiWZLylN0KyxxX 5+576+UA1QA/KJmb9kkBx2Zpq3izW7dzY/ws56iyldkZ0UGaLSTN7M8agA+mT63c V6OIJ9/4S4pCsRfkzRAlbCyfMcdo8E/bkkCJzSPPbdcSn2datPsee0QcUBewwByX j55kH7N8JuSbDQ37WZ0Pw==
X-ME-Sender: <xms:Su4dZzT4BKZTb-t_qWAQAJgQXBw4In6loHEEDQ9rXKWE-QZv5IoCnA> <xme:Su4dZ0yCAlcIj7DROJohojSfSQ5EBW4Qu8OiL1SdABQvZrBQiORHv6DKAj9AkhrPR s8sFRF5WqNHQXIJfw>
X-ME-Received: <xmr:Su4dZ40akkqjj1kDkPIvbm0JDKnYPc8VZf0ahzSwPBuDRAg1FNIkfCmsWT8TN_nJ0YsikShxDshw9XistFgVAeC4gOIwX2C86O4k_2eZRA2mZVTgSkuESxsOaJzvukF07mVfdQI>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeeftddrvdejhedguddvfecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpggftfghnshhusghstghrihgsvgdp uffrtefokffrpgfnqfghnecuuegrihhlohhuthemuceftddtnecupfhoucgurghtvgcufh hivghlugculdegledmnecujfgurheptggghffvufesrgdttdertddtjeenucfhrhhomhep tfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicuuehothcuoeguoh gpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucggtffrrghtthgvrhhnpeekfedv udetjedvfeekheeiveeugfefhfetteevgeffkefffeetffdvleehudeiteenucffohhmrg hinhepghhithhhuhgsrdgtohhmnecuvehluhhsthgvrhfuihiivgepudenucfrrghrrghm pehmrghilhhfrhhomhepughopghnohhtpghrvghplhihsehmnhhothdrnhgvthdpnhgspg hrtghpthhtohepuddpmhhouggvpehsmhhtphhouhhtpdhrtghpthhtohepohgruhhthhes ihgvthhfrdhorhhg
X-ME-Proxy: <xmx:Su4dZzBo7wh98Rr7SgK7p6bZudKaaVZoTMTYvSAbrnOKaiMvdHGYRQ> <xmx:Su4dZ8hADs4KHa7grgsKfcN1ucrov4QDHCAPenzWQMlGKdVF6uF-Yg> <xmx:Su4dZ3rhizOde91hySSWtGV8J7W-4PcckdDzDmh3279IjyglqU4Tlw> <xmx:Su4dZ3guOLrnBXYwVlJoaLiP8S3oIeBZTEKaf2CgXReuOZh5E6UyBA> <xmx:Su4dZ_uexbstb8Tp9DULXBGJGT3trEv23sNhGLuXGHx8cfTKmnU-_6BG>
Feedback-ID: i1c3946f2:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <oauth@ietf.org>; Sun, 27 Oct 2024 03:39:53 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============8700677087763484288=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: oauth@ietf.org
Message-Id: <20241027074611.D59C2C14F706@ietfa.amsl.com>
Date: Sun, 27 Oct 2024 00:46:11 -0700
Message-ID-Hash: UYJDYRBXSJLM5PPI3NZH2RK3D55KASEP
X-Message-ID-Hash: UYJDYRBXSJLM5PPI3NZH2RK3D55KASEP
X-MailFrom: do_not_reply@mnot.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [OAUTH-WG] Weekly github digest (OAuth Activity Summary)
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/s3XCYmfcPSam4NhiF__E-0Dc0kE>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>



Events without label "editorial"

Issues
------
* oauth-wg/oauth-transaction-tokens (+0/-1/💬1)
  1 issues received 1 new comments:
  - #131 Can a sub_id change? (1 by gffletch)
    https://github.com/oauth-wg/oauth-transaction-tokens/issues/131 

  1 issues closed:
  - Authentication mechanisms https://github.com/oauth-wg/oauth-transaction-tokens/issues/135 

* oauth-wg/draft-ietf-oauth-status-list (+2/-6/💬0)
  2 issues created:
  - Rewrite introduction (by c2bo)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/189 
  - Define Status List Response status code (by c2bo)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/188 

  6 issues closed:
  - Support an optional feature for historical resolution https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/138 [feature] [ready-for-pr] 
  - Be more elaborate on CBOR/CWT types and definitions https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/145 [ready-for-pr] 
  - Add Reserved For Private Use Range https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/181 
  - Missing IANA section for status types https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/177 [ready-for-pr] 
  - Explain Status List Provider and other roles in the introduction https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/158 [ready-for-pr] 
  - Relax constraint on not allowing MAC for Status List Token? https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/111 [ready-for-pr] 

* oauth-wg/draft-ietf-oauth-attestation-based-client-auth (+1/-7/💬0)
  1 issues created:
  - Remove backslash for line wrapping from examples (by c2bo)
    https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/89 [discuss] 

  7 issues closed:
  - Delete key attestation example from the Annex https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/88 
  - Add required typ values for the client-attestation and client-attestation-pop in line with JWT BCP https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/72 [ready-for-pr] 
  - typ values for Client Attestation JWT and Client Attestation PoP JWT https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/30 
  - IETF 118: Refer / Explain relation to RATS and the RATS terminology https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/60 [ready-for-pr] 
  - extend use beyond authorization servers https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/46 
  - Explicitly state the client attestation mechanism can be used at other endpoints such as PAR https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/76 [ready-for-pr] 
  - Restructure sections for presentation of attestation https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/86 [ready-for-pr] 



Pull requests
-------------
* oauth-wg/oauth-transaction-tokens (+0/-2/💬0)
  2 pull requests merged:
  - Updated Mutual Authentication Guidance
    https://github.com/oauth-wg/oauth-transaction-tokens/pull/142 
  - Update Transaction Token Service responsibility for replacement tokens #110
    https://github.com/oauth-wg/oauth-transaction-tokens/pull/147 

* oauth-wg/oauth-selective-disclosure-jwt (+1/-0/💬1)
  1 pull requests submitted:
  - Address Denis' comments (by danielfett)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/481 

  1 pull requests received 1 new comments:
  - #481 Address Denis' comments (1 by bc-pi)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/481 

* oauth-wg/draft-ietf-oauth-status-list (+3/-5/💬3)
  3 pull requests submitted:
  - Status Issuer and Status Provider role description to the introductio… (by paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/187 
  - improve section on Status Types and introduce IANA registry for it (by paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/186 
  - remove constraint that Status List Token must not use a MAC (by paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/185 

  2 pull requests received 3 new comments:
  - #184 fix: update cwt claim definitions (2 by paulbastian, tplooker)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/184 
  - #178 add optional support for historical status resolution (1 by c2bo)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/178 

  5 pull requests merged:
  - add optional support for historical status resolution
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/178 
  - fix: update cwt claim definitions
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/184 
  - improve section on Status Types and introduce IANA registry for it
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/186 
  - Status Issuer and Status Provider role description to the introductio…
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/187 
  - remove constraint that Status List Token must not use a MAC
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/185 

* oauth-wg/draft-ietf-oauth-attestation-based-client-auth (+4/-4/💬3)
  4 pull requests submitted:
  - remove annex as key attestations are moved out of scope  for now (by paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/93 
  - add typ values (by paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/92 
  - add RATS relation (by paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/91 
  - Restructure text and add alternative representation (by c2bo)
    https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/90 

  3 pull requests received 3 new comments:
  - #93 remove annex as key attestations are moved out of scope  for now (1 by paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/93 
  - #92 add typ values (1 by c2bo)
    https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/92 
  - #90 Restructure text and add alternative representation (1 by c2bo)
    https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/90 

  4 pull requests merged:
  - remove annex as key attestations are moved out of scope  for now
    https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/93 
  - add typ values
    https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/92 
  - add RATS relation
    https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/91 
  - Restructure text and add alternative representation
    https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/90 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/oauth-wg/oauth-browser-based-apps
* https://github.com/oauth-wg/oauth-identity-chaining
* https://github.com/oauth-wg/oauth-transaction-tokens
* https://github.com/oauth-wg/oauth-sd-jwt-vc
* https://github.com/oauth-wg/draft-ietf-oauth-resource-metadata
* https://github.com/oauth-wg/oauth-cross-device-security
* https://github.com/oauth-wg/oauth-selective-disclosure-jwt
* https://github.com/oauth-wg/oauth-v2-1
* https://github.com/oauth-wg/draft-ietf-oauth-status-list
* https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth