[GNAP] Weekly github digest (GNAP Weekly GitHub Activity Summary)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 01 August 2021 08:31 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: txauth@ietfa.amsl.com
Delivered-To: txauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A9913A3249 for <txauth@ietfa.amsl.com>; Sun, 1 Aug 2021 01:31:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=LvygFV/E; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=AZ/M0QCj
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wzaRxulBLCjn for <txauth@ietfa.amsl.com>; Sun, 1 Aug 2021 01:31:09 -0700 (PDT)
Received: from wout1-smtp.messagingengine.com (wout1-smtp.messagingengine.com [64.147.123.24]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DB4D63A3247 for <txauth@ietf.org>; Sun, 1 Aug 2021 01:31:08 -0700 (PDT)
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailout.west.internal (Postfix) with ESMTP id 47BBF320084E for <txauth@ietf.org>; Sun, 1 Aug 2021 03:34:45 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162]) by compute3.internal (MEProxy); Sun, 01 Aug 2021 03:34:45 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject; s=fm3; bh=bz3JcXT7jL5 2G6H24xoirlAqdn522ob4lX4UQ/oZTWw=; b=LvygFV/EDbVy1P9A3/MD1v4TQ5m lzi3oQ/v6sJXoSQk+Aob8dYZvPEFnQ4EHHOFQ5FM26aa/N09aLxYxejm1GS91QVg gFmMN7XxXQXa09nnaxCdjI1CyckTF+cJcHHntt7wuR7Kd3vvxcPXTjG9OuPESyDC 3fo3vKy7wuAJYDFtoW0eQRcib60FtmoCQkUcNng+L+Uxo6PKYGjG52+FS8k0PVXL yt3FU+uYJ3VMDiX6iYPW5BaTAO1/RpLk1M//9jZO4Jf+4jToKfjk78D4lQXUyrbw C+2GP74pELaX/lT5QVryoojzF5h5qiDIOBl0JP5EQ0nndAqxn2dHjnqfLjg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:from:mime-version:subject:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm3; bh=bz3JcXT7jL52G6H24xoirlAqdn522ob4lX4UQ/oZTWw=; b=AZ/M0QCj AZdNmSinzp4ZNRrzkqGY4yNnjVrI+akfO1Cb6zUMcVaa5Jh7gbLRLA5Et5ivX/RY XajnAeRtr/78iduU5ThUd9spB16aKiPNTa19PYHtodkuuTPznojqQ9LFrQ2iv0u6 7CDMAjlsVm8aCntszr0aP+TccYEVvE32aVy8qlkzYYmFun1CpYa5ZdcFdYZxW31B pu6paKrWMDE9i49PfyvAk8+r9ANR0bp4CMrFo2EQi7WqokF6z6X5MLV9bastoJ9R tSuOwaELZ6SLgsKxlXZyKzT2bbjlABOkpEKkBZ+jJpvpwmNqoFjqMmu7EgnhHgfn mrEhgfqtvsw6Uw==
X-ME-Sender: <xms:k04GYTXuNNU5vRNk9c2ZPYKKYO_RaC8Zz9ai8SN0qoXoj-AcYDE7ng> <xme:k04GYbkmXyxOUwQYMw-aqlMaoO9r5v0s27IqyHi1Qd8YDEdr67rIvyX5_J4aAUUNV 4ACdXYd17hwDknicw>
X-ME-Received: <xmr:k04GYfYKOnlhZTatnMg1KYpUDC2srZQI6Pb8GxJE5PAwELmjHdS7ryuWSxuSIxN96sg4mE8zLj2kJIOQ7y6_AlryoxjVVkcZOFqlpQGidp4fqncFZP5HoAE9RroACDoP1A>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvtddrheelgddugecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecupfhoucgurghtvgcufhhivghlugculdegledmnecujf gurheptggghffvufesrgdttdertddtjeenucfhrhhomheptfgvphhoshhithhorhihucet tghtihhvihhthicuufhumhhmrghrhicuuehothcuoeguohgpnhhothgprhgvphhlhiesmh hnohhtrdhnvghtqeenucggtffrrghtthgvrhhnpeekfedvudetjedvfeekheeiveeugfef hfetteevgeffkefffeetffdvleehudeiteenucffohhmrghinhepghhithhhuhgsrdgtoh hmnecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomhepugho pghnohhtpghrvghplhihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:k04GYeUaO3dkbU0PqFtM1JagS1tWWq9kLVzehJvoFmvI7c1oAjB1yQ> <xmx:k04GYdn1s3vLgPhq7lejvKbGWUV6lAgPmQNREutURVXVUUsH9DiLsA> <xmx:k04GYbc_c61ZakslqkShMThQzrGTjzMWmwCvMPqTs-yLhQG71X9AoA> <xmx:lE4GYSyFDMRf9fRQQcg3Wijomuoiy7TOK8BmHKGlEhW0NkxghVVHDg>
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <txauth@ietf.org>; Sun, 1 Aug 2021 03:34:43 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============1680938252125354846=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: txauth@ietf.org
Message-Id: <20210801083108.DB4D63A3247@ietfa.amsl.com>
Date: Sun, 01 Aug 2021 01:31:08 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/txauth/mnfqL4G7gtwNAspWQhFbWQ42fx0>
Subject: [GNAP] Weekly github digest (GNAP Weekly GitHub Activity Summary)
X-BeenThere: txauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: GNAP <txauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/txauth>, <mailto:txauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/txauth/>
List-Post: <mailto:txauth@ietf.org>
List-Help: <mailto:txauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/txauth>, <mailto:txauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Aug 2021 08:31:15 -0000



Events without label "editorial"

Issues
------
* ietf-wg-gnap/core-protocol (+4/-3/💬98)
  4 issues created:
  - Trust relationships for a model using TLS and no client instance keys (by Denisthemalice)
    https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/301 
  - Editorial: references in running text (by yaronf)
    https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/300 
  - Why do we even support symmetric keys? (by yaronf)
    https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/299 
  - Untrusted security-critical information from the Client (by yaronf)
    https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/298 

  9 issues received 98 new comments:
  - #299 Why do we even support symmetric keys? (4 by agropper, fimbault, jricher, yaronf)
    https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/299 
  - #298 Untrusted security-critical information from the Client (2 by jricher, yaronf)
    https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/298 
  - #295   In practice, only rights are supported but attributes should also be supported (2 by Denisthemalice, fimbault)
    https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/295 
  - #292 Does a client instance really need to be identified by a unique key ? (51 by Denisthemalice, aaronpk, agropper, fimbault, jricher)
    https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/292 
  - #290 Checks needed to defeat user collaborative attacks are unfortunately out of the scope of the document (35 by Denisthemalice, aaronpk, fimbault, jricher)
    https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/290 
  - #288 Since both rights and resource locations must be disclosed to the AS, the AS can act as Big Brother (1 by fimbault)
    https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/288 
  - #113 Applicability of OAuth PoP (1 by jricher)
    https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/113 
  - #112 Use of OAuth PoP without access tokens (1 by jricher)
    https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/112 
  - #68 Syntax for single and multiple access tokens (1 by jricher)
    https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/68 

  3 issues closed:
  - Syntax for single and multiple access tokens https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/68 
  - Use of OAuth PoP without access tokens https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/112 
  - Applicability of OAuth PoP https://github.com/ietf-wg-gnap/gnap-core-protocol/issues/113 




Repositories tracked by this digest:
-----------------------------------
* https://github.com/ietf-wg-gnap/core-protocol
* https://github.com/ietf-wg-gnap/gnap-resource-servers