Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add missing IANA registrations #144

Merged
merged 9 commits into from
Dec 21, 2023
Merged

Add missing IANA registrations #144

merged 9 commits into from
Dec 21, 2023

Conversation

selfissued
Copy link
Member

Fixes #7
Fixes #46

Copy link
Collaborator

@Sakurann Sakurann left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thank you for the PR. I think there are few things missing.

openid-4-verifiable-credential-issuance-1_0.md Outdated Show resolved Hide resolved
openid-4-verifiable-credential-issuance-1_0.md Outdated Show resolved Hide resolved
openid-4-verifiable-credential-issuance-1_0.md Outdated Show resolved Hide resolved
openid-4-verifiable-credential-issuance-1_0.md Outdated Show resolved Hide resolved
Copy link
Collaborator

@Sakurann Sakurann left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

agree with Torsten's comments - author should be one of the spec authors.

Comment on lines 1711 to 1743
## OAuth Extensions Error Registry

This specification registers the following error values in the IANA "OAuth Extensions Error Registry" [@!IANA.OAuth.Parameters] established by [@!RFC6749].

* Name: invalid_credential_request
* Usage Location: resource access error response
* Protocol Extension: OpenID for Verifiable Credentials Issuance
* Change controller: OpenID Foundation Digital Credentials Protocols Working Group - [email protected]
* Reference: (#credential-request-errors) of this specification

* Name: unsupported_credential_type
* Usage Location: resource access error response
* Protocol Extension: OpenID for Verifiable Credentials Issuance
* Change controller: OpenID Foundation Digital Credentials Protocols Working Group - [email protected]
* Reference: (#credential-request-errors) of this specification

* Name: unsupported_credential_format
* Usage Location: resource access error response
* Protocol Extension: OpenID for Verifiable Credentials Issuance
* Change controller: OpenID Foundation Digital Credentials Protocols Working Group - [email protected]
* Reference: (#credential-request-errors) of this specification

* Name: invalid_proof
* Usage Location: resource access error response
* Protocol Extension: OpenID for Verifiable Credentials Issuance
* Change controller: OpenID Foundation Digital Credentials Protocols Working Group - [email protected]
* Reference: (#credential-request-errors) of this specification

* Name: invalid_encryption_parameters
* Usage Location: resource access error response
* Protocol Extension: OpenID for Verifiable Credentials Issuance
* Change controller: OpenID Foundation Digital Credentials Protocols Working Group - [email protected]
* Reference: (#credential-request-errors) of this specification
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These are not OAuth errors and therefore don't need to be registered and shouldn't be. see https://datatracker.ietf.org/doc/html/rfc6749#section-7.2

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These are errors defined by a profile of OAuth. Other errors defined by other OAuth profiles are registered. For instance, https://openid.net/specs/openid-connect-core-1_0.html#ErrorContents registered errors defined by the OAuth profile called OpenID Connect. You can see their registrations at https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml#extensions-error.

These errors defined by the OAuth profile called OpenID for Verifiable Credential Issuance also should and need to be registered.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These are errors defined by a profile of OAuth. Other errors defined by other OAuth profiles are registered. For instance, https://openid.net/specs/openid-connect-core-1_0.html#ErrorContents registered errors defined by the OAuth profile called OpenID Connect. You can see their registrations at https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml#extensions-error.

Yes but all of those registered OpenID Connect errors are returned from the authorization endpoint using the standard parameter for such. Registration for those makes sense and is one of those prescribed by https://datatracker.ietf.org/doc/html/rfc6749#section-8.5 (note that general protected resource application errors are not).

These errors defined by the OAuth profile called OpenID for Verifiable Credential Issuance also should and need to be registered.

These are errors for the Credential Request endpoint, which is an OAuth protected resource but is not an OAuth endpoint. The only protected resource errors that need registration are "for error values to be shared among OAuth token authentication schemes" (such as Bearer / DPoP) for when a "resource access request fails" https://datatracker.ietf.org/doc/html/rfc6749#section-7.2

The registry is not for general application layer errors from the protected resource.

Comment on lines +1692 to +1700
* Parameter Name: c_nonce
* Parameter Usage Location: token response
* Change Controller: OpenID Foundation Digital Credentials Protocols Working Group - [email protected]
* Reference: (#token-response) of this specification

* Parameter Name: c_nonce_expires_in
* Parameter Usage Location: token response
* Change Controller: OpenID Foundation Digital Credentials Protocols Working Group - [email protected]
* Reference: (#token-response) of this specification
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would prefer to see these removed (a la #39) but I recognize this is in vain and am just putting something here for posterity.

Copy link
Member

@bc-pi bc-pi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Credential Endpoint protocol layer errors should not be in the oauth registry

Accepted Brian's suggestion

Co-authored-by: Brian Campbell <[email protected]>
Copy link
Contributor

@awoie awoie left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I double-checked if everything is covered and it looks good. I'm approving because the content seems to be right in general but I'm not an IANA OAuth2 registry expert. So I don't know if we really need to register all of them or whether some of them will just live in this spec.

@Sakurann Sakurann merged commit e507477 into openid:main Dec 21, 2023
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
5 participants