-
daniel
Sorry I didn't find the time for editor work the past week and I also didn't send an agenda. I did however just read the two new proto xeps just now and I'm +1 on both
-
daniel
Note that the vote expires today so if you haven't read them yet now might be a good time 😊
-
dan.caseley
> Client Access XEP - I've got a nit about using service-unavailable rather than not-allowed/not-acceptable, but that's not really enough to reject on. It also has no XML schema. What really gives me pause is the opaque client id - there's no implementation notes or suggestions, just that it's 'opaque'. Is there prior art that makes my concern unusual or unreasonable? Anyone got a take on my thoughts on the Client Access XEP? Is it overly harsh?
-
daniel
dan.caseley: not having a schema is pretty common at this stage
-
Zash
> In order for a Standards Track XEP to advance from Proposed to Stable, it must: > 6. be formally defined by an XML schema per XEP-0001, so shouldn't be a hard requirement until then
-
dan.caseley
The opaque client ID bothers me most.
-
daniel
And id being opaque. I thinks that's like an archive id for example? I don't understand why opaque should be an issue
-
daniel
It's not User defined or anything is it?
-
daniel
Or iq ids...
-
singpolyma
I think all ids in XMPP are opaque
-
daniel
I mean we can make it a UUID like in sasl2/bind2 but I find that pretty nit picky for an experimental xep
-
singpolyma
Which is usually what you want
-
singpolyma
Even in sasl2 doesn't it just suggest uuid? Obviously that's a sane choice usually but there's no point to require id✎ -
singpolyma
Even in sasl2 doesn't it just suggest uuid? Obviously that's a sane choice usually but there's no point to require it ✏
-
daniel
I think it suggest uuidv4 specifically and some server implementations check
-
daniel
But I'm fine with it simply being opaque
-
moparisthebest
I will be +1 on both Though I highly dislike adding the misfeature of user-agent to XMPP, don't most modern things instead ask users to add a nickname for clients? That's just feedback for MattJ I guess, nothing blocking
-
dan.caseley
Okay. If it's established in history as being normal, I'm happy being +0
-
MattJ
moparisthebest, I can't recall something asking me to name a login session
-
moparisthebest
Also thanks for the great security considerations on both that's a pet peeve of mine (:
-
moparisthebest
MattJ: every "grant access to this" ux I've seen, uh tokens in gitlab and GitHub and Gmail etc
-
singpolyma
We have lots of user agent equivalents already just not yours part of auth
-
MattJ
moparisthebest, really? Tokens, perhaps, but I don't recall ever seeing that as part of an OAuth flow
-
daniel
It's time
-
moparisthebest
I'm not sure I've ever seen an oauth flow in real life, so token management is the only example of granting/revoking account access I'm familiar with
-
daniel
1) roll call
-
moparisthebest
Hello!
-
dan.caseley
Howdy!
-
daniel
I assume singpolyma dan.caseley are here
-
daniel
Is larma here
-
larma
yes
-
daniel
2) agenda bashing
-
daniel
No agenda so nothing to bash
-
daniel
3) editors update
-
daniel
I didn't find the time to do editor tasks this week. But my availability will improve towards the end of the day
-
daniel
4) items for voting
-
daniel
None
-
daniel
5) pending votes
-
daniel
None I think. Since people voted just now
-
daniel
6) date of next
-
daniel
+1w wfm
-
moparisthebest
+1w wfm
-
singpolyma
+1w wfm
-
dan.caseley
+1w wfm
-
daniel
7) AOB
-
moparisthebest
Nothing here
-
daniel
Assuming none
-
daniel
8) close
-
daniel
Thank you all. See you next week
-
dan.caseley
Thanks daniel!
-
moparisthebest
Thanks daniel and all