Skip to content

Commit

Permalink
Update of TR report from new reffy run
Browse files Browse the repository at this point in the history
Using reffy commit 16.0.5.
  • Loading branch information
reffy-bot committed Jul 10, 2024
1 parent 1d75244 commit 84e3e08
Show file tree
Hide file tree
Showing 13 changed files with 2,438 additions and 2,051 deletions.
1,819 changes: 1,459 additions & 360 deletions tr/dfns/IFT.json

Large diffs are not rendered by default.

341 changes: 34 additions & 307 deletions tr/dfns/vc-data-integrity.json

Large diffs are not rendered by default.

342 changes: 144 additions & 198 deletions tr/headings/IFT.json

Large diffs are not rendered by default.

199 changes: 47 additions & 152 deletions tr/headings/vc-data-integrity.json
Original file line number Diff line number Diff line change
Expand Up @@ -85,173 +85,82 @@
"title": "Proof Chains",
"number": "2.1.2"
},
{
"id": "proof-graphs",
"href": "https://www.w3.org/TR/vc-data-integrity/#proof-graphs",
"level": 4,
"title": "Proof Graphs",
"number": "2.1.3"
},
{
"id": "proof-purposes",
"href": "https://www.w3.org/TR/vc-data-integrity/#proof-purposes",
"level": 3,
"title": "Proof Purposes",
"number": "2.2"
},
{
"id": "controller-documents",
"href": "https://www.w3.org/TR/vc-data-integrity/#controller-documents",
"level": 3,
"title": "Controller Documents",
"number": "2.3"
},
{
"id": "verification-methods",
"href": "https://www.w3.org/TR/vc-data-integrity/#verification-methods",
"level": 4,
"title": "Verification Methods",
"number": "2.3.1"
},
{
"id": "verification-material",
"href": "https://www.w3.org/TR/vc-data-integrity/#verification-material",
"level": 5,
"title": "Verification Material",
"number": "2.3.1.1"
},
{
"id": "multikey",
"href": "https://www.w3.org/TR/vc-data-integrity/#multikey",
"level": 5,
"title": "Multikey",
"number": "2.3.1.2"
},
{
"id": "jsonwebkey",
"href": "https://www.w3.org/TR/vc-data-integrity/#jsonwebkey",
"level": 5,
"title": "JsonWebKey",
"number": "2.3.1.3"
},
{
"id": "referring-to-verification-methods",
"href": "https://www.w3.org/TR/vc-data-integrity/#referring-to-verification-methods",
"level": 5,
"title": "Referring to Verification Methods",
"number": "2.3.1.4"
},
{
"id": "verification-relationships",
"href": "https://www.w3.org/TR/vc-data-integrity/#verification-relationships",
"level": 4,
"title": "Verification Relationships",
"number": "2.3.2"
},
{
"id": "authentication",
"href": "https://www.w3.org/TR/vc-data-integrity/#authentication",
"level": 5,
"title": "Authentication",
"number": "2.3.2.1"
},
{
"id": "assertion",
"href": "https://www.w3.org/TR/vc-data-integrity/#assertion",
"level": 5,
"title": "Assertion",
"number": "2.3.2.2"
},
{
"id": "key-agreement",
"href": "https://www.w3.org/TR/vc-data-integrity/#key-agreement",
"level": 5,
"title": "Key Agreement",
"number": "2.3.2.3"
},
{
"id": "capability-invocation",
"href": "https://www.w3.org/TR/vc-data-integrity/#capability-invocation",
"level": 5,
"title": "Capability Invocation",
"number": "2.3.2.4"
},
{
"id": "capability-delegation",
"href": "https://www.w3.org/TR/vc-data-integrity/#capability-delegation",
"level": 5,
"title": "Capability Delegation",
"number": "2.3.2.5"
},
{
"id": "multibase-0",
"href": "https://www.w3.org/TR/vc-data-integrity/#multibase-0",
"level": 3,
"title": "Multibase",
"number": "2.4"
},
{
"id": "multihash",
"href": "https://www.w3.org/TR/vc-data-integrity/#multihash",
"level": 3,
"title": "Multihash",
"number": "2.5"
},
{
"id": "resource-integrity",
"href": "https://www.w3.org/TR/vc-data-integrity/#resource-integrity",
"level": 3,
"title": "Resource Integrity",
"number": "2.6"
"number": "2.3"
},
{
"id": "relationship-to-linked-data",
"href": "https://www.w3.org/TR/vc-data-integrity/#relationship-to-linked-data",
"level": 3,
"title": "Relationship to Linked Data",
"number": "2.7"
"number": "2.4"
},
{
"id": "relationship-to-verifiable-credentials",
"href": "https://www.w3.org/TR/vc-data-integrity/#relationship-to-verifiable-credentials",
"level": 3,
"title": "Relationship to Verifiable Credentials",
"number": "2.8"
"number": "2.5"
},
{
"id": "contexts-and-vocabularies",
"href": "https://www.w3.org/TR/vc-data-integrity/#contexts-and-vocabularies",
"level": 3,
"title": "Contexts and Vocabularies",
"number": "2.9"
"number": "2.6"
},
{
"id": "context-injection",
"href": "https://www.w3.org/TR/vc-data-integrity/#context-injection",
"level": 4,
"title": "Context Injection",
"number": "2.9.1"
"number": "2.6.1"
},
{
"id": "securing-data-losslessly",
"href": "https://www.w3.org/TR/vc-data-integrity/#securing-data-losslessly",
"level": 4,
"title": "Securing Data Losslessly",
"number": "2.9.2"
"number": "2.6.2"
},
{
"id": "datatypes",
"href": "https://www.w3.org/TR/vc-data-integrity/#datatypes",
"level": 4,
"title": "Datatypes",
"number": "2.9.3"
"number": "2.6.3"
},
{
"id": "the-cryptosuitestring-datatype",
"href": "https://www.w3.org/TR/vc-data-integrity/#the-cryptosuitestring-datatype",
"level": 5,
"title": "The cryptosuiteString Datatype",
"number": "2.9.3.1"
"number": "2.6.3.1"
},
{
"id": "the-multibase-datatype",
"href": "https://www.w3.org/TR/vc-data-integrity/#the-multibase-datatype",
"level": 5,
"title": "The multibase Datatype",
"number": "2.9.3.2"
"number": "2.6.3.2"
},
{
"id": "cryptographic-suites",
Expand All @@ -274,61 +183,40 @@
"title": "Algorithms",
"number": "4"
},
{
"id": "base-encode",
"href": "https://www.w3.org/TR/vc-data-integrity/#base-encode",
"level": 3,
"title": "Base Encode",
"number": "4.1"
},
{
"id": "base-decode",
"href": "https://www.w3.org/TR/vc-data-integrity/#base-decode",
"level": 3,
"title": "Base Decode",
"number": "4.2"
},
{
"id": "add-proof",
"href": "https://www.w3.org/TR/vc-data-integrity/#add-proof",
"level": 3,
"title": "Add Proof",
"number": "4.3"
"number": "4.1"
},
{
"id": "add-proof-set-chain",
"href": "https://www.w3.org/TR/vc-data-integrity/#add-proof-set-chain",
"level": 3,
"title": "Add Proof Set/Chain",
"number": "4.4"
"number": "4.2"
},
{
"id": "verify-proof",
"href": "https://www.w3.org/TR/vc-data-integrity/#verify-proof",
"level": 3,
"title": "Verify Proof",
"number": "4.5"
"number": "4.3"
},
{
"id": "verify-proof-sets-and-chains",
"href": "https://www.w3.org/TR/vc-data-integrity/#verify-proof-sets-and-chains",
"level": 3,
"title": "Verify Proof Sets and Chains",
"number": "4.6"
},
{
"id": "retrieve-verification-method",
"href": "https://www.w3.org/TR/vc-data-integrity/#retrieve-verification-method",
"level": 3,
"title": "Retrieve Verification Method",
"number": "4.7"
"number": "4.4"
},
{
"id": "processing-errors",
"href": "https://www.w3.org/TR/vc-data-integrity/#processing-errors",
"level": 3,
"title": "Processing Errors",
"number": "4.8"
"number": "4.5"
},
{
"id": "security-considerations",
Expand Down Expand Up @@ -372,61 +260,68 @@
"title": "Transformations",
"number": "5.5"
},
{
"id": "protected-information",
"href": "https://www.w3.org/TR/vc-data-integrity/#protected-information",
"level": 3,
"title": "Protected Information",
"number": "5.6"
},
{
"id": "data-opacity",
"href": "https://www.w3.org/TR/vc-data-integrity/#data-opacity",
"level": 3,
"title": "Data Opacity",
"number": "5.6"
"number": "5.7"
},
{
"id": "verification-method-binding",
"href": "https://www.w3.org/TR/vc-data-integrity/#verification-method-binding",
"level": 3,
"title": "Verification Method Binding",
"number": "5.7"
"number": "5.8"
},
{
"id": "verification-relationship-validation",
"href": "https://www.w3.org/TR/vc-data-integrity/#verification-relationship-validation",
"level": 3,
"title": "Verification Relationship Validation",
"number": "5.8"
"number": "5.9"
},
{
"id": "proof-purpose-validation",
"href": "https://www.w3.org/TR/vc-data-integrity/#proof-purpose-validation",
"level": 3,
"title": "Proof Purpose Validation",
"number": "5.9"
"number": "5.10"
},
{
"id": "canonicalization-method-security",
"href": "https://www.w3.org/TR/vc-data-integrity/#canonicalization-method-security",
"level": 3,
"title": "Canonicalization Method Security",
"number": "5.10"
"number": "5.11"
},
{
"id": "canonicalization-method-correctness",
"href": "https://www.w3.org/TR/vc-data-integrity/#canonicalization-method-correctness",
"level": 3,
"title": "Canonicalization Method Correctness",
"number": "5.11"
"number": "5.12"
},
{
"id": "network-requests",
"href": "https://www.w3.org/TR/vc-data-integrity/#network-requests",
"level": 3,
"title": "Network Requests",
"number": "5.12"
"number": "5.13"
},
{
"id": "other-security-considerations",
"href": "https://www.w3.org/TR/vc-data-integrity/#other-security-considerations",
"level": 3,
"title": "Other Security Considerations",
"number": "5.13"
"number": "5.14"
},
{
"id": "privacy-considerations",
Expand Down Expand Up @@ -491,47 +386,47 @@
"title": "Presenting Time Values",
"number": "7.1"
},
{
"id": "revision-history",
"href": "https://www.w3.org/TR/vc-data-integrity/#revision-history",
"level": 2,
"title": "Revision History",
"number": "8"
},
{
"id": "understanding-proof-sets-and-proof-chains",
"href": "https://www.w3.org/TR/vc-data-integrity/#understanding-proof-sets-and-proof-chains",
"level": 2,
"title": "Understanding Proof Sets and Proof Chains",
"number": "A"
},
{
"id": "revision-history",
"href": "https://www.w3.org/TR/vc-data-integrity/#revision-history",
"level": 2,
"title": "Revision History",
"number": "B"
},
{
"id": "acknowledgements",
"href": "https://www.w3.org/TR/vc-data-integrity/#acknowledgements",
"level": 2,
"title": "Acknowledgements",
"number": "B"
"number": "C"
},
{
"id": "references",
"href": "https://www.w3.org/TR/vc-data-integrity/#references",
"level": 2,
"title": "References",
"number": "C"
"number": "D"
},
{
"id": "normative-references",
"href": "https://www.w3.org/TR/vc-data-integrity/#normative-references",
"level": 3,
"title": "Normative references",
"number": "C.1"
"number": "D.1"
},
{
"id": "informative-references",
"href": "https://www.w3.org/TR/vc-data-integrity/#informative-references",
"level": 3,
"title": "Informative references",
"number": "C.2"
"number": "D.2"
}
]
}
Loading

0 comments on commit 84e3e08

Please sign in to comment.