Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.

Already on GitHub? Sign in to your account

[meta] Looking for maintainers! #89

Open
toupeira opened this issue Oct 10, 2019 · 10 comments
Open

[meta] Looking for maintainers! #89

toupeira opened this issue Oct 10, 2019 · 10 comments

Comments

@toupeira
Copy link
Member

I'm increasingly neglecting this gem because I'm not really using it in any of my current projects, and working with OAuth / OIDC is just generally causing me a lot of headaches 馃槢

If anybody wants to become a maintainer, please let me know!

/cc @nashby @nbulaj

@giubueno
Copy link

giubueno commented Mar 2, 2020

Ping me.

@nbulaj
Copy link
Member

nbulaj commented May 19, 2020

@toupeira I will provide a support for this gem (as doorkeeper maintainer), like some bugfixes and improvements, but not new features. Could you please check if I have permissions to push to rubygems? I have something more to merge soon, and we need to release a new version with a fixes to support latest Doorkeeper (5.4).

@toupeira
Copy link
Member Author

@nbulaj thanks! 馃憤

And yes you should have permission:

$ gem owner doorkeeper-openid_connect
Owners for gem: doorkeeper-openid_connect
- nikita_bulai
- [email protected]
- [email protected]

@mecampbellsoup
Copy link

and working with OAuth / OIDC is just generally causing me a lot of headaches 馃槢

Out of curiosity (as we embark on a buy-vs-build decision at our company) could you elaborate on these headaches?!

@toupeira
Copy link
Member Author

@mecampbellsoup well, just take a look at the length and complexity of these specs 馃榿

But joking aside, I originally started extending this gem so we could support OIDC in GitLab, so it's used quite widely (especially at Siemens, who originally sponsored that contribution), and @nbulaj and me are still around now and then to look after bugfixes and other small improvements.

And really most of the heavy lifting is done in the main Doorkeeper gem, so if you're tied to Rails I don't think there's a good reason to start from scratch 馃檪 You might be interested in https://github.com/nov/openid_connect though, if you're looking for more of a library rather than a Railsy framework solution.

@mecampbellsoup
Copy link

@mecampbellsoup well, just take a look at the length and complexity of these specs 馃榿

But joking aside, I originally started extending this gem so we could support OIDC in GitLab, so it's used quite widely (especially at Siemens, who originally sponsored that contribution), and @nbulaj and me are still around now and then to look after bugfixes and other small improvements.

And really most of the heavy lifting is done in the main Doorkeeper gem, so if you're tied to Rails I don't think there's a good reason to start from scratch 馃檪 You might be interested in nov/openid_connect though, if you're looking for more of a library rather than a Railsy framework solution.

To be sure, we would use this library if we went with Ruby. However we are more likely to use Python due to ... well, other concerns not related to this conversation.

I was more curious whether you were suggesting that:

  • you are a "buy" proponent in the build-vs-buy debate (e.g. Auth0, Okta); or
  • you are opposed to OIDC whatsoever (on the IdP side, i.e. should my company's auth server be a full-fledged OIDC IdP, or is it sufficient to simply issue opaque tokens and do session management like the good old days)

@toupeira
Copy link
Member Author

@mecampbellsoup I'm not opposed to OIDC at all, it seems perfectly fine if you want to build your own SSO, and OAuth2 will probably crop up anyway if you want to integrate with other services.

Regarding hosted SSOs, I don't have much experience with them and zero knowledge about your business so I can't really give you any advice 馃槈 But I do know that Auth0 and Okta also offer OIDC and are certified providers: https://openid.net/certification/

@stanhu
Copy link
Contributor

stanhu commented Nov 22, 2022

@toupeira Do you think you could add me here?

@toupeira
Copy link
Member Author

toupeira commented Dec 3, 2022

@stanhu oh hey, sorry for the delay! Turns out the notifications for this repository were still getting sent to my old gitlab.com address 馃槄

I haven't been active here in a while, so I'll leave this decision to @nbulaj who's taken over the helm. For context, Stan works at GitLab and I trust him fully, and I myself have left GitLab earlier this year 馃檪

@nbulaj
Copy link
Member

nbulaj commented Dec 20, 2022

Oh, @stanhu do you still interested in helping maintaining the gem? Just let me know please 馃檹 Sorry didn't have enough time to read all the discussions.

@nbulaj nbulaj pinned this issue Feb 20, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants