Comments (6)
@pravi Regarding the "request to follow", do you think that omniauth-saml
hasn't followed SemVer for the most recent release?
from omniauth-saml.
@md5 I maintain gitlab package in debian. Gitlab wants omniauth-saml ~> 1.4.0 and that will break if I upload omniauth-saml 1.5.0. If gitlab is confident 1.5 will not break their code, they can confidently declare omniauth-saml ~> 1.4. But as things stand right now, there is no clear statement. Do you think its realistic for gitlab to check over 260 gems how each of their previous releases were? SemVer makes life easy for users of libraries and I think every library should follow it and make it easy for people to find that information.
from omniauth-saml.
@pravi what version of GitLab are you packaging? omniauth-saml
was updated to 1.4.2 on version 8.4.4 and GitLab version 8.6 will make use of omniauth-saml
1.5.0.
You can see the commit for 1.4.2 here: gitlabhq/gitlabhq@ea7bdc7
and the commit 1.5.0 here: gitlabhq/gitlabhq@32ddf09
Please let us know where you think omniauth-saml
has not followed the SemVer rules you mention.
from omniauth-saml.
I guess the thing @pravi likes to have is a clear commitment to semver principle and I agree with him we should mention this within the README.md
to simplify life of software packagers and users.
I prepare a pull request for this.
from omniauth-saml.
if all it takes is a simple mention of commitment, then sure, let's commit.
from omniauth-saml.
Yes, a mention of commitment is all I need.
from omniauth-saml.
Related Issues (20)
- Field 'attribute_statements' not working HOT 1
- Update omniauth dependency HOT 1
- How do I set ruby-saml options such as :skip_recipient_check ?
- rescue OpenSSL::X509::CertificateError HOT 1
- Signature validation always true with IdP initiated SLO
- OmniAuth v2.0.0rc1 HOT 2
- Please support ValidUntil and cacheDuration support on Metadata
- ruby-saml (~> 1.9) breaks authentication due to adjusted behavior in REXML (3.2.5)
- Use of `origin` parameter in request URL breaks integration with certain IDPs
- Issue: omniauth: (saml) Request phase initiated. HOT 2
- Support for multiple :idp_cert_fingerprint HOT 1
- Getting runtime error Invalid settings, idp_sso_target_url is not set! HOT 1
- Errors in IdP initiated logout HOT 1
- login_hint? HOT 2
- How do you test your setup of omniauth-saml in your Rails app? HOT 4
- Problem integrating SAML SSO authentication
- Make omniauth-saml federation compatible
- Support for POST binding?
- I18n error with SP-initiated SLO
- Can we give any name to :attribute_service_name
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from omniauth-saml.