devise-pwned_password 0.1.0 → 0.1.1

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 7794b80de3b65f09c95f29c5cb907c9643d61bad
4
- data.tar.gz: e76f856c88cb727d8b93d5df55ba69ddbd96ca32
3
+ metadata.gz: 4d25ddf45c7eddaf3e5334a1fc1dde9dfd0c1299
4
+ data.tar.gz: 105d467a316fd317e76abb0226b0debecac123cc
5
5
  SHA512:
6
- metadata.gz: 1c3f388b3f4ba33481294492f318e5eecf8f45c790e12608fe3dfa7096b3e0c5526a7dc857d03f40e479ec37bceea5371d26e0768030fcc9e6eb83b00bb5eb7c
7
- data.tar.gz: 741f99479411bdbaaa2d5eea56c68c10eaaa216aef2f295615bfe9fb91810b79f512665e14b01547496e5bc82142d13cdcc27c82c48b819bd303daf33b293a33
6
+ metadata.gz: cdad317bb782d686f9f0734dd5d519b0d1b0329e89d272466fe57ea9737d890b58f8a2e99951fa1c55af34088697ee0a0bb54796e9eb60c646048fbb7f8821dc
7
+ data.tar.gz: 005647a67db66a184ca7c53280c1743b985b15ca3a4968700de3c7e8aa549767d4880462219d7c02624f09887d58a299956f088c9399584fe9808ccf80b3f9d1
data/README.md CHANGED
@@ -1,8 +1,27 @@
1
1
  # Devise::PwnedPassword
2
- Short description and motivation.
2
+ Devise extension that checks user passwords against the PwnedPasswords dataset https://haveibeenpwned.com/Passwords
3
+
4
+ Based on
5
+
6
+ https://github.com/HCLarsen/devise-uncommon_password
7
+
3
8
 
4
9
  ## Usage
5
- How to use my plugin.
10
+ Add the :pwned_password module to your existing Devise model.
11
+
12
+ ```ruby
13
+ class AdminUser < ApplicationRecord
14
+ devise :database_authenticatable,
15
+ :recoverable, :rememberable, :trackable, :validatable, :pwned_password
16
+ end
17
+ ```
18
+
19
+
20
+ Users will receive the following error message if they use a password from the PwnedPasswords dataset
21
+
22
+ ```
23
+ This password has previously appeared in a data breach and should never be used. Please choose something harder to guess.
24
+ ```
6
25
 
7
26
  ## Installation
8
27
  Add this line to your application's Gemfile:
@@ -13,16 +32,18 @@ gem 'devise-pwned_password'
13
32
 
14
33
  And then execute:
15
34
  ```bash
16
- $ bundle
17
- ```
18
-
19
- Or install it yourself as:
20
- ```bash
21
- $ gem install devise-pwned_password
35
+ $ bundle install
22
36
  ```
23
37
 
24
38
  ## Contributing
25
- Contribution directions go here.
39
+
40
+ To contribute
41
+
42
+ * Check the [issue tracker](https://github.com/michaelbanfield/devise-pwned_password/issues) and [pull requests](https://github.com/michaelbanfield/devise-pwned_password/pulls) for anything similar
43
+ * Fork the repository
44
+ * Make your changes
45
+ * Run bin/test to make sure the unit tests still run
46
+ * Send a pull requests
26
47
 
27
48
  ## License
28
49
  The gem is available as open source under the terms of the [MIT License](http://opensource.org/licenses/MIT).
@@ -1,5 +1,5 @@
1
1
  module Devise
2
2
  module PwnedPassword
3
- VERSION = '0.1.0'
3
+ VERSION = '0.1.1'
4
4
  end
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: devise-pwned_password
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.0
4
+ version: 0.1.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Michael Banfield
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2017-10-04 00:00:00.000000000 Z
11
+ date: 2017-10-05 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: rails
@@ -24,6 +24,20 @@ dependencies:
24
24
  - - "~>"
25
25
  - !ruby/object:Gem::Version
26
26
  version: 5.1.2
27
+ - !ruby/object:Gem::Dependency
28
+ name: devise
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - "~>"
32
+ - !ruby/object:Gem::Version
33
+ version: '4'
34
+ type: :runtime
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - "~>"
39
+ - !ruby/object:Gem::Version
40
+ version: '4'
27
41
  - !ruby/object:Gem::Dependency
28
42
  name: sqlite3
29
43
  requirement: !ruby/object:Gem::Requirement