devise-pwned_password 0.1.0 → 0.1.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +30 -9
- data/lib/devise/pwned_password/version.rb +1 -1
- metadata +16 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 4d25ddf45c7eddaf3e5334a1fc1dde9dfd0c1299
|
4
|
+
data.tar.gz: 105d467a316fd317e76abb0226b0debecac123cc
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: cdad317bb782d686f9f0734dd5d519b0d1b0329e89d272466fe57ea9737d890b58f8a2e99951fa1c55af34088697ee0a0bb54796e9eb60c646048fbb7f8821dc
|
7
|
+
data.tar.gz: 005647a67db66a184ca7c53280c1743b985b15ca3a4968700de3c7e8aa549767d4880462219d7c02624f09887d58a299956f088c9399584fe9808ccf80b3f9d1
|
data/README.md
CHANGED
@@ -1,8 +1,27 @@
|
|
1
1
|
# Devise::PwnedPassword
|
2
|
-
|
2
|
+
Devise extension that checks user passwords against the PwnedPasswords dataset https://haveibeenpwned.com/Passwords
|
3
|
+
|
4
|
+
Based on
|
5
|
+
|
6
|
+
https://github.com/HCLarsen/devise-uncommon_password
|
7
|
+
|
3
8
|
|
4
9
|
## Usage
|
5
|
-
|
10
|
+
Add the :pwned_password module to your existing Devise model.
|
11
|
+
|
12
|
+
```ruby
|
13
|
+
class AdminUser < ApplicationRecord
|
14
|
+
devise :database_authenticatable,
|
15
|
+
:recoverable, :rememberable, :trackable, :validatable, :pwned_password
|
16
|
+
end
|
17
|
+
```
|
18
|
+
|
19
|
+
|
20
|
+
Users will receive the following error message if they use a password from the PwnedPasswords dataset
|
21
|
+
|
22
|
+
```
|
23
|
+
This password has previously appeared in a data breach and should never be used. Please choose something harder to guess.
|
24
|
+
```
|
6
25
|
|
7
26
|
## Installation
|
8
27
|
Add this line to your application's Gemfile:
|
@@ -13,16 +32,18 @@ gem 'devise-pwned_password'
|
|
13
32
|
|
14
33
|
And then execute:
|
15
34
|
```bash
|
16
|
-
$ bundle
|
17
|
-
```
|
18
|
-
|
19
|
-
Or install it yourself as:
|
20
|
-
```bash
|
21
|
-
$ gem install devise-pwned_password
|
35
|
+
$ bundle install
|
22
36
|
```
|
23
37
|
|
24
38
|
## Contributing
|
25
|
-
|
39
|
+
|
40
|
+
To contribute
|
41
|
+
|
42
|
+
* Check the [issue tracker](https://github.com/michaelbanfield/devise-pwned_password/issues) and [pull requests](https://github.com/michaelbanfield/devise-pwned_password/pulls) for anything similar
|
43
|
+
* Fork the repository
|
44
|
+
* Make your changes
|
45
|
+
* Run bin/test to make sure the unit tests still run
|
46
|
+
* Send a pull requests
|
26
47
|
|
27
48
|
## License
|
28
49
|
The gem is available as open source under the terms of the [MIT License](http://opensource.org/licenses/MIT).
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: devise-pwned_password
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.1.
|
4
|
+
version: 0.1.1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Michael Banfield
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2017-10-
|
11
|
+
date: 2017-10-05 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: rails
|
@@ -24,6 +24,20 @@ dependencies:
|
|
24
24
|
- - "~>"
|
25
25
|
- !ruby/object:Gem::Version
|
26
26
|
version: 5.1.2
|
27
|
+
- !ruby/object:Gem::Dependency
|
28
|
+
name: devise
|
29
|
+
requirement: !ruby/object:Gem::Requirement
|
30
|
+
requirements:
|
31
|
+
- - "~>"
|
32
|
+
- !ruby/object:Gem::Version
|
33
|
+
version: '4'
|
34
|
+
type: :runtime
|
35
|
+
prerelease: false
|
36
|
+
version_requirements: !ruby/object:Gem::Requirement
|
37
|
+
requirements:
|
38
|
+
- - "~>"
|
39
|
+
- !ruby/object:Gem::Version
|
40
|
+
version: '4'
|
27
41
|
- !ruby/object:Gem::Dependency
|
28
42
|
name: sqlite3
|
29
43
|
requirement: !ruby/object:Gem::Requirement
|