doorkeeper 5.1.2 → 5.2.0.rc1

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of doorkeeper might be problematic. Click here for more details.

Files changed (66) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +812 -0
  3. data/CONTRIBUTING.md +4 -9
  4. data/Dangerfile +1 -1
  5. data/Gemfile +2 -1
  6. data/NEWS.md +1 -819
  7. data/README.md +2 -2
  8. data/RELEASING.md +6 -5
  9. data/app/controllers/doorkeeper/applications_controller.rb +5 -3
  10. data/app/controllers/doorkeeper/authorized_applications_controller.rb +1 -1
  11. data/app/controllers/doorkeeper/tokens_controller.rb +18 -8
  12. data/app/validators/redirect_uri_validator.rb +19 -9
  13. data/app/views/doorkeeper/applications/_form.html.erb +0 -6
  14. data/app/views/doorkeeper/applications/show.html.erb +1 -1
  15. data/config/locales/en.yml +3 -1
  16. data/doorkeeper.gemspec +1 -1
  17. data/gemfiles/rails_5_0.gemfile +1 -0
  18. data/gemfiles/rails_5_1.gemfile +1 -0
  19. data/gemfiles/rails_5_2.gemfile +1 -0
  20. data/gemfiles/rails_6_0.gemfile +2 -1
  21. data/gemfiles/rails_master.gemfile +1 -0
  22. data/lib/doorkeeper.rb +3 -0
  23. data/lib/doorkeeper/config.rb +30 -3
  24. data/lib/doorkeeper/config/option.rb +13 -7
  25. data/lib/doorkeeper/grape/helpers.rb +5 -1
  26. data/lib/doorkeeper/helpers/controller.rb +16 -3
  27. data/lib/doorkeeper/oauth/authorization/code.rb +10 -8
  28. data/lib/doorkeeper/oauth/authorization/token.rb +1 -1
  29. data/lib/doorkeeper/oauth/code_response.rb +2 -2
  30. data/lib/doorkeeper/oauth/error_response.rb +1 -1
  31. data/lib/doorkeeper/oauth/helpers/uri_checker.rb +18 -4
  32. data/lib/doorkeeper/oauth/nonstandard.rb +39 -0
  33. data/lib/doorkeeper/oauth/refresh_token_request.rb +8 -8
  34. data/lib/doorkeeper/oauth/token_introspection.rb +13 -12
  35. data/lib/doorkeeper/orm/active_record.rb +17 -1
  36. data/lib/doorkeeper/orm/active_record/access_grant.rb +1 -1
  37. data/lib/doorkeeper/orm/active_record/access_token.rb +2 -2
  38. data/lib/doorkeeper/orm/active_record/application.rb +5 -65
  39. data/lib/doorkeeper/stale_records_cleaner.rb +6 -2
  40. data/lib/doorkeeper/version.rb +3 -3
  41. data/lib/generators/doorkeeper/previous_refresh_token_generator.rb +6 -6
  42. data/lib/generators/doorkeeper/templates/initializer.rb +41 -9
  43. data/lib/generators/doorkeeper/templates/migration.rb.erb +3 -0
  44. data/spec/controllers/applications_controller_spec.rb +93 -0
  45. data/spec/controllers/protected_resources_controller_spec.rb +3 -3
  46. data/spec/controllers/tokens_controller_spec.rb +71 -3
  47. data/spec/dummy/config/application.rb +3 -1
  48. data/spec/dummy/config/initializers/doorkeeper.rb +27 -9
  49. data/spec/lib/config_spec.rb +11 -0
  50. data/spec/lib/oauth/helpers/uri_checker_spec.rb +17 -2
  51. data/spec/lib/oauth/pre_authorization_spec.rb +0 -15
  52. data/spec/models/doorkeeper/application_spec.rb +268 -373
  53. data/spec/requests/flows/authorization_code_spec.rb +16 -4
  54. data/spec/requests/flows/revoke_token_spec.rb +19 -11
  55. data/spec/support/doorkeeper_rspec.rb +1 -1
  56. data/spec/validators/redirect_uri_validator_spec.rb +39 -14
  57. metadata +7 -15
  58. data/.coveralls.yml +0 -1
  59. data/.github/ISSUE_TEMPLATE.md +0 -25
  60. data/.github/PULL_REQUEST_TEMPLATE.md +0 -17
  61. data/.gitignore +0 -20
  62. data/.gitlab-ci.yml +0 -16
  63. data/.hound.yml +0 -3
  64. data/.rspec +0 -1
  65. data/.rubocop.yml +0 -50
  66. data/.travis.yml +0 -35
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 95c8686453ad6829c1ea72b91427ff928c327bcb070a874aa7bcb1a7069862ce
4
- data.tar.gz: ea167ef64660032fa82132c2d422ef9e6d3ab1941648a93b2334b5071ba4c105
3
+ metadata.gz: f8d957f89709f38c434bcaa2f50d2b7a540ed613c37c49a7206cbab07c32c240
4
+ data.tar.gz: f1945351442b325395da930863b402cb45091f576075ffe0b71dbc285911d846
5
5
  SHA512:
6
- metadata.gz: 24b52822b413bef6896c516237dfbd31bb9c4205496aae188a7a70bb574e9babb8ea0a6acbb73df014c03f27682dd97f3ecd3e509bbf29c91bdc2a56a2151d63
7
- data.tar.gz: 38c01cb3999dc3384b89507aac2f25f76a311aea6e2fda59a86f35d2a323776e3e58873a74beeab888dd20bd89520b167e8414f71aa206112217fda6c890e0ba
6
+ metadata.gz: 97b9c9d403403af0227f670b66876be06dac554beeb024f507e3c460a0fcd6c5eeb75b8747946ff622065791992ce1bf9c30f8366f964e57545e229366533048
7
+ data.tar.gz: f235dee893b1ad79ad1873006e68e0ad508a25f676c4d6ecd6f867cca0ec8c5f1776420d79e0efb8cefc7309b1f467ef34de3382249c698fd842872c3eea5254
@@ -0,0 +1,812 @@
1
+ # Changelog
2
+
3
+ See https://github.com/doorkeeper-gem/doorkeeper/wiki/Migration-from-old-versions for
4
+ upgrade guides.
5
+
6
+ User-visible changes worth mentioning.
7
+
8
+ ## master
9
+
10
+ - [#1260], [#1261] Improve Token Introspection configuration option (access to tokens, client).
11
+ - [#1257] Add constraint configuration when using client authentication on introspection endpoint.
12
+ - [#1252] Returning `unauthorized` when the revocation of the token should not be performed due to wrong permissions.
13
+ - [#1249] Specify case sensitive uniqueness to remove Rails 6 deprecation message
14
+ - [#1248] Display the Application Secret in HTML after creating a new application even when `hash_application_secrets` is used.
15
+ - [#1248] Return the unhashed Application Secret in the JSON response after creating new application even when `hash_application_secrets` is used.
16
+ - [#1238] Better support for native app with support for custom scheme and localhost redirection.
17
+
18
+ ## 5.1.0
19
+
20
+ - [#1243] Add nil check operator in token checking at token introspection.
21
+ - [#1241] Explaining foreign key options for resource owner in a single place
22
+ - [#1237] Allow to set blank redirect URI if Doorkeeper configured to use redirect URI-less grant flows.
23
+ - [#1234] Fix `StaleRecordsCleaner` to properly work with big amount of records.
24
+ - [#1228] Allow to explicitly set non-expiring tokens in `custom_access_token_expires_in` configuration
25
+ option using `Float::INIFINITY` return value.
26
+ - [#1224] Do not try to store token if not found by fallback hashing strategy.
27
+ - [#1223] Update Hound/Rubocop rules, correct Doorkeeper codebase to follow style-guides.
28
+ - [#1220] Drop Rails 4.2 & Ruby < 2.4 support.
29
+
30
+ ## 5.1.0.rc2
31
+
32
+ - [#1208] Unify hashing implementation into secret storing strategies
33
+
34
+ **[IMPORTANT]**: If you have been using the master branch of doorkeeper with bcrypt in your Gemfile.lock,
35
+ your application secrets have been hashed using BCrypt. To restore this behavior, use the initializer option
36
+ `use_application_hashing using: 'Doorkeeper::SecretStoring::BCrypt`.
37
+
38
+ - [#1216] Add nil check to `expires_at` method.
39
+ - [#1215] Fix deprecates for Rails 6.
40
+ - [#1214] Scopes field accepts array.
41
+ - [#1209] Fix tokens validation for Token Introspection request.
42
+ - [#1202] Use correct HTTP status codes for error responses.
43
+
44
+ **[IMPORTANT]**: this change might break your application if you were relying on the previous
45
+ 401 status codes, this is now a 400 by default, or a 401 for `invalid_client` and `invalid_token` errors.
46
+
47
+ - [#1201] Fix custom TTL block `client` parameter to always be an `Doorkeeper::Application` instance.
48
+
49
+ **[IMPORTANT]**: those who defined `custom_access_token_expires_in` configuration option need to check
50
+ their block implementation: if you are using `oauth_client.application` to get `Doorkeeper::Application`
51
+ instance, then you need to replace it with just `oauth_client`.
52
+
53
+ - [#1200] Increase default Doorkeeper access token value complexity (`urlsafe_base64` instead of just `hex`)
54
+ matching RFC6749/RFC6750.
55
+
56
+ **[IMPORTANT]**: this change have possible side-effects in case you have custom database constraints for
57
+ access token value, application secrets, refresh tokens or you patched Doorkeeper models and introduced
58
+ token value validations, or you are using database with case-insensitive WHERE clause like MySQL
59
+ (you can face some collisions). Before this change access token value matched `[a-f0-9]` regex, and now
60
+ it matches `[a-zA-Z0-9\-_]`. In case you have such restrictions and your don't use custom token generator
61
+ please change configuration option `default_generator_method` to `:hex`.
62
+
63
+ - [#1195] Allow to customize Token Introspection response (fixes #1194).
64
+ - [#1189] Option to set `token_reuse_limit`.
65
+ - [#1191] Try to load bcrypt for hashing of application secrets, but add fallback.
66
+
67
+ ## 5.1.0.rc1
68
+
69
+ - [#1188] Use `params` instead of `request.POST` in tokens controller (fixes #1183).
70
+ - [#1182] Fix loopback IP redirect URIs to conform with RFC8252, p. 7.3 (fixes #1170).
71
+ - [#1179] Authorization Code Grant Flow without client id returns invalid_client error.
72
+ - [#1177] Allow to limit `scopes` for certain `grant_types`
73
+ - [#1176] Fix test factory support for `factory_bot_rails`
74
+ - [#1175] Internal refactor: use `scopes_string` inside `scopes`.
75
+ - [#1168] Allow optional hashing of tokens and secrets.
76
+ - [#1164] Fix error when `root_path` is not defined.
77
+ - [#1162] Fix `enforce_content_type` for requests without body.
78
+
79
+ ## 5.0.2
80
+
81
+ - [#1158] Fix initializer template: change `handle_auth_errors` option
82
+ - [#1157] Remove redundant index from migration template.
83
+
84
+ ## 5.0.1
85
+
86
+ - [#1154] Refactor `StaleRecordsCleaner` to be ORM agnostic.
87
+ - [#1152] Fix migration template: change resource owner data type from integer to Rails generic `references`
88
+ - [#1151] Fix Refresh Token strategy: add proper validation of client credentials both for Public & Private clients.
89
+ - [#1149] Fix for `URIChecker#valid_for_authorization?` false negative when query is blank, but `?` present.
90
+ - [#1140] Allow rendering custom errors from exceptions (issue #844). Originally opened as [#944].
91
+ - [#1138] Revert regression bug (check for token expiration in Authorizations controller so authorization
92
+ triggers every time)
93
+
94
+ ## 5.0.0
95
+
96
+ - [#1127] Change the token_type initials of the Banner Token to uppercase to comply with the RFC6750 specification.
97
+
98
+ ## 5.0.0.rc2
99
+
100
+ - [#1122] Fix AuthorizationsController#new error response to be in JSON format
101
+ - [#1119] Fix token revocation for OAuth apps using "implicit" grant flow
102
+ - [#1116] `AccessGrant`s will now be revoked along with `AccessToken`s when
103
+ hitting the `AuthorizedApplicationController#destroy` route.
104
+ - [#1114] Make token info endpoint's attributes consistent with token creation
105
+ - [#1108] Simple formating of callback URLs when listing oauth applications
106
+ - [#1106] Restrict access to AdminController with 'Forbidden 403' if admin_authenticator is not
107
+ configured by developers.
108
+
109
+ ## 5.0.0.rc1
110
+
111
+ - [#1103] Allow customizing use_refresh_token
112
+ - [#1089] Removed enable_pkce_without_secret configuration option
113
+ - [#1102] Expiration time based on scopes
114
+ - [#1099] All the configuration variables in `Doorkeeper.configuration` now
115
+ always return a non-nil value (`true` or `false`)
116
+ - [#1099] ORM / Query optimization: Do not revoke the refresh token if it is not enabled
117
+ in `doorkeeper.rb`
118
+ - [#996] Expiration Time Base On Grant Type
119
+ - [#997] Allow PKCE authorization_code flow as specified in RFC7636
120
+ - [#907] Fix lookup for matching tokens in certain edge-cases
121
+ - [#992] Add API option to use Doorkeeper without management views for API only
122
+ Rails applications (`api_only`)
123
+ - [#1045] Validate redirect_uri as the native URI when making authorization code requests
124
+ - [#1048] Remove deprecated `Doorkeeper#configured?`, `Doorkeeper#database_installed?`, and
125
+ `Doorkeeper#installed?` method
126
+ - [#1031] Allow public clients to authenticate without `client_secret`. Define an app as
127
+ either public or private/confidential
128
+
129
+ **[IMPORTANT]**: all the applications (clients) now are considered as private by default.
130
+ You need to manually change `confidential` column to `false` if you are using public clients,
131
+ in other case your mobile (or other) applications will not be able to authorize.
132
+ See [#1142](https://github.com/doorkeeper-gem/doorkeeper/issues/1142) for more details.
133
+
134
+ - [#1010] Add configuration to enforce configured scopes (`default_scopes` and
135
+ `optional_scopes`) for applications
136
+ - [#1060] Ensure that the native redirect_uri parameter matches with redirect_uri of the client
137
+ - [#1064] Add :before_successful_authorization and :after_successful_authorization hooks
138
+ - [#1069] Upgrade Bootstrap to 4 for Admin
139
+ - [#1068] Add rake task to cleanup databases that can become large over time
140
+ - [#1072] AuthorizationsController: Memoize strategy.authorize_response result to enable
141
+ subclasses to use the response object.
142
+ - [#1075] Call `before_successful_authorization` and `after_successful_authorization` hooks
143
+ on `create` action as well as `new`
144
+ - [#1082] Fix #916: remember routes mapping and use it required places (fix error with
145
+ customized Token Info route).
146
+ - [#1086, #1088] Fix bug with receiving default scopes in the token even if they are
147
+ not present in the application scopes (use scopes intersection).
148
+ - [#1076] Add config to enforce content type to application/x-www-form-urlencoded
149
+ - Fix bug with `force_ssl_in_redirect_uri` when it breaks existing applications with an
150
+ SSL redirect_uri.
151
+
152
+ ## 4.4.3
153
+
154
+ - [#1143] Adds a config option `opt_out_native_route_change` to opt out of the breaking api
155
+ changed introduced in https://github.com/doorkeeper-gem/doorkeeper/pull/1003
156
+
157
+ ## 4.4.2
158
+
159
+ - [#1130] Backport fix for native redirect_uri from 5.x.
160
+
161
+ ## 4.4.1
162
+
163
+ - [#1127] Backport token type to comply with the RFC6750 specification.
164
+ - [#1125] Backport Quote surround I18n yes/no keys
165
+
166
+ ## 4.4.0
167
+
168
+ - [#1120] Backport security fix from 5.x for token revocation when using public clients
169
+
170
+ **[IMPORTANT]**: all the applications (clients) now are considered as private by default.
171
+ You need to manually change `confidential` column to `false` if you are using public clients,
172
+ in other case your mobile (or other) applications will not be able to authorize.
173
+ See [#1142](https://github.com/doorkeeper-gem/doorkeeper/issues/1142) for more details.
174
+
175
+ ## 4.3.2
176
+
177
+ - [#1053] Support authorizing with query params in the request `redirect_uri` if explicitly present in app's `Application#redirect_uri`
178
+
179
+ ## 4.3.1
180
+
181
+ - Remove `BaseRecord` and introduce additional concern for ordering methods to fix
182
+ braking changes for Doorkeeper models.
183
+ - [#1032] Refactor BaseRequest callbacks into configurable lambdas
184
+ - [#1040] Clear mixins from ActiveRecord DSL and save only overridable API. It
185
+ allows to use this mixins in Doorkeeper ORM extensions with minimum code boilerplate.
186
+
187
+ ## 4.3.0
188
+
189
+ - [#976] Fix to invalidate the second redirect URI when the first URI is the native URI
190
+ - [#1035] Allow `Application#redirect_uri=` to handle array of URIs.
191
+ - [#1036] Allow to forbid Application redirect URI's with specific rules.
192
+ - [#1029] Deprecate `order_method` and introduce `ordered_by`. Sort applications
193
+ by `created_at` in index action.
194
+ - [#1033] Allow Doorkeeper configuration option #force_ssl_in_redirect_uri to be a callable object.
195
+ - Fix Grape integration & add specs for it
196
+ - [#913] Deferred ORM (ActiveRecord) models loading
197
+ - [#943] Fix Access Token token generation when certain errors occur in custom token generators
198
+ - [#1026] Implement RFC7662 - OAuth 2.0 Token Introspection
199
+ - [#985] Generate valid migration files for Rails >= 5
200
+ - [#972] Replace Struct subclassing with block-form initialization
201
+ - [#1003] Use URL query param to pass through native redirect auth code so automated apps can find it.
202
+
203
+ **[IMPORTANT]**: Previously authorization code response route was `/oauth/authorize/<code>`,
204
+ now it is `oauth/authorize/native?code=<code>` (in order to help applications to automatically find the code value).
205
+
206
+ - [#868] `Scopes#&` and `Scopes#+` now take an array or any other enumerable
207
+ object.
208
+ - [#1019] Remove translation not in use: `invalid_resource_owner`.
209
+ - Use Ruby 2 hash style syntax (min required Ruby version = 2.1)
210
+ - [#948] Make Scopes.<=> work with any "other" value.
211
+ - [#974] Redirect URI is checked without query params within AuthorizationCodeRequest.
212
+ - [#1004] More explicit help text for `native_redirect_uri`.
213
+ - [#1023] Update Ruby versions and test against 2.5.0 on Travis CI.
214
+ - [#1024] Migrate from FactoryGirl to FactoryBot.
215
+ - [#1025] Improve documentation for adding foreign keys
216
+ - [#1028] Make it possible to have composite strategy names.
217
+
218
+ ## 4.2.6
219
+
220
+ - [#970] Escape certain attributes in authorization forms.
221
+
222
+ ## 4.2.5
223
+
224
+ - [#936] Deprecate `Doorkeeper#configured?`, `Doorkeeper#database_installed?`, and
225
+ `Doorkeeper#installed?`
226
+ - [#909] Add `InvalidTokenResponse#reason` reader method to allow read the kind
227
+ of invalid token error.
228
+ - [#928] Test against more recent Ruby versions
229
+ - Small refactorings within the codebase
230
+ - [#921] Switch to Appraisal, and test against Rails master
231
+ - [#892] Add minimum Ruby version requirement
232
+
233
+ ## 4.2.0
234
+
235
+ - Security fix: Address CVE-2016-6582, implement token revocation according to
236
+ spec (tokens might not be revoked if client follows the spec).
237
+ - [#873] Add hooks to Doorkeeper::ApplicationMetalController
238
+ - [#871] Allow downstream users to better utilize doorkeeper spec factories by
239
+ eliminating name conflict on `:user` factory.
240
+
241
+ ## 4.1.0
242
+
243
+ - [#845] Allow customising the `Doorkeeper::ApplicationController` base
244
+ controller
245
+
246
+ ## 4.0.0
247
+
248
+ - [#834] Fix AssetNotPrecompiled error with Sprockets 4
249
+ - [#843] Revert "Fix validation error messages"
250
+ - [#847] Specify Null option to timestamps
251
+
252
+ ## 4.0.0.rc4
253
+
254
+ - [#777] Add support for public client in password grant flow
255
+ - [#823] Make configuration and specs ORM independent
256
+ - [#745] Add created_at timestamp to token generation options
257
+ - [#838] Drop `Application#scopes` generator and warning, introduced for
258
+ upgrading doorkeeper from v2 to v3.
259
+ - [#801] Fix Rails 5 warning messages
260
+ - Test against Rails 5 RC1
261
+
262
+ ## 4.0.0.rc3
263
+
264
+ - [#769] Revoke refresh token on access token use. To make use of the new config
265
+ add `previous_refresh_token` column to `oauth_access_tokens`:
266
+
267
+ ```
268
+ rails generate doorkeeper:previous_refresh_token
269
+ ```
270
+
271
+ - [#811] Toughen parameters filter with exact match
272
+ - [#813] Applications admin bugfix
273
+ - [#799] Fix Ruby Warnings
274
+ - Drop `attr_accessible` from models
275
+
276
+ ### Backward incompatible changes
277
+
278
+ - [#730] Force all timezones to use UTC to prevent comparison issues.
279
+ - [#802] Remove `config.i18n.fallbacks` from engine
280
+
281
+ ## 4.0.0.rc2
282
+
283
+ - Fix optional belongs_to for Rails 5
284
+ - Fix Ruby warnings
285
+
286
+ ## 4.0.0.rc1
287
+
288
+ ### Backward incompatible changes
289
+
290
+ - Drops support for Rails 4.1 and earlier
291
+ - Drops support for Ruby 2.0
292
+ - [#778] Bug fix: use the remaining time that a token is still valid when
293
+ building the redirect URI for the implicit grant flow
294
+
295
+ ### Other changes
296
+
297
+ - [#771] Validation error messages fixes
298
+ - Adds foreign key constraints in generated migrations between tokens and
299
+ grants, and applications
300
+ - Support Rails 5
301
+
302
+ ## 3.1.0
303
+
304
+ - [#736] Existing valid tokens are now reused in client_credentials flow
305
+ - [#749] Allow user to raise authorization error with custom messages.
306
+ Under `resource_owner_authenticator` block a user can
307
+ `raise Doorkeeper::Errors::DoorkeeperError.new('custom_message')`
308
+ - [#762] Check doesn’t abort the actual migration, so it runs
309
+ - [#722] `doorkeeper_forbidden_render_options` now supports returning a 404 by
310
+ specifying `respond_not_found_when_forbidden: true` in the
311
+ `doorkeeper_forbidden_render_options` method.
312
+ - [#734] Simplify and remove duplication in request strategy classes
313
+
314
+ ## 3.0.1
315
+
316
+ - [#712] Wrap exchange of grant token for access token and access token refresh
317
+ in transactions
318
+ - [#704] Allow applications scopes to be mass assigned
319
+ - [#707] Fixed order of Mixin inclusion and table_name configuration in models
320
+ - [#712] Wrap access token and refresh grants in transactions
321
+ - Adds JRuby support
322
+ - Specs, views and documentation adjustments
323
+
324
+ ## 3.0.0
325
+
326
+ ### Other changes
327
+
328
+ - [#693] Updates `en.yml`.
329
+
330
+ ## 3.0.0 (rc2)
331
+
332
+ ### Backward incompatible changes
333
+
334
+ - [#678] Change application-specific scopes to take precedence over server-wide
335
+ scopes. This removes the previous behavior where the intersection between
336
+ application and server scopes was used.
337
+
338
+ ### Other changes
339
+
340
+ - [#671] Fixes `NoMethodError - undefined method 'getlocal'` when calling
341
+ the /oauth/token path. Switch from using a DateTime object to update
342
+ AR to using a Time object. (Issue #668)
343
+ - [#677] Support editing application-specific scopes via the standard forms
344
+ - [#682] Pass error hash to Grape `error!`
345
+ - [#683] Generate application secret/UID if fields are blank strings
346
+
347
+ ## 3.0.0 (rc1)
348
+
349
+ ### Backward incompatible changes
350
+
351
+ - [#648] Extracts mongodb ORMs to
352
+ https://github.com/doorkeeper-gem/doorkeeper-mongodb. If you use ActiveRecord
353
+ you don’t need to do any change, otherwise you will need to install the new
354
+ plugin.
355
+ - [#665] `doorkeeper_unauthorized_render_options(error:)` and
356
+ `doorkeeper_forbidden_render_options(error:)` now accept `error` keyword
357
+ argument.
358
+
359
+ ### Removed deprecations
360
+
361
+ - Removes `doorkeeper_for` deprecation notice.
362
+ - Remove `applications.scopes` upgrade notice.
363
+
364
+ ## 2.2.2
365
+
366
+ - [#541] Fixed `undefined method attr_accessible` problem on Rails 4
367
+ (happens only when ProtectedAttributes gem is used) in #599
368
+
369
+ ## 2.2.1
370
+
371
+ - [#636] `custom_access_token_expires_in` bugfixes
372
+ - [#641] syntax error fix (Issue #612)
373
+ - [#633] Send extra details to Custom Token Generator
374
+ - [#628] Refactor: improve orm adapters to ease extension
375
+ - [#637] Upgrade to rspec to 3.2
376
+
377
+ ## 2.2.0 - 2015-04-19
378
+
379
+ - [#611] Allow custom access token generators to be used
380
+ - [#632] Properly fallback to `default_scopes` when no scope is specified
381
+ - [#622] Clarify that there is a logical OR between scopes for authorizing
382
+ - [#635] Upgrade to rspec 3
383
+ - [#627] i18n fallbacks to english
384
+ - Moved CHANGELOG to NEWS.md
385
+
386
+ ## 2.1.4 - 2015-03-27
387
+
388
+ - [#595] HTTP spec: Add `scope` for refresh token scope param
389
+ - [#596] Limit scopes in app scopes for client credentials
390
+ - [#567] Add Grape helpers for easier integration with Grape framework
391
+ - [#606] Add custom access token expiration support for Client Credentials flow
392
+
393
+ ## 2.1.3 - 2015-03-01
394
+
395
+ - [#588] Fixes scopes_match? bug that skipped authorization form in some cases
396
+
397
+ ## 2.1.2 - 2015-02-25
398
+
399
+ - [#574] Remove unused update authorization route.
400
+ - [#576] Filter out sensitive parameters from logs.
401
+ - [#582] The Authorization HTTP header fields are now case insensitive.
402
+ - [#583] Database connection bugfix in certain scenarios.
403
+ - Testing improvements
404
+
405
+ ## 2.1.1 - 2015-02-06
406
+
407
+ - Remove `wildcard_redirect_url` option
408
+ - [#481] Customize token flow OAuth expirations with a config lambda
409
+ - [#568] TokensController: Memoize strategy.authorize_response result to enable
410
+ subclasses to use the response object.
411
+ - [#571] Fix database initialization issues in some configurations.
412
+ - Documentation improvements
413
+
414
+ ## 2.1.0 - 2015-01-13
415
+
416
+ - [#540] Include `created_at` in response.
417
+ - [#538] Check application-level scopes in client_credentials and password flow.
418
+ - [5596227] Check application scopes in AccessToken when present. Fixes a bug in
419
+ doorkeeper 2.0.0 and 2.0.1 referring to application specific scopes.
420
+ - [#534] Internationalizes doorkeeper views.
421
+ - [#545] Ensure there is a connection to the database before checking for
422
+ missing columns
423
+ - [#546] Use `Doorkeeper::` prefix when referencing `Application` to avoid
424
+ possible application model name conflict.
425
+ - [#538] Test with Rails ~> 4.2.
426
+
427
+ ### Potentially backward incompatible changes
428
+
429
+ - Enable by default `authorization_code` and `client_credentials` grant flows.
430
+ Disables implicit and password grant flows by default.
431
+ - [#510, #544, 722113f] Revoked refresh token response bugfix.
432
+
433
+ ## 2.0.1 - 2014-12-17
434
+
435
+ - [#525, #526, #527] Fix `ActiveRecord::NoDatabaseError` on gem load.
436
+
437
+ ## 2.0.0 - 2014-12-16
438
+
439
+ ### Backward incompatible changes
440
+
441
+ - [#448] Removes `doorkeeper_for` helper. Now we use
442
+ `before_action :doorkeeper_authorize!`.
443
+ - [#469] Allow client applications to restrict the set of allowable scopes.
444
+ Fixes #317. `oauth_applications` relation needs a new `scopes` string column,
445
+ non nullable, which defaults to an empty string. To add the column run:
446
+
447
+ ```
448
+ rails generate doorkeeper:application_scopes
449
+ ```
450
+
451
+ If you’d rather do it by hand, your ActiveRecord migration should contain:
452
+
453
+ ```ruby
454
+ add_column :oauth_applications, :scopes, :string, null: false, default: ‘’
455
+ ```
456
+
457
+ ### Removed deprecations
458
+
459
+ - Removes `test_redirect_uri` option. It is now called `native_redirect_uri`.
460
+ - [#446] Removes `mount Doorkeeper::Engine`. Now we use `use_doorkeeper`.
461
+
462
+ ### Others
463
+
464
+ - [#484] Performance improvement - avoid performing order_by when not required.
465
+ - [#450] When password is invalid in Password Credentials Grant, Doorkeeper
466
+ returned 'invalid_resource_owner' instead of 'invalid_grant', as the spec
467
+ declares. Fixes #444.
468
+ - [#452] Allows `revoked_at` to be set in the future, for future expiry.
469
+ Rationale: https://github.com/doorkeeper-gem/doorkeeper/pull/452#issuecomment-51431459
470
+ - [#480] For Implicit grant flow, access tokens can now be reused. Fixes #421.
471
+ - [#491] Reworks of @jasl's #454 and #478. ORM refactor that allows doorkeeper
472
+ to be extended more easily with unsupported ORMs. It also marks the boundaries
473
+ between shared model code and ORM specifics inside of the gem.
474
+ - [#496] Tests with Rails 4.2.
475
+ - [#489] Adds `force_ssl_in_redirect_uri` to force the usage of the HTTPS
476
+ protocol in non-native redirect uris.
477
+ - [#516] SECURITY: Adds `protect_from_forgery` to `Doorkeeper::ApplicationController`
478
+ - [#518] Fix random failures in mongodb.
479
+
480
+ ---
481
+
482
+ ## 1.4.2 - 2015-03-02
483
+
484
+ - [#576] Filter out sensitive parameters from logs
485
+
486
+ ## 1.4.1 - 2014-12-17
487
+
488
+ - [#516] SECURITY: Adds `protect_from_forgery` to `Doorkeeper::ApplicationController`
489
+
490
+ ## 1.4.0 - 2014-07-31
491
+
492
+ - internals
493
+ - [#427] Adds specs expectations.
494
+ - [#428] Error response refactor.
495
+ - [#417] Moves token validation into Access Token class.
496
+ - [#439] Removes redundant module includes.
497
+ - [#443] TokensController and TokenInfoController inherit from ActionController::Metal
498
+ - bug
499
+ - [#418] fixes #243, requests with insufficient scope now respond 403 instead
500
+ of 401. (API change)
501
+ - [#438] fixes #398, native redirect for implicit token grant bug.
502
+ - [#440] namespace fixes
503
+ - enhancements
504
+ - [#432] Keeps query parameters
505
+
506
+ ## 1.3.1 - 2014-07-06
507
+
508
+ - enhancements
509
+ - [#405] Adds facade to more easily get the token from a request in a route
510
+ constraint.
511
+ - [#415] Extend Doorkeeper TokenResponse with an `after_successful_response`
512
+ callback that allows handling of `response` object.
513
+ - internals
514
+ - [#409] Deprecates `test_redirect_uri` in favor of `native_redirect_uri`.
515
+ See discussion in: [#351].
516
+ - [#411] Clean rspec deprecations. General test improvements.
517
+ - [#412] rspec line width can go longer than 80 (hound CI config).
518
+ - bug
519
+ - [#413] fixes #340, routing scope is now taken into account in redirect.
520
+ - [#401] and [#425] application is not required any longer for access_token.
521
+
522
+ ## 1.3.0 - 2014-05-23
523
+
524
+ - enhancements
525
+ - [#387] Adds reuse_access_token configuration option.
526
+
527
+ ## 1.2.0 - 2014-05-02
528
+
529
+ - enhancements
530
+ - [#376] Allow users to enable basic header authorization for access tokens.
531
+ - [#374] Token revocation implementation [RFC 7009]
532
+ - [#295] Only enable specific grant flows.
533
+ - internals
534
+ - [#381] Locale source fix.
535
+ - [#380] Renames `errors_for` to `doorkeeper_errors_for`.
536
+ - [#390] Style adjustments in accordance with Ruby Style Guide form
537
+ Thoughtbot.
538
+
539
+ ## 1.1.0 - 2014-03-29
540
+
541
+ - enhancements
542
+ - [#336] mongoid4 support.
543
+ - [#372] Allow users to set ActiveRecord table_name_prefix/suffix options
544
+ - internals
545
+ - [#343] separate OAuth's admin and user end-point to different layouts, upgrade theme to Bootstrap 3.1.
546
+ - [#348] Move render_options in filter after `@error` has been set
547
+
548
+ ## 1.0.0 - 2014-01-13
549
+
550
+ - bug (spec)
551
+ - [#228] token response `expires_in` value is now in seconds, relative to
552
+ request time
553
+ - [#296] client is optional for password grant type.
554
+ - [#319] If client credentials are present on password grant type they are validated
555
+ - [#326] If client credentials are present in refresh token they are validated
556
+ - [#326] If authenticated client does not match original client that
557
+ obtained a refresh token it responds `invalid_grant` instead of
558
+ `invalid_client`. Previous usage was invalid according to Section 5.2 of
559
+ the spec.
560
+ - [#329] access tokens' `scopes` string wa being compared against
561
+ `default_scopes` symbols, always unauthorizing.
562
+ - [#318] Include "WWW-Authenticate" header with Unauthorized responses
563
+ - enhancements
564
+ - [#293] Adds ActionController::Instrumentation in TokensController
565
+ - [#298] Support for multiple redirect_uris added.
566
+ - [#313] `AccessToken.revoke_all_for` actually revokes all non-revoked
567
+ tokens for an application/owner instead of deleting them.
568
+ - [#333] Rails 4.1 support
569
+ - internals
570
+ - Removes jQuery dependency [fixes #300][pr #312 is related]
571
+ - [#294] Client uid and secret will be generated only if not present.
572
+ - [#316] Test warnings addressed.
573
+ - [#338] Rspec 3 syntax.
574
+
575
+ ---
576
+
577
+ ## 0.7.4 - 2013-12-01
578
+
579
+ - bug
580
+ - Symbols instead of strings for user input.
581
+
582
+ ## 0.7.3 - 2013-10-04
583
+
584
+ - enhancements
585
+ - [#204] Allow to overwrite scope in routes
586
+ - internals
587
+ - Returns only present keys in Token Response (may imply a backwards
588
+ incompatible change). https://github.com/doorkeeper-gem/doorkeeper/issues/220
589
+ - bug
590
+ - [#290] Support for Rails 4 when 'protected_attributes' gem is present.
591
+
592
+ ## 0.7.2 - 2013-09-11
593
+
594
+ - enhancements
595
+ - [#272] Allow issuing multiple access_tokens for one user/application for multiple devices
596
+ - [#170] Increase length of allowed redirect URIs
597
+ - [#239] Do not try to load unavailable Request class for the current phase.
598
+ - [#273] Relax jquery-rails gem dependency
599
+
600
+ ## 0.7.1 - 2013-08-30
601
+
602
+ - bug
603
+ - [#269] Rails 3.2 raised `ActiveModel::MassAssignmentSecurity::Error`.
604
+
605
+ ## 0.7.0 - 2013-08-21
606
+
607
+ - enhancements
608
+ - [#229] Rails 4!
609
+ - internals
610
+ - [#203] Changing table name to be specific in column_names_with_table
611
+ - [#215] README update
612
+ - [#227] Use Rails.config.paths["config/routes"] instead of assuming "config/routes.rb" exists
613
+ - [#262] Add jquery as gem dependency
614
+ - [#263] Add a configuration for ActiveRecord.establish_connection
615
+ - Deprecation and Ruby warnings (PRs merged outside of GitHub).
616
+
617
+ ## 0.6.7 - 2013-01-13
618
+
619
+ - internals
620
+ - [#188] Add IDs to the show views for integration testing [@egtann](https://github.com/egtann)
621
+
622
+ ## 0.6.6 - 2013-01-04
623
+
624
+ - enhancements
625
+ - [#187] Raise error if configuration is not set
626
+
627
+ ## 0.6.5 - 2012-12-26
628
+
629
+ - enhancements
630
+ - [#184] Vendor the Bootstrap CSS [@tylerhunt](https://github.com/tylerhunt)
631
+
632
+ ## 0.6.4 - 2012-12-15
633
+
634
+ - bug
635
+ - [#180] Add localization to authorized_applications destroy notice [@aalvarado](https://github.com/aalvarado)
636
+
637
+ ## 0.6.3 - 2012-12-07
638
+
639
+ - bugfixes
640
+ - [#163] Error response content-type header should be application/json [@ggayan](https://github.com/ggayan)
641
+ - [#175] Make token.expires_in_seconds return nil when expires_in is nil [@miyagawa](https://github.com/miyagawa)
642
+ - enhancements
643
+ - [#166, #172, #174] Behavior to automatically authorize based on a configured proc
644
+ - internals
645
+ - [#168] Using expectation syntax for controller specs [@rdsoze](https://github.com/rdsoze)
646
+
647
+ ## 0.6.2 - 2012-11-10
648
+
649
+ - bugfixes
650
+ - [#162] Remove ownership columns from base migration template [@rdsoze](https://github.com/rdsoze)
651
+
652
+ ## 0.6.1 - 2012-11-07
653
+
654
+ - bugfixes
655
+ - [#160] Removed |routes| argument from initializer authenticator blocks
656
+ - documentation
657
+ - [#160] Fixed description of context of authenticator blocks
658
+
659
+ ## 0.6.0 - 2012-11-05
660
+
661
+ - enhancements
662
+ - Mongoid `orm` configuration accepts only :mongoid2 or :mongoid3
663
+ - Authorization endpoint does not redirect in #new action anymore. It wasn't specified by OAuth spec
664
+ - TokensController now inherits from ActionController::Metal. There might be performance upgrades
665
+ - Add link to authorization in Applications scaffold
666
+ - [#116] MongoMapper support [@carols10cents](https://github.com/carols10cents)
667
+ - [#122] Mongoid3 support [@petergoldstein](https://github.com/petergoldstein)
668
+ - [#150] Introduce test redirect uri for applications
669
+ - bugfixes
670
+ - [#157] Response token status should be `:ok`, not `:success` [@theycallmeswift](https://github.com/theycallmeswift)
671
+ - [#159] Remove ActionView::Base.field_error_proc override (fixes #145)
672
+ - internals
673
+ - Update development dependencies
674
+ - Several refactorings
675
+ - Rails/ORM are easily swichable with env vars (rails and orm)
676
+ - Travis now tests against Mongoid v2
677
+
678
+ ## 0.5.0 - 2012-10-20
679
+
680
+ Official support for rubinius was removed.
681
+
682
+ - enhancements
683
+ - Configure the way access token is retrieved from request (default to bearer header)
684
+ - Authorization Code expiration time is now configurable
685
+ - Add support for mongoid
686
+ - [#78, #128, #137, #138] Application Ownership
687
+ - [#92] Allow users to skip controllers
688
+ - [#99] Remove deprecated warnings for data-\* attributes [@towerhe](https://github.com/towerhe)
689
+ - [#101] Return existing access_token for PasswordAccessTokenRequest [@benoist](https://github.com/benoist)
690
+ - [#104] Changed access token scopes example code to default_scopes and optional_scopes [@amkirwan](https://github.com/amkirwan)
691
+ - [#107] Fix typos in initializer
692
+ - [#123] i18n for validator, flash messages [@petergoldstein](https://github.com/petergoldstein)
693
+ - [#140] ActiveRecord is the default value for the ORM [@petergoldstein](https://github.com/petergoldstein)
694
+ - internals
695
+ - [#112, #120] Replacing update_attribute with update_column to eliminate deprecation warnings [@rmoriz](https://github.com/rmoriz), [@petergoldstein](https://github.com/petergoldstein)
696
+ - [#121] Updating all development dependencies to recent versions. [@petergoldstein](https://github.com/petergoldstein)
697
+ - [#144] Adding MongoDB dependency to .travis.yml [@petergoldstein](https://github.com/petergoldstein)
698
+ - [#143] Displays errors for unconfigured error messages [@timgaleckas](https://github.com/timgaleckas)
699
+ - bugfixes
700
+ - [#102] Not returning 401 when access token generation fails [@cslew](https://github.com/cslew)
701
+ - [#125] Doorkeeper is using ActiveRecord version of as_json in ORM agnostic code [@petergoldstein](https://github.com/petergoldstein)
702
+ - [#142] Prevent double submission of password based authentication [@bdurand](https://github.com/bdurand)
703
+ - documentation
704
+ - [#141] Add rack-cors middleware to readme [@gottfrois](https://github.com/gottfrois)
705
+
706
+ ## 0.4.2 - 2012-06-05
707
+
708
+ - bugfixes:
709
+ - [#94] Uninitialized Constant in Password Flow
710
+
711
+ ## 0.4.1 - 2012-06-02
712
+
713
+ - enhancements:
714
+ - Backport: Move doorkeeper_for extension to Filter helper
715
+
716
+ ## 0.4.0 - 2012-05-26
717
+
718
+ - deprecation
719
+ - Deprecate authorization_scopes
720
+ - database changes
721
+ - AccessToken#resource_owner_id is not nullable
722
+ - enhancements
723
+ - [#83] Add Resource Owner Password Credentials flow [@jaimeiniesta](https://github.com/jaimeiniesta)
724
+ - [#76] Allow token expiration to be disabled [@mattgreen](https://github.com/mattgreen)
725
+ - [#89] Configure the way client credentials are retrieved from request
726
+ - [#b6470a] Add Client Credentials flow
727
+ - internals
728
+ - [#2ece8d, #f93778] Introduce Client and ErrorResponse classes
729
+
730
+ ## 0.3.4 - 2012-05-24
731
+
732
+ - Fix attr_accessible for rails 3.2.x
733
+
734
+ ## 0.3.3 - 2012-05-07
735
+
736
+ - [#86] shrink gem package size
737
+
738
+ ## 0.3.2 - 2012-04-29
739
+
740
+ - enhancements
741
+ - [#54] Ignore Authorization: headers that are not Bearer [@miyagawa](https://github.com/miyagawa)
742
+ - [#58, #64] Add destroy action to applications endpoint [@jaimeiniesta](https://github.com/jaimeiniesta), [@davidfrey](https://github.com/davidfrey)
743
+ - [#63] TokensController responds with `401 unauthorized` [@jaimeiniesta](https://github.com/jaimeiniesta)
744
+ - [#67, #72] Fix for mass-assignment [@cicloid](https://github.com/cicloid)
745
+ - internals
746
+ - [#49] Add Gemnasium status image to README [@laserlemon](https://github.com/laserlemon)
747
+ - [#50] Fix typos [@tomekw](https://github.com/tomekw)
748
+ - [#51] Updated the factory_girl_rails dependency, fix expires_in response which returned a float number instead of integer [@antekpiechnik](https://github.com/antekpiechnik)
749
+ - [#62] Typos, .gitignore [@jaimeiniesta](https://github.com/jaimeiniesta)
750
+ - [#65] Change \_path redirections to \_url redirections [@jaimeiniesta](https://github.com/jaimeiniesta)
751
+ - [#75] Fix unknown method #authenticate_admin! [@mattgreen](https://github.com/mattgreen)
752
+ - Remove application link in authorized app view
753
+
754
+ ## 0.3.1 - 2012-02-17
755
+
756
+ - enhancements
757
+ - [#48] Add if, else options to doorkeeper_for
758
+ - Add views generator
759
+ - internals
760
+ - Namespace models
761
+
762
+ ## 0.3.0 - 2012-02-11
763
+
764
+ - enhancements
765
+ - [#17, #31] Add support for client credentials in basic auth header [@GoldsteinTechPartners](https://github.com/GoldsteinTechPartners)
766
+ - [#28] Add indices to migration [@GoldsteinTechPartners](https://github.com/GoldsteinTechPartners)
767
+ - [#29] Allow doorkeeper to run with rails 3.2 [@john-griffin](https://github.com/john-griffin)
768
+ - [#30] Improve client's redirect uri validation [@GoldsteinTechPartners](https://github.com/GoldsteinTechPartners)
769
+ - [#32] Add token (implicit grant) flow [@GoldsteinTechPartners](https://github.com/GoldsteinTechPartners)
770
+ - [#34] Add support for custom unathorized responses [@GoldsteinTechPartners](https://github.com/GoldsteinTechPartners)
771
+ - [#36] Remove repetitions from the Authorised Applications view [@carvil](https://github.com/carvil)
772
+ - When user revoke an application, all tokens for that application are revoked
773
+ - Error messages now can be translated
774
+ - Install generator copies the error messages localization file
775
+ - internals
776
+ - Fix deprecation warnings in ActiveSupport::Base64
777
+ - Remove deprecation in doorkeeper_for that handles hash arguments
778
+ - Depends on railties instead of whole rails framework
779
+ - CI now integrates with rails 3.1 and 3.2
780
+
781
+ ## 0.2.0 - 2011-12-17
782
+
783
+ - enhancements
784
+ - [#4] Add authorized applications endpoint
785
+ - [#5, #11] Add access token scopes
786
+ - [#10] Add access token expiration by default
787
+ - [#9, #12] Add refresh token flow
788
+ - internals
789
+ - [#7] Improve configuration options with :default
790
+ - Improve configuration options with :builder
791
+ - Refactor config class
792
+ - Improve coverage of authorization request integration
793
+ - bug fixes
794
+ - [#6, #20] Fix access token response headers
795
+ - Fix issue with state parameter
796
+ - deprecation
797
+ - deprecate :only and :except options in doorkeeper_for
798
+
799
+ ## 0.1.1 - 2011-11-30
800
+
801
+ - enhancements
802
+ - [#3] Authorization code must be short lived and single use
803
+ - [#2] Improve views provided by doorkeeper
804
+ - [#1] Skips authorization form if the client has been authorized by the resource owner
805
+ - Improve readme
806
+ - bugfixes
807
+ - Fix issue when creating the access token (wrong client id)
808
+
809
+ ## 0.1.0 - 2011-11-25
810
+
811
+ - Authorization Code flow
812
+ - OAuth applications endpoint