rodauth 2.36.0 → 2.37.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (159) hide show
  1. checksums.yaml +4 -4
  2. data/lib/rodauth/features/base.rb +15 -1
  3. data/lib/rodauth/features/change_login.rb +2 -2
  4. data/lib/rodauth/features/create_account.rb +2 -2
  5. data/lib/rodauth/features/email_auth.rb +1 -1
  6. data/lib/rodauth/features/internal_request.rb +4 -4
  7. data/lib/rodauth/features/json.rb +5 -0
  8. data/lib/rodauth/features/jwt.rb +5 -9
  9. data/lib/rodauth/features/lockout.rb +1 -1
  10. data/lib/rodauth/features/login.rb +1 -1
  11. data/lib/rodauth/features/login_password_requirements_base.rb +13 -0
  12. data/lib/rodauth/features/reset_password.rb +1 -1
  13. data/lib/rodauth/features/two_factor_base.rb +6 -13
  14. data/lib/rodauth/features/verify_account.rb +2 -2
  15. data/lib/rodauth/features/webauthn_autofill.rb +2 -1
  16. data/lib/rodauth/features/webauthn_login.rb +1 -1
  17. data/lib/rodauth/version.rb +1 -1
  18. data/lib/rodauth.rb +6 -2
  19. metadata +3 -258
  20. data/CHANGELOG +0 -521
  21. data/README.rdoc +0 -1555
  22. data/doc/account_expiration.rdoc +0 -41
  23. data/doc/active_sessions.rdoc +0 -56
  24. data/doc/argon2.rdoc +0 -54
  25. data/doc/audit_logging.rdoc +0 -44
  26. data/doc/base.rdoc +0 -123
  27. data/doc/change_login.rdoc +0 -25
  28. data/doc/change_password.rdoc +0 -26
  29. data/doc/change_password_notify.rdoc +0 -14
  30. data/doc/close_account.rdoc +0 -26
  31. data/doc/confirm_password.rdoc +0 -32
  32. data/doc/create_account.rdoc +0 -27
  33. data/doc/disallow_common_passwords.rdoc +0 -17
  34. data/doc/disallow_password_reuse.rdoc +0 -30
  35. data/doc/email_auth.rdoc +0 -55
  36. data/doc/email_base.rdoc +0 -18
  37. data/doc/error_reasons.rdoc +0 -77
  38. data/doc/guides/admin_activation.rdoc +0 -46
  39. data/doc/guides/already_authenticated.rdoc +0 -10
  40. data/doc/guides/alternative_login.rdoc +0 -46
  41. data/doc/guides/change_table_and_column_names.rdoc +0 -19
  42. data/doc/guides/create_account_programmatically.rdoc +0 -38
  43. data/doc/guides/delay_password.rdoc +0 -25
  44. data/doc/guides/email_only.rdoc +0 -16
  45. data/doc/guides/i18n.rdoc +0 -29
  46. data/doc/guides/internals.rdoc +0 -233
  47. data/doc/guides/links.rdoc +0 -12
  48. data/doc/guides/login_return.rdoc +0 -37
  49. data/doc/guides/migrate_password_hash_algorithm.rdoc +0 -15
  50. data/doc/guides/password_column.rdoc +0 -25
  51. data/doc/guides/password_confirmation.rdoc +0 -37
  52. data/doc/guides/password_requirements.rdoc +0 -43
  53. data/doc/guides/paths.rdoc +0 -51
  54. data/doc/guides/query_params.rdoc +0 -9
  55. data/doc/guides/redirects.rdoc +0 -17
  56. data/doc/guides/registration_field.rdoc +0 -68
  57. data/doc/guides/render_confirmation.rdoc +0 -17
  58. data/doc/guides/require_mfa.rdoc +0 -30
  59. data/doc/guides/reset_password_autologin.rdoc +0 -21
  60. data/doc/guides/share_configuration.rdoc +0 -34
  61. data/doc/guides/status_column.rdoc +0 -28
  62. data/doc/guides/totp_or_recovery.rdoc +0 -16
  63. data/doc/http_basic_auth.rdoc +0 -18
  64. data/doc/internal_request.rdoc +0 -539
  65. data/doc/json.rdoc +0 -56
  66. data/doc/jwt.rdoc +0 -52
  67. data/doc/jwt_cors.rdoc +0 -22
  68. data/doc/jwt_refresh.rdoc +0 -58
  69. data/doc/lockout.rdoc +0 -73
  70. data/doc/login.rdoc +0 -39
  71. data/doc/login_password_requirements_base.rdoc +0 -44
  72. data/doc/logout.rdoc +0 -22
  73. data/doc/otp.rdoc +0 -93
  74. data/doc/otp_lockout_email.rdoc +0 -30
  75. data/doc/otp_modify_email.rdoc +0 -19
  76. data/doc/otp_unlock.rdoc +0 -58
  77. data/doc/password_complexity.rdoc +0 -34
  78. data/doc/password_expiration.rdoc +0 -38
  79. data/doc/password_grace_period.rdoc +0 -24
  80. data/doc/password_pepper.rdoc +0 -52
  81. data/doc/path_class_methods.rdoc +0 -10
  82. data/doc/recovery_codes.rdoc +0 -61
  83. data/doc/release_notes/1.0.0.txt +0 -443
  84. data/doc/release_notes/1.1.0.txt +0 -8
  85. data/doc/release_notes/1.10.0.txt +0 -80
  86. data/doc/release_notes/1.11.0.txt +0 -32
  87. data/doc/release_notes/1.12.0.txt +0 -61
  88. data/doc/release_notes/1.13.0.txt +0 -34
  89. data/doc/release_notes/1.14.0.txt +0 -19
  90. data/doc/release_notes/1.15.0.txt +0 -21
  91. data/doc/release_notes/1.16.0.txt +0 -31
  92. data/doc/release_notes/1.17.0.txt +0 -23
  93. data/doc/release_notes/1.18.0.txt +0 -26
  94. data/doc/release_notes/1.19.0.txt +0 -116
  95. data/doc/release_notes/1.2.0.txt +0 -18
  96. data/doc/release_notes/1.20.0.txt +0 -175
  97. data/doc/release_notes/1.21.0.txt +0 -12
  98. data/doc/release_notes/1.22.0.txt +0 -11
  99. data/doc/release_notes/1.23.0.txt +0 -32
  100. data/doc/release_notes/1.3.0.txt +0 -21
  101. data/doc/release_notes/1.4.0.txt +0 -11
  102. data/doc/release_notes/1.5.0.txt +0 -74
  103. data/doc/release_notes/1.6.0.txt +0 -37
  104. data/doc/release_notes/1.7.0.txt +0 -6
  105. data/doc/release_notes/1.8.0.txt +0 -14
  106. data/doc/release_notes/1.9.0.txt +0 -15
  107. data/doc/release_notes/2.0.0.txt +0 -361
  108. data/doc/release_notes/2.1.0.txt +0 -31
  109. data/doc/release_notes/2.10.0.txt +0 -47
  110. data/doc/release_notes/2.11.0.txt +0 -31
  111. data/doc/release_notes/2.12.0.txt +0 -17
  112. data/doc/release_notes/2.13.0.txt +0 -19
  113. data/doc/release_notes/2.14.0.txt +0 -17
  114. data/doc/release_notes/2.15.0.txt +0 -48
  115. data/doc/release_notes/2.16.0.txt +0 -20
  116. data/doc/release_notes/2.17.0.txt +0 -10
  117. data/doc/release_notes/2.18.0.txt +0 -27
  118. data/doc/release_notes/2.19.0.txt +0 -61
  119. data/doc/release_notes/2.2.0.txt +0 -39
  120. data/doc/release_notes/2.20.0.txt +0 -10
  121. data/doc/release_notes/2.21.0.txt +0 -28
  122. data/doc/release_notes/2.22.0.txt +0 -43
  123. data/doc/release_notes/2.23.0.txt +0 -15
  124. data/doc/release_notes/2.24.0.txt +0 -15
  125. data/doc/release_notes/2.25.0.txt +0 -8
  126. data/doc/release_notes/2.26.0.txt +0 -45
  127. data/doc/release_notes/2.27.0.txt +0 -35
  128. data/doc/release_notes/2.28.0.txt +0 -16
  129. data/doc/release_notes/2.29.0.txt +0 -27
  130. data/doc/release_notes/2.3.0.txt +0 -37
  131. data/doc/release_notes/2.30.0.txt +0 -15
  132. data/doc/release_notes/2.31.0.txt +0 -47
  133. data/doc/release_notes/2.32.0.txt +0 -65
  134. data/doc/release_notes/2.33.0.txt +0 -18
  135. data/doc/release_notes/2.34.0.txt +0 -36
  136. data/doc/release_notes/2.35.0.txt +0 -22
  137. data/doc/release_notes/2.36.0.txt +0 -35
  138. data/doc/release_notes/2.4.0.txt +0 -22
  139. data/doc/release_notes/2.5.0.txt +0 -20
  140. data/doc/release_notes/2.6.0.txt +0 -37
  141. data/doc/release_notes/2.7.0.txt +0 -33
  142. data/doc/release_notes/2.8.0.txt +0 -20
  143. data/doc/release_notes/2.9.0.txt +0 -21
  144. data/doc/remember.rdoc +0 -79
  145. data/doc/reset_password.rdoc +0 -66
  146. data/doc/reset_password_notify.rdoc +0 -17
  147. data/doc/session_expiration.rdoc +0 -28
  148. data/doc/single_session.rdoc +0 -37
  149. data/doc/sms_codes.rdoc +0 -138
  150. data/doc/two_factor_base.rdoc +0 -70
  151. data/doc/update_password_hash.rdoc +0 -7
  152. data/doc/verify_account.rdoc +0 -67
  153. data/doc/verify_account_grace_period.rdoc +0 -19
  154. data/doc/verify_login_change.rdoc +0 -59
  155. data/doc/webauthn.rdoc +0 -118
  156. data/doc/webauthn_autofill.rdoc +0 -19
  157. data/doc/webauthn_login.rdoc +0 -16
  158. data/doc/webauthn_modify_email.rdoc +0 -19
  159. data/doc/webauthn_verify_account.rdoc +0 -9
data/CHANGELOG DELETED
@@ -1,521 +0,0 @@
1
- === 2.36.0 (2024-07-23)
2
-
3
- * Add webauthn_modify_email feature for emailing when a WebAuthn authenticator is added or removed (jeremyevans)
4
-
5
- * Add account_from_id method for retrieving an account using the account id and optional status id (janko) (#431)
6
-
7
- * Add otp_modify_email feature for emailing when TOTP authentication is setup or disabled (jeremyevans)
8
-
9
- * Add otp_lockout_email feature for emailing when TOTP authentication is locked out or unlocked (jeremyevans)
10
-
11
- * Add strftime_format configuration method for configuring display of Time values to users (jeremyevans)
12
-
13
- * Add otp_unlock feature for unlocking TOTP authentication after it has been locked out (jeremyevans)
14
-
15
- * Make internal_request feature work with Roda path_rewriter plugin (jeremyevans) (#425)
16
-
17
- === 2.35.0 (2024-05-28)
18
-
19
- * Handle internal_request_configuration blocks in superclasses (jeremyevans, bjeanes)
20
-
21
- * Avoid unused block warning on Ruby 3.4 (jeremyevans)
22
-
23
- * Add throw_rodauth_error method to make it possible to throw without setting a field error (jf) (#418)
24
-
25
- * Support logging out all active sessions for a loaded account that is not logged in (such as after resetting password) (enescakir) (#401)
26
-
27
- === 2.34.0 (2024-03-22)
28
-
29
- * Add remove_all_active_sessions_except_current method for removing current active session (jeremyevans) (#395)
30
-
31
- * Add remove_all_active_sessions_except_for method for removing active sessions except for given session id (jeremyevans) (#395)
32
-
33
- * Avoid overriding WebAuthn internals when using webauthn 3 (santiagorodriguez96, jeremyevans) (#398)
34
-
35
- * Support overriding webauthn_rp_id when verifying Webauthn credentials (butsjoh, jeremyevans) (#397)
36
-
37
- * Override require_login_redirect in login feature to use login_path (janko) (#396)
38
-
39
- * Do not override convert_token_id_to_integer? if the user has already configured it (janko) (#393)
40
-
41
- * Have uses_two_factor_authentication? handle case where account has been deleted (janko) (#390)
42
-
43
- * Add current_route accessor to allow easy determination of which rodauth route was requested (janko) (#381)
44
-
45
- === 2.33.0 (2023-12-21)
46
-
47
- * Expire SMS confirm code after 24 hours by default (jeremyevans)
48
-
49
- * Do not accidentally confirm SMS phone number on successful authentication of other second factor (Bertg) (#376, #377)
50
-
51
- * Return error response instead of 404 response for requests to valid pages with missing tokens (janko) (#375)
52
-
53
- * Do not override existing primary key value in the cached account when inserting a new account (janko) (#372)
54
-
55
- === 2.32.0 (2023-10-23)
56
-
57
- * Remove use of Base64 in argon2 feature (jeremyevans)
58
-
59
- * Add sms_needs_confirmation_notice_flash configuration method, supporting different flash notice for successful submission (jeremyevans)
60
-
61
- * Support *_response configuration methods for overriding common notice flash/redirect handling in many features (HoneyryderChuck, jeremyevans) (#369)
62
-
63
- * Support hmac_secret rotation in the otp feature (jeremyevans) (#365)
64
-
65
- * Support hmac_secret rotation in the email_base feature (jeremyevans) (#365)
66
-
67
- * Support hmac_secret rotation in the webauthn feature (jeremyevans) (#365)
68
-
69
- * Support hmac_secret rotation in the jwt_refresh feature (jeremyevans) (#365)
70
-
71
- * Support hmac_secret rotation in the single_session feature (jeremyevans) (#365)
72
-
73
- * Support hmac_secret rotation in the remember feature (jeremyevans) (#365)
74
-
75
- * Support hmac_secret rotation via hmac_old_secret configuration method in the active_sessions feature (jeremyevans) (#365)
76
-
77
- * Support argon2 secret rotation via argon2_old_secret configuration method and the update_password_hash feature (jeremyevans) (#365)
78
-
79
- * Support jwt secret rotation via jwt_old_secret configuration method, if using jwt 2.4+ (jeremyevans) (#365)
80
-
81
- === 2.31.0 (2023-08-22)
82
-
83
- * Make clear_session work correctly for internal requests (janko) (#359)
84
-
85
- * Support webauthn_invalid_webauthn_id_message configuration method in the webauthn_autofill feature (janko) (#356)
86
-
87
- * Support webauth features in the internal_request feature (janko) (#355)
88
-
89
- * Allow WebAuthn login to count for two factors if user verification is provided (janko) (#354)
90
-
91
- * Allow explicit use of p_cost in argon2 feature if using argon2 2.1+ (estebanz01) (#353)
92
-
93
- * Add json_response_error? configuration method to json feature, for whether response indicates an error (opya) (#340)
94
-
95
- === 2.30.0 (2023-05-22)
96
-
97
- * Make load_memory in the remember feature not raise NoMethodError if logged in when the account no longer exists (jeremyevans) (#331)
98
-
99
- * Add webauthn_autofill feature, for supporting autofill of webauthn information on the login form (janko) (#328)
100
-
101
- === 2.29.0 (2023-03-22)
102
-
103
- * Support :render=>false plugin options (davekaro) (#319)
104
-
105
- * Add remove_active_session method for removing the active session for a given session id (janko) (#317)
106
-
107
- * Remove current active session when adding new active session (janko) (#314)
108
-
109
- * Extend the remember cookie deadline once an hour by default while logged in (janko, jeremyevans) (#313)
110
-
111
- * Add account! method for returning associated account or loading account based on the session value (janko) (#309)
112
-
113
- === 2.28.0 (2023-02-22)
114
-
115
- * Skip rendering reset password request form on invalid internal request logins (janko) (#303)
116
-
117
- * Make logged_in? return false if using verify_account_grace_period feature and grace_period has expired (janko) (#300)
118
-
119
- * Make password_hash method public (janko) (#299)
120
-
121
- * Add webauthn_key_insert_hash auth method to webauthn feature to control inserts into webauthn keys table (janko) (#298)
122
-
123
- === 2.27.0 (2023-01-24)
124
-
125
- * Rename webauth_credentials_for_get to webauthn_credentials_for_get for consistency (janko) (#295)
126
-
127
- * Hide WebAuthn text inputs by default when using Bootstrap (janko) (#294)
128
-
129
- * Attempt to avoid database errors when invalid tokens are submitted (jeremyevans)
130
-
131
- * Allow button template to be overridden just as other templates can be (jeremyevans) (#280)
132
-
133
- === 2.26.1 (2022-11-08)
134
-
135
- * Fix regression in QR code generation in otp feature causing all black QR code (janko) (#279)
136
-
137
- === 2.26.0 (2022-10-21)
138
-
139
- * Raise a more informative error when using a feature requiring hmac_secret but not setting hmac_secret (janko) (#271)
140
-
141
- * Limit parameter bytesize to 1024 by default, override with max_param_bytesize configuration method (jeremyevans)
142
-
143
- * Skip displaying links for disabled routes (janko) (#269)
144
-
145
- * Do not prefix flash keys with the session key prefix (jeremyevans) (#266)
146
-
147
- * Set configuration_name correctly for internal request classes (janko) (#265)
148
-
149
- * Add argon2_secret configuration method to the argon2 feature to specify the secret/pepper used for argon2 password hashes (janko) (#264)
150
-
151
- * Use white background instead of transparent background for QR code in otp feature (jeremyevans) (#256)
152
-
153
- === 2.25.0 (2022-06-22)
154
-
155
- * Support disabling routes by passing nil/false to *_route methods (janko) (#245)
156
-
157
- === 2.24.0 (2022-05-24)
158
-
159
- * Work around implicit null byte check added in bcrypt 3.1.18 by checking password requirements before other password checks (jeremyevans)
160
-
161
- * Fix invalid HTML on pages with OTP QR codes (jeremyevans)
162
-
163
- * Add recovery_codes_available? configuration method to the recovery_codes feature (janko) (#238)
164
-
165
- * Add otp_available? configuration method to the otp feature (janko) (#238)
166
-
167
- === 2.23.0 (2022-04-22)
168
-
169
- * Don't automatically set :httponly cookie option if :http_only option is set in remember feature (jeremyevans)
170
-
171
- * Fix invalid domain check in internal_request feature when using Rack 3 (jeremyevans)
172
-
173
- * Make removing all multifactor authentication methods mark session as not authenticated by SMS (janko) (#235)
174
-
175
- * Use use_path option when rendering QR code to svg in the otp feature, to reduce svg size (jeremyevans)
176
-
177
- === 2.22.0 (2022-03-22)
178
-
179
- * Ignore parameters where the value includes a null byte by default, add null_byte_parameter_value configuration method for customization (jeremyevans)
180
-
181
- * Handle sessions created before active_sessions feature was enabled during logout (jeremyevans) (#224)
182
-
183
- * Add reset_password_notify for emailing users after successful password resets (jeremyevans)
184
-
185
- * An email method can now be used in external features to DRY up email creation code (jeremyevans)
186
-
187
- * The change_password_notify feature now correctly handles template precompilation (jeremyevans)
188
-
189
- * Fix update_sms to update stored sms hash (bjeanes) (#222)
190
-
191
- === 2.21.0 (2022-02-23)
192
-
193
- * Avoid extra bcrypt hashing on account verification when using account_password_hash_column (janko) (#217)
194
-
195
- * Make require_account public (janko) (#212)
196
-
197
- * Force specific date/time format when displaying webauthn last use time (jeremyevans)
198
-
199
- * Automatically clear the session in require_login if users go beyond verify account grace period (janko) (#211)
200
-
201
- * Fix typo in default value of global_logout_label in active_sessions plugin (sterlzbd) (#209)
202
-
203
- === 2.20.0 (2022-01-24)
204
-
205
- * Change the default implementation of webauth_rp_id to not include the port (jeremyevans) (#203)
206
-
207
- * Make logout of all sessions in active_sessions plugin also remove remember key if using remember plugin (jeremyevans)
208
-
209
- === 2.19.0 (2021-12-22)
210
-
211
- * Add login_maximum_bytes, setting the maximum number of bytes in a login, 255 by default (jeremyevans)
212
-
213
- * Add password_maximum_bytes, setting the maximum number of bytes in a password, nil by default for no limit (jeremyevans)
214
-
215
- * Add password_maximum_length, setting the maximum number of characters in a password, nil by default for no limit (jeremyevans)
216
-
217
- * Support multi-level inheritance of Rodauth::Auth (janko) (#191)
218
-
219
- * Allow internal_request feature to work correctly when loaded into custom Rodauth::Auth subclasses before loading into a Roda application (janko) (#190)
220
-
221
- * Assign internal subclass created by internal_request feature to the InternalRequest constant (janko) (#187)
222
-
223
- === 2.18.0 (2021-11-23)
224
-
225
- * Allow JSON API access to /multifactor-manage to get links to setup/disable multifactor authentication endpoints (jeremyevans)
226
-
227
- * Allow JSON API access to /multifactor-auth to get links to possible multifactor authentication endpoints (jeremyevans)
228
-
229
- * Set configuration_name on class passed via :auth_class option if not already set (janko, jeremyevans) (#181)
230
-
231
- * Use viewbox: true option when creating QR code in otp feature, displays better and easier to style when using rqrcode 2+ (jeremyevans)
232
-
233
- * Make argon2 feature work with argon2 2.1.0 (jeremyevans)
234
-
235
- === 2.17.0 (2021-09-24)
236
-
237
- * Make jwt_refresh work correctly with verify_account_grace_period (jeremyevans)
238
-
239
- * Use 4xx status code when attempting to login to or create an unverified account (janko) (#177, #178)
240
-
241
- === 2.16.0 (2021-08-23)
242
-
243
- * Add Rodauth.lib for using Rodauth as a library (jeremyevans)
244
-
245
- * Make internal_request feature work if the configuration uses only_json? true (janko) (#176)
246
-
247
- === 2.15.0 (2021-07-27)
248
-
249
- * Add path_class_methods feature, for getting paths/URLs using class methods (jeremyevans)
250
-
251
- * Make default base_url method use configured domain (janko) (#171)
252
-
253
- * Add internal_request feature, for interacting with Rodauth by calling methods (jeremyevans, janko)
254
-
255
- === 2.14.0 (2021-06-22)
256
-
257
- * Make jwt_refresh feature allow refresh with expired access tokens even if prefix is not set correctly (jeremyevans) (#168)
258
-
259
- * Make internal account_in_unverified_grace_period? method handle accounts missing or unverified accounts (janko, jeremyevans) (#167)
260
-
261
- * Add remembered_session_id configuration method for getting session id from valid remember token if present (bjeanes) (#166)
262
-
263
- === 2.13.0 (2021-05-22)
264
-
265
- * Make jwt_refresh expired access token support work when using rodauth.check_active_sessions before calling r.rodauth (renchap) (#165)
266
-
267
- * Update default templates to add classes for Bootstrap 5 compatibility (janko) (#164)
268
-
269
- * Add set_error_reason configuration method to allow applications more finer grained error handling (renchap, jeremyevans) (#162)
270
-
271
- === 2.12.0 (2021-04-22)
272
-
273
- * Add configuration methods to active_sessions plugin to control the inserting and updating of rows (janko) (#159)
274
-
275
- === 2.11.0 (2021-03-22)
276
-
277
- * Add same_as_current_login_message and contains_null_byte_message configuration methods to increase translatability (dmitryzuev) (#158)
278
-
279
- * Allow the rodauth plugin to be loaded without a block (janko) (#157)
280
-
281
- * Use new-password autocomplete value for the password fields on the reset password form (basabin54) (#155)
282
-
283
- * Support :auth_class plugin option, to use a specific class instead of creating a Rodauth::Auth subclass (janko) (#153)
284
-
285
- * Make Rodauth configuration work correctly if the rodauth plugin is loaded more than once (janko) (#152)
286
-
287
- === 2.10.0 (2021-02-22)
288
-
289
- * Add argon2 feature to allow use of the argon2 password hash algorithm instead of bcrypt (AlexeyMatskevich, jeremyevans) (#147)
290
-
291
- * Avoid unnecessary previous password queries when using disallow_password_reuse feature with create_account or verify_account features (AlexeyMatskevich, jeremyevans) (#148)
292
-
293
- === 2.9.0 (2021-01-22)
294
-
295
- * Split jwt feature into json and jwt features, with the json feature using standard session support (janko, jeremyevans) (#145)
296
-
297
- * Mark remember cookie as only transmitted over HTTPS by default if created via an HTTPS request (janko) (#144)
298
-
299
- === 2.8.0 (2021-01-06)
300
-
301
- * [SECURITY] Set HttpOnly on remember cookie by default so it cannot be accessed by Javascript (janko) (#142)
302
-
303
- * Clear JWT session when rodauth.clear_session is called if the Roda sessions plugin is used (janko) (#140)
304
-
305
- === 2.7.0 (2020-12-22)
306
-
307
- * Avoid method redefinition warnings in verbose warning mode (jeremyevans)
308
-
309
- * Return expired access token error message in the JWT refresh feature when using an expired token when it isn't allowed (AlexyMatskevich) (#133)
310
-
311
- * Allow Rodauth features to be preloaded, instead of always trying to require them (janko) (#136)
312
-
313
- * Use a default remember cookie path of '/', though this may cause problem with multiple Rodauth configurations on the same domain (janko) (#134)
314
-
315
- * Add auto_remove_recovery_codes? to the recovery_codes feature, for automatically removing the codes when disabling multifactor authentication (SilasSpet, jeremyevans) (#135)
316
-
317
- === 2.6.0 (2020-11-20)
318
-
319
- * Avoid loading features multiple times (janko) (#131)
320
-
321
- * Add around_rodauth method for running code around the handling of all Rodauth routes (bjeanes) (#129)
322
-
323
- * Fix javascript for registration of multiple webauthn keys (bjeanes) (#127)
324
-
325
- * Add allow_refresh_with_expired_jwt_access_token? configuration method to jwt_refresh feature, for allowing refresh with expired access token (jeremyevans)
326
-
327
- * Promote setup_account_verification to public API, useful for automatically sending account verification emails (jeremyevans)
328
-
329
- === 2.5.0 (2020-10-22)
330
-
331
- * Add change_login_needs_verification_notice_flash for easier translation of change_login_notice_flash when using verify_login_change (bjeanes, janko, jeremyevans) (#126)
332
-
333
- * Add login_return_to_requested_location_path for controlling path to use as the requested location (HoneyryderChuck, jeremyevans) (#122, #123)
334
-
335
- === 2.4.0 (2020-09-21)
336
-
337
- * Add session_key_prefix for more easily using separate session keys when using multiple configurations (janko) (#121)
338
-
339
- * Add password_pepper feature for appending a secret key to passwords before they are hashed, supporting secret rotation (janko) (#119)
340
-
341
- === 2.3.0 (2020-08-21)
342
-
343
- * Return an error status instead of an invalid access token when trying to refresh JWT without an access token in the jwt_refresh feature (jeremyevans)
344
-
345
- * Allow {create,drop}_database_authentication_functions to work with UUID keys (monorkin, janko) (#117)
346
-
347
- * Add rodauth.login('login_type') for logging in after setting a valid account (janko) (#114)
348
-
349
- * Make new refresh token available to the after_refresh_token hook by setting it in the response first (jeremyevans)
350
-
351
- * Make the jwt_refresh plugin call before_jwt_refresh_route hook (previously the configuration method was ignored) (AlexeyMatskevich) (#110)
352
-
353
- * Add login_email_regexp, login_not_valid_email_message, and log_valid_email? configuration methods (janko) (#107)
354
-
355
- === 2.2.0 (2020-07-20)
356
-
357
- * Allow removing all jwt_refresh tokens when logging out by providing a value of "all" as the token to remove (jeremyevans)
358
-
359
- * Allow removing specific jwt_refresh token when logging out by providing the token to remove (jeremyevans)
360
-
361
- * Avoid NoMethodError when checking if session is authenticated when using two factor auth, verify_account_grace_period, and email_auth (jeremyevans) (#105)
362
-
363
- * Reduce queries in #authenticated? and #require_authentication when using two factor authentication (janko) (#106)
364
-
365
- * Treat verify_account_email_resend returning false as an error in the verify_account feature (jeremyevans)
366
-
367
- * Fix use of password_dictionary configuration method in password_complexity feature (jeremyevans)
368
-
369
- * Remove unnecessary conditionals (jeremyevans)
370
-
371
- * Add otp_last_use to the otp feature, returning the time of last successful OTP use (jeremyevans) (#103)
372
-
373
- === 2.1.0 (2020-06-09)
374
-
375
- * Do not check CSRF tokens by default for requests using JWT (janko, jeremyevans) (#99)
376
-
377
- * Use new-password autocomplete value for password field when creating accounts (jeremyevans) (#98)
378
-
379
- * Consistently use json_response_body for all JSON responses in jwt feature (arthurmmoreira) (#97)
380
-
381
- * Add check_csrf configuration method to customize CSRF checking (janko) (#96)
382
-
383
- * Have logged_in? when using http_basic_auth feature check for basic authentication (jeremyevans) (#94)
384
-
385
- * Don't consider account open if in unverified grace period without password (janko) (#92)
386
-
387
- === 2.0.0 (2020-05-06)
388
-
389
- * Do not show email auth as an option for unverified accounts if using the verify_account_grace_period feature (jeremyevans) (#88)
390
-
391
- * Generate unlock account key outside of send_unlock_account_email, similar to other email methods (janko) (#89)
392
-
393
- * Default otp_drift to 30 in the otp feature (jeremyevans)
394
-
395
- * Add rodauth.require_http_basic_auth to http_basic_auth feature, similar to require_login (janko) (#86)
396
-
397
- * Rename require_http_basic_auth to require_http_basic_auth? in http_basic_auth feature (janko) (#86)
398
-
399
- * Change http_basic_auth feature to use rodauth.http_basic_auth for handling basic authentication, similar to rodauth.load_memory (janko) (#86)
400
-
401
- * Do not call already_logged_in if logged in when accessing verify_login_change page (janko) (#87)
402
-
403
- * HTML id attributes now use - instead of _ in recovery_codes and remember features (jeremyevans)
404
-
405
- * Allow *_path and *_url methods to accept a hash of query parameters (janko) (#84)
406
-
407
- * Use a danger button when closing accounts (janko) (#83)
408
-
409
- * Handle invalid form inputs in a more bootstrap compatible manner (janko) (#83)
410
-
411
- * Use standard vertical Bootstrap forms instead of horizontal forms in templates (janko) (#83)
412
-
413
- * Make templates compatible with Bootstrap 4, and still display correctly with Bootstrap 3 (janko) (#83)
414
-
415
- * Add check_csrf_opts and check_csrf_block for arguments to the check_csrf! call before Rodauth route dispatching (jeremyevans)
416
-
417
- * Add audit_logging feature, logging changes to a database table (jeremyevans)
418
-
419
- * Add hook_action configuration method, called after all before/after hooks (jeremyevans)
420
-
421
- * Enable email rate limiting by default in lockout, reset_password, and verify_account features (jeremyevans)
422
-
423
- * Add session_expiration_error_status method to the session_expiration feature, used for JSON requests where session has expired (jeremyevans)
424
-
425
- * Add domain configuration method to set an explicit domain, instead of relying on the host of the request (jeremyevans)
426
-
427
- * Add inactive_session_error_status to single_session feature, used for JSON requests where session is no longer active (jeremyevans)
428
-
429
- * Prevent use of previous JWT access tokens after refresh when using jwt_refresh and active_sessions features (jeremyevans)
430
-
431
- * Change default setting of jwt_check_accept? from false to true in the jwt feature (jeremyevans)
432
-
433
- * Automatically check CSRF tokens before calling any Rodauth route by default, allow disabling using check_csrf? false (jeremyevans)
434
-
435
- * Add translate(key, default_value) configuration method and have it affect all translatable content (jeremyevans)
436
-
437
- * Add *_page_title configuration methods for all *_view configuration methods (jeremyevans)
438
-
439
- * Default to using Roda's route_csrf plugin for CSRF support, with :csrf=>:rack_csrf available for using rack_csrf (jeremyevans)
440
-
441
- * Allow ability for user to fix an incorrect login when requesting a password reset (janko, jeremyevans) (#76)
442
-
443
- * Add two_factor_auth_return_to_requested_location? to support returning to original page after successful second factor authentication (janko) (#69)
444
-
445
- * Add login_return_to_requested_location? to support returning to original page after successful login (janko) (#69)
446
-
447
- * Add rodauth.require_password_authentication method to confirm_password feature (janko, jeremyevans) (#75)
448
-
449
- * Make remember feature no longer depend on confirm_password (janko) (#79)
450
-
451
- * Replace {create_account,reset_password_request,verify_account_resend}_link configuration methods with *_link_text (janko) (#77)
452
-
453
- * Remove remembered_session_key configuration method, no longer needed (janko) (#80)
454
-
455
- * Add rodauth.possible_authentication_methods for the available authentication methods for the account (jeremyevans)
456
-
457
- * Add active_sessions feature for disabling session reuse after logout, and allowing global logout of all sessions (jeremyevans)
458
-
459
- * Add webauthn_verify_account feature for passwordless WebAuthn setup during account verification (jeremyevans)
460
-
461
- * Allow confirm_password feature to operate as second factor authentication if using webauthn login (jeremyevans)
462
-
463
- * Add webauthn_login feature for passwordless login via WebAuthn (jeremyevans)
464
-
465
- * Do not allow two factor authentication using same type as primary authentication (jeremyevans)
466
-
467
- * Do not require passwords by default if the account does not have a password (jeremyevans)
468
-
469
- * Remove clear_remembered_session_key and two_factor_session_key configuration methods, no longer needed (jeremyevans)
470
-
471
- * Store authentication methods used in the session, available via rodauth.authenticated_by (jeremyevans)
472
-
473
- * Do not require login confirmation by default if verifying accounts or login changes (jeremyevans)
474
-
475
- * Add mark_input_fields_with_inputmode? and inputmode_for_field? configuration methods for controlling inputmode (jeremyevans)
476
-
477
- * Support and enable inputmode=numeric attributes by default for otp auth code and sms code fields (jeremyevans)
478
-
479
- * Add sms_phone_input_type and default to tel instead of using text for SMS phone input (jeremyevans)
480
-
481
- * Add mark_input_fields_with_autocomplete? and autocomplete_for_field? configuration methods for controlling autocomplete (jeremyevans)
482
-
483
- * Support and enable autocomplete attributes by default for fields (jeremyevans)
484
-
485
- * Add login_uses_email? configuration method for whether to treat logins as email addresses (jeremyevans)
486
-
487
- * Remove the verify change login feature, users should switch to the verify login change feature (jeremyevans)
488
-
489
- * Change default setting of json_response_success_key to success in the jwt feature (jeremyevans)
490
-
491
- * Remove deprecated account_model configuration method (jeremyevans)
492
-
493
- * Remove all deprecated configuration and runtime method aliases in the lockout, verify_account, email_auth, reset_password, and verify_login_change features (jeremyevans)
494
-
495
- * Remove deprecated before_otp_authentication_route configuration method (jeremyevans)
496
-
497
- * Change default setting of login_input_type to email if login_column is :email (jeremyevans)
498
-
499
- * Change default setting of mark_input_fields_as_required? to true (jeremyevans)
500
-
501
- * Change default setting of verify_account_set_password? in verify_account feature to true (jeremyevans)
502
-
503
- * Change default setting of json_response_custom_error_status? in jwt feature to true (jeremyevans)
504
-
505
- * Add auto_add_recovery_codes? configuration method to recovery codes feature, and default to false (jeremyevans)
506
-
507
- * Add base_url configuration method to set an explicit base for URLs, instead of relying on the base_url of the request (jeremyevans)
508
-
509
- * Add webauthn feature to handle WebAuthn authentication (jeremyevans)
510
-
511
- * Fix corner cases when disabling a second factor when multiple second factors have been setup (jeremyevans)
512
-
513
- * Don't override second factor used to authenticate when setting up additional second factor authentication (jeremyevans)
514
-
515
- * Add two factor auth, manage, and disable pages (jeremyevans)
516
-
517
- * Drop support for Ruby 1.8 (jeremyevans)
518
-
519
- === Older
520
-
521
- See doc/CHANGELOG.old