Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12:Update
rubygem-devise
rubygem-devise.changes
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File rubygem-devise.changes of Package rubygem-devise
------------------------------------------------------------------- Thu May 28 04:29:45 UTC 2015 - coolo@suse.com - updated to version 3.5.1 see installed CHANGELOG.md ------------------------------------------------------------------- Tue Feb 10 17:36:49 UTC 2015 - coolo@suse.com - updated to version 3.4.1 ------------------------------------------------------------------- Mon Oct 13 09:49:29 UTC 2014 - coolo@suse.com - adapt to new rubygem packaging ------------------------------------------------------------------- Tue Mar 18 14:57:13 UTC 2014 - coolo@suse.com - updated to version 3.2.4 * enchancements * `bcrypt` dependency updated due https://github.com/codahale/bcrypt-ruby/pull/86. * View generator now can generate specific views with the `-v` flag, like `rails g devise:views -v sessions` (by @kayline) ------------------------------------------------------------------- Sat Feb 22 06:25:42 UTC 2014 - coolo@suse.com - updated to version 3.2.3 * enhancements * Devise will use the `secret_key_base` on Rails 4+ applications as its `secret_key`. You can change this and use your own secret by changing the `devise.rb` initializer. * bug fix * Migrations will be properly generated when using rails 4.1.0. ------------------------------------------------------------------- Tue Nov 26 07:28:28 UTC 2013 - coolo@suse.com - updated to version 3.2.2 * bug fix * Ensure timeoutable works when `sign_out_all_scopes` is false (by @louman) * Keep the query string when storing location (by @csexton) * Require rails generator base class in devise generators ------------------------------------------------------------------- Fri Nov 22 08:40:30 UTC 2013 - coolo@suse.com - updated to version 3.2.1 Security announcement: http://blog.plataformatec.com.br/2013/11/e-mail-enumeration-in-devise-in-paranoid-mode * enhancements * Add `store_location_for` helper and ensure it is safe (by @matthewrudy and @homakov) * Add `yield` around resource methods in Devise controllers (by @edelpero) * bug fix * Bring `password_digest` back to fix compatibility with `devise-encryptable` * Avoid e-mail enumeration on sign in when in paranoid mode ### 3.2.0 * enhancements * Previously deprecated token authenticatable and insecure lookups have been removed * Add a class method so you can encrypt passwords from fixtures (by @tenderlove) * Send custom message when user enters invalid password and it has only one attempt to enter correct password before his account will be locked (by @Lightpower) * Prevent mutation of values assigned to case and whitespace santitized members (by @iamvery) * Separate redirects and flash messages in `navigational_formats` and `flashing_formats` (by @ssendev) * bug fix * A GET to sign_in page shouldn't extend the session (by @drewish) * Splat the arguments to `strong_parameters#permit` to work around a limitation in the `strong_parameters` gem (by @memberful) * Omniauth now uses `mapping.fullpath` when generating routes. This means if you call `devise_for :users` inside a scope, like `scope "/api"`, the scope will now apply to the omniauth route (by @AlexanderZaytsev) * Ensure timeoutable hook respects `Devise.sign_out_all_scopes` configuration * deprecations * `expire_session_data_after_sign_in!` has been deprecated in favor of `expire_data_after_sign_in!` ------------------------------------------------------------------- Fri Oct 4 07:17:58 UTC 2013 - coolo@suse.com - updated to version 3.1.1 * bug fix * Improve default message which asked users to sign in even when they were already signed (by @gregates) * Improve error message for when the `config.secret_key` is missing ------------------------------------------------------------------- Sat Sep 7 05:20:00 UTC 2013 - coolo@suse.com - updated to version 3.1.0 Security announcement: http://blog.plataformatec.com.br/2013/08/devise-3-1-now-with-more-secure-defaults/ * backwards incompatible changes * Do not store confirmation, unlock and reset password tokens directly in the database. This means tokens previously stored in the database are no longer valid. You can reenable this temporarily by setting `config.allow_insecure_tokens_lookup = true` in your configuration file. It is recommended to keep this configuration set to true just temporarily in your production servers only to aid migration * The Devise mailer and its views were changed to explicitly receive a token argument as `@token`. You will need to update your mailers and re-copy the views to your application with `rails g devise:views` * Sanitization of parameters should be done by calling `devise_parameter_sanitizer.sanitize(:action)` instead of `devise_parameter_sanitizer.for(:action)` * deprecations * Token authentication is deprecated * enhancements * Better security defaults * Allow easier customization of parameter sanitizer (by @alexpeattie) * bug fix * Do not confirm e-mail after password reset (by @moll) * Do not sign in after confirmation * Do not store confirmation, unlock and reset password tokens directly in the database * Do not compare directly against confirmation, unlock and reset password tokens * Skip storage for cookies on unverified requests ------------------------------------------------------------------- Mon Aug 26 05:05:51 UTC 2013 - coolo@suse.com - updated to version 3.0.3 == 3.0.3 * bug fix * Do not confirm account after reset password == 3.0.2 * bug fix * Skip storage for cookies on unverified requests == 3.0.1 Security announcement: http://blog.plataformatec.com.br/2013/08/csrf-token-fixation-attacks-in-devise/ ------------------------------------------------------------------- Tue Aug 6 17:45:14 UTC 2013 - coolo@suse.com - updated to version 3.0.1 * enhancements * Add after_confirmation callback * bug fix * When using rails 3.2, the generator adds 'attr_accessible' to the model (by @jcoyne) * Clean up CSRF token after authentication (by @homakov). Notice this change will clean up the CSRF Token after authentication (sign in, sign up, etc). So if you are using AJAX for such features, you will need to fetch a new CSRF token from the server. ------------------------------------------------------------------- Sun Jul 21 07:27:49 UTC 2013 - coolo@suse.com - updated to version 3.0.0 * enhancements * Rails 4 and Strong Parameters compatibility (by @carlosantoniodasilva, @josevalim, @latortuga, @lucasmazza, @nashby, @rafaelfranca, @spastorino) * Drop support for Rails < 3.2 and Ruby < 1.9.3 * Enable to skip sending reconfirmation email when reconfirmable is on and skip_confirmation_notification! is invoked (by @tkhr) * bug fix * Errors on unlock are now properly reflected on the first `unlock_keys` ------------------------------------------------------------------- Wed May 8 06:59:44 UTC 2013 - coolo@suse.com - updated to version 2.2.4 * enhancements * Add `destroy_with_password` to `DatabaseAuthenticatable`. Allows destroying a record when `:current_password` matches, similarly to how `update_with_password` works. (by @mich iel3) * Allow to override path after password resetting (by @worker8) * Add `#skip_confirmation_notification!` method to `Confirmable`. Allows skipping confirmation email without auto-confirming. (by @gregates) * allow_unconfirmed_access_for config from `:confirmable` module can be set to `nil` that means unconfirmed access for unlimited time. (by @nashby) * Support Rails' token strategy on authentication (by @robhurring) * Support explicitly setting the http authentication key via `config.http_authentication_key` (by @neo) * bug fix * Do not redirect when accessing devise API via JSON. (by @sebastianwr) * Generating scoped devise views now uses the correct scoped shared links partial instead of the default devise one (by @nashby) * Fix inheriting mailer templates from `Devise::Mailer` * Fix a bug when procs are used as default mailer in Devise (by @tomasv) ------------------------------------------------------------------- Thu Feb 7 17:10:59 UTC 2013 - lslezak@suse.cz - updated to version 2.2.3 * fixed security issue (wrong records may be read when sending specifically crafted requests) (bnc#800955) ------------------------------------------------------------------- Thu Jan 24 06:47:50 UTC 2013 - coolo@suse.com - updated to version 2.2.2 * bug fix * Fix bug when checking for reconfirmable in templates * bug fix * Fix regression with case_insensitive_keys * Fix regression when password is blank when it is invalid ------------------------------------------------------------------- Fri Aug 31 12:51:22 UTC 2012 - coolo@suse.com - update to 2.1.2, see CHANGELOG.md ------------------------------------------------------------------- Thu May 31 10:43:19 UTC 2012 - lslezak@suse.cz - updated to 1.5.3 ------------------------------------------------------------------- Fri Jun 11 15:29:26 UTC 2010 - mrueckert@suse.de - update to version 1.0.7 * Ensure password confirmation is always required * authenticatable was deprecated and renamed to database_authenticatable * confirmable is not included by default on generation ------------------------------------------------------------------- Fri Jun 11 10:00:01 UTC 2010 - mrueckert@suse.de - use rubygems_requires macro ------------------------------------------------------------------- Mon Apr 12 19:45:24 UTC 2010 - mrueckert@suse.de - initial package
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor