View Source Changelog
v2-3-1
v2.3.1
- Change compile time loading of configuration to only load permissions allowing the app to change things like ttl or secret key at runtime
v2-3-0
v2.3.0
- Fix warning about the usage of
Application.get_env
in the module scope - Change Elixir required version to follow https://github.com/ueberauth/.github/blob/master/SECURITY.md#supported-versions
enhancement
Enhancement
- Check float values of
time
intime_within_drift?/2
.
v2-2-3
v2.2.3
enhancement-1
Enhancement
- Ensure that badly-formatted tokens don't raise an exception when attempting to decode them.
v2-2-2
v2.2.2
enhancement-2
Enhancement
Guardian.Plug.EnsureAuthenticated
will now accept atom keys in the map passed to theclaims
option.
v2-2-1
v2.2.1
enhancement-3
Enhancement
Guardian.Plug.VerifyHeader
andGuardian.Plug.VerifySession
:refresh_from_cookie
option will try refreshing when access token not found, invalid or expired if cookie present #683
v2-2-0
v2.2.0
enhancement-4
Enhancement
- Add
:scheme
option toGuardian.Plug.VerifyHeader
#680 - Add
:refresh_from_cookie
option toGuardian.Plug.VerifyHeader
andGuardian.Plug.VerifySession
to replaceGuardian.Plug.VerifyCookie
plug #675
deprecation
Deprecation
:realm
option configuration ofGuardian.Plug.VerifyHeader
is deprecated please use:scheme
instead.Guardian.Plug.VerifyCookie
is deprecated in favor of:refresh_from_cookie
option inGuardian.Plug.VerifyHeader
andGuardian.Plug.VerifySession
v2-1-2
v2.1.2
enhancement-5
Enhancement
- Documentation improvements
- Parse the kid from the signing secret to the signature #654
bugfix
Bugfix
- Fixed issue with remember_me plug not using the correct ttl #649
- Fixed failing compilation if plug was not included as a dep #633
Thanks goes to all contributors
v2-1-1
v2.1.1
enhancement-6
Enhancement
- Documentation improvements
v2-1-0
v2.1.0
enhancement-7
Enhancement
- Add option
halt
to all plugs. This allows to optionally not halt the connection on error so downstream plugs are still called #617 - Added SlidingCookie plug that allows auto refreshing cookie tokens 616
- Documentation updates
bug-fix
Bug Fix
- Error when permissions was an empty list, was causes by a wrong default value, 625
v2-0-1
v2.0.1
enhancement-8
Enhancement
- Documentation updates
v2-0-0
v2.0.0
enhancement-9
Enhancement
bug-fix-1
Bug Fix
- Fix
cookie_options
configuration overrides #570
breaking-change
Breaking Change
Improved
Guardian.Permissions
. NowGuardian.Permissions
accepts multiple encoders. The interface is defined inGuardian.Permissions.PermissionEncoding
. 585To fix the breaking changes, do something as follow.
- Find
use Guardian.Permissions.Bitwise
- Replace with
use Guardian.Permissions, encoding: Guardian.Permissions.BitwiseEncoding
Notice that we added a key called
encoding
, this key will allow you pass the encoding strategy that fit yours needs.Check the list of supported encoding.
- Find
Moved
Guardian.Phoenix.Socket
to guardian_phoenix. You should be installguardian_phoenix
and it should work as today.
v1-1-0
v1.1.0
- JWT secret fetcher behaviour added
- Let Guardian plug call :revoke on sign_out #458
- Fix an issue where Guardian.Plug tries to clear the wrong keys from the conn #476
v1-0-0
v1.0.0
- Allow for multiple Guardian setups in a single applications
- Adds pipelines
- Significantly updates Guardian api to be more consistent
- Make Phoenix an optional dependency
- Make Plug an optional dependency
- Permissions as an optional add-in
- Deprecates Hooks in favour of callbacks on particular implementations
- Removes Phoenix macros in favour of plain functions
See the 0.14 to 1.0 Upgrade Guide for detailed updating instructions
v0-14-5
v0.14.5
Update the poison and phoenix deps to allow a broader version setting
v0-14-4
v0.14.4
- Fix a param issue in sockets
v0-14-3
v0.14.3
- Fix function specs
- Renew session on
sign_in
- Add a custom claim key from load resource
v0-14-2
v0.14.2
- _Really fix pattern matching error with GuardianDB
v0-14-1
v0.14.1
- Fixed pattern matching error with GuardianDB
v0-14-0
v0.14.0
- Update to Elixir 1.3
- Added test coverage: https://github.com/ueberauth/guardian/pull/234
- Token exchange: https://github.com/ueberauth/guardian/pull/150
- Adds ensure resource plug https://github.com/ueberauth/guardian/pull/238
- Name collision fix: https://github.com/ueberauth/guardian/pull/215
- Support for
{:system, var}
configuration options - Adds an
allowed_drift
option to allow for clock skew
bugs
Bugs
- Replaced taking a function for configuring secret_key with accepting a tuple {mod, func, args}
v0-13-0
v0.13.0
- Change default token type from "token" to "access"
- Fix Dialyzer errors
- Target Elixir 1.3+
- Update Jose and Phoenix dependencies
- Fixes for ttl and exp
- Added integration tests
v0-12-0
v0.12.0
- Add
one_of
to permissions Plug to allow for OR'd sets of permissions as well as AND'd ones - Fix infinite recursion bug when joining channels
v0-11-1
v0.11.1
- Support for secret keys other than "oct" which provides support for signature algorithms other than HSxxx. See #122
- Fix incorrect param name in channel
- Tighten up log calls
- Fix moar typos
- General code cleanup
- Loosen poison requirement to >= 1.3.0
- Use existing resource on conn if already present
- Fix refresh to correctly use revoke
v0-10-1
v0.10.1
- Fix error in Guardian.Plug.ErrorHandler when Accept header is unset.
- Adding Guardian.Plug.EnsureNotAuthenticated to validates that user isn't logged
- Fix bug where TTL was not able to be set when generating tokens
v0-10-0
v0.10.0
- Add a Guardian.Phoenix.Socket module and refactor Guardian.Channel
- Update JOSE to Version 1.6.0. Version 1.6.0 of erlang-jose adds the ability of using libsodium and SHA-3 (keccack) algorithms. This improves speed a lot.
- Adds Travis
- Adds ability to use custom secrets
- Allows peeking at the contents of the token
v0-9-1
v0.9.1
- Stop compiling permissions. This leads to weird bugs when permissions are changed but not recompiled
v0-9-0
v0.9.0
- Remove internal calls to Dict
- Store the type of the token in the typ field rather than the aud field The aud field should default to the sub or failing that, the iss. This is to facilitate implementing an OAuth provider or just allowing folks to declare their own audience.
v0-8-1
v0.8.1
- Fix a bug with logout where it was not checking the session, only the assigns This meant that if you had not verified the session the token would not be revoked.
v0-7-1
v0.7.1
- Adds basic Phoenix controller helpers
v0-7-0
v0.7.0
- Remove Joken from the dependencies and use JOSE instead.
- Add a refresh! function
v0-6-2
v0.6.2
- Adds Guardian.Plug.authenticated?
- Adds simple claim checks to EnsureAuthenticated
bugs-1
Bugs
- Fix an issue with permissions strings vs atoms (not encoding correctly)
v0-6-0
v0.6.0
Rename
Guardian.mint -> Guardian.encode_and_sign
Guardian.verify -> Guardian.decode_and_verify
Guardian.Plug.EnsureSession -> Guardian.Plug.EnsureAuthenticated
Guardian.Plug.VerifyAuthorization -> Guardian.Plug.VerifyHeader
v0-5-2
v0.5.2
Add new hooks on_verify and on_revoke Remove multiple hooks registration
v0-5-1
v0.5.1
Allow multiple hooks to be registered to Guardian
v0-5-0
v0.5.0
Use strings for keys in the token.
v0-4-0
v0.4.0
Remove CSRF tokens support. CSRF tokens are masked and so cannot be adequately implemented.
v0-3-0
v0.3.0
- Add callback hooks for authentication things
v0-2-0
v0.2.0
- Update to use new Joken
- Include permissions
v0-0-1
v0.0.1
Initial Release