Changelog
This is the changelog for Pwned by Core Theory.
1.5.3 (2022-10-17)
Fixes
- Add proper Have I Been Pwned? test emails per their API documentation.
- Change module attribute for
@hibp_api_key
to variable. - Update dependencies.
1.5.2 (2021-01-30)
Enhancements
- Add clearer test coverage for both
master
andstaging
branches toREADME.md
. - Refactor GitHub Actions workflow.
- Improve function docs clarity for
EmailFlattener.flatten/1
andEmailReducer.reduce_email_list/1
. - Add a security policy.
1.5.1 (2021-01-27)
Enhancements
- Format changelog.
- Add further reading section with notes on rate limiting and additional resources.
1.5.0 (2021-01-27)
Enhancements
- Replace unsafe runtime environment call with compile time call in
api_client.ex
. - Refactor
api_client.ex
for clarity, performance, and maintainability.
1.2.4 (2021-01-26)
Enhancements
- Add
hibp-api-key
to CI to enable checking email and password tests.
1.2.3 (2021-01-26)
Enhancements
- Add default for application environment
:user_agent
and ability to override in 3rd party application config files. - Add usage explanation for setting the
:user_agent
in 3rd party applications. - Add
@moduledoc
toPwned.APIClient
.
1.2.2 (2021-01-26)
Enhancements
- Add
CHANGELOG.md
file.
1.2.1 (2021-01-26)
Bug fixes
- Update application name to match
:pwned_coretheory
. Previous application name mismatch was causingPwned.check_email(email)
to return{:error, "unauthorized api key"}
with valid key.