All Versions
23
Latest Version
Avg Release Cycle
52 days
Latest Release
399 days ago
Changelog History
Page 1
Changelog History
Page 1
-
v0.4.13 Changes
April 27, 2022๐ Now supports
ecto_sql
3.8.x and requires Elixir 1.11+.- Added [dynamic strategy configuration guide](guides/dynamic_strategy_configuration.md)
-
v0.4.12 Changes
September 30, 2021๐ Now supports Phoenix 1.6.x.
-
v0.4.11 Changes
July 14, 2021๐ Bug fixes
- โ [
PowAssent.Ecto.UserIdentities.Context
] The macro no longer throws warning in Elixir 1.12
- โ [
-
v0.4.10 Changes
November 24, 2020โจ Enhancements
- [
PowAssent.Plug
] Fixed bug where the:cache_store_backend
was not being loaded from the application environment correctly #198
- [
-
v0.4.9 Changes
October 18, 2020 -
v0.4.8 Changes
May 18, 2020โจ Enhancements
- [
PowAssent.Plug
] AddedPowAssent.Plug.put_create_session_callback/2
#178 - [
PowAssent.Plug
] AddedPowAssent.Plug.fetch_config/1
#178 - [
PowAssent.Plug
] Now calls create session callbacks set withPowAssent.Plug.put_create_session_callback/2
when a session is created #178 - [
PowAssent.Plug.Reauthorization
] Added plug to enable reauthorization #178 - ๐ป [
PowAssent.Phoenix.AuthorizationController
] Now instead of raising an exception for strategy errors, the user is redirected to the sign in page with a generic error message #179 - [
PowAssent.Config
] AddedPowAssent.Config.merge_provider_config/3
#166 - [
PowAssent.Plug
] AddedPowAssent.Plug.merge_provider_config/3
#166
- [
-
v0.4.7 Changes
April 22, 2020๐ Now support Phoenix 1.5 and requires Pow
~> 1.0.19
and Elixir 1.7. -
v0.4.6 Changes
February 16, 2020The callback flow has been changed so sessions are now stored in the backend cache with
PowAssent.Store.SessionCache
instead of usingPlug.Session
. This prevents exposure of sensitive data, as the only thing stored in the Plug session is a random UUID.โก๏ธ Updated Pow requirement to
~> 1.0.17
. #141โจ Enhancements
- ๐ [
PowAssent.Plug
] AddedPowAssent.Plug.change_user/4
#118 - [
PowAssent.Operations
] AddedPowAssent.Operations.user_identity_changeset/4
#118 - [
PowAssent.Phoenix.AuthorizationController
] Now prevents user enumeration attack usingPowEmailConfirmation.Phoenix.ControllerCallbacks
whenPowEmailConfirmation
extension is enabled #128 - ๐ [
PowAssent.Phoenix.AuthorizationController
] Now stores:changeset
in session when redirecting to:add_user_id
page #137 - [
PowAssent.Phoenix.RegistrationController
] Now prevents user enumeration attack usingPowEmailConfirmation.Phoenix.ControllerCallbacks
whenPowEmailConfirmation
extension is enabled #128 - ๐ [
PowAssent.Phoenix.RegistrationController
] Now uses:changeset
stored in the session when rendering:add_user_id
page #137 - [
PowAssent.Plug
] Moved business logic away fromPowAssent.Phoenix.AuthorizationController
intoPowAssent.Plug.callback_upsert/4
that will authenticate, upsert user identity, or create user #133 - [
PowAssent.Store.SessionCache
] Added session store module #135 - [
PowAssent.Plug
] AddedPowAssent.Plug.init_session/1
#135 - [
PowAssent.Plug
] AddedPowAssent.Plug.put_session/3
#135 - [
PowAssent.Plug
] AddedPowAssent.Plug.delete_session/2
#135
๐ Bug fixes
- ๐ [
PowAssent.Ecto.Schema
] Fixed issue inPowAssent.Ecto.Schema.changeset/2
where confirmation token was not set thus allowing users with unconfirmed email to sign in #121
๐ Documentation
- Added legacy migration guide #129
- Added API guide #143
- ๐ [
-
v0.4.5 Changes
December 06, 2019- [
PowAssent.Phoenix.AuthorizationController
] Now supports:request_path
param so the user will be redirected back to:request_path
after successful authorization #110 - ๐ [
PowAssent.Phoenix.ViewHelpers
]PowAssent.Phoenix.ViewHelpers.authorization_link/3
now adds:request_path
to the query param if assigned to the conn #110 - ๐ [
PowAssent.Phoenix.ViewHelpers
]PowAssent.Phoenix.ViewHelpers.authorization_link/3
,PowAssent.Phoenix.ViewHelpers.deauthorization_link/3
, andPowAssent.Phoenix.ViewHelpers.provider_links/2
now accepts keyword list with options to be passed on to the link generation #112
- [
-
v0.4.4 Changes
November 22, 2019Note: This release contains an important security fix.
- [
PowAssent.Plug
] Now usesString.to_existing_atom/1
inPowAssent.Plug.providers_for_current_user/1
- [
PowAssent.Plug
] Fixed security issue by removingString.to_atom/1
for user provided binary inPowAssent.Plug.authorize_url/3
andPowAssent.Plug.callback/4
- [
PowAssent.Config
]PowAssent.Config.get_provider_config/2
now accepts binary provider
- [