Skip to content

Releases: doorkeeper-gem/doorkeeper

v5.1.0

17 Apr 14:37
2dac191
Compare
Choose a tag to compare

See Upgrade guides for migration to a new version.

  • [#1243]: Add nil check operator in token checking at token introspection.
  • [#1241] Explaining foreign key options for resource owner in a single place
  • [#1237] Allow to set blank redirect URI if Doorkeeper configured to use redirect URI-less grant flows.
  • [#1234] Fix StaleRecordsCleaner to properly work with big amount of records.
  • [#1228] Allow to explicitly set non-expiring tokens in custom_access_token_expires_in configuration
    option using Float::INIFINITY return value.
  • [#1224] Do not try to store token if not found by fallback hashing strategy.
  • [#1223] Update Hound/Rubocop rules, correct Doorkeeper codebase to follow style-guides.
  • [#1220] Drop Rails 4.2 & Ruby < 2.4 support.

v5.1.0.rc2

22 Mar 07:51
7e16d1b
Compare
Choose a tag to compare
v5.1.0.rc2 Pre-release
Pre-release
  • [#1208] Unify hashing implementation into secret storing strategies

    [IMPORTANT]: If you have been using the master branch of doorkeeper with bcrypt in your Gemfile.lock,
    your application secrets have been hashed using BCrypt. To restore this behavior, use the initializer option
    use_application_hashing using: 'Doorkeeper::SecretStoring::BCrypt.

  • [#1216] Add nil check to expires_at method.

  • [#1215] Fix deprecates for Rails 6.

  • [#1214] Scopes field accepts array.

  • [#1209] Fix tokens validation for Token Introspection request.

  • [#1202] Use correct HTTP status codes for error responses.

    [IMPORTANT]: this change might break your application if you were relying on the previous
    401 status codes, this is now a 400 by default, or a 401 for invalid_client and invalid_token errors.

  • [#1201] Fix custom TTL block client parameter to always be an Doorkeeper::Application instance.

    [IMPORTANT]: those who defined custom_access_token_expires_in configuration option need to check
    their block implementation: if you are using oauth_client.application to get Doorkeeper::Application
    instance, then you need to replace it with just oauth_client.

  • [#1200] Increase default Doorkeeper access token value complexity (urlsafe_base64 instead of just hex)
    matching RFC6749/RFC6750.

    [IMPORTANT]: this change have possible side-effects in case you have custom database constraints for
    access token value, application secrets, refresh tokens or you patched Doorkeeper models and introduced
    token value validations, or you are using database with case-insensitive WHERE clause like MySQL
    (you can face some collisions). Before this change access token value matched [a-f0-9] regex, and now
    it matches [a-zA-Z0-9\-_]. In case you have such restrictions and your don't use custom token generator
    please change configuration option default_generator_method to :hex.

  • [#1195] Allow to customize Token Introspection response (fixes #1194).

  • [#1189] Option to set token_reuse_limit.

  • [#1191] Try to load bcrypt for hashing of application secrets, but add fallback.

v5.1.0.rc1

17 Jan 08:47
f2816be
Compare
Choose a tag to compare
v5.1.0.rc1 Pre-release
Pre-release
  • [#1188] Use params instead of request.POST in tokens controller (fixes #1183).
  • [#1182] Fix loopback IP redirect URIs to conform with RFC8252, p. 7.3 (fixes #1170).
  • [#1179] Authorization Code Grant Flow without client id returns invalid_client error.
  • [#1177] Allow to limit scopes for certain grant_types
  • [#1176] Fix test factory support for factory_bot_rails
  • [#1175] Internal refactor: use scopes_string inside scopes.
  • [#1168] Allow optional hashing of tokens and secrets.
  • [#1164] Fix error when root_path is not defined.
  • [#1162] Fix enforce_content_type for requests without body.

v5.0.2

25 Oct 09:28
67a2cfc
Compare
Choose a tag to compare
  • [#1158] Fix initializer template: change handle_auth_errors option
  • [#1157] Remove redundant index from migration template.

v5.0.1

10 Oct 14:09
6004331
Compare
Choose a tag to compare
  • [#1140] Allow rendering custom errors from exceptions (issue #844). Originally opened as [#944].
  • [#1138] Revert regression bug (check for token expiration in Authorizations controller so authorization
    triggers every time)
  • [#1149] Fix for URIChecker#valid_for_authorization? false negative when query is blank, but ? present.
  • [#1151] Fix Refresh Token strategy: add proper validation of client credentials both for Public & Private clients.
  • [#1152] Fix migration template: change resource owner data type from integer to Rails generic references
  • [#1154] Refactor StaleRecordsCleaner to be ORM agnostic.

v4.4.3

21 Sep 11:37
f3822ea
Compare
Choose a tag to compare
  • [#1143] Adds a config option opt_out_native_route_change to opt out of the breaking api changed introduced in #1003

v5.0.0

24 Aug 13:55
4c94445
Compare
Choose a tag to compare
  • [#1127] Change the token_type initials of the Banner Token to uppercase to comply with the RFC6750 specification.

v4.4.2

20 Aug 15:25
9772e05
Compare
Choose a tag to compare
  • [#1130] Backport fix for native redirect_uri from 5.x.

v4.4.1

27 Jul 15:00
ff635c7
Compare
Choose a tag to compare
  • [#1127] Backport token type to comply with the RFC6750 specification.
  • [#1125] Backport Quote surround I18n yes/no keys

v5.0.0.rc2

17 Jul 10:04
178e86c
Compare
Choose a tag to compare
v5.0.0.rc2 Pre-release
Pre-release
  • [#1106] Restrict access to AdminController with 'Forbidden 403' if admin_authenticator is not
    configured by developers..
  • [#1108] Simple formating of callback URLs when listing oauth applications
  • [#1116] AccessGrants will now be revoked along with AccessTokens when
    hitting the AuthorizedApplicationController#destroy route.
  • [#1114] Make token info endpoint's attributes consistent with token creation
  • [#1119] Fix token revocation for OAuth apps using "implicit" grant flow
  • [#1122] Fix AuthorizationsController#new error response to be in JSON format