Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Releases: omniauth/omniauth

v2.1.4

01 Oct 17:14

Choose a tag to compare

What's Changed

Full Changelog: v2.1.3...v2.1.4

You may now configure an after_request_phase callback on your omniauth builder instance. This callback will be run after the request phase before returning the request result.

v2.1.3

27 Feb 18:50

Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v2.1.2...v2.1.3

v2.1.2

27 Feb 18:44

Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v2.1.1...v2.1.2

v2.1.1

27 Feb 18:43
d2fd0fc

Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v2.1.0...v2.1.1

v1.9.2

19 Aug 14:27
74526f0

Choose a tag to compare

Backports a vulnerability fix that was included in Omniauth 2.0 release to the 1.9 channel.

https://nvd.nist.gov/vuln/detail/CVE-2020-36599

Current Omniauth security policy maintains v2.0 and v2.1 channels for security releases, and security patches should not be typically expected for the v1.9 channel.

v2.1.0

13 Apr 18:35

Choose a tag to compare

This release adds Ruby 3.0+ support.

Due to kwarg changes in ruby 3, we have bumped the minimum required version of Rack to 2.2.3, which is where ruby3 support was added.

Releasing as a minor as dependency resolution should fail at install if an application is locked to a rack below new minimum.

Full Changelog: v2.0.4...v2.1.0

v2.0.4

07 Apr 20:23
e7b8811

Choose a tag to compare

This release removes unnecessary warning logging when accessing GET routes that are not related to the OmniAuth request path.

Thanks to @charlie-wasp and @sponomarev at Evil Martians for the bug find and subsequent PR.

Fix rescuing of application errors when call_app! is used.

18 Feb 18:01
f9dddef

Choose a tag to compare

As a consequence of the changes that were merged in #689, errors
thrown by strategies that utilize other_phase (or more specifically
call_app!), would be caught by omniauth, causing headaches for folks
looking to have those errors handled by their application. This
should allow for errors that come from the app to pass through, while
passing errors that come from the authentication phases to the fail!
handler.

Resolves #1030

Fix for incorrect order of request_validation_phase in test_mode.

02 Feb 15:59
ba115e1

Choose a tag to compare

@jsdalton gave an awesome report of the issue present in test_mode in #1033

The current implementation of mock_call was verifying the token for all requests, regardless of whether the current path is on the omniauth request path. The change was introduced recently in 1b784ff. See #1032 for details.

This creates two problems:

  1. When test mode is on, the authenticity verification logic is run inappropriately against requests where this may not even be wanted.
  2. The behavior varies from actual production behavior, potentially allowing bugs to be introduced by unwary developers.

Note that this bug was only present when OmniAuth was configured for test_mode and using the mock_call phases.

Allow passing rack-protection configuration to default request_validation_phase

16 Jan 21:23
982d1e4

Choose a tag to compare

This release now properly allows an instance of OmniAuth::AuthenticityTokenProtection (with passed in rack-protection configuration) to be used as the request_validation_phase.

Thanks @jkowens #1027

If you haven't already read the release notes for v2.0.0, you should do so.