Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump doorkeeper from 5.5.2 to 5.6.6 #493

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jun 12, 2023

Bumps doorkeeper from 5.5.2 to 5.6.6.

Release notes

Sourced from doorkeeper's releases.

v5.6.6

  • #1644 Update HTTP headers.
  • #1646 Block public clients automatic authorization skip.
  • #1648 Add custom token attributes to Refresh Token Request.
  • #1649 Fixed custom_access_token_attributes related errors.

v5.6.5

  • #1602 Allow custom data to be stored inside access grants/tokens.
  • #1634 Code refactoring for custom token attributes.
  • #1639 Add grant type validation to avoid Internal Server Error for DELETE /oauth/authorize endpoint.

v5.6.4

  • #1633 Apply ORM configuration in #to_prepare block to avoid autoloading errors.

v5.6.3

  • #1622 Drop support for Rubies 2.5 and 2.6
  • #1605 Fix URI validation for Ruby 3.2+.
  • #1625 Exclude endless access tokens from StaleRecordsCleaner.
  • #1626 Remove deprecated active_record_options config option.
  • #1631 Fix regression with redirect behavior after token lookup optimizations (redirect to app URI when found).
  • #1630 Special case unique index creation for refresh_token on SQL Server.
  • #1627 Lazy evaluate Doorkeeper config when loading files and executing initializers.

v5.6.2

  • #1604 Fix fetching of the application when custom application_class defined.

v5.6.1

  • #1593 Add support for Trilogy ActiveRecord adapter.
  • #1597 Add optional support to use the url path for the native authorization code flow. Ports forward #1143 from 4.4.3
  • #1599 Remove unnecessarily re-fetch of application object when creating an access token.

v5.6.0

  • #1581 Consider token_type_hint when searching for access token in TokensController to avoid extra database calls.

v5.6.0.rc1

  • #1551 Change lazy loading for ORM to be Ruby standard autoload.

  • #1552 Remove duplicate IDs on Auth form to improve accessibility.

  • #1542 Improve performance of Doorkeeper::AccessToken#matching_token_for using database specific SQL time math.

    [IMPORTANT]: API of the Doorkeeper::AccessToken#matching_token_for method has changed and now it returns only active access tokens (previously they were just not revoked). Please remember that the idea of the reuse_access_token option is to check for existing active token (see configuration option description).

v5.5.4

  • #1535 Revert changes introduced in #1528 to allow query params in redirect_uri as per the spec.

v5.5.3

  • #1528 Don't allow extra query params in redirect_uri.
  • #1525 I18n source for forbidden token error is now doorkeeper.errors.messages.forbidden_token.missing_scope.
  • #1531 Disable strict-loading for Doorkeeper models by default.

... (truncated)

Changelog

Sourced from doorkeeper's changelog.

5.6.6

  • #1644 Update HTTP headers.
  • #1646 Block public clients automatic authorization skip.
  • #1648 Add custom token attributes to Refresh Token Request.
  • #1649 Fixed custom_access_token_attributes related errors.

5.6.5

  • #1602 Allow custom data to be stored inside access grants/tokens.
  • #1634 Code refactoring for custom token attributes.
  • #1639 Add grant type validation to avoid Internal Server Error for DELETE /oauth/authorize endpoint.

5.6.4

  • #1633 Apply ORM configuration in #to_prepare block to avoid autoloading errors.

5.6.3

  • #1622 Drop support for Rubies 2.5 and 2.6
  • #1605 Fix URI validation for Ruby 3.2+.
  • #1625 Exclude endless access tokens from StaleRecordsCleaner.
  • #1626 Remove deprecated active_record_options config option.
  • #1631 Fix regression with redirect behavior after token lookup optimizations (redirect to app URI when found).
  • #1630 Special case unique index creation for refresh_token on SQL Server.
  • #1627 Lazy evaluate Doorkeeper config when loading files and executing initializers.

5.6.2

  • #1604 Fix fetching of the application when custom application_class defined.

5.6.1

  • #1593 Add support for Trilogy ActiveRecord adapter.
  • #1597 Add optional support to use the url path for the native authorization code flow. Ports forward #1143 from 4.4.3
  • #1599 Remove unnecessarily re-fetch of application object when creating an access token.

5.6.0

  • #1581 Consider token_type_hint when searching for access token in TokensController to avoid extra database calls.

5.6.0.rc2

  • #1558 Fixed bug: able to obtain a token with default scopes even if they are not present in the application scopes when using client credentials.
  • #1567 Only filter code parameter if authorization_code grant flow is enabled.

5.6.0.rc1

  • #1551 Change lazy loading for ORM to be Ruby standard autoload.

... (truncated)

Commits
  • 986115c Release 5.6.6 馃帀
  • 57ce594 Merge pull request #1649 from JeremyC-za/custom_token_attribs_break_rails_com...
  • 3de42ad Removed validations, test, and config changes
  • 23c44ce Unit test
  • e0b39c2 Cleaning up diff
  • 5a80014 Removed ConfigError type, not needed anymore
  • 12ff132 Removing alternative validation method
  • a4d4767 Warning instead of raising config errors
  • 34573fb Ignoring unrecognized custom attributes
  • 267e4c5 Removed validation and test
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [doorkeeper](https://github.com/doorkeeper-gem/doorkeeper) from 5.5.2 to 5.6.6.
- [Release notes](https://github.com/doorkeeper-gem/doorkeeper/releases)
- [Changelog](https://github.com/doorkeeper-gem/doorkeeper/blob/main/CHANGELOG.md)
- [Commits](doorkeeper-gem/doorkeeper@v5.5.2...v5.6.6)

---
updated-dependencies:
- dependency-name: doorkeeper
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file ruby Pull requests that update Ruby code labels Jun 12, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file ruby Pull requests that update Ruby code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

0 participants