1
0
mirror of https://github.com/volatiletech/authboss.git synced 2025-02-09 13:47:09 +02:00

479 Commits

Author SHA1 Message Date
Aaron L
3a5c333b5b Move to go modules 2020-07-03 11:24:07 -07:00
Aaron L
08fa0a6abf Add docs for special casing of Load() for oauth2 2020-07-03 11:02:23 -07:00
Aaron L
7cb9fa3f07 Fix bug in lock code v2.4.1 2020-05-18 18:29:50 -07:00
Aaron L
020487826a Add MailNoGoroutine option
This change allows users to write Mailer implementations that either
spawn their own goroutines or honor proper context usage. The current
behavior of the modules with this setting turned to 'false' creates a race
condition between the original http request's context authboss was handed being
cancelled by the http server, and the use of that context by the mailer
implementation which is being run in a goroutine.
v2.4.0
2020-02-07 14:24:40 -08:00
Aaron L
1a504ce1f4 Update changelog v2.3.2 2020-01-30 10:16:10 -08:00
Aaron L
c462afb065 Fix potential misconfiguration 2020-01-30 10:11:47 -08:00
Aaron L
02deb67e82 Merge branch 'frederikhors/Unused-type' 2020-01-30 09:50:54 -08:00
Aaron L
b0b6d3b017 Merge branch 'frederikhors/Unused-function' 2020-01-30 09:50:15 -08:00
Aaron L
4d33b97b4f Merge branches
'frederikhors/patch-1'
'frederikhors/Redundant-type-conversion'
'frederikhors/Redundant-types-in-composite-literals'
'frederikhors/Imported-pkg-name-as-name-identifier'
'frederikhors/Variable-'delete'-collides-with-builtin-function'
2020-01-30 09:49:22 -08:00
frederikhors
e4d1e16935 Variable 'delete' collides with builtin function 2020-01-29 14:59:47 +01:00
frederikhors
6f6f2e6fd7 Imported pkg name as name identifier 2020-01-29 14:52:00 +01:00
frederikhors
6aae44ae44 Unused type 2020-01-29 14:47:32 +01:00
frederikhors
d2e9e10908 Unused function 2020-01-29 14:46:29 +01:00
frederikhors
827256e4d7 Redundant types in composite literals 2020-01-29 14:08:11 +01:00
frederikhors
9c764f69fe Redundant type conversion 2020-01-29 14:04:44 +01:00
frederikhors
89a17c17c4
Repetition range replaceable by '+' 2020-01-29 13:14:14 +01:00
Aaron L
852e35abde Update changelog v2.3.1 2020-01-28 18:18:23 -08:00
Aaron L
e6061b1c98 Merge branch 'frederikhors/patch-1' into dev 2020-01-28 18:17:10 -08:00
frederikhors
dd50d39785
Fix "defaults" package link 2020-01-28 20:15:30 +01:00
Aaron L
234546b401 Update changelog 2019-10-21 10:42:21 -07:00
Aaron L
ab5003c870 Merge branch 'abelkuruvilla/master' into dev 2019-10-21 10:41:24 -07:00
Aaron L
5cd1340c16 Update changelog 2019-10-20 19:30:40 -07:00
Aaron L
928ca45c51 Merge branch 'Gys/Gys-email-patch' into dev 2019-10-20 19:25:51 -07:00
Abel Kuruvilla
8c7bb388ad Add logout events 2019-10-21 01:53:36 +05:30
Gys
8c6ebdc085
add the context data before rendering emails
In Responder.Respond() all context data is merged into the HTMLData before continuing to the HTML rendering. This commit does the same for emails, to make personalized emails possible.
2019-10-12 13:00:56 +01:00
Aaron L
9dc8f7711c Add DeleteAllSession to mock 2019-07-11 00:47:56 -07:00
Aaron L
4d85b23e8a Fix missing lastaction on login
- Add Setup() function for expire to install a hook to set last action
  on successful login. If Setup() is not called, expiration starts from
  the first request made by the logged in user after the login request
  itself.
v2.3.0
2019-03-30 15:56:13 -07:00
Aaron L
834bb1ba43 Fix bug in expire
Users were able to persist one request past expiration because the
session state was not actually hidden for downstream http handlers as it
was in Authboss 1.0 because of the abstraction of ClientState where an
http handler cannot alter the session subsequent handlers.

There's a number of positive reasons for the design as is, but it did
end up creating this bug when this code was ported from v1 to v2.
2019-03-30 15:32:39 -07:00
Aaron L
81ffd176ac Add VerifyPassword method 2019-03-15 13:43:57 -07:00
Aaron L
12fcb0d914 Fix readme typos 2019-03-06 19:50:25 -08:00
Aaron L
4b00b4dd33 Add validation to recover start 2019-03-06 08:25:30 -08:00
Aaron L
5c92c016e0 Merge branch 'dannashirn/master' into dev 2019-02-06 20:10:50 -08:00
Franco Albornoz
727723f88a
Delete duplicate phrase in README.md 2019-01-29 16:27:02 -03:00
Aaron L
a7b9d57691 Move mocks so external packages can use them 2019-01-20 09:45:26 -08:00
Aaron L
4a8ff134bb Update changelog 2019-01-12 11:42:38 -08:00
Aaron L
470b7c0488 Fix bug in remember 2019-01-12 11:30:39 -08:00
Aaron L
6402c5da57 Merge branch 'frederikhors/patch-3' into dev 2019-01-12 10:43:01 -08:00
Aaron L
194ed7d048 Merge branch 'frederikhors/patch-4' into dev 2019-01-12 10:39:59 -08:00
frederikhors
7e3ad2a691
Update client_state.go 2019-01-08 13:47:18 +01:00
frederikhors
b69996a743
Update README.md 2019-01-07 02:04:17 +01:00
Aaron L
ee6a9ab99a Update changelog 2018-12-31 09:54:10 -08:00
Aaron L
ca3933ab81 Merge remote-tracking branch 'offline-gmbh/master' into dev 2018-12-31 09:53:08 -08:00
Tobias Kündig
74d60ddf98
Forward call to Hijack()
This change makes sure that the `http.Hijacker` interface remains implemented
when using the `LoadClientStateMiddleware`.
2018-12-31 17:01:12 +01:00
Aaron L
ca066a55b5 Add DelAllSession method
In order to prevent leaking of session values (and to avoid the mess of
deleting the entire session cookie which could still have values we want
in it) this nuclear method is now called by expire/logout with a
whitelist of keys to keep (passed in from
Config.Storage.SessionWhitelistKeys).
2018-12-17 23:03:55 -08:00
Aaron L
db25c5e30b Merge branch 'dev' v2.2.0 2018-12-16 22:54:11 -08:00
Aaron L
e38d4652d5 Bump version 2018-12-16 22:52:27 -08:00
Aaron L
f70bdd5eeb Add EventAuthHijack to work around ordering issue
Lock/Confirm and possibly other authentication preemption mechanisms
hook into 'Before(EventAuth)', but the ordering of these rejection
mechanisms mixed with the 2fa acceptance response could result in a
dual response.
2018-12-16 22:50:26 -08:00
Aaron L
019073081f Fix same hook like bug but for failures 2018-12-13 23:10:16 -08:00
Aaron L
0e85072885 Fix bug where After Auth hooks could fail
- User was not being set in the Context for 2fa success paths meaning
  things like lock and remember event handlers would fail.
2018-12-13 23:04:28 -08:00
Aaron L
6f3e7ca54a Add more flexibility to authboss.Middleware
- Add requirements and responses for the authboss middleware. This lets
  us later add new types that don't break the API instead of a list of
  bools.
2018-12-10 23:00:27 -08:00