-
-
Notifications
You must be signed in to change notification settings - Fork 89
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Getting to 1.0 #89
Getting to 1.0 #89
Conversation
Thank you Mikkel for your continuous work on this gem, it's one of my favorite. I love and really look forward having tokens hashed I've always felt weird that the sign in would accept any email and say that if you're there you may receive an email. I understand the reasons behind it, but from a UX point of view it's not that great Some food for thoughts:
|
Thank you @xdmx!
|
Having official support for system and controller/request specs (started in #71) would be really nice for 1.0 |
I can’t think of major changes that would be needed. But 1.0 should be turbo compatible. I think that would only mean form errors may need to be handled differently. |
I was trying out Turbo with my app the other day. I didn't spend a whole lot of time on it, but I did get the following error when trying to request a passwordless sign on:
I do use custom templates for my |
Protect from open redirect vulnerabilityHow can the open redirect vulnerability be avoided? Probably, by making sure that passwordless_query_redirect_path cannot redirect to other websites. In the rare instance of a multi-domain application, a passlist can be issued via a config param. It seems to me that
Are we sure that |
Allow the user to update their email addressIt's currently not possible for users to update their email addresses. For any long-lived application, this is a required feature. With @rickychilcott we're thinking of the best approach here: #106 |
Regarding the Turbo issue: I believe responding with a 422 (Unprocessable Entity) should address it (based on this comment hotwired/turbo-rails#12 (comment)) EDIT: ah sorry, this only applies for error scenarios |
@mikker what is missing to bring this to the finish line and release a v1 with these changes? Would you consider releasing a v0.11 with these changes and then separately add the remaining ones (shorter tokens and sign in message) and then release a v1? Following the semver a 0.x it would be acceptable to change something that could break (like the routes and hashed tokens) as it's still in development:
|
This PR marks the beginnings of working towards a 1.0 of Passwordless.
There will be breaking changes.
Plans
isolate_namespace
users.sign_in_path
and even weirdermain_app.whatever_path
.passwordless_for :users
and:admins
) is broken