Skip to content

Releases: github/secure_headers

Bug fix release - frozen CSP configs can raise errors in some cases

29 Feb 04:42
Compare
Choose a tag to compare

Bug fix for handling CSP configs that supply a frozen hash. If a directive value is nil, then appending to a config with a frozen hash would cause an error since we're trying to modify a frozen hash. See #223.

Add upgrade-insecure-requests support

26 Feb 18:20
Compare
Choose a tag to compare

Adds upgrade-insecure-requests support for requests from Firefox and Chrome (and Opera). See the spec for details.

h/t @reedloden

Prepare for upcoming rails 5 changes related to filters

19 Feb 01:31
Compare
Choose a tag to compare

See #215

This should allow use of Rails 5 without deprecations from before_filter. before_filter is deprecated and will be removed in Rails 5.1.

This change is not applicable for the 3.x series.

3.x

18 Feb 06:53
Compare
Choose a tag to compare
3.x

secure_headers 3.0.0 is a near-complete, not-entirely-backward-compatible rewrite. Please see the upgrade guide for an in-depth explanation of the changes and the suggested upgrade path.

3.x rewrite release candidate

16 Feb 21:10
Compare
Choose a tag to compare
Pre-release

secure_headers 3.0 is a near-complete rewrite that is not entirely backwards compatible. See the upgrade guide for migrating between 2.x and 3.x: https://github.com/twitter/secureheaders/blob/master/upgrading-to-3-0.md

Remove noisy deprecation warning

16 Feb 18:11
Compare
Choose a tag to compare

See #203 and cfad0e5

Upon upgrading to secure_headers 2.5.0, I get a flood of these deprecations when running my tests:
[DEPRECATION] secure_header_options_for will not be supported in secure_headers

/cc @bquorning

2.x deprecation warning release

06 Jan 22:11
Compare
Choose a tag to compare

This release contains deprecation warnings for those wishing to upgrade to the 3.x series. With this release, fixing all deprecation warnings will make your configuration compatible when you decide to upgrade to the soon-to-be-released 3.x series (currently in pre-release stage).

No changes to functionality should be observed unless you were using procs as CSP config values.

Bug fix release

03 Dec 23:29
Compare
Choose a tag to compare

If you use the header_hash method for setting your headers in middleware and you opted out of a header (via setting the value to false), you would run into an exception as described in #193

     NoMethodError:
       undefined method `name' for nil:NilClass
     # ./lib/secure_headers.rb:63:in `block in header_hash'
     # ./lib/secure_headers.rb:54:in `each'
     # ./lib/secure_headers.rb:54:in `inject'
     # ./lib/secure_headers.rb:54:in `header_hash'

Performance improvement

23 Oct 18:35
Compare
Choose a tag to compare

@igrep reported an anti-patter in use regarding UserAgentParser. This caused UserAgentParser to reload it's entire configuration set twice* per request. Moving this to a cached constant prevents the constant reinstantiation and will improve performance.

#187

Bug fix release

20 Oct 20:22
Compare
Choose a tag to compare

A nasty regression meant that many CSP configuration values were "reset" after the first request, one of these being the "enforce" flag. See #184 for the full list of fields that were affected. Thanks to @spdawson for reporting this #183