This is a log of changes in Quorum since version 0.3.0, released on 9 September 2011.
Unless otherwise indicated, all changes are by Marnen Laibow-Koser. Other contributors to this document should try to maintain the existing format and identify their changes. Numbers in [square brackets] refer to issues in the tracker.
Quorum is distributed under the BSD 3-Clause License. Share and enjoy!
- First release under the new numbering format: v0.3.0 (new) = beta3.0.0 (old)
- Upgrade to Rails 3.0
- DO NOT USE! Although tests are passing, the application has serious cosmetic bugs involving Rails 3's autoescaping of HTML. I'll fix these bugs and release a new version.
- Upgrade to Ruby 1.9 [#58]
- Deal with Rails 3 deprecations [#56]
- Fix problems involving Rails 3's autoescaping of HTML [#57]
- Fix acts_as_addressed issues caused by upgrade [#59]
- Fix Capistrano deployment issues
[I mistakenly skipped 0.3.4.]
- Fix MIME type on RSS feed [#62]
- Fix Atom link on RSS feed [#62]
- Fix problem with Git tagging on Cap deployment.
- Fix a couple more broken links to RSS feed [#62]
- Replace many controller specs with Cucumber stories [#54]
- Deal better with HTML escaping
- Fix iCal export issues: we were exporting an invalid iCalendar file [#65]
- Remove make_resourceful now that Rails offers
respond_with
[#64]
- Add the ability to make comments on one's commitment status [#69]
- Fix invalid HTML on event list [#71]
- Autolink URLs in event descriptions [#75]
- Show commitment status icons on comments [#74]
- Bugfix.
- Put event comments on separate lines [#77]
- Add application information in footer [#79]
- Bugfix.
- Put attendance icons in "attending" and "not attending" columns [#81]
- Update to Rails 3.0.20 to patch security hole
- Make some configuration changes for Passenger
- Remove YM4R and Spatial Adapter, since neither is currently supported [#82, #86]
- Add patch for ActionMailer vulnerability at http://seclists.org/oss-sec/2013/q4/118 [#88]
- Ruby 1.9 compatibility, since 1.8 has a security vulnerability: https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164/ [#66]
- Fix security alerts CVE-2013-6414 and CVE-2013-4491 [#89]
- Fix a security bug where password resets could log the user in [#92]
- Upgrade to Ruby 2.0. [#83]
- Upgrade to Rails 4.0. [#84]
- Handle asset pipline and deployment properly.