Merge pull request #4729 from MrPetovan/task/4604-add-password-exposed-check
authorMichael Vogel <icarus@dabo.de>
Tue, 3 Apr 2018 05:56:36 +0000 (07:56 +0200)
committerGitHub <noreply@github.com>
Tue, 3 Apr 2018 05:56:36 +0000 (07:56 +0200)
[Composer] Bump divineomega/password_exposed version to 2.5.1

composer.lock

index 72417f8..28199f4 100644 (file)
         },
         {
             "name": "divineomega/password_exposed",
-            "version": "v2.4.0",
+            "version": "v2.5.1",
             "source": {
                 "type": "git",
                 "url": "https://github.com/DivineOmega/password_exposed.git",
-                "reference": "7e26898a280662529b3e5e472b16fcbda167ffce"
+                "reference": "c928bf722eb02398df11076add60df070cb55581"
             },
             "dist": {
                 "type": "zip",
-                "url": "https://api.github.com/repos/DivineOmega/password_exposed/zipball/7e26898a280662529b3e5e472b16fcbda167ffce",
-                "reference": "7e26898a280662529b3e5e472b16fcbda167ffce",
+                "url": "https://api.github.com/repos/DivineOmega/password_exposed/zipball/c928bf722eb02398df11076add60df070cb55581",
+                "reference": "c928bf722eb02398df11076add60df070cb55581",
                 "shasum": ""
             },
             "require": {
                 }
             ],
             "description": "This PHP package provides a `password_exposed` helper function, that uses the haveibeenpwned.com API to check if a password has been exposed in a data breach.",
-            "time": "2018-03-14T09:17:40+00:00"
+            "time": "2018-04-02T18:16:36+00:00"
         },
         {
             "name": "ezyang/htmlpurifier",