@leapdev/auth-agent 2.2.7-beta.0 → 2.2.7-beta.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +73 -0
- package/package.json +1 -1
package/CHANGELOG.md
ADDED
|
@@ -0,0 +1,73 @@
|
|
|
1
|
+
# Changelog
|
|
2
|
+
|
|
3
|
+
## 2.2.*
|
|
4
|
+
|
|
5
|
+
### [2.2.7]
|
|
6
|
+
#### Bugfixes
|
|
7
|
+
* remove window session PASSTHROUGH_SESSION_KEY after passthrough is done
|
|
8
|
+
|
|
9
|
+
### [2.2.6]
|
|
10
|
+
#### Bugfixes
|
|
11
|
+
* Update pubnub to v7.2.3 to fix Vulnerability warnings from Synopsis scan
|
|
12
|
+
### [2.2.5]
|
|
13
|
+
#### Bugfixes
|
|
14
|
+
* fix 2.2.3 & 2.2.4 corrupted deployment
|
|
15
|
+
### [2.2.3] (corrupted deployment)
|
|
16
|
+
#### Bugfixes
|
|
17
|
+
* fix autoLogout config issue
|
|
18
|
+
|
|
19
|
+
### [2.2.2]
|
|
20
|
+
#### Features
|
|
21
|
+
* In function AuthAgent.init(), now user can provide "initToken" with a valid LEAP Auth Token. AuthAgent will use the jti from "initToken" and call passthrough to create an auth session
|
|
22
|
+
|
|
23
|
+
### [2.2.1]
|
|
24
|
+
#### Bugfixes
|
|
25
|
+
* Update pubnub to v5.0.0 to fix Vulnerability warnings from Synopsis scan
|
|
26
|
+
|
|
27
|
+
### [2.2.0]
|
|
28
|
+
#### Bugfixes
|
|
29
|
+
* Update pubnub to v4.37.0 to fix Vulnerability warnings from Synopsis scan
|
|
30
|
+
|
|
31
|
+
************************************************************************
|
|
32
|
+
|
|
33
|
+
## 2.1.*
|
|
34
|
+
|
|
35
|
+
### [2.1.6]
|
|
36
|
+
#### Features
|
|
37
|
+
* Agent would be able to check Auth Session via a iframe. It would have users authenticated if users have a valid auth session previously
|
|
38
|
+
|
|
39
|
+
### [2.1.5]
|
|
40
|
+
#### Bugfixes
|
|
41
|
+
* have an exception for LD. Now tokens from LD can be accepted in URLs to bypass authentication.
|
|
42
|
+
|
|
43
|
+
### [2.1.4]
|
|
44
|
+
#### Bugfixes
|
|
45
|
+
* fix issue of hook afterLogin triggered unexpectedly in init
|
|
46
|
+
|
|
47
|
+
### [2.1.3]
|
|
48
|
+
#### Bugfixes
|
|
49
|
+
* fix issue in api getRefreshedAccessToken: now it would get refreshed accessToken 30 seconds before the current token expired
|
|
50
|
+
|
|
51
|
+
### [2.1.2]
|
|
52
|
+
#### Bugfixes
|
|
53
|
+
* fix issue happening when token expires_in is greater than 24 days
|
|
54
|
+
|
|
55
|
+
### [2.1.1]
|
|
56
|
+
#### Bugfixes
|
|
57
|
+
* fix issue happening when `window.crypto.subtle` doesn't exist
|
|
58
|
+
|
|
59
|
+
### [2.1.0]
|
|
60
|
+
#### Features
|
|
61
|
+
* Add function `getRefreshedAccessToken()`: this function is an async function. It would first check if the current access token is valid and if it does, AuthAgent will trigger a refresh process and get a valid access token from LEAP Auth
|
|
62
|
+
* Add function `getDecodedRefreshedAccessToken()`: this function is an async function. It would first check if the current access token is valid and if it does, AuthAgent will trigger a refresh process, get a valid access token from LEAP Auth and decode this refreshed access token.
|
|
63
|
+
* function `linkUser()` becomes an async function
|
|
64
|
+
* function `unlinkUser()` becomes an async function
|
|
65
|
+
* function `passthrough()` becomes an async function
|
|
66
|
+
|
|
67
|
+
************************************************************************
|
|
68
|
+
|
|
69
|
+
## 2.0.*
|
|
70
|
+
|
|
71
|
+
### [2.0.12]
|
|
72
|
+
#### Features
|
|
73
|
+
* Add hook `afterRefreshToken`
|