@leapdev/auth-agent 2.2.7-beta.0 → 2.2.7-beta.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/CHANGELOG.md +73 -0
  2. package/package.json +1 -1
package/CHANGELOG.md ADDED
@@ -0,0 +1,73 @@
1
+ # Changelog
2
+
3
+ ## 2.2.*
4
+
5
+ ### [2.2.7]
6
+ #### Bugfixes
7
+ * remove window session PASSTHROUGH_SESSION_KEY after passthrough is done
8
+
9
+ ### [2.2.6]
10
+ #### Bugfixes
11
+ * Update pubnub to v7.2.3 to fix Vulnerability warnings from Synopsis scan
12
+ ### [2.2.5]
13
+ #### Bugfixes
14
+ * fix 2.2.3 & 2.2.4 corrupted deployment
15
+ ### [2.2.3] (corrupted deployment)
16
+ #### Bugfixes
17
+ * fix autoLogout config issue
18
+
19
+ ### [2.2.2]
20
+ #### Features
21
+ * In function AuthAgent.init(), now user can provide "initToken" with a valid LEAP Auth Token. AuthAgent will use the jti from "initToken" and call passthrough to create an auth session
22
+
23
+ ### [2.2.1]
24
+ #### Bugfixes
25
+ * Update pubnub to v5.0.0 to fix Vulnerability warnings from Synopsis scan
26
+
27
+ ### [2.2.0]
28
+ #### Bugfixes
29
+ * Update pubnub to v4.37.0 to fix Vulnerability warnings from Synopsis scan
30
+
31
+ ************************************************************************
32
+
33
+ ## 2.1.*
34
+
35
+ ### [2.1.6]
36
+ #### Features
37
+ * Agent would be able to check Auth Session via a iframe. It would have users authenticated if users have a valid auth session previously
38
+
39
+ ### [2.1.5]
40
+ #### Bugfixes
41
+ * have an exception for LD. Now tokens from LD can be accepted in URLs to bypass authentication.
42
+
43
+ ### [2.1.4]
44
+ #### Bugfixes
45
+ * fix issue of hook afterLogin triggered unexpectedly in init
46
+
47
+ ### [2.1.3]
48
+ #### Bugfixes
49
+ * fix issue in api getRefreshedAccessToken: now it would get refreshed accessToken 30 seconds before the current token expired
50
+
51
+ ### [2.1.2]
52
+ #### Bugfixes
53
+ * fix issue happening when token expires_in is greater than 24 days
54
+
55
+ ### [2.1.1]
56
+ #### Bugfixes
57
+ * fix issue happening when `window.crypto.subtle` doesn't exist
58
+
59
+ ### [2.1.0]
60
+ #### Features
61
+ * Add function `getRefreshedAccessToken()`: this function is an async function. It would first check if the current access token is valid and if it does, AuthAgent will trigger a refresh process and get a valid access token from LEAP Auth
62
+ * Add function `getDecodedRefreshedAccessToken()`: this function is an async function. It would first check if the current access token is valid and if it does, AuthAgent will trigger a refresh process, get a valid access token from LEAP Auth and decode this refreshed access token.
63
+ * function `linkUser()` becomes an async function
64
+ * function `unlinkUser()` becomes an async function
65
+ * function `passthrough()` becomes an async function
66
+
67
+ ************************************************************************
68
+
69
+ ## 2.0.*
70
+
71
+ ### [2.0.12]
72
+ #### Features
73
+ * Add hook `afterRefreshToken`
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@leapdev/auth-agent",
3
- "version": "2.2.7-beta.0",
3
+ "version": "2.2.7-beta.1",
4
4
  "description": "LEAP Auth Agent",
5
5
  "license": "LEAP Legal Software, PTY LTD",
6
6
  "main": "./src/index.js",