Skip to content

Commit

Permalink
docs: update changelogs
Browse files Browse the repository at this point in the history
  • Loading branch information
ahmednfwela committed Mar 20, 2024
1 parent a3784b7 commit b0ffeb4
Show file tree
Hide file tree
Showing 3 changed files with 18 additions and 10 deletions.
13 changes: 9 additions & 4 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -45,15 +45,20 @@ Packages with dependency updates only:

#### `oidc_core` - `v0.6.3`

- Updated docs and example
- **DEPS**: Use `jose_plus: ^0.4.4` which uses [package:clock](https://pub.dev/packages/clock) JWT validation to simplify testing.
- **FEAT**: Added `OidcDateTime` extension which contains `secondsSinceEpoch` and `fromSecondsSinceEpoch` helper methods

- **FIX**: Attempt to refresh expired tokens instead of throwing them away.

#### `oidc` - `v0.5.2`

- Updated docs and example

- **FIX**: Attempt to refresh expired tokens instead of throwing them away.
- **FEAT**: Use [package:clock](https://pub.dev/packages/clock) to get the current time instead of `DateTime.now()` to simplify testing.
- **FIX**: Attempt to refresh expired tokens on initialization instead of throwing them away.
- Now your users will have to login less.
- This works only when there is a refresh token available.
- Doesn't work with silent authorization (e.g. implicit auth and `prompt: none`).
- **DOCS**: Updated docs and example.
- **DEPS**: Use `jose_plus: ^0.4.4` which uses [package:clock](https://pub.dev/packages/clock) as well for JWT validation.

#### `oidc_desktop` - `v0.2.0+8`

Expand Down
10 changes: 7 additions & 3 deletions packages/oidc/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,8 +1,12 @@
## 0.5.2

- Updated docs and example

- **FIX**: Attempt to refresh expired tokens instead of throwing them away.
- **FEAT**: Use [package:clock](https://pub.dev/packages/clock) to get the current time instead of `DateTime.now()` to simplify testing.
- **FIX**: Attempt to refresh expired tokens on initialization instead of throwing them away.
- Now your users will have to login less.
- This works only when there is a refresh token available.
- Doesn't work with silent authorization (e.g. implicit auth and `prompt: none`).
- **DOCS**: Updated docs and example.
- **DEPS**: Use `jose_plus: ^0.4.4` which uses [package:clock](https://pub.dev/packages/clock) as well for JWT validation.

## 0.5.1

Expand Down
5 changes: 2 additions & 3 deletions packages/oidc_core/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,8 +1,7 @@
## 0.6.3

- Updated docs and example

- **FIX**: Attempt to refresh expired tokens instead of throwing them away.
- **DEPS**: Use `jose_plus: ^0.4.4` which uses [package:clock](https://pub.dev/packages/clock) JWT validation to simplify testing.
- **FEAT**: Added `OidcDateTime` extension which contains `secondsSinceEpoch` and `fromSecondsSinceEpoch` helper methods

## 0.6.2

Expand Down

0 comments on commit b0ffeb4

Please sign in to comment.