diff --git a/CHANGELOG.md b/CHANGELOG.md index 4ae6541b4..fb1e51823 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,15 +1,28 @@ # Change Log +## [v2.0.5](https://github.com/auth0/auth0-spa-js/tree/v2.0.5) (2023-05-22) + +[Full Changelog](https://github.com/auth0/auth0-spa-js/compare/v2.0.4...v2.0.5) + +**Changed** + +- distinguish between missing and invalid state [\#1099](https://github.com/auth0/auth0-spa-js/pull/1099) ([frederikprijck](https://github.com/frederikprijck)) +- Allow sync openUrl [\#1087](https://github.com/auth0/auth0-spa-js/pull/1087) ([adamjmcgrath](https://github.com/adamjmcgrath)) + ## [v2.0.4](https://github.com/auth0/auth0-spa-js/tree/v2.0.4) (2023-02-22) + [Full Changelog](https://github.com/auth0/auth0-spa-js/compare/v2.0.3...v2.0.4) **Fixed** + - Correctly expose missing_refresh_token error from worker [\#1080](https://github.com/auth0/auth0-spa-js/pull/1080) ([frederikprijck](https://github.com/frederikprijck)) ## [v2.0.3](https://github.com/auth0/auth0-spa-js/tree/v2.0.3) (2023-02-04) + [Full Changelog](https://github.com/auth0/auth0-spa-js/compare/v2.0.2...v2.0.3) **Fixed** + - Ensure cookieDomain is used when using legacy Cookiestorage [\#1071](https://github.com/auth0/auth0-spa-js/pull/1071) ([frederikprijck](https://github.com/frederikprijck)) - Ensure to only clear current client cache when logging out [\#1068](https://github.com/auth0/auth0-spa-js/pull/1068) ([frederikprijck](https://github.com/frederikprijck)) @@ -26,12 +39,15 @@ This patch release is identical to `2.0.1` but has been released to ensure tooli Even though 2.0.1 was not vulnerable for the related [CVE](https://unit42.paloaltonetworks.com/jsonwebtoken-vulnerability-cve-2022-23529/) because of the fact that `jsonwebtoken` is a devDependency, we are cutting a release to ensure build tools no longer report our SDK as vulnerable to the mentioned CVE. ## [v2.0.1](https://github.com/auth0/auth0-spa-js/tree/v2.0.1) (2022-12-08) + [Full Changelog](https://github.com/auth0/auth0-spa-js/compare/v2.0.0...v2.0.1) **Changed** + - Add openUrl and deprecate onRedirect [\#1058](https://github.com/auth0/auth0-spa-js/pull/1058) ([frederikprijck](https://github.com/frederikprijck)) **Fixed** + - Export MissingRefreshTokenError [\#1043](https://github.com/auth0/auth0-spa-js/pull/1043) ([frederikprijck](https://github.com/frederikprijck)) ## [v2.0.0](https://github.com/auth0/auth0-spa-js/tree/v2.0.0) (2022-10-27) diff --git a/docs/classes/Auth0Client.html b/docs/classes/Auth0Client.html index 804036db6..0519230db 100644 --- a/docs/classes/Auth0Client.html +++ b/docs/classes/Auth0Client.html @@ -23,7 +23,7 @@
Optional
options: GetTokenSilentlyOptionsOptional
options: Optional config: PopupConfigOptionsStatic
fromStatic
fromOptional
cacheSpecify a custom cache implementation to use for token storage and retrieval. This setting takes precedence over cacheLocation
if they are both specified.
Optional
cacheOptional
Read more about changing storage options in the Auth0 docs
The Client ID found on your Application settings page
Optional
cookieOptional
. (eg: .example.com
).
Optional
httpSpecify the timeout for HTTP calls using fetch
. The default is 10 seconds.
Optional
issuerThe issuer to be used for validation of JWTs, optionally defaults to the domain above
Optional
leewayOptional
Optional
legacyOptional
Optional
nowOptional
sessionOptional
Optional
useYou might want to enable this if you rely on your users being a may end up spanning across multiple tabs (e.g. magic links) or you cannot otherwise rely on session storage being available.
Optional
useOptional
Optional
useOptional
Note: Use of refresh tokens must be enabled by an administrator on your Auth0 client application.
Optional
uselet
Optional
id_Previously issued ID Token.
Optional
invitationThe Id of an invitation to accept. This is available from the user invitation URL that is given when participating in a user invitation flow.
Optional
login_Optional
This currently only affects the classic Lock experience.
Optional
max_Optional
Optional
organizationOptional
org_id claim in your user's ID Token.
Optional
promptOptional
Optional
redirect_Optional
Optional
scopeOptional
Note: The openid
scope is always applied regardless of this setting.
Optional
screen_Optional
This only affects the New Universal Login Experience.
Optional
ui_Optional
'fr-CA fr en'.
Optional
cacheOptional
on, where it both reads from the cache and sends a request to Auth0 as needed.
Optional
detailedOptional
The default is false
.
Optional
timeoutOptional
Optional
openUsed to control the redirect and not rely on the SDK to do the actual redirect.
Set to false
to disable the redirect, or provide a function to handle the actual redirect yourself.
await auth0.logout({
async openUrl(url) {
window.location.replace(url);
}
});
+Example
await auth0.logout({
openUrl(url) {
window.location.replace(url);
}
});
+
+
+Example
import { Browser } from '@capacitor/browser';
await auth0.logout({
async openUrl(url) {
await Browser.open({ url });
}
});
Optional
openUsed to control the redirect and not rely on the SDK to do the actual redirect.
-const client = new Auth0Client({
async openUrl(url) {
window.location.replace(url);
}
});
+Example
const client = new Auth0Client({
openUrl(url) {
window.location.replace(url);
}
});
+
+
+Example
import { Browser } from '@capacitor/browser';
const client = new Auth0Client({
async openUrl(url) {
await Browser.open({ url });
}
});
Fetches a new access token and returns it.
@@ -131,7 +131,7 @@Parameters
Optional
options: GetTokenSilentlyOptions