Releases: inrupt/solid-client-authn-js
Releases · inrupt/solid-client-authn-js
v1.17.2
Bugfixes
browser
- Mismatching redirect URI on refresh: this bug was caused by an invalid redirect URL stored with session data.
Saving an invalid redirect URL is now prohibited, and in addition the storage of users impacted by this bug will be cleared so that they don't have to do anything manually
to clear their local storage. Users affected by this bug will be asked to log back in, as if they logged out.
v1.17.1
v1.17.0
New Features
- Support for RP-Initiated Logout in Node and Browser libraries.
- ESM support for Node and Browser packages.
v1.16.0
v1.15.0
v1.14.0
browser and node
New features
- The
Sessionexposes aneventsattribute implementingEventEmitter, with
type hints to guide which events are supported. It allows to register a callback
listening on events usingsession.events.on, but also to unregister a callback
usingsession.events.off, or to register a one-off callback usingsession.events.once.
This attribute intends at replacing exisingSessionmethods to listen on events,
namelyonLogin,onLogout,onError,onSessionRestore,onSessionExpiration,
onNewRefreshToken.
Deprecation notice
The following have been deprecated, and will be removed in future major releases.
- The
Sessionclass will no longer extendEventEmitter. Instead, it will expose
aneventsattribute implementingEventEmitter. We do not recommand to use
either aSessioninstance or itseventsattribute as an arbitrary events emitter,
and encourage users to only use the supported events and documented API. SessionmethodsonLogin,onLogout,onError,onSessionRestore,
onSessionExpiration,onNewRefreshTokenare deprecated in favor ofsession.events.on
called with the appropriate event name.
node
Bugfixes
- The session expiration date was incorrectly computed in the authorization code flow.
v1.13.4
browser
Bugfix
- v1.13.3 introduced a bug in the silent reload flow, resulting in a "Mismatching
redirect URL" error when refreshing a page with an app logged in. This regression
went unnoticed because of a misconfiguration of the browser-based test app that
should have covered this scenario. Both issues are now resolved.
node
Bugfix
- The
Sessionexpiration date was not set in all contexts:session.info.expirationDate
wasn't set properly using Client Credentials.
v1.13.3
v1.13.2
node
Bugfix
- The Client Credential flow had a bug where the expiration time set by the OpenID
Provider for the token was ignored, and an arbitrary default was applied instead.
This resulted in the session being unable to make authenticated requests, but
still acting as if it were logged in. The session now uses the expiration time
set by the OpenID Provider.
v1.13.1
Node and browser
Bugfix
- The redirect URL provided to the login function was being normalized, which could result in misalignments with the redirect URLs declared in a Client Identifier document, since the latter wasn't being normalized. The normalization step has now been removed, and the redirect provided by the user is sent to the OpenID Provider unchanged.
- Some dependencies updates