Releases: okta/okta-auth-js
@okta/[email protected]
@okta/[email protected]
Bug Fixes
- #369
-
Will reject with error if PKCE is enabled but not supported when OIDC flow is initiated. Previously this check was done in the constructor and affected non-OIDC flows
-
Will print a console warning and disable secure cookies if cookies.secure is enabled on an HTTP connection. Previously this would throw in the constructor.
-
@okta/[email protected]
Features
- #363
- Expose server bundle for React Native platform as an Authentication SDK.
- Handle userAgent customization with newly added userAgent field in config.
@okta/[email protected]
@okta/[email protected]
Features
New option cookies allows overriding default secure and sameSite values.
Breaking Changes
-
#308 - Removed
jqueryandreqwesthttpRequesters -
#309 - Removed
Qlibrary, now using standard Promise. IE11 will require a polyfill for thePromiseobject. Use ofPromise.prototype.finallyrequires Node > 10.3 for server-side use. -
#310 - New behavior for signOut()
postLogoutRedirectUriwill default towindow.location.origin- signOut() will revoke access token and perform redirect by default. Fallback to XHR closeSession() if no idToken.
- New method closeSession() for XHR signout without redirect or reload.
- New method revokeAccessToken()
-
#311 - parseFromUrl() now returns tokens in an object hash (instead of array). The
stateparameter (passed to authorize request) is also returned. -
#313 - An HTTPS origin will be enforced unless running on
http://localhostorcookies.secureis set tofalse -
#316 - Option
issueris required. Optionurlhas been deprecated and is no longer used. -
#317 -
pkceoption is nowtrueby default.grantTypeoption is removed. -
#320 -
getWithRedirect,getWithPopup, andgetWithoutPromptpreviously took 2 sets of option objects as parameters, a set of "oauthOptions" and additional options. These methods now take a single options object which can hold all available options. Passing a second options object will cause an exception to be thrown. -
- Default responseType when using implicit flow is now
['token', 'id_token']. - When both access token and id token are returned, the id token's
at_hashclaim will be validated against the access token
- Default responseType when using implicit flow is now
-
#325 - Previously, the default
responseModefor PKCE was"fragment". It is now"query". Unless explicitly specified using theresponseModeoption, theresponse_modeparameter is no longer passed bytoken.getWithRedirectto the/authorizeendpoint. Theresponse_modewill be set by the backend according to the OpenID specification. Implicit flow will use"fragment"and PKCE will use"query". If previous behavior is desired, PKCE can set theresponseModeoption to"fragment". -
#329 - Fix internal fetch implementation.
responseTextwill always be a string, regardless of headers or response type. If a JSON object was returned, the object will be returned asresponseJSONandresponseTypewill be set to "json". Invalid/malformed JSON server response will no longer throw a raw TypeError but will return a well structured error response which includes thestatuscode returned from the server.
Other
-
#306 - Now using babel for ES5 compatibility. All polyfills have been removed.
-
#312 - Added an E2E test for server-side authentication (node module, not webpack).
@okta/[email protected]
Bug Fixes
-#338 - (Fix for Chrome 80) Setting 'Secure' on cookies if running on HTTPS. Setting 'SameSite=Lax' on cookies if running on HTTP. TokenManager (if using cookie storage) will retain previous behavior, setting 'SameSite=Lax' in all cases unless tokenManager.secure is set to true via config.
@okta/[email protected]
Bug Fixes
- #334 - Setting 'SameSite=none' for all cookies (Fix for iFrame)