Skip to content

Commit

Permalink
updates idx api for recovery, activation, and email verify
Browse files Browse the repository at this point in the history
email verify callback contains otp parameter

adds new option withCredentials

adds new option codeChallenge

pass authenticator if password is provided up front

use jasmine framework in wdio

improve layout in test app

add more time for token renew tests

prefer login direct, avoid issue with popup OKTA-454796

add exchangeCodeForTokens option

loosen remediate restrictions on default flow

update samples

throw exceptions from run (breaking change)

consolidate idx interface under the idx namespace

activationToken and recoveryToken as config option
  • Loading branch information
aarongranick-okta committed Jan 7, 2022
1 parent 71f18af commit 7f54738
Show file tree
Hide file tree
Showing 90 changed files with 2,020 additions and 1,352 deletions.
11 changes: 9 additions & 2 deletions .vscode/launch.json
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@
"--runInBand",
"--no-cache",
"--collectCoverage=false",
"--testTimeout=120000",
"--config=jest.browser.js",
"${relativeFile}"
],
Expand All @@ -44,6 +45,7 @@
"--runInBand",
"--no-cache",
"--collectCoverage=false",
"--testTimeout=120000",
"--config=jest.server.js",
"${relativeFile}"
],
Expand All @@ -55,11 +57,16 @@
"name": "sdk: e2e spec",
"type": "node",
"request": "launch",
"args": ["wdio.conf.js", "--spec", "${file}"],
"args": [
"wdio.conf.js", "--spec", "${file}"
],
"cwd": "${workspaceFolder}/test/e2e",
"autoAttachChildProcesses": true,
"program": "${workspaceRoot}/test/e2e/node_modules/@wdio/cli/bin/wdio.js",
"console": "integratedTerminal"
"console": "integratedTerminal",
"env": {
"DEBUG": "1"
}
},

{
Expand Down
14 changes: 14 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,20 @@
- [#1003](https://github.com/okta/okta-auth-js/pull/1003) Supports generic UserClaims type. Custom claims should be extended by typescript generics, like `UserClaims<{ groups: string[]; }>`
- [#1049](https://github.com/okta/okta-auth-js/pull/1049) Bump minimum supported node version to 12.20
- [#1050](https://github.com/okta/okta-auth-js/pull/1050) Removes `userAgent` field from oktaAuth instance
- [#1014](https://github.com/okta/okta-auth-js/pull/1014) Shared transaction storage is automatically cleared on success and error states. Storage is not cleared for "terminal" state which is neither success nor error.

### Features

- [#1014](https://github.com/okta/okta-auth-js/pull/1014) Updates IDX API to support email verify and recovery/activation
- adds new configuration options `recoveryToken` and `activationToken`
- email verify callback:
- adds support for passing `otp` to idx pipeline
- updates samples to display error message with OTP code
- idx methods support new options:
- `exchangeCodeForTokens`. If false, `interactionCode` will be returned on the transaction at the end of the flow instead of `tokens`.
- `autoRemediate`. If false, there will be no attempt to satisfy remediations even if values have been passed.
- TransactionManager supports new option:
- `saveLastResponse`. If false, IDX responses will not be cached.

## 5.10.0

Expand Down
4 changes: 4 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -1838,6 +1838,10 @@ We have implemented a small SPA app, located at `./test/app/` which is used inte

The [CHANGELOG](CHANGELOG.md) contains details for all changes and links to the original PR.

### From 5.x to 6.x

* All async [IDX API](docs/idx.md) methods will either resolve with an IDX transaction object or throw an exception. In the previous version some exceptions were caught and returned as the `error` property on an IDX transaction object.

### From 4.x to 5.x

* Token auto renew requires [running OktaAuth as a service](#running-as-a-service). To start the service, call [start()](#start). `start` will also call [updateAuthState](#authstatemanagerupdateauthstate) to set an initial [AuthState](#authstatemanager)
Expand Down

0 comments on commit 7f54738

Please sign in to comment.