- By default this addon would pass in the following block into the auth0 lock constructor. However, in 4.0.0 it will no longer do this, you will have to pass in the options yourself.
The default options were as follows:
let defaultOptions = {
autoclose: true,
auth: {
redirect: false,
params: {
scope: 'openid'
},
}
};
Now you will have to pass them in manually if you want the same behavior:
let lockOptions = {
autoclose: true,
auth: {
redirect: false,
params: {
scope: 'openid'
},
}
};
get(this, 'session').authenticate('authenticator:auth0-lock', lockOptions);
- #66 chore: Add deprecations by Chris Watts
- The addon no longer navigates to the auth0 logout url when the session is invalidated through ember-simple-auth session. You have to manually call session.navigateToLogoutURL()
- Use idToken instead of jwt on the authenticated object when making requests to the backend.
- Use idTokenPayload.exp instead of exp to figure out when the token is about to expire
- USe logoutReturnToURL instead of logoutURL in the environment config. This will be used when calling navigateToLogoutURL()
- Remove redirectURI from the environment config.
- #46 enhacenement: Add yarn by Chris Watts
- #52 enhancement: Remove deprecations by Chris Watts
- #54 enhancement: Add api demo by Chris Watts
- #55 fix: Semver dependency by Chris Watts
- #58 docs: Update readme with examples by Chris Watts
- #57 fix: correct Lock object init/fn call order of operations by James Martinez
- #42 enhancement: Update ember-simple-auth v1.2.0 by Chris Watts
- #45 enhancement: Add eslint by Chris Watts
- #41 enhancement: Add ability to use v8 of auth0.js by Chris Watts
- #40 enhancement: Change auth0-impersonation authenticator to auth0-url-hash by Chris Watts
- #33 bugfix: Fix issue with latest version of auth0-lock by Chris Watts
- #23 enhancement: upgrade dependencies by Chris Watts
- #28 enhancement: Improve ability to show the auth0 lock so that it can be overriden during acceptance tests by Chris Watts
- #20 fix: issue where the session would not be invalided when the token is expired by Chris Watts
Breaking Changes
- The profile that is returned from lock.js getProfile is now scoped under the profile property on the session. See readme for updated session object
- #9 fix: issue where jwt authorizer wasn't adding the jwt to the block by @seawatts
- Fixed an issue where
ember install
orember generate
would fail becausersvp
was indevDependencies
instead ofdependencies
- The session data object is now unified into one object instead of split between the user profile and the jwt info
{
"authenticated": {
"authenticator": "authenticator:auth0-impersonation",
"email": "[email protected]",
"impersonated": true,
"impersonator": {
"user_id": "google-oauth2|108251222085688410292",
"email": "[email protected]"
},
"appMetadata": {
},
"userMetadata": {
},
"emailVerified": true,
"clientID": "YwDY9D433veMHC2e27j2BESjlnwF7ry8",
"updatedAt": "2016-11-02T23:28:06.864Z",
"userId": "auth0|da71a38d-3d2a-4281-8dfa-504ed0acd598",
"identities": [
{
"user_id": "da71a38d-3de2-4281-8dfa-504ed0acd598",
"provider": "auth0",
"connection": "DB",
"isSocial": false
}
],
"createdAt": "2016-04-01T21:03:24.847Z",
"globalClientId": "I22jtMbdaRIz0pOwPdN2Ciuh2uIdzfy2",
"accessToken": "OfevAkQ5ar42HA2j",
"idToken": "aaaa.bbb.cccc",
"idTokenPayload": {
"iss": "https://domain.auth0.com/",
"sub": "auth0|da71a382-3dea-2281-8dfa-204ed0acd598",
"aud": "Yw2Y9D433veMHCred7j0BESjlnwF7r28",
"exp": 1478629287,
"iat": 1478129287
}
}
}
- beforeExpired would never fire. This is now moved into the application-route-mixin and can be overridden by beforeSessionExpired
- auth0.js and lock.js were not being installed correctly
- Added ember-simple-auth as a dependency