diff --git a/CHANGELOG.md b/CHANGELOG.md index de2e090d..fbc874de 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,4 +1,16 @@ +## [v9.11.0](https://github.com/auth0/auth0.js/tree/v9.11.0) (2019-06-25) +[Full Changelog](https://github.com/auth0/auth0.js/compare/v9.10.4...v9.11.0) + +**Added** +- Add method to patch root user attributes [\#949](https://github.com/auth0/auth0.js/pull/949) ([luisrudge](https://github.com/luisrudge)) + +**Changed** +- Fix/check nonce state hs256 tokens [\#952](https://github.com/auth0/auth0.js/pull/952) ([luisrudge](https://github.com/luisrudge)) + +**Fixed** +- Ignore syntax errors from popups [\#948](https://github.com/auth0/auth0.js/pull/948) ([luisrudge](https://github.com/luisrudge)) + ## [v9.10.4](https://github.com/auth0/auth0.js/tree/v9.10.4) (2019-05-24) [Full Changelog](https://github.com/auth0/auth0.js/compare/v9.10.3...v9.10.4) diff --git a/README.md b/README.md index 404211a2..427d7309 100644 --- a/README.md +++ b/README.md @@ -31,7 +31,7 @@ From CDN: ```html - + ``` From [npm](https://npmjs.org): diff --git a/docs/Authentication.html b/docs/Authentication.html index f93dc4a6..cddbf543 100644 --- a/docs/Authentication.html +++ b/docs/Authentication.html @@ -24,7 +24,7 @@
@@ -499,7 +499,7 @@
Parameters:

diff --git a/docs/Management.html b/docs/Management.html index bbd0805d..0b5405ff 100644 --- a/docs/Management.html +++ b/docs/Management.html @@ -24,7 +24,7 @@
@@ -294,7 +294,7 @@
Parameters:

- Generated by JSDoc 3.5.5 on Fri May 24 2019 16:14:41 GMT-0300 (Brasilia Standard Time) using the Minami theme. + Generated by JSDoc 3.5.5 on Tue Jun 25 2019 11:53:46 GMT-0300 (Brasilia Standard Time) using the Minami theme.
diff --git a/docs/WebAuth.html b/docs/WebAuth.html index 744c1623..d7a3ab95 100644 --- a/docs/WebAuth.html +++ b/docs/WebAuth.html @@ -24,7 +24,7 @@
@@ -571,7 +571,7 @@
Parameters:

- Generated by JSDoc 3.5.5 on Fri May 24 2019 16:14:41 GMT-0300 (Brasilia Standard Time) using the Minami theme. + Generated by JSDoc 3.5.5 on Tue Jun 25 2019 11:53:46 GMT-0300 (Brasilia Standard Time) using the Minami theme.
diff --git a/docs/authentication_db-connection.js.html b/docs/authentication_db-connection.js.html index 33102404..019e5e6b 100644 --- a/docs/authentication_db-connection.js.html +++ b/docs/authentication_db-connection.js.html @@ -24,7 +24,7 @@
@@ -160,7 +160,7 @@

authentication/db-connection.js


- Generated by JSDoc 3.5.5 on Fri May 24 2019 16:14:41 GMT-0300 (Brasilia Standard Time) using the Minami theme. + Generated by JSDoc 3.5.5 on Tue Jun 25 2019 11:53:46 GMT-0300 (Brasilia Standard Time) using the Minami theme.
diff --git a/docs/authentication_index.js.html b/docs/authentication_index.js.html index ca2af71f..deeb4827 100644 --- a/docs/authentication_index.js.html +++ b/docs/authentication_index.js.html @@ -24,7 +24,7 @@
@@ -581,7 +581,7 @@

authentication/index.js


- Generated by JSDoc 3.5.5 on Fri May 24 2019 16:14:41 GMT-0300 (Brasilia Standard Time) using the Minami theme. + Generated by JSDoc 3.5.5 on Tue Jun 25 2019 11:53:46 GMT-0300 (Brasilia Standard Time) using the Minami theme.
diff --git a/docs/global.html b/docs/global.html index 78f6a891..9fc1b8fa 100644 --- a/docs/global.html +++ b/docs/global.html @@ -24,7 +24,7 @@
@@ -161,7 +161,7 @@

authorizeSource:
@@ -1825,6 +1825,89 @@
Parameters:
+ + + +

+ + +
+ + + +

callback()

+ + + + + +
+

Runs the callback code for the cross origin authentication call. This method is meant to be called by the cross origin authentication callback url.

+
+ + + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + +
Source:
+
+ + + + + + + +
+ + + + + + + + + + + + + + + + + + + + @@ -2100,89 +2183,6 @@
Parameters:
- - - -
- - -
- - - -

callback()

- - - - - -
-

Runs the callback code for the cross origin authentication call. This method is meant to be called by the cross origin authentication callback url.

-
- - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - -
Source:
-
- - - - - - - -
- - - - - - - - - - - - - - - - - - - - @@ -2236,7 +2236,7 @@

changeP
Source:
@@ -2726,7 +2726,7 @@

checkSess
Source:
@@ -3154,7 +3154,7 @@

Source:
@@ -3237,7 +3237,7 @@

Source:
@@ -4096,7 +4096,7 @@

linkUserSource:
@@ -4254,14 +4254,7 @@

login -

Logs the user in with username and password using the correct flow based on where it's called from:

-
    -
  • If you're calling this method from the Universal Login Page, it will use the usernamepassword/login endpoint
  • -
  • If you're calling this method outside the Universal Login Page, it will use the cross origin authentication (/co/authenticate) flow -You can use either username or email to identify the user, but username will take precedence over email. -After the redirect to redirectUri, use parseHash to retrieve the authentication data. -Notice that when using the cross origin authentication flow, some browsers might not be able to successfully authenticate if 3rd party cookies are disabled. See here for more information..
  • -
+

Makes a call to the oauth/token endpoint with password-realm grant type

@@ -4297,7 +4290,7 @@

loginSource:
@@ -4307,7 +4300,7 @@

loginSee:
@@ -4365,7 +4358,7 @@
Parameters:
-

options used in the authorize call after the login_ticket is acquired

+ @@ -4408,7 +4401,39 @@
Parameters:
- <optional>
+ + + + + + + + + + +

email or username of the user that will perform Auth

+ + + + + + + + + password + + + + + +String + + + + + + + @@ -4420,7 +4445,7 @@
Parameters:
-

Username (mutually exclusive with email)

+

the password of the user that will perform Auth

@@ -4429,7 +4454,7 @@
Parameters:
- email + scope @@ -4456,7 +4481,7 @@
Parameters:
-

Email (mutually exclusive with username)

+

scopes to be requested during Auth. e.g. openid email

@@ -4465,7 +4490,7 @@
Parameters:
- password + audience @@ -4480,6 +4505,8 @@
Parameters:
+ <optional>
+ @@ -4490,7 +4517,7 @@
Parameters:
-

Password

+

identifier of the resource server who will consume the access token issued after Auth

@@ -4505,7 +4532,7 @@
Parameters:
-String +Object @@ -4514,8 +4541,6 @@
Parameters:
- <optional>
- @@ -4526,7 +4551,7 @@
Parameters:
-

Realm used to authenticate the user, it can be a realm name or a database connection name

+

the HRD domain or the connection name where the user belongs to. e.g. Username-Password-Authentication

@@ -4549,7 +4574,7 @@
Parameters:
-crossOriginLoginCallback +tokenCallback @@ -4560,7 +4585,7 @@
Parameters:
-

Callback function called only when an authentication error, like invalid username or password, occurs. For other types of errors, there will be a redirect to the redirectUri.

+

function called with the result of the request

@@ -4598,7 +4623,9 @@

login -

Makes a call to the oauth/token endpoint with password-realm grant type

+

Logs in the user with username and password using the cross origin authentication (/co/authenticate) flow. You can use either username or email to identify the user, but username will take precedence over email. +Some browsers might not be able to successfully authenticate if 3rd party cookies are disabled in your browser. See here for more information.. +After the /co/authenticate call, you'll have to use the parseHash function at the redirectUri specified in the constructor.

@@ -4634,20 +4661,13 @@

loginSource:
-
See:
-
- -
- @@ -4702,7 +4722,7 @@
Parameters:
- +

options used in the authorize call after the login_ticket is acquired

@@ -4745,39 +4765,7 @@
Parameters:
- - - - - - - - - - -

email or username of the user that will perform Auth

- - - - - - - - - password - - - - - -String - - - - - - - + <optional>
@@ -4789,7 +4777,7 @@
Parameters:
-

the password of the user that will perform Auth

+

Username (mutually exclusive with email)

@@ -4798,7 +4786,7 @@
Parameters:
- scope + email @@ -4825,7 +4813,7 @@
Parameters:
-

scopes to be requested during Auth. e.g. openid email

+

Email (mutually exclusive with username)

@@ -4834,7 +4822,7 @@
Parameters:
- audience + password @@ -4849,8 +4837,6 @@
Parameters:
- <optional>
- @@ -4861,7 +4847,7 @@
Parameters:
-

identifier of the resource server who will consume the access token issued after Auth

+

Password

@@ -4876,7 +4862,7 @@
Parameters:
-Object +String @@ -4885,6 +4871,8 @@
Parameters:
+ <optional>
+ @@ -4895,7 +4883,7 @@
Parameters:
-

the HRD domain or the connection name where the user belongs to. e.g. Username-Password-Authentication

+

Realm used to authenticate the user, it can be a realm name or a database connection name

@@ -4918,7 +4906,7 @@
Parameters:
-tokenCallback +crossOriginLoginCallback @@ -4929,7 +4917,7 @@
Parameters:
-

function called with the result of the request

+

Callback function called only when an authentication error, like invalid username or password, occurs. For other types of errors, there will be a redirect to the redirectUri.

@@ -4967,9 +4955,14 @@

login -

Performs authentication with username/email and password with a database connection

-

This method is not compatible with API Auth so if you need to fetch API tokens with audience -you should use authorize or login.

+

Logs the user in with username and password using the correct flow based on where it's called from:

+
    +
  • If you're calling this method from the Universal Login Page, it will use the usernamepassword/login endpoint
  • +
  • If you're calling this method outside the Universal Login Page, it will use the cross origin authentication (/co/authenticate) flow +You can use either username or email to identify the user, but username will take precedence over email. +After the redirect to redirectUri, use parseHash to retrieve the authentication data. +Notice that when using the cross origin authentication flow, some browsers might not be able to successfully authenticate if 3rd party cookies are disabled. See here for more information..
  • +

@@ -5005,13 +4998,20 @@

loginSource:
+
See:
+
+ +
+ @@ -5066,7 +5066,7 @@
Parameters:
- +

options used in the authorize call after the login_ticket is acquired

@@ -5094,7 +5094,7 @@
Parameters:
- redirectUri + username @@ -5121,7 +5121,7 @@
Parameters:
-

url that the Auth0 will redirect after Auth with the Authorization Response

+

Username (mutually exclusive with email)

@@ -5130,7 +5130,7 @@
Parameters:
- responseType + email @@ -5157,7 +5157,7 @@
Parameters:
-

type of the response used. It can be any of the values code and token

+

Email (mutually exclusive with username)

@@ -5166,7 +5166,7 @@
Parameters:
- responseMode + password @@ -5181,8 +5181,6 @@
Parameters:
- <optional>
- @@ -5193,7 +5191,7 @@
Parameters:
-

how the AuthN response is encoded and redirected back to the client. Supported values are query and fragment

+

Password

@@ -5202,7 +5200,7 @@
Parameters:
- scope + realm @@ -5229,7 +5227,7 @@
Parameters:
-

scopes to be requested during AuthN. e.g. openid email

+

Realm used to authenticate the user, it can be a realm name or a database connection name

@@ -5252,7 +5250,7 @@
Parameters:
-credentialsCallback +crossOriginLoginCallback @@ -5263,7 +5261,7 @@
Parameters:
- +

Callback function called only when an authentication error, like invalid username or password, occurs. For other types of errors, there will be a redirect to the redirectUri.

@@ -5301,9 +5299,9 @@

login -

Logs in the user with username and password using the cross origin authentication (/co/authenticate) flow. You can use either username or email to identify the user, but username will take precedence over email. -Some browsers might not be able to successfully authenticate if 3rd party cookies are disabled in your browser. See here for more information.. -After the /co/authenticate call, you'll have to use the parseHash function at the redirectUri specified in the constructor.

+

Performs authentication with username/email and password with a database connection

+

This method is not compatible with API Auth so if you need to fetch API tokens with audience +you should use authorize or login.

@@ -5339,7 +5337,7 @@

loginSource:
@@ -5400,7 +5398,7 @@
Parameters:
-

options used in the authorize call after the login_ticket is acquired

+ @@ -5428,7 +5426,7 @@
Parameters:
- username + redirectUri @@ -5455,7 +5453,7 @@
Parameters:
-

Username (mutually exclusive with email)

+

url that the Auth0 will redirect after Auth with the Authorization Response

@@ -5464,7 +5462,7 @@
Parameters:
- email + responseType @@ -5491,7 +5489,7 @@
Parameters:
-

Email (mutually exclusive with username)

+

type of the response used. It can be any of the values code and token

@@ -5500,7 +5498,7 @@
Parameters:
- password + responseMode @@ -5515,6 +5513,8 @@
Parameters:
+ <optional>
+ @@ -5525,7 +5525,7 @@
Parameters:
-

Password

+

how the AuthN response is encoded and redirected back to the client. Supported values are query and fragment

@@ -5534,7 +5534,7 @@
Parameters:
- realm + scope @@ -5561,7 +5561,7 @@
Parameters:
-

Realm used to authenticate the user, it can be a realm name or a database connection name

+

scopes to be requested during AuthN. e.g. openid email

@@ -5584,7 +5584,7 @@
Parameters:
-crossOriginLoginCallback +credentialsCallback @@ -5595,7 +5595,7 @@
Parameters:
-

Callback function called only when an authentication error, like invalid username or password, occurs. For other types of errors, there will be a redirect to the redirectUri.

+ @@ -5633,9 +5633,9 @@

l
-

Logs in the user with username and password using the cross origin authentication (/co/authenticate) flow. You can use either username or email to identify the user, but username will take precedence over email. -Some browsers might not be able to successfully authenticate if 3rd party cookies are disabled in your browser. See here for more information.. -After the /co/authenticate call, you'll have to use the parseHash function at the redirectUri specified in the constructor.

+

Performs authentication with username/email and password with a database connection inside a new window

+

This method is not compatible with API Auth so if you need to fetch API tokens with audience +you should use authorize or login.

@@ -5659,8 +5659,6 @@

l -
Deprecated:
  • This method will be released in the next major version. Use `webAuth.login` instead.
- @@ -5673,7 +5671,7 @@

l
Source:
@@ -5734,7 +5732,7 @@

Parameters:
-

options used in the authorize call after the login_ticket is acquired

+ @@ -5762,7 +5760,7 @@
Parameters:
- username + redirectUri @@ -5789,7 +5787,7 @@
Parameters:
-

Username (mutually exclusive with email)

+

url that the Auth0 will redirect after Auth with the Authorization Response

@@ -5798,7 +5796,7 @@
Parameters:
- email + responseType @@ -5825,7 +5823,7 @@
Parameters:
-

Email (mutually exclusive with username)

+

type of the response used. It can be any of the values code and token

@@ -5834,7 +5832,7 @@
Parameters:
- password + responseMode @@ -5849,6 +5847,8 @@
Parameters:
+ <optional>
+ @@ -5859,7 +5859,7 @@
Parameters:
-

Password

+

how the AuthN response is encoded and redirected back to the client. Supported values are query and fragment. The query value is only supported when responseType is code.

@@ -5868,7 +5868,7 @@
Parameters:
- connection + scope @@ -5895,7 +5895,7 @@
Parameters:
-

Connection used to authenticate the user, it can be a realm name or a database connection name

+

scopes to be requested during AuthN. e.g. openid email

@@ -5918,7 +5918,7 @@
Parameters:
-crossOriginLoginCallback +credentialsCallback @@ -5929,7 +5929,7 @@
Parameters:
-

Callback function called only when an authentication error, like invalid username or password, occurs. For other types of errors, there will be a redirect to the redirectUri.

+ @@ -5967,9 +5967,9 @@

l
-

Performs authentication with username/email and password with a database connection inside a new window

-

This method is not compatible with API Auth so if you need to fetch API tokens with audience -you should use authorize or login.

+

Logs in the user with username and password using the cross origin authentication (/co/authenticate) flow. You can use either username or email to identify the user, but username will take precedence over email. +Some browsers might not be able to successfully authenticate if 3rd party cookies are disabled in your browser. See here for more information.. +After the /co/authenticate call, you'll have to use the parseHash function at the redirectUri specified in the constructor.

@@ -5993,6 +5993,8 @@

l +
Deprecated:
  • This method will be released in the next major version. Use `webAuth.login` instead.
+ @@ -6005,7 +6007,7 @@

l
Source:
@@ -6066,7 +6068,7 @@

Parameters:
- +

options used in the authorize call after the login_ticket is acquired

@@ -6094,7 +6096,7 @@
Parameters:
- redirectUri + username @@ -6121,7 +6123,7 @@
Parameters:
-

url that the Auth0 will redirect after Auth with the Authorization Response

+

Username (mutually exclusive with email)

@@ -6130,7 +6132,7 @@
Parameters:
- responseType + email @@ -6157,7 +6159,7 @@
Parameters:
-

type of the response used. It can be any of the values code and token

+

Email (mutually exclusive with username)

@@ -6166,7 +6168,7 @@
Parameters:
- responseMode + password @@ -6181,8 +6183,6 @@
Parameters:
- <optional>
- @@ -6193,7 +6193,7 @@
Parameters:
-

how the AuthN response is encoded and redirected back to the client. Supported values are query and fragment. The query value is only supported when responseType is code.

+

Password

@@ -6202,7 +6202,7 @@
Parameters:
- scope + connection @@ -6229,7 +6229,7 @@
Parameters:
-

scopes to be requested during AuthN. e.g. openid email

+

Connection used to authenticate the user, it can be a realm name or a database connection name

@@ -6252,7 +6252,7 @@
Parameters:
-credentialsCallback +crossOriginLoginCallback @@ -6263,7 +6263,7 @@
Parameters:
- +

Callback function called only when an authentication error, like invalid username or password, occurs. For other types of errors, there will be a redirect to the redirectUri.

@@ -7042,7 +7042,7 @@

logoutSource:
@@ -7668,7 +7668,7 @@

pass
Source:
@@ -7996,7 +7996,7 @@

pass
Source:
@@ -8367,7 +8367,7 @@

pas
Source:
@@ -8683,7 +8683,7 @@

pas
Source:
@@ -8949,6 +8949,200 @@

Parameters:
+

+ + +
+ + + +

patchUserAttributes(userId, user, cb)

+ + + + + +
+

Updates the user attributes. It will patch the user attributes that the server allows it.

+
+ + + + + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + +
Source:
+
+ + + + + +
See:
+
+ +
+ + + +
+ + + + + + + + + +
Parameters:
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
NameTypeDescription
userId + + +String + + + + + + +
user + + +Object + + + + + + +
cb + + +userCallback + + + + + + +
+ + + + + + + + + + + + + + + +
@@ -9330,7 +9524,7 @@

renewAuthSource:
@@ -10310,7 +10504,7 @@

signupSource:
@@ -10582,7 +10776,7 @@

sig
Source:
@@ -10820,6 +11014,8 @@

signupA

Signs up a new user and automatically logs the user in after the signup.

+

This method is not compatible with API Auth so if you need to fetch API tokens with audience +you should use authorize or signupAndAuthorize.

@@ -10855,7 +11051,7 @@

signupA
Source:
@@ -11348,8 +11544,6 @@

signupA

Signs up a new user and automatically logs the user in after the signup.

-

This method is not compatible with API Auth so if you need to fetch API tokens with audience -you should use authorize or signupAndAuthorize.

@@ -11385,7 +11579,7 @@

signupA
Source:
@@ -12950,7 +13144,7 @@

Source:
@@ -14232,7 +14426,7 @@

Source:
@@ -14382,7 +14576,7 @@

Parameters:

- Generated by JSDoc 3.5.5 on Fri May 24 2019 16:14:41 GMT-0300 (Brasilia Standard Time) using the Minami theme. + Generated by JSDoc 3.5.5 on Tue Jun 25 2019 11:53:46 GMT-0300 (Brasilia Standard Time) using the Minami theme.
diff --git a/docs/index.html b/docs/index.html index 331ca877..198a72d7 100644 --- a/docs/index.html +++ b/docs/index.html @@ -24,7 +24,7 @@
@@ -70,12 +70,12 @@

Index

Install

From CDN:

<!-- Latest patch release -->
-<script src="https://cdn.auth0.com/js/auth0/9.10.4/auth0.min.js"></script>

From npm:

+<script src="https://cdn.auth0.com/js/auth0/9.11.0/auth0.min.js"></script>

From npm:

npm install auth0-js

After installing the auth0-js module, you'll need bundle it up along with all of its dependencies.

auth0.WebAuth

Provides support for all the authentication flows.

Initialize

var auth0 = new auth0.WebAuth({
-  domain: "{YOUR_AUTH0_DOMAIN}",
-  clientID: "{YOUR_AUTH0_CLIENT_ID}"
+  domain: '{YOUR_AUTH0_DOMAIN}',
+  clientID: '{YOUR_AUTH0_CLIENT_ID}'
 });

Parameters: