Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

release: version packages #6424

Merged
merged 1 commit into from
Sep 13, 2024
Merged

release: version packages #6424

merged 1 commit into from
Sep 13, 2024

Conversation

silverhand-bot
Copy link
Collaborator

@silverhand-bot silverhand-bot commented Aug 9, 2024

This PR was opened by the Changesets release GitHub action. When you're ready to do a release, you can merge this and publish to npm yourself or setup this action to publish automatically. If you're not ready to do a release yet, that's fine, whenever you add more changesets to master, this PR will be updated.

Releases

@logto/connector-gitlab@1.0.0

Major Changes

  • 31296f0: add GitLab social connector leveraging OAuth2

    Major Changes

    • Initial release of the GitLab connector.

      This release introduces the Logto connector for GitLab, enabling social sign-in using GitLab accounts. It supports OAuth 2.0 authentication flow, fetching user information, and handling errors gracefully.

    Features

    • OAuth 2.0 Authentication: Support for OAuth 2.0 authentication flow with GitLab.
    • User Information Retrieval: Fetches user details such as full name, email, profile URL, and avatar.
    • Error Handling: Graceful handling of OAuth errors, including token exchange failures and user-denied permissions.
    • Configurable Scope: Allows customization of OAuth scopes to access different levels of user information.

Patch Changes

  • Updated dependencies [27d2c91]
    • @logto/connector-oauth@1.5.0

@logto/connector-patreon@1.0.0

Major Changes

  • aba0892: add Patreon social connector

    Major Changes

    • Initial release of the Patreon connector.

      This release introduces the Logto connector for Patreon, enabling social sign-in using Patreon accounts. It supports OAuth 2.0 authentication flow, fetching user information, and handling errors gracefully.

    Features

    • OAuth 2.0 Authentication: Support for OAuth 2.0 authentication flow with Patreon.
    • User Information Retrieval: Fetches user details such as full name, email, profile URL, and avatar.
    • Error Handling: Graceful handling of OAuth errors, including token exchange failures and user-denied permissions.
    • Configurable Scope: Allows customization of OAuth scopes to access different levels of user information.

Patch Changes

  • Updated dependencies [27d2c91]
    • @logto/connector-oauth@1.5.0

@logto/cli@1.20.0

Minor Changes

  • 0183d0c: split translate command from @logto/cli and create a standalone package

    The "translate" command has greatly increased the size of the "@logto/cli" package, as it involves TypeScript code manipulation and has to use "typescrpt" as a "dependency".
    In fact, only a small number of developers who want to contribute Logto will use this command, so we believe it's best to separate the less frequently used "translate" command from the "cli" package to keep it small and simple.

    Please also be noted that this change is actually a breaking change for those who use the "translate" command. However, the CLI has to be bundle-released with the "Logto" open-source distribution, and we feel it is still too early to make a major version bump for Logto. Therefore, the "minor" bump is used this time.

Patch Changes

  • Updated dependencies [e0326c9]
  • Updated dependencies [25187ef]
  • Updated dependencies [479d589]
    • @logto/schemas@1.20.0

@logto/connector-kook@0.2.0

Minor Changes

  • 4b01ce7: add KOOK social connector

Patch Changes

  • Updated dependencies [27d2c91]
    • @logto/connector-oauth@1.5.0

@logto/connector-oauth@1.5.0

Minor Changes

  • 27d2c91: adding support for nested attributes

@logto/phrases@1.14.0

Minor Changes

  • f150a67: display user password information on user details page

  • e0326c9: Add personal access token (PAT)

    Personal access tokens (PATs) provide a secure way for users to grant access tokens without using their credentials and interactive sign-in.

    You can create a PAT by going to the user's detail page in Console or using the Management API POST /users/:userId/personal-access-tokens.

    To use a PAT, call the token exchange endpoint POST /oidc/token with the following parameters:

    1. grant_type: REQUIRED. The value of this parameter must be urn:ietf:params:oauth:grant-type:token-exchange indicates that a token exchange is being performed.
    2. resource: OPTIONAL. The resource indicator, the same as other token requests.
    3. scope: OPTIONAL. The requested scopes, the same as other token requests.
    4. subject_token: REQUIRED. The user's PAT.
    5. subject_token_type: REQUIRED. The type of the security token provided in the subject_token parameter. The value of this parameter must be urn:logto:token-type:personal_access_token.
    6. client_id: REQUIRED. The client identifier of the client application that is making the request, the returned access token will contain this client_id claim.

    And the response will be a JSON object with the following properties:

    1. access_token: REQUIRED. The access token of the user, which is the same as other token requests like authorization_code or refresh_token.
    2. issued_token_type: REQUIRED. The type of the issued token. The value of this parameter must be urn:ietf:params:oauth:token-type:access_token.
    3. token_type: REQUIRED. The type of the token. The value of this parameter must be Bearer.
    4. expires_in: REQUIRED. The lifetime in seconds of the access token.
    5. scope: OPTIONAL. The scopes of the access token.
  • 53060c2: add ar-SA language (credit to @zaaakher)

@logto/phrases-experience@1.8.0

Minor Changes

@logto/schemas@1.20.0

Minor Changes

  • e0326c9: Add personal access token (PAT)

    Personal access tokens (PATs) provide a secure way for users to grant access tokens without using their credentials and interactive sign-in.

    You can create a PAT by going to the user's detail page in Console or using the Management API POST /users/:userId/personal-access-tokens.

    To use a PAT, call the token exchange endpoint POST /oidc/token with the following parameters:

    1. grant_type: REQUIRED. The value of this parameter must be urn:ietf:params:oauth:grant-type:token-exchange indicates that a token exchange is being performed.
    2. resource: OPTIONAL. The resource indicator, the same as other token requests.
    3. scope: OPTIONAL. The requested scopes, the same as other token requests.
    4. subject_token: REQUIRED. The user's PAT.
    5. subject_token_type: REQUIRED. The type of the security token provided in the subject_token parameter. The value of this parameter must be urn:logto:token-type:personal_access_token.
    6. client_id: REQUIRED. The client identifier of the client application that is making the request, the returned access token will contain this client_id claim.

    And the response will be a JSON object with the following properties:

    1. access_token: REQUIRED. The access token of the user, which is the same as other token requests like authorization_code or refresh_token.
    2. issued_token_type: REQUIRED. The type of the issued token. The value of this parameter must be urn:ietf:params:oauth:token-type:access_token.
    3. token_type: REQUIRED. The type of the token. The value of this parameter must be Bearer.
    4. expires_in: REQUIRED. The lifetime in seconds of the access token.
    5. scope: OPTIONAL. The scopes of the access token.
  • 25187ef: add support for login_hint parameter in sign-in method

    This feature allows you to provide a suggested identifier (email, phone, or username) for the user, improving the sign-in experience especially in scenarios where the user's identifier is known or can be inferred.

    Example:

    // Example usage (React project using React SDK)
    void signIn({
      redirectUri,
      loginHint: "user@example.com",
      firstScreen: "signIn", // or 'register'
    });

Patch Changes

  • 479d589: bump @withtyped dependency version
  • Updated dependencies [f150a67]
  • Updated dependencies [e0326c9]
  • Updated dependencies [53060c2]
    • @logto/phrases@1.14.0
    • @logto/phrases-experience@1.8.0

@logto/translate@0.1.0

Minor Changes

  • 0183d0c: split translate command from @logto/cli and create a standalone package

    The "translate" command has greatly increased the size of the "@logto/cli" package, as it involves TypeScript code manipulation and has to use "typescrpt" as a "dependency".
    In fact, only a small number of developers who want to contribute Logto will use this command, so we believe it's best to separate the less frequently used "translate" command from the "cli" package to keep it small and simple.

    Please also be noted that this change is actually a breaking change for those who use the "translate" command. However, the CLI has to be bundle-released with the "Logto" open-source distribution, and we feel it is still too early to make a major version bump for Logto. Therefore, the "minor" bump is used this time.

Patch Changes

  • Updated dependencies [f150a67]
  • Updated dependencies [e0326c9]
  • Updated dependencies [53060c2]
    • @logto/phrases@1.14.0
    • @logto/phrases-experience@1.8.0

@logto/connector-wecom@0.3.1

Patch Changes

  • 763dd60: fix wecom connector platform, should be Universal instead of null

@logto/create@1.20.0

Patch Changes

  • Updated dependencies [0183d0c]
    • @logto/cli@1.20.0

@logto/console@1.18.0

Minor Changes

  • f150a67: display user password information on user details page

  • e0326c9: Add personal access token (PAT)

    Personal access tokens (PATs) provide a secure way for users to grant access tokens without using their credentials and interactive sign-in.

    You can create a PAT by going to the user's detail page in Console or using the Management API POST /users/:userId/personal-access-tokens.

    To use a PAT, call the token exchange endpoint POST /oidc/token with the following parameters:

    1. grant_type: REQUIRED. The value of this parameter must be urn:ietf:params:oauth:grant-type:token-exchange indicates that a token exchange is being performed.
    2. resource: OPTIONAL. The resource indicator, the same as other token requests.
    3. scope: OPTIONAL. The requested scopes, the same as other token requests.
    4. subject_token: REQUIRED. The user's PAT.
    5. subject_token_type: REQUIRED. The type of the security token provided in the subject_token parameter. The value of this parameter must be urn:logto:token-type:personal_access_token.
    6. client_id: REQUIRED. The client identifier of the client application that is making the request, the returned access token will contain this client_id claim.

    And the response will be a JSON object with the following properties:

    1. access_token: REQUIRED. The access token of the user, which is the same as other token requests like authorization_code or refresh_token.
    2. issued_token_type: REQUIRED. The type of the issued token. The value of this parameter must be urn:ietf:params:oauth:token-type:access_token.
    3. token_type: REQUIRED. The type of the token. The value of this parameter must be Bearer.
    4. expires_in: REQUIRED. The lifetime in seconds of the access token.
    5. scope: OPTIONAL. The scopes of the access token.
  • b837efe: add access deny method to the custom token claims script

    Introduce a new api parameter to the custom token claims script. This parameter is used to provide more access control context over the token exchange process.
    Use api.denyAccess() to reject the token exchange request. Use this method to implement your own access control logics.

    const getCustomJwtClaims: async ({ api }) => {
      // Reject the token request, with a custom error message
      return api.denyAccess('Access denied');
    }

Patch Changes

  • ee1947a: support entering name while creating a user
  • ff6b304: fix: should not show custom JWT paywall for OSS users
  • 3b9714b: set lang attribute for <html>
  • fae8725: improve RTL language support

@logto/core@1.20.0

Minor Changes

  • e0326c9: Add personal access token (PAT)

    Personal access tokens (PATs) provide a secure way for users to grant access tokens without using their credentials and interactive sign-in.

    You can create a PAT by going to the user's detail page in Console or using the Management API POST /users/:userId/personal-access-tokens.

    To use a PAT, call the token exchange endpoint POST /oidc/token with the following parameters:

    1. grant_type: REQUIRED. The value of this parameter must be urn:ietf:params:oauth:grant-type:token-exchange indicates that a token exchange is being performed.
    2. resource: OPTIONAL. The resource indicator, the same as other token requests.
    3. scope: OPTIONAL. The requested scopes, the same as other token requests.
    4. subject_token: REQUIRED. The user's PAT.
    5. subject_token_type: REQUIRED. The type of the security token provided in the subject_token parameter. The value of this parameter must be urn:logto:token-type:personal_access_token.
    6. client_id: REQUIRED. The client identifier of the client application that is making the request, the returned access token will contain this client_id claim.

    And the response will be a JSON object with the following properties:

    1. access_token: REQUIRED. The access token of the user, which is the same as other token requests like authorization_code or refresh_token.
    2. issued_token_type: REQUIRED. The type of the issued token. The value of this parameter must be urn:ietf:params:oauth:token-type:access_token.
    3. token_type: REQUIRED. The type of the token. The value of this parameter must be Bearer.
    4. expires_in: REQUIRED. The lifetime in seconds of the access token.
    5. scope: OPTIONAL. The scopes of the access token.
  • 3d3a220: add support for additional first screen options

    This feature introduces new first screen options, allowing developers to customize the initial screen presented to users. In addition to the existing sign_in and register options, the following first screen choices are now supported:

    • identifier:sign_in: Only display specific identifier-based sign-in methods to users.
    • identifier:register: Only display specific identifier-based registration methods to users.
    • reset_password: Allow users to directly access the password reset page.
    • single_sign_on: Allow users to directly access the single sign-on (SSO) page.

    Example:

    // Example usage (React project using React SDK)
    void signIn({
      redirectUri,
      firstScreen: "identifier:sign_in",
      /**
       * Optional. Specifies which sign-in methods to display on the identifier sign-in page.
       * If not specified, the default sign-in experience configuration will be used.
       * This option is effective when the `firstScreen` value is `identifier:sign_in`, `identifier:register`, or `reset_password`.
       */
      identifiers: ["email", "phone"],
    });
  • 25187ef: add support for login_hint parameter in sign-in method

    This feature allows you to provide a suggested identifier (email, phone, or username) for the user, improving the sign-in experience especially in scenarios where the user's identifier is known or can be inferred.

    Example:

    // Example usage (React project using React SDK)
    void signIn({
      redirectUri,
      loginHint: "user@example.com",
      firstScreen: "signIn", // or 'register'
    });
  • b837efe: add access deny method to the custom token claims script

    Introduce a new api parameter to the custom token claims script. This parameter is used to provide more access control context over the token exchange process.
    Use api.denyAccess() to reject the token exchange request. Use this method to implement your own access control logics.

    const getCustomJwtClaims: async ({ api }) => {
      // Reject the token request, with a custom error message
      return api.denyAccess('Access denied');
    }
  • cc346b4: add password policy checking api

    Add POST /api/sign-in-exp/default/check-password API to check if the password meets the password policy configured in the default sign-in experience. A user ID is required for this API if rejects user info is enabled in the password policy.

    Here's a non-normative example of the request and response:

    POST /api/sign-in-exp/default/check-password
    Content-Type: application/json
    
    {
      "password": "123",
      "userId": "some-user-id"
    }
    400 Bad Request
    Content-Type: application/json
    
    {
      "result": false,
      "issues": [
        { "code": "password_rejected.too_short" },
        { "code": "password_rejected.character_types" },
        { "code": "password_rejected.restricted.sequence" }
      ]
    }

Patch Changes

  • a748fc8: fix: add hasPassword field to user API response

  • fae8725: improve RTL language support

  • 6951e31: introduce new parse_error query parameter flag. The value of parse_error can only be false.

    By default, Logto returns the parsed error code and error description in all the RequestError error responses. This is to ensure the error responses are consistent and easy to understand.

    However, when integrating Logto with Google OAuth, the error response body containing code will be rejected by Google. code is considered as a reserved OIDC key, can't be used as the error code key in the error response body.

    To workaround this, we add a new parse_error query parameter flag. When parsing the OIDC error body, if the parse_error is set to false, only oidc error body will be returned.

    example:

    curl -X POST "http://localhost:3001/oidc/token?parse_error=false"
    
    {
      "error": "invalid_grant",
      "error_description": "Invalid value for parameter 'code': 'invalid_code'."
    }
  • 5aab7c0: prevent user registration and profile fulfillment with SSO-only email domains

    Emails associated with SSO-enabled domains should only be used through the SSO authentication process.

    Bug fix:

    • Creating a new user with a verification record that contains an SSO-only email domain should return a 422 RequestError with the error code session.sso_required.
    • Updating a user profile with an SSO-only email domain should return a 422 RequestError with the error code session.sso_required.
  • Updated dependencies [f150a67]

  • Updated dependencies [ee1947a]

  • Updated dependencies [baa8577]

  • Updated dependencies [ff6b304]

  • Updated dependencies [e0326c9]

  • Updated dependencies [3d3a220]

  • Updated dependencies [25187ef]

  • Updated dependencies [479d589]

  • Updated dependencies [2626616]

  • Updated dependencies [3b9714b]

  • Updated dependencies [ab90f43]

  • Updated dependencies [fae8725]

  • Updated dependencies [0183d0c]

  • Updated dependencies [b837efe]

  • Updated dependencies [53060c2]

    • @logto/console@1.18.0
    • @logto/phrases@1.14.0
    • @logto/experience@1.9.0
    • @logto/schemas@1.20.0
    • @logto/experience-legacy@1.9.0
    • @logto/demo-app@1.4.1
    • @logto/cli@1.20.0
    • @logto/phrases-experience@1.8.0

@logto/experience@1.9.0

Minor Changes

  • baa8577: migrate experience app using Experience API.

    Migrate experience app API requests from legacy Interaction API to the new Experience API, except the following endpoints:

    • GET /api/interaction/consent
    • POST /api/interaction/consent

    Those endpoints are used in the third-party application's consent page only. Remain unchanged.

  • 3d3a220: add support for additional first screen options

    This feature introduces new first screen options, allowing developers to customize the initial screen presented to users. In addition to the existing sign_in and register options, the following first screen choices are now supported:

    • identifier:sign_in: Only display specific identifier-based sign-in methods to users.
    • identifier:register: Only display specific identifier-based registration methods to users.
    • reset_password: Allow users to directly access the password reset page.
    • single_sign_on: Allow users to directly access the single sign-on (SSO) page.

    Example:

    // Example usage (React project using React SDK)
    void signIn({
      redirectUri,
      firstScreen: "identifier:sign_in",
      /**
       * Optional. Specifies which sign-in methods to display on the identifier sign-in page.
       * If not specified, the default sign-in experience configuration will be used.
       * This option is effective when the `firstScreen` value is `identifier:sign_in`, `identifier:register`, or `reset_password`.
       */
      identifiers: ["email", "phone"],
    });
  • 25187ef: add support for login_hint parameter in sign-in method

    This feature allows you to provide a suggested identifier (email, phone, or username) for the user, improving the sign-in experience especially in scenarios where the user's identifier is known or can be inferred.

    Example:

    // Example usage (React project using React SDK)
    void signIn({
      redirectUri,
      loginHint: "user@example.com",
      firstScreen: "signIn", // or 'register'
    });
  • 2626616: allow link new social identity to an existing user account when registration is disabled.

    Previous behavior

    Sign-in with a social identity that does not have an existing user account will throw an identity_not_exist error. When the registration is disabled, the error message will be shown, the user will not be able to create a new account or link the social identity to an existing account via verified email or phone number.

    Expected behavior

    When the registration is disabled, if a related user account is found, the user should be able to link the social identity to an existing account via a verified email or phone number.

    Updates

    When the registration is disabled:

    • Show identity_not_exist error message if no related user account is found.
    • Automatically link the social identity to the existing account if a related user account is found and social automatic account linking is enabled.
    • Redirect the user to the social link account page if a related user account is found and social automatic account linking is disabled.
    • Hide the register button on the social link account page if the registration is disabled.

    When the registration is enabled:

    • Automatically register a new account with the social identity if no related user account is found.
    • Automatically link the social identity to the existing account if a related user account is found and social automatic account linking is enabled.
    • Redirect the user to the social link account page if a related user account is found and social automatic account linking is disabled.
    • Show the register new account button on the social link account page.

Patch Changes

  • 3b9714b: set lang attribute for <html>

  • ab90f43: fix(experience): prevent errors from applying unsupported cached identifier types

    Previously, cached identifier input values were applied to all pages without type checking, potentially causing errors. Now, the type is verified before application to ensure compatibility with each page's supported types.

  • fae8725: improve RTL language support

@logto/experience-legacy@1.9.0

Minor Changes

  • 2626616: allow link new social identity to an existing user account when registration is disabled.

    Previous behavior

    Sign-in with a social identity that does not have an existing user account will throw an identity_not_exist error. When the registration is disabled, the error message will be shown, the user will not be able to create a new account or link the social identity to an existing account via verified email or phone number.

    Expected behavior

    When the registration is disabled, if a related user account is found, the user should be able to link the social identity to an existing account via a verified email or phone number.

    Updates

    When the registration is disabled:

    • Show identity_not_exist error message if no related user account is found.
    • Automatically link the social identity to the existing account if a related user account is found and social automatic account linking is enabled.
    • Redirect the user to the social link account page if a related user account is found and social automatic account linking is disabled.
    • Hide the register button on the social link account page if the registration is disabled.

    When the registration is enabled:

    • Automatically register a new account with the social identity if no related user account is found.
    • Automatically link the social identity to the existing account if a related user account is found and social automatic account linking is enabled.
    • Redirect the user to the social link account page if a related user account is found and social automatic account linking is disabled.
    • Show the register new account button on the social link account page.

@logto/integration-tests@1.9.0

Minor Changes

  • 3d3a220: add support for additional first screen options

    This feature introduces new first screen options, allowing developers to customize the initial screen presented to users. In addition to the existing sign_in and register options, the following first screen choices are now supported:

    • identifier:sign_in: Only display specific identifier-based sign-in methods to users.
    • identifier:register: Only display specific identifier-based registration methods to users.
    • reset_password: Allow users to directly access the password reset page.
    • single_sign_on: Allow users to directly access the single sign-on (SSO) page.

    Example:

    // Example usage (React project using React SDK)
    void signIn({
      redirectUri,
      firstScreen: "identifier:sign_in",
      /**
       * Optional. Specifies which sign-in methods to display on the identifier sign-in page.
       * If not specified, the default sign-in experience configuration will be used.
       * This option is effective when the `firstScreen` value is `identifier:sign_in`, `identifier:register`, or `reset_password`.
       */
      identifiers: ["email", "phone"],
    });

Patch Changes

  • cc346b4: add password policy checking api

    Add POST /api/sign-in-exp/default/check-password API to check if the password meets the password policy configured in the default sign-in experience. A user ID is required for this API if rejects user info is enabled in the password policy.

    Here's a non-normative example of the request and response:

    POST /api/sign-in-exp/default/check-password
    Content-Type: application/json
    
    {
      "password": "123",
      "userId": "some-user-id"
    }
    400 Bad Request
    Content-Type: application/json
    
    {
      "result": false,
      "issues": [
        { "code": "password_rejected.too_short" },
        { "code": "password_rejected.character_types" },
        { "code": "password_rejected.restricted.sequence" }
      ]
    }

@logto/demo-app@1.4.1

Patch Changes

  • 3b9714b: set lang attribute for <html>
  • fae8725: improve RTL language support

@logto/elements@0.0.1

Patch Changes

  • fae8725: improve RTL language support

Copy link

github-actions bot commented Aug 9, 2024

COMPARE TO master

Total Size Diff ⚠️ 📈 +17.61 KB

Diff by File
Name Diff
.changeset/brave-horses-knock.md 📈 +112 Bytes
.changeset/dry-candles-design.md 📈 +77 Bytes
.changeset/fast-adults-dream.md 📈 +798 Bytes
.changeset/fresh-shrimps-rhyme.md 📈 +478 Bytes
.changeset/friendly-rice-sell.md 📈 +87 Bytes
.changeset/funny-goats-tap.md 📈 +1.79 KB
.changeset/hip-cats-destroy.md 📈 +111 Bytes
.changeset/nine-vans-whisper.md 📈 +1.18 KB
.changeset/pink-baboons-mix.md 📈 +66 Bytes
.changeset/polite-bats-learn.md 📈 +80 Bytes
.changeset/popular-monkeys-complain.md 📈 +539 Bytes
.changeset/proud-baboons-hope.md 📈 +68 Bytes
.changeset/proud-books-itch.md 📈 +1.68 KB
.changeset/quiet-penguins-join.md 📈 +119 Bytes
.changeset/rare-moons-unite.md 📈 +342 Bytes
.changeset/rare-poems-happen.md 📈 +160 Bytes
.changeset/selfish-kangaroos-perform.md 📈 +786 Bytes
.changeset/silly-hotels-greet.md 📈 +849 Bytes
.changeset/spicy-cameras-sleep.md 📈 +565 Bytes
.changeset/tiny-fishes-bake.md 📈 +942 Bytes
.changeset/violet-beds-yawn.md 📈 +78 Bytes
.changeset/witty-rivers-laugh.md 📈 +525 Bytes
.changeset/yellow-yaks-bathe.md 📈 +802 Bytes
.changeset/young-moons-deny.md 📈 +109 Bytes
packages/cli/CHANGELOG.md 📈 +995 Bytes
packages/cli/package.json 0 Bytes
packages/connectors/connector-gitlab/CHANGELOG.md 📈 +929 Bytes
packages/connectors/connector-gitlab/package.json 0 Bytes
packages/connectors/connector-kook/CHANGELOG.md 📈 +181 Bytes
packages/connectors/connector-kook/package.json 0 Bytes
packages/connectors/connector-oauth2/CHANGELOG.md 📈 +80 Bytes
packages/connectors/connector-oauth2/package.json 0 Bytes
packages/connectors/connector-patreon/CHANGELOG.md 📈 +917 Bytes
packages/connectors/connector-patreon/package.json 0 Bytes
packages/connectors/connector-wecom/CHANGELOG.md 📈 +113 Bytes
packages/connectors/connector-wecom/package.json 0 Bytes
packages/console/CHANGELOG.md 📈 +2.58 KB
packages/console/package.json 0 Bytes
packages/core/CHANGELOG.md 📈 +6.99 KB
packages/core/package.json 0 Bytes
packages/create/CHANGELOG.md 📈 +88 Bytes
packages/create/package.json 0 Bytes
packages/demo-app/CHANGELOG.md 📈 +119 Bytes
packages/demo-app/package.json 0 Bytes
packages/elements/CHANGELOG.md 📈 +90 Bytes
packages/elements/package.json 0 Bytes
packages/experience-legacy/CHANGELOG.md 📈 +1.68 KB
packages/experience-legacy/package.json 0 Bytes
packages/experience/CHANGELOG.md 📈 +4.18 KB
packages/experience/package.json 0 Bytes
packages/integration-tests/CHANGELOG.md 📈 +1.97 KB
packages/integration-tests/package.json 0 Bytes
packages/phrases-experience/CHANGELOG.md 📈 +84 Bytes
packages/phrases-experience/package.json 0 Bytes
packages/phrases/CHANGELOG.md 📈 +1.88 KB
packages/phrases/package.json 0 Bytes
packages/schemas/CHANGELOG.md 📈 +2.47 KB
packages/schemas/alterations/1.20.0-1723448981-personal-access-tokens.ts 📈 +1.16 KB
packages/schemas/alterations/1.20.0-1724229102-add-report-sub-updates-cloud-scope.ts 📈 +2.91 KB
packages/schemas/alterations/1.20.0-1724316971-add-verified-identifier-to-verification-statuses.ts 📈 +468 Bytes
packages/schemas/alterations/1.20.0-1725971571-add-verification-record.ts 📈 +1.1 KB
packages/schemas/alterations/next-1723448981-personal-access-tokens.ts 📈 +1.16 KB
packages/schemas/alterations/next-1724229102-add-report-sub-updates-cloud-scope.ts 📈 +2.91 KB
packages/schemas/alterations/next-1724316971-add-verified-identifier-to-verification-statuses.ts 📈 +468 Bytes
packages/schemas/alterations/next-1725971571-add-verification-record.ts 📈 +1.1 KB
packages/schemas/package.json 0 Bytes
packages/translate/CHANGELOG.md 📈 +1.02 KB
packages/translate/package.json 0 Bytes
pnpm-lock.yaml 📈 +3.48 KB

@github-actions github-actions bot added the size/m label Aug 9, 2024
@silverhand-bot silverhand-bot force-pushed the changeset-release/master branch 2 times, most recently from 91a0877 to 46a16d0 Compare August 11, 2024 12:24
@silverhand-bot silverhand-bot force-pushed the changeset-release/master branch 13 times, most recently from 91f37d2 to c17f086 Compare August 13, 2024 11:18
@silverhand-bot silverhand-bot force-pushed the changeset-release/master branch 6 times, most recently from cf1ad91 to fdbb2b9 Compare August 16, 2024 03:08
@silverhand-bot silverhand-bot force-pushed the changeset-release/master branch 23 times, most recently from a7ccd01 to c6d97d1 Compare September 13, 2024 08:04
@silverhand-bot silverhand-bot force-pushed the changeset-release/master branch from c6d97d1 to 2909731 Compare September 13, 2024 09:36
@charIeszhao charIeszhao merged commit 43d83e8 into master Sep 13, 2024
36 of 40 checks passed
@charIeszhao charIeszhao deleted the changeset-release/master branch September 13, 2024 10:06
SamSalvatico added a commit to ogcio/logto that referenced this pull request Oct 7, 2024
* refactor(experience): use vite

* refactor(console): use local mermaid import

* fix(console): use correct public url (logto-io#6325)

* refactor(console, experience): optimize bundling (logto-io#6326)

* refactor(console, experience): optimize bundling

* fix: use correct favicon paths

* chore: use dynamic react dependency checking in bundling

* refactor(core): rename some file names and methods (logto-io#6321)

* refactor(core): rename some files name and methods

rename some files name and methods, fix some comments

* chore: update comments

update comments

* chore: update comments

update comments

* chore: polish the words

polish the words

* fix(console): check scope only when data is ready (logto-io#6329)

* feat(core,schemas): implement profile fulfillment flow (logto-io#6293)

* feat(core,schemas): implement profile fulfillment flow

implement profile fulfillment flow

* fix(test): fix integration tests

fix integration tests

* fix(core): fix rebase issue

fix rebase issue

* refactor(core): refactor the interaction set profile flow

refactor the interaction set profile flow

* test(core): add profile fulfillment integration tests (logto-io#6294)

* test(core): add profile fufillment integration tests

add profile fufillment integration tests

* fix: fix integration tests

fix integration tests

* refactor(test): rebase and update the latest profile api

rebase and update the latest profile api

* fix(console): css loaded svg should be rendered properly (logto-io#6333)

* fix(core): fix some webhook api body status 404 bug (logto-io#6311)

* fix(core): fix some webhook api body status 404 bug

fix some webhook api body status 404 bug

* fix(core): improve the webhook trigger logic

improve the webhook trigger logic

* chore: add changeset

add changeset

* chore: update the changeset

update the changeset

* feat(core): implement the WebAuthn verification (logto-io#6308)

feat(core): implement the webauthn verification

implement the webauthn verification

* feat(schemas): add custom data to application (logto-io#6309)

* feat(core,schemas): add application custom data

add application custom data

* test(core): add update application with new custom data test

add update application with new custom data test

* refactor(console): increase custom ui assets upload timeout to 5 mins (logto-io#6319)

refactor(console): increase custom ui assets upload timeout to 5mins

* refactor: update logto/core cloud API usage

* refactor: update code according to CR

* refactor(console): update admin console using new pricing model (logto-io#6295)

* refactor(console): update cloud API calls

* refactor: update code according to CR

* refactor: correct component usage

* refactor(console): safely lazy load pages (logto-io#6332)

* refactor(console): safely lazy load pages

* chore(console): use react-safe-lazy

* feat(core): implement the missing mfa bind and guard flow (logto-io#6320)

* feat(core): implement the mfa binding flow

implment the mfa binding flow

* fix(test): fix integration tests

fix integration tests

* fix(core): fix the wrong status code

fix the wrong status code

* refactor(core): refactor bind backup codes

refactor bind backup codes

* refactor(core): extract isNewMfaVerification property (logto-io#6338)

extract isNewMfaVerifrication property

* refactor(core): refactor backup code generates flow (logto-io#6339)

refactor(core): refactor backup code generate flow

refactor backup code generate flow

* fix(console): dragging anchor in the color picker on application branding page (logto-io#6340)

* test(core): add the mfa binding integration tests (logto-io#6330)

* refactor(core): refactor backup code generate flow

refactor backup code generate flow

* fix(core): fix api payload

fix api payload

* test(core): implement the mfa binding integration tests

implement the mfa binding integration tests

* test(core): rebase backup code refactor

rebase backup code refactor

* style(console): fix custom jwt guide card style (logto-io#6343)

* refactor(console): block page navigation when uploading custom ui assets (logto-io#6342)

* chore(console): update bring your ui documentation link (logto-io#6317)

chore(console): add bring your ui documentation link

* fix(elements): fix user context tag name (logto-io#6346)

* chore: launch multiple app secrets

* chore: launch multiple app secrets

* refactor(core): use tsup for building

* refactor: use tsup for building

* refactor(console): improve ux

* chore: fix failed tests

* refactor(connector): use tsup for building

* ci: add check job

* feat(console): remove beta tag for protected app (logto-io#6341)

* feat(console): add passport.js guide (logto-io#6344)

* chore: update plausible urls (logto-io#6349)

* refactor(console, experience): solve sass deprecations (logto-io#6356)

* fix(console): fix the plan title for subscription plan selector (logto-io#6348)

* refactor(core): refactor openapi docs for protected app (logto-io#6331)

* refactor: update per review

* feat: allow app secret edit (logto-io#6352)

* fix(console): add dev guard on new pricing model subscription hooks (logto-io#6363)

* feat(core): migrate register flow affiliate report logic (logto-io#6334)

Migrate the new user affiliate flow from interaction API. 

- `postAffiliateLogs` is forked from  `routes/interaction/actions/helpers.ts`

* refactor(core): extract verified interaction guard middleware (logto-io#6336)

* refactor(core): refactor backup code generate flow

refactor backup code generate flow

* fix(core): fix api payload

fix api payload

* fix(core): fix rebase issue

fix rebase issue

* refactor(core): extract verified interaction guard middleware

extract verified interaction guard middleware

* refactor(console): fix text overflow issue (logto-io#6366)

* refactor(core): make the interaction event mandatory (logto-io#6337)

* refactor(core): refactor backup code generate flow

refactor backup code generate flow

* fix(core): fix api payload

fix api payload

* fix(core): fix rebase issue

fix rebase issue

* refactor(core): make the interaction event mandatory

make the interaction event mandatory

* test: update integration tests

update integration tests

* fix(core): fix the middleware apply bug

fix the koaExperienceInteraction middleware apply bug

* feat(core): add webhooks middleware to experience api (logto-io#6357)

* refactor(core): refactor backup code generate flow

refactor backup code generate flow

* fix(core): fix api payload

fix api payload

* fix(core): fix rebase issue

fix rebase issue

* feat(core): add hooks middleware to experience APIs

add interaction hooks to experience APIs

* refactor(core): refactor experience API context type

refactor experience API context type

* feat(connector): added postmark connector

* chore: remove unused deps (logto-io#6372)

* chore: remove unused deps

* chore: fix version

* refactor(core): improve swagger auth description (logto-io#6367)

* feat(core,schemas): add auditLogs to experience API (logto-io#6361)

* refactor(core): refactor backup code generate flow

refactor backup code generate flow

* fix(core): fix api payload

fix api payload

* fix(core): fix rebase issue

fix rebase issue

* feat(core,schemas): add auditLogs to experience API

add auditLogs to experience API

* refactor(core): allow cloudflare insights origin in csp (logto-io#6375)

refactor(core): allow cloudflare csp

* feat(core,schemas): add mandatory password guard on register (logto-io#6368)

* refactor(core): refactor backup code generate flow

refactor backup code generate flow

* fix(core): fix api payload

fix api payload

* fix(core): fix rebase issue

fix rebase issue

* feat(core,schemas): add mandatory password guard on register

add mandatory password guard on register

* feat: add advanced search params to all supported endpoints (logto-io#6358)

* feat: add search params to list users endpoint

* feat: implement advanced search for all supported endpoints

* chore(deps): update dependency nock to v14.0.0-beta.9 (logto-io#6243)

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>

* feat(cli): add cli command to setup custom ui local debugging proxy (logto-io#6365)

* feat(cli): add proxy

* refactor(cli): polish code per comments

* refactor(cli): polish code

* refactor(cli): support serving static files

* chore: add changeset

* refactor: polish code

* refactor(cli): polish code

* refactor(cli): make json parse safer

* feat(core,console,phrases): add custom data editor to application details page (logto-io#6370)

* feat(core,console,phrases): add custom data editor to application details page

add custom data editor to application details page

* chore: add changeset

add changeset

* fix(core): fix input params bug

fix input params bug

* fix(test): fix the integration tests

fix the integration tests

* fix(console): use the form controller element

use the form controller element

* fix(core,console): remove deepPartial statement

remove deepPartial statement from the patch application API payload guard

* fix(test): fix backchannel integration test

fix backchannel integration test

* fix(core): allow non-json body type when parsing (logto-io#6379)

* refactor(core): make password optional in NewPasswordIdentity (logto-io#6377)

refactor(core): make password optional in NewPasswordIdentity verification

make password optioanl in NewPasswordIdentity verification

* refactor(console): get and check `skuId` from checkout session (logto-io#6369)

* refactor(console): get and check skuId from checkout session

* chore: update @logto/cloud dependency

* refactor: add tests for content-type in oidc apis (logto-io#6380)

* refactor(console): delay module loading suspense component display by 500ms (logto-io#6345)

* chore(console): remove redunant login hint usage for invitation (logto-io#6385)

* fix(core): error data bug fixing (logto-io#6382)

fix(core): error code bug fixing

error code bug fixing

* refactor(console): update billing info showed in subscription details page (logto-io#6384)

* fix(console): add in-line error message (logto-io#6386)

* fix(console): add in-line error message

add in-line error message

* refactor(console): remove old validation logic

remove old validation logic

* fix(console): create tenant button should stretch to full width (logto-io#6381)

* fix(console): manual update subscription data when add/delete resources (logto-io#6360)

* fix(console): add post response hook to update subscription info for useApi hook

* refactor: wrap sync subscription data method

* chore(phrases): update content (logto-io#6392)

chore: update content

* fix(console): fix the subscription plan display in tenant dropdown (logto-io#6393)

* refactor(core): should not guard sso authentication flow (logto-io#6394)

should not guard mfa and profile fulfillment for the sso authentication flow

* fix(core): should not throw when not adding any new roles to a user (logto-io#6387)

* fix(console): should not call cloud API when tenant ID is not valid (logto-io#6399)

* refactor(console): improve guide logo and contact us logo display (logto-io#6391)

* feat(core,schemas): add support for argon2d and argon2id (logto-io#6404)

* feat(console): support next auth v5 (logto-io#6397)

* feat: add add-on feature notice/tag

* chore: define add on unit price temporarily

* refactor: produce br outputs (logto-io#6376)

* refactor: produce br outputs

* refactor: fix favicon url

* refactor: add `report:subscription:updates` Cloud scope (logto-io#6403)

* Revert "refactor: add `report:subscription:updates` Cloud scope" (logto-io#6412)

Revert "refactor: add `report:subscription:updates` Cloud scope (logto-io#6403)"

This reverts commit e1922e9.

* fix(console): fix unexpected 401 error toast (logto-io#6416)

* feat(core): add Sentinel guard (logto-io#6374)

feat(core): add sentinel protection

add sentinel protection

* feat(core): support google one tap (logto-io#6395)

* feat(core): support google one tap

support google one tap verification

* fix(core): fix google one tap verification error

fix google one tap verification error

* fix(test): optimize social verification test

optimize social verificaiton tests

* fix(test): update social verification ut

update social verification util unit test

* refactor(core,schemas): refactor the register flow (logto-io#6401)

* refactor(core,schemas): refactor the registration flow

refactor the registraction flow

* fix(core): remove unused method

remove unused method

* fix(test): remove legacy test

remove legacy test

* fix(core): fix webauthn verificaiton api

fix webauthn verification api

* feat(console): add new usage display for pro subscription plan (logto-io#6413)

* release: version packages (logto-io#6197)

* feat: report subscription usage updates (logto-io#6419)

* feat: report subscription usage updates

* refactor: refactor code according to CR

* feat: support `login_hint` params for sign-in url (logto-io#6400)

* refactor(console): avoid getSubscription call before authentication (logto-io#6426)

avoid getSubscription call before authentication

* feat(connector): add kook connector (logto-io#6227)

* feat(connector): add kook connector

* docs: remove some lines to align with other connectors

* chore(connector): migrate kook-connector to tsup logto-io#6355

* fix(connector): type error in kook-connector

* chore: fix pnpm-lock

* chore: add changeset

---------

Co-authored-by: wangsijie <wangsijie@silverhand.io>

* fix(console): catch timeout error when submitting form (logto-io#6431)

* refactor(core): merge subscription usage API request (logto-io#6427)

* refactor(core): merge subscription usage API request

merge subscription usage API request

* fix(core): fix type issue

fix type issue

* fix(experience): prevent errors from applying unsupported cached identifier types (logto-io#6425)

* fix(experience): prevent errors from applying unsupported cached identifier types

* test(experience): add integration tests for cached input value

* refactor(experience): rename `getIdentifierInputValue` to `getIdentifierInputValueByTypes`

* refactor(experience): add `identifierInputValue` back

* refactor(experience): update implementation

* feat(schemas): init personal access tokens table (logto-io#6383)

* chore: fix alteration timestamp (logto-io#6433)

* refactor: stop using GET /:tenantId/usage API and GET /tenants usage field (logto-io#6434)

* feat(core): create PAT (logto-io#6388)

* feat(core): list PATs (logto-io#6389)

* feat(core): modify and delete PATs (logto-io#6390)

* fix: update tenant selector dropdown data source (logto-io#6438)

* feat(experience): add identifier sign-in page (logto-io#6435)

* feat(experience): add identifier register page (logto-io#6437)

* fix(console): should not block custom JWT creation for OSS user (logto-io#6441)

* refactor(cli): rename proxy cli to tunnel (logto-io#6442)

* feat(core): add experience APIs openapi docs (logto-io#6436)

* feat(core): add experience APIs openapi docs

add experience APIs openapi docs

* fix(core): adjust the format

adjust the format

* chore: update experience API description

update experience API description

* fix(core): fix integration tests

fix integration tests

* chore(core): add devFeature tag in openapi doc

add devFeature tag in openapi doc

* fix(core): fix the integration test

remove the redundent path paramter def

* refactor(console): separate subscription based usage (logto-io#6448)

* refactor(console): separate subscription based usage

* refactor: add periodic usage fallback to avoid breaking changes

* fix: fix mock tenant data

* fix(console): should be able to edit password and email in profile (logto-io#6447)

* fix: fix console issues for add-on (logto-io#6443)

* fix: fix console issues for add-on

* refactor: refactor code

* refactor: update

* fix: fix method use case

* fix(console): fix add-on console issues

* fix(console): fix add-on console issues

* chore: fix org footer copy

* chore: open Stripe payment management page in new tab

* chore: fix MFA banner copy

* chore: fix add on notice footer

* refactor(core): redesign get sso connectors endpoint (logto-io#6454)

* refactor(core): redesign get sso connectors endpoint

redesign get sso conenctors endpoint

* chore(core): fix import format

fix import format

* fix(console): fix enterprise SSO creation model button status

* fix(console): fix code

* fix(core): fix google one tap validation error (logto-io#6455)

fix google one tap validation error

* refactor(console): refactor tag component (logto-io#6453)

* feat(experience): add identifier sso-only landing page (logto-io#6440)

* feat(core,experience,schemas): support identifier page related params for sign-in url (logto-io#6446)

* chore(console): add display pricing change notice and update plan comparison table (logto-io#6456)

* chore: add pricing change notice

* chore: update plan comparison table

* chore(experience): move shared form components into components file (logto-io#6457)

* feat(core): implement wellknown swagger endpoints (logto-io#6445)

* feat(core): implement wellknown swagger endpoints

implement wellknown swagger endpoints

* chore(core): rename

rename

* refactor(core): extract common util methods

extract common util methods

* fix(core): fix lint error

fix lint error

* refactor(core): shared code optimization

shared code optimization

* chore(core): remove type assertion

remove type assertion

* chore(console): update add on tag CSS (logto-io#6459)

* fix(console): fix impersonation tag in audit log (logto-io#6463)

* fix(cli): should proxy google social callback url properly to exp ui (logto-io#6458)

* fix(cli): should proxy google social callback url properly to exp ui

* test(cli): add unit tests for tunnel util

* refactor: split translate cmd from logto cli (logto-io#6451)

* refactor: split translate cmd from logto cli

* chore: add changeset

* refactor(cli): remove translate command from cli package

* chore(core): remove devFeature guard (logto-io#6462)

* chore(core): should not trigger profile update log

should not trigger profile update log if the synced profile is empty

* chore(core): add userId to experience audit log

add userId to the experience audit log

* chore(core): remove devFeature guard

remove devFeature guard

* feat(test): remove devFeature guard in test

remove devFeature guard in test

* chore(console, core): remove dev features guard for bring your ui feature (logto-io#6465)

* refactor(console,core): remove add on dev feature guard (logto-io#6466)

* fix(experience): update dev features flag env handling (logto-io#6467)

* fix(console): bring back accidentally deleted css file (logto-io#6468)

* test(experience): add integration tests for first screen feature (logto-io#6464)

* feat(console): add label for new experience API logs (logto-io#6469)

add label for new experience API logs

* feat(core): token exchange by pat (logto-io#6450)

* chore(console): fix add-on issues (logto-io#6470)

* feat(console): user personal access tokens (logto-io#6444)

* fix(console): add add-on display issues and refactor component PlanName (logto-io#6471)

* fix(console): manually trigger usage api updates (logto-io#6473)

* fix(experience): correct first screen fallbacks (logto-io#6472)

* fix(experience): smart input field should have correct initial type (logto-io#6477)

* fix(console): fix next auth guide typo (logto-io#6478)

* fix(console,core,connector): fix display issues and `POST /connectors` API code guard (logto-io#6481)

* fix(console,core,connector): fix display issues

* chore: add changeset

* fix: translate cli workspace dependency reference (logto-io#6474)

* fix(console): manually trigger usage api updates on org member deletion (logto-io#6475)

* chore(console): add beta tag to bring your ui feature (logto-io#6484)

* fix(console): fix console z index issue on modals and banners (logto-io#6483)

* fix(experience): add sso form mode context provider for identifier sign-in/register pages (logto-io#6482)

* refactor(console): remove protected app promotion (logto-io#6479)

* chore(console): remove beta tag from 3rd party app (logto-io#6485)

* Revert "Revert "refactor: add `report:subscription:updates` Cloud scope"" (logto-io#6415)

* Revert "Revert "refactor: add `report:subscription:updates` Cloud scope" (logto-io#6412)"

This reverts commit ebc04a2.

* chore: update alteration script ts

* chore: rebase and update alteration timestamp

* fix(core,console): disable quota guard and unblock resource creation for pro tenants (logto-io#6487)

* fix: fix alteration script dependency (logto-io#6488)

fix: alteration script dependency

* style(experience): add missing brand-60 color token (logto-io#6490)

* fix: make alteration script compatible for core DB in all regions (logto-io#6494)

* feat(console): add doc link of pat (logto-io#6496)

* feat(console): edit personal access token name (logto-io#6491)

* fix(core): remove grant id of token exchange (logto-io#6497)

* refactor(cli): show more info and add port in-use detection (logto-io#6495)

* refactor(cli): show more info and add port in-use detection

* refactor(cli): update per review comments

* refactor(cli): add social redirect uri update reminder

* fix(console): always show upsell notice for custom JWT (logto-io#6500)

* fix(core): remove the requirement of secured app for PAT (logto-io#6493)

* chore(core): add openapi operationId to experience APIs (logto-io#6486)

* chore(core): add openapi operationId to experience APIs

add openapi operationId to experience APIs

* chore: update content

update content

* feat(core): add swagger operationId guard

add swagger operationId guard

* fix: update some content

update some content

* test: add integration tests for pat token introspection (logto-io#6501)

* feat(experience): add reset password first screen (logto-io#6498)

* fix(core): add grant record for token exchange (logto-io#6502)

* fix(console): use safeLazy to dynamically import guide mdx (logto-io#6503)

* fix(console): change PAT and app secrets phrases (logto-io#6504)

* fix(console): remove legacy charge notification components (logto-io#6505)

* chore: remove optimize deps config for local dev (logto-io#6506)

* fix(core,schemas): check email verification status in me api (logto-io#6507)

* chore: add changeset (logto-io#6492)

* chore: remove dev feature guard of PAT (logto-io#6499)

* fix(phrases): fix pl and ru i18n phrases (logto-io#6510)

fix pl and ru i18n phrases

* fix(core): should be able to update password in profile if verified via email (logto-io#6511)

* refactor(tunnel): split tunnel cli and make it a standalone package (logto-io#6512)

* release: @logto/tunnel:0.1.0 (logto-io#6513)

* refactor(experience): improve identifier prefilling (logto-io#6508)

* chore: add Arabic translation (logto-io#6422)

* chore: add Arabic translation

* chore: add arabic to phrases-experience

* chore: use `ar-AR` as language code

* chore: sync keys

* chore: add changeset and update elements

---------

Co-authored-by: Gao Sun <gao@silverhand.io>

* fix(core): avoid unexpected 500 error (logto-io#6515)

* fix(core): avoid unexpected 500 error

avoid unexpected 500 error

* fix(core): fix ut

fix ut

* refactor(experience): remove redundant `defaultType` prop for `SmartInputField` (logto-io#6517)

* refactor(experience): cache input identifier for reset password first screen (logto-io#6516)

* chore(experience): upgrade react-hook-form (logto-io#6520)

* fix(experience): apply form default value to smart input filed (logto-io#6521)

* feat(core): add `error_code_key` query string param (logto-io#6519)

* feat(core): add error_key query string param
feat(core): add error_key query string param
add error_key query string param

 Please enter the commit message for your changes. Lines starting

* chore(core): rename

rename the query param name

* fix(core): safe parse

safe parse

* chore: add changeset

add changeset

* refactor: update language code to ar-SA (logto-io#6518)

* chore: remove dev feature guard for first screens (logto-io#6522)

* chore: remove dev feature guard for new first screens

* chore: add changeset

* chore(experience): add comments for identifier sign-in and register page

* refactor(core): refactor oidc error response query param (logto-io#6525)

refactor oidc error reponse query param

* feat: add Patreon connector (logto-io#6514)

* fix(experience): avoid carring identifer from reset password page to sign-in page (logto-io#6526)

* refactor(console): support entering name while creating a user (logto-io#6523)

* refactor(core,toolkit): relocate customJwt local vm handler (logto-io#6524)

relocate customJwt local vm handler

* chore(console): should use SKU to filter tenant dropdown and add display of dev/admin plan (logto-io#6509)

* chore(schemas): bump withtyped version (logto-io#6537)

* chore(schemas): bump withtyped version

bump withtyped version

* chore: update changeset

update changeset

* feat: add GitLab connector (logto-io#6529)

* feat(tunnel): support cli deploy custom ui assets to cloud (logto-io#6530)

* refactor: flatten `UserSettings` component file structure (logto-io#6539)

* fix(deps): update withtyped and cloud dependency version (logto-io#6538)

* fix(deps): update withtyped and cloud dependency version

update withtyped and cloud dependency version

* chore: update cloud dependency

* chore(core): update cloud client utils type

---------

Co-authored-by: Darcy Ye <darcyye@silverhand.io>

* feat(core): add denyAccess api context to customJwt script (logto-io#6532)

* feat(schemas,core): add denyAccess api conext to custom jwt

add denyAccess api context to the custom jwt

* fix(test): fix integration test

fix integration test

* chore(schemas): update type name

update api context type name

* chore(schemas): fix typo

fix typo

* feat(core): add dev feature guard

add dev feature guard

* feat(console): add api context type declarations (logto-io#6533)

* feat(console): add api context type declarations

add api context type declarations

* chore(console): update type name

update custom jwt api context type name

* feat(console): update the cutsom JWT editor

update the custom JWT editor

* fix(core): add `hasPassword` field to user API response (logto-io#6543)

* feat(tunnel): support zip option in deploy command (logto-io#6541)

* feat(tunnel): support zip option in deploy command

* chore: update changeset

* refactor(tunnel): improve error handling in deploy command

* refactor(tunnel): improve cli error message per review comments

Co-authored-by: Gao Sun <gao@silverhand.io>

---------

Co-authored-by: Gao Sun <gao@silverhand.io>

* release: @logto/tunnel:0.2.0 (logto-io#6547)

* feat: add support for nested attribute profile mapping (logto-io#6534)

* feat: add support for nested attribute profile mapping

* chore: undo version change

Undo version change since it’s handled by changeset

Co-authored-by: Darcy Ye <darcyye@silverhand.io>

* chore: remove new implementation and use essentials

Updated implementation to use essentials, throwing exception when not found

* fix: should use getSafe() and do not throw error when mapping profile

---------

Co-authored-by: Darcy Ye <darcyye@silverhand.io>

* feat(console): display user password information on user details page (logto-io#6544)

* style(console): adjust sample code editor height (logto-io#6548)

bug bash fix. adjust sample code editor height, and phrases

* refactor(experience): experience api migration (logto-io#6407)

* refactor(experience): migrate the password register and sign-in

migrate the password register and sign-in flow

* fix(experience): update some namings

update some namings

* refactor(experience): refactor the verification code flow (migration-2) (logto-io#6408)

* refactor(experience): refactor the verificaiton code flow

refactor the verification code flow

* refactor(experience): migrate the social and sso flow (migration-3) (logto-io#6406)

* refactor(experience): migrate the social and sso flow

migrate the social and sso flow

* refactor(experience): migrate profile fulfillment flow  (migration-4) (logto-io#6414)

* refactor(experience): migrate profile fulfillment flow

migrate the profile fulfillment flow

* refactor(experience): remove unused hook

remove unused hook

* fix(experience): fix password policy checker

fix password policy checker error display

* fix(experience): fix the api name

fix the api name

* refactor(experience): migrate mfa flow (migration-5) (logto-io#6417)

* refactor(experience): migrate mfa binding flow

migrate mfa binding flow

* test(experience): update unit tests (migration-6) (logto-io#6420)

* test(experience): update unit tests

update unit tests

* chore(experience): remove legacy APIs

remove legacy APIs

* refactor(experience): revert api prefix

revert api prefix

* fix(experience): update the sso connectors endpoint

update the sso connectors endpoint

* chore: add changeset

add changeset

* fix(experience): comments fix

comments fix

* refactor(experience): refactor the code verificatin api

refactor the code verification api

* refactor(experience): code refactor

refactor some implementation logic

* feat(experience, core): add experience legacy package (logto-io#6527)

add experience legacy package

* chore(console,phrases): update custom JWT phrases (logto-io#6551)

* chore(console,phrases): update cusotm jwt phrases

update custom jwt phrase in console

* chore(console): update the comments

update the comments

* feat(console,core): remove custom token claims api context dev guard (logto-io#6553)

* feat(console,core): remove custom jwt api context dev guard

remove custom jwt api context dev guard

* fix(console,schemas,phrases): fix custom jwt token request phrases

fix custom jwt token request phrases

* chore: return denyAccess
return denyAccess

* refactor: set `lang` attribute for html tag (logto-io#6536)

* refactor: set `lang` attribute for html tag

* refactor: use shared i18next instance

* refactor: align html attr usage

* refactor(console,core,demo-app,elements,experience): improve rtl support (logto-io#6549)

* refactor(console,experience): improve rtl support

* chore: add changeset

* fix(core): fix custom UI not triggered bug (logto-io#6563)

fix custom UI not triggered on legacy-experience bug

* fix: fix object comparison util method used in DB alteration CI (logto-io#6562)

* fix(experience): allow link social account on sign-in only mode (logto-io#6560)

* fix(experience): allow link social account on sign-in only mode

allow link social account, when registration is disabled;

* chore: add changeset

add changeset

* chore: fix typos

fix typos

* feat(core): add koa oidc auth for profile API (logto-io#6559)

* feat(core): password checking api (logto-io#6567)

* feat(core): password checking api

* refactor(core): improve API response

* refactor: update display, quota guard and usage report logic for enterprise users (logto-io#6565)

* refactor: update display, quota guard and usage report logic for enterprise users

* chore: undo logto email connector dependency update

* chore: use contact us button for pro plan when currently on enterprise plan

* fix(console): fix log label typo (logto-io#6569)

fix log label typo

* refactor(console,experience): improve RTL support (logto-io#6568)

* refactor(console,experience): improve RTL support

* test: add ui test cases for console language switcher

* refactor: update css

* fix(core): allow no password user to set password in console profile (logto-io#6572)

* refactor: use orgsLimit instead of orgsEnabled as org quota key (logto-io#6570)

* refactor: use orgsLimit instead of orgsEnabled as org quota key

* refactor: implement getUsageByKey method

* chore: undo logto email connector dependency update

* fix(experience-legacy): add html attribute dir to better support RTL (logto-io#6575)

* fix(core): avoid duplicate operationId (logto-io#6574)

avoid duplication operationId

* fix: fix enterprise console issues (logto-io#6578)

* fix: fix enterprise console issues

* fix: exclude 0 quota in plan usage card

* fix: fix skuName and do not show sku ID for enterprise plan

* feat(schemas): add verification record table (logto-io#6566)

* fix(experience-legacy): update text alignment for RTL support (logto-io#6583)

* refactor: refactor SkuName component to make isEnterprisePlan as input (logto-io#6580)

* test: add integration test for no password user setting password (logto-io#6579)

* test: add integration test for no password user setting password

* refactor(test): polish content

Co-authored-by: Gao Sun <gao@silverhand.io>

---------

Co-authored-by: Gao Sun <gao@silverhand.io>

* test: add ui integration test for lang and dir html attributes in experience (logto-io#6581)

* fix(experience-legacy): flip arrow icons on rtl (logto-io#6584)

* fix(core): add sso only email guard (logto-io#6576)

* fix(core): add sso only email guard

add sso only email guard to registration and profile fulfilling flow

* chore: update changeset

update changeset

* chore(core): update content

update content

* fix(core): update content

update content

* release: version packages (logto-io#6424)

* removed some

* updated

* chore(cli): update

---------

Co-authored-by: Gao Sun <gao@silverhand.io>
Co-authored-by: simeng-li <simeng@silverhand.io>
Co-authored-by: Charles Zhao <charleszhao@silverhand.io>
Co-authored-by: Darcy Ye <darcyye@silverhand.io>
Co-authored-by: Xiao Yijun <xiaoyijun@silverhand.io>
Co-authored-by: wangsijie <wangsijie@silverhand.io>
Co-authored-by: Sten Roger Sandvik <sten.sandvik@fieldnode.com>
Co-authored-by: Mostafa Moradian <mstfmoradian@gmail.com>
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Co-authored-by: silverhand-bot <107667382+silverhand-bot@users.noreply.github.com>
Co-authored-by: Misaka_L <lipww1234@foxmail.com>
Co-authored-by: Zakher Masri <46135573+zaaakher@users.noreply.github.com>
Co-authored-by: DevTekVE <devtekve@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Development

Successfully merging this pull request may close these issues.

3 participants