Skip to content

Releases: labd/node-federated-token

@labdigital/[email protected]

07 Jun 06:08
Compare
Choose a tag to compare

Minor Changes

  • 5d091fd: Split the package in a core and a apollo specific package. This makes it
    possible to support other gateways/servers in the future

@labdigital/[email protected]

07 Jun 06:41
Compare
Choose a tag to compare

Patch Changes

@labdigital/[email protected]

07 Jun 06:30
Compare
Choose a tag to compare

Patch Changes

  • 8cb1d63: Export PublicFederatedTokenContext

@labdigital/[email protected]

07 Jun 06:08
Compare
Choose a tag to compare

Minor Changes

  • 5d091fd: Split the package in a core and a apollo specific package. This makes it
    possible to support other gateways/servers in the future

Patch Changes

v0.12.1

13 Mar 15:03
Compare
Choose a tag to compare

Patch Changes

  • 9dc2517: Fix removing cookies for specific paths and domains

v0.12.0

11 Mar 13:46
Compare
Choose a tag to compare

Minor Changes

  • 1f632f3: Add cookienames option to CookieTokenSource constructor

v0.11.0

08 Mar 12:54
Compare
Choose a tag to compare

Minor Changes

  • c28e91c: Delete refreshToken if invalid

v0.10.0

08 Mar 09:18
Compare
Choose a tag to compare

Minor Changes

  • b528dd5: Delete RefreshToken when a token is invalid (but not expired)
  • 438e344: Throw TokenInvalidError for invalid tokens

v0.9.1

20 Feb 16:02
Compare
Choose a tag to compare

Patch Changes

  • 58ded5e: Check for values modified in deserializeAccessToken

    When you only set a value in a service, the token did not get updated in the gateway.
    This was because the valueModified was only set after a token change, not just a value change.
    This changes improves the check to fix that.

v0.9.0

10 Feb 13:01
Compare
Choose a tag to compare

Minor Changes

  • 280da10: Improve cookie security settings by using __Host- where needed