Skip to content

Commit

Permalink
release: version packages
Browse files Browse the repository at this point in the history
  • Loading branch information
silverhand-bot committed Nov 15, 2024
1 parent 6404254 commit 5af5965
Show file tree
Hide file tree
Showing 26 changed files with 214 additions and 95 deletions.
16 changes: 0 additions & 16 deletions .changeset/early-numbers-attend.md

This file was deleted.

15 changes: 0 additions & 15 deletions .changeset/four-deers-divide.md

This file was deleted.

12 changes: 0 additions & 12 deletions .changeset/wet-nails-guess.md

This file was deleted.

8 changes: 8 additions & 0 deletions packages/cli/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,13 @@
# Change Log

## 1.22.0

### Patch Changes

- Updated dependencies [640425414]
- Updated dependencies [640425414]
- @logto/schemas@1.22.0

## 1.21.0

### Patch Changes
Expand Down
4 changes: 2 additions & 2 deletions packages/cli/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@logto/cli",
"version": "1.21.0",
"version": "1.22.0",
"description": "Logto CLI.",
"author": "Silverhand Inc. <contact@silverhand.io>",
"homepage": "https://github.com/logto-io/logto#readme",
Expand Down Expand Up @@ -44,7 +44,7 @@
"dependencies": {
"@logto/connector-kit": "workspace:^4.0.0",
"@logto/core-kit": "workspace:^2.5.0",
"@logto/schemas": "workspace:1.21.0",
"@logto/schemas": "workspace:1.22.0",
"@logto/shared": "workspace:^3.1.2",
"@silverhand/essentials": "^2.9.1",
"@silverhand/slonik": "31.0.0-beta.2",
Expand Down
27 changes: 27 additions & 0 deletions packages/console/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,32 @@
# Change Log

## 1.19.0

### Minor Changes

- 640425414: add `trustUnverifiedEmail` setting for the Microsoft EntraID OIDC SSO connector

Since we launched the **EntraID OIDC SSO connector** we have received several feedbacks that their customer's email address can not be populated to Logto's user profile when signing up through the EntraID OIDC SSO connector.
This is because Logto only syncs verified email addresses, meaning the `email_verified` claim must be `true` in the user info response from the OIDC provider.

However, based on Microsoft's documentation, since the user's email address in manually managed by the organization, they are not verified guaranteed. This means that the `email_verified` claim will not be included in their user info response.

To address this issue, we have added a new `trustUnverifiedEmail` exclusively for the Microsoft EntraID OIDC SSO connector. When this setting is enabled, Logto will trust the email address provided by the Microsoft EntraID OIDC SSO connector even if the `email_verified` claim is not included in the user info response. This will allow users to sign up and log in to Logto using their email address without any issues. Please note this may introduce a security risk as the email address is not verified by the OIDC provider. You should only enable this setting if you trust the email address provided by the Microsoft EntraID OIDC SSO connector.

You can configure this setting in the **EntraID OIDC SSO connector** settings page in the Logto console or through the management API.

- 640425414: display support email and website info on experience error pages.

Added support email and website info to the error pages of the experience app. E.g. when a user tries to access a page that doesn't exist, or when the social session is not found in a social callback page. This will help users to contact support easily when they encounter an error.

You may configure the support email and website info in the sign-in experience settings page in the Logto console or through the management API.

- 640425414: add unknown session redirect url in the sign-in experience settings

In certain cases, Logto may be unable to properly identify a user’s authentication session when they land on the sign-in page. This can happen if the session has expired, if the user bookmarks the sign-in URL for future access, or if they directly share the sign-in link. By default, an "unknown session" 404 error is displayed.

To improve user experience, we have added a new `unknownSessionRedirectUrl` field in the sign-in experience settings.You can configure this field to redirect users to a custom URL when an unknown session is detected. This will help users to easily navigate to your client application or website and reinitiate the authentication process automatically.

## 1.18.1

### Patch Changes
Expand Down
8 changes: 4 additions & 4 deletions packages/console/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@logto/console",
"version": "1.18.1",
"version": "1.19.0",
"description": "> TODO: description",
"author": "Silverhand Inc. <contact@silverhand.io>",
"homepage": "https://github.com/logto-io/logto#readme",
Expand Down Expand Up @@ -31,10 +31,10 @@
"@logto/connector-kit": "workspace:^4.0.0",
"@logto/core-kit": "workspace:^2.5.0",
"@logto/language-kit": "workspace:^1.1.0",
"@logto/phrases": "workspace:^1.14.1",
"@logto/phrases-experience": "workspace:^1.8.0",
"@logto/phrases": "workspace:^1.15.0",
"@logto/phrases-experience": "workspace:^1.9.0",
"@logto/react": "^3.0.12",
"@logto/schemas": "workspace:^1.21.0",
"@logto/schemas": "workspace:^1.22.0",
"@logto/shared": "workspace:^3.1.2",
"@mdx-js/react": "^3.0.1",
"@mdx-js/rollup": "^3.0.1",
Expand Down
40 changes: 40 additions & 0 deletions packages/core/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,45 @@
# Change Log

## 1.22.0

### Minor Changes

- 640425414: add `trustUnverifiedEmail` setting for the Microsoft EntraID OIDC SSO connector

Since we launched the **EntraID OIDC SSO connector** we have received several feedbacks that their customer's email address can not be populated to Logto's user profile when signing up through the EntraID OIDC SSO connector.
This is because Logto only syncs verified email addresses, meaning the `email_verified` claim must be `true` in the user info response from the OIDC provider.

However, based on Microsoft's documentation, since the user's email address in manually managed by the organization, they are not verified guaranteed. This means that the `email_verified` claim will not be included in their user info response.

To address this issue, we have added a new `trustUnverifiedEmail` exclusively for the Microsoft EntraID OIDC SSO connector. When this setting is enabled, Logto will trust the email address provided by the Microsoft EntraID OIDC SSO connector even if the `email_verified` claim is not included in the user info response. This will allow users to sign up and log in to Logto using their email address without any issues. Please note this may introduce a security risk as the email address is not verified by the OIDC provider. You should only enable this setting if you trust the email address provided by the Microsoft EntraID OIDC SSO connector.

You can configure this setting in the **EntraID OIDC SSO connector** settings page in the Logto console or through the management API.

- 640425414: display support email and website info on experience error pages.

Added support email and website info to the error pages of the experience app. E.g. when a user tries to access a page that doesn't exist, or when the social session is not found in a social callback page. This will help users to contact support easily when they encounter an error.

You may configure the support email and website info in the sign-in experience settings page in the Logto console or through the management API.

- 640425414: add unknown session redirect url in the sign-in experience settings

In certain cases, Logto may be unable to properly identify a user’s authentication session when they land on the sign-in page. This can happen if the session has expired, if the user bookmarks the sign-in URL for future access, or if they directly share the sign-in link. By default, an "unknown session" 404 error is displayed.

To improve user experience, we have added a new `unknownSessionRedirectUrl` field in the sign-in experience settings.You can configure this field to redirect users to a custom URL when an unknown session is detected. This will help users to easily navigate to your client application or website and reinitiate the authentication process automatically.

### Patch Changes

- Updated dependencies [640425414]
- Updated dependencies [640425414]
- Updated dependencies [640425414]
- @logto/console@1.19.0
- @logto/phrases@1.15.0
- @logto/experience@1.10.0
- @logto/experience-legacy@1.10.0
- @logto/phrases-experience@1.9.0
- @logto/schemas@1.22.0
- @logto/cli@1.22.0

## 1.21.0

### Minor Changes
Expand Down
10 changes: 5 additions & 5 deletions packages/core/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@logto/core",
"version": "1.21.0",
"version": "1.22.0",
"description": "The open source identity solution.",
"main": "build/index.js",
"author": "Silverhand Inc. <contact@silverhand.io>",
Expand Down Expand Up @@ -33,7 +33,7 @@
"@koa/cors": "^5.0.0",
"@logto/affiliate": "^0.1.0",
"@logto/app-insights": "workspace:^2.0.0",
"@logto/cli": "workspace:^1.21.0",
"@logto/cli": "workspace:^1.22.0",
"@logto/connector-kit": "workspace:^4.0.0",
"@logto/console": "workspace:*",
"@logto/core-kit": "workspace:^2.5.0",
Expand All @@ -42,9 +42,9 @@
"@logto/experience-legacy": "workspace:*",
"@logto/js": "^4.1.4",
"@logto/language-kit": "workspace:^1.1.0",
"@logto/phrases": "workspace:^1.14.1",
"@logto/phrases-experience": "workspace:^1.8.0",
"@logto/schemas": "workspace:^1.21.0",
"@logto/phrases": "workspace:^1.15.0",
"@logto/phrases-experience": "workspace:^1.9.0",
"@logto/schemas": "workspace:^1.22.0",
"@logto/shared": "workspace:^3.1.2",
"@silverhand/essentials": "^2.9.1",
"@silverhand/slonik": "31.0.0-beta.2",
Expand Down
6 changes: 6 additions & 0 deletions packages/create/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,11 @@
# Change Log

## 1.22.0

### Patch Changes

- @logto/cli@1.22.0

## 1.21.0

### Patch Changes
Expand Down
4 changes: 2 additions & 2 deletions packages/create/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@logto/create",
"version": "1.21.0",
"version": "1.22.0",
"author": "Silverhand Inc. <contact@silverhand.io>",
"license": "MPL-2.0",
"type": "module",
Expand All @@ -15,6 +15,6 @@
"node": "^20.9.0"
},
"dependencies": {
"@logto/cli": "workspace:^1.21.0"
"@logto/cli": "workspace:^1.22.0"
}
}
10 changes: 10 additions & 0 deletions packages/experience-legacy/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,15 @@
# Change Log

## 1.10.0

### Minor Changes

- 640425414: display support email and website info on experience error pages.

Added support email and website info to the error pages of the experience app. E.g. when a user tries to access a page that doesn't exist, or when the social session is not found in a social callback page. This will help users to contact support easily when they encounter an error.

You may configure the support email and website info in the sign-in experience settings page in the Logto console or through the management API.

## 1.9.0

### Minor Changes
Expand Down
8 changes: 4 additions & 4 deletions packages/experience-legacy/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@logto/experience-legacy",
"version": "1.9.0",
"version": "1.10.0",
"license": "MPL-2.0",
"type": "module",
"private": true,
Expand All @@ -24,9 +24,9 @@
"@logto/connector-kit": "workspace:^4.0.0",
"@logto/core-kit": "workspace:^2.5.0",
"@logto/language-kit": "workspace:^1.1.0",
"@logto/phrases": "workspace:^1.14.0",
"@logto/phrases-experience": "workspace:^1.8.0",
"@logto/schemas": "workspace:^1.20.0",
"@logto/phrases": "workspace:^1.15.0",
"@logto/phrases-experience": "workspace:^1.9.0",
"@logto/schemas": "workspace:^1.22.0",
"@react-spring/shared": "^9.6.1",
"@react-spring/web": "^9.6.1",
"@silverhand/eslint-config": "6.0.1",
Expand Down
10 changes: 10 additions & 0 deletions packages/experience/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,15 @@
# Change Log

## 1.10.0

### Minor Changes

- 640425414: display support email and website info on experience error pages.

Added support email and website info to the error pages of the experience app. E.g. when a user tries to access a page that doesn't exist, or when the social session is not found in a social callback page. This will help users to contact support easily when they encounter an error.

You may configure the support email and website info in the sign-in experience settings page in the Logto console or through the management API.

## 1.9.0

### Minor Changes
Expand Down
8 changes: 4 additions & 4 deletions packages/experience/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@logto/experience",
"version": "1.9.0",
"version": "1.10.0",
"license": "MPL-2.0",
"type": "module",
"private": true,
Expand All @@ -24,9 +24,9 @@
"@logto/connector-kit": "workspace:^4.0.0",
"@logto/core-kit": "workspace:^2.5.0",
"@logto/language-kit": "workspace:^1.1.0",
"@logto/phrases": "workspace:^1.14.0",
"@logto/phrases-experience": "workspace:^1.8.0",
"@logto/schemas": "workspace:^1.20.0",
"@logto/phrases": "workspace:^1.15.0",
"@logto/phrases-experience": "workspace:^1.9.0",
"@logto/schemas": "workspace:^1.22.0",
"@react-spring/shared": "^9.6.1",
"@react-spring/web": "^9.6.1",
"@silverhand/eslint-config": "6.0.1",
Expand Down
10 changes: 10 additions & 0 deletions packages/phrases-experience/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,15 @@
# Change Log

## 1.9.0

### Minor Changes

- 640425414: display support email and website info on experience error pages.

Added support email and website info to the error pages of the experience app. E.g. when a user tries to access a page that doesn't exist, or when the social session is not found in a social callback page. This will help users to contact support easily when they encounter an error.

You may configure the support email and website info in the sign-in experience settings page in the Logto console or through the management API.

## 1.8.0

### Minor Changes
Expand Down
2 changes: 1 addition & 1 deletion packages/phrases-experience/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@logto/phrases-experience",
"version": "1.8.0",
"version": "1.9.0",
"description": "Logto shared phrases (i18n) for experience.",
"author": "Silverhand Inc. <contact@silverhand.io>",
"homepage": "https://github.com/logto-io/logto#readme",
Expand Down
27 changes: 27 additions & 0 deletions packages/phrases/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,32 @@
# Change Log

## 1.15.0

### Minor Changes

- 640425414: add `trustUnverifiedEmail` setting for the Microsoft EntraID OIDC SSO connector

Since we launched the **EntraID OIDC SSO connector** we have received several feedbacks that their customer's email address can not be populated to Logto's user profile when signing up through the EntraID OIDC SSO connector.
This is because Logto only syncs verified email addresses, meaning the `email_verified` claim must be `true` in the user info response from the OIDC provider.

However, based on Microsoft's documentation, since the user's email address in manually managed by the organization, they are not verified guaranteed. This means that the `email_verified` claim will not be included in their user info response.

To address this issue, we have added a new `trustUnverifiedEmail` exclusively for the Microsoft EntraID OIDC SSO connector. When this setting is enabled, Logto will trust the email address provided by the Microsoft EntraID OIDC SSO connector even if the `email_verified` claim is not included in the user info response. This will allow users to sign up and log in to Logto using their email address without any issues. Please note this may introduce a security risk as the email address is not verified by the OIDC provider. You should only enable this setting if you trust the email address provided by the Microsoft EntraID OIDC SSO connector.

You can configure this setting in the **EntraID OIDC SSO connector** settings page in the Logto console or through the management API.

- 640425414: display support email and website info on experience error pages.

Added support email and website info to the error pages of the experience app. E.g. when a user tries to access a page that doesn't exist, or when the social session is not found in a social callback page. This will help users to contact support easily when they encounter an error.

You may configure the support email and website info in the sign-in experience settings page in the Logto console or through the management API.

- 640425414: add unknown session redirect url in the sign-in experience settings

In certain cases, Logto may be unable to properly identify a user’s authentication session when they land on the sign-in page. This can happen if the session has expired, if the user bookmarks the sign-in URL for future access, or if they directly share the sign-in link. By default, an "unknown session" 404 error is displayed.

To improve user experience, we have added a new `unknownSessionRedirectUrl` field in the sign-in experience settings.You can configure this field to redirect users to a custom URL when an unknown session is detected. This will help users to easily navigate to your client application or website and reinitiate the authentication process automatically.

## 1.14.1

### Patch Changes
Expand Down
2 changes: 1 addition & 1 deletion packages/phrases/package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "@logto/phrases",
"version": "1.14.1",
"version": "1.15.0",
"description": "Logto shared phrases (i18n).",
"author": "Silverhand Inc. <contact@silverhand.io>",
"homepage": "https://github.com/logto-io/logto#readme",
Expand Down
Loading

0 comments on commit 5af5965

Please sign in to comment.