chore(deps): update dependency supertokens-node to v14 - autoclosed #8267
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
13.6.0
->14.1.3
Release Notes
supertokens/supertokens-node (supertokens-node)
v14.1.3
Compare Source
Changes
Fixes
v14.1.2
Compare Source
Fixes
Changes
verifySession
send the appropriate response instead of throwing (and sending 500) if session validation fails in koa, hapi and loopback (already happening in other frameworks).v14.1.1
Compare Source
Added
TRY_REFRESH_TOKEN
orUNAUTHORISED
error to make debugging easierv14.1.0
Compare Source
Changes
getRequestFromUserContext
function that can be used to read the original network request from the user context in overridden APIs and recipe functionsv14.0.2
Compare Source
Changes
getSession
functiongetSession
functionv14.0.1
Compare Source
v14.0.0
Compare Source
Breaking Changes
2.21
2.8
-2.20
getAccessTokenPayload
will now return standard (sub
,iat
,exp
) claims and some SuperTokens specific claims along the user defined ones ingetAccessTokenPayload
.sub
,iat
,exp
,sessionHandle
,parentRefreshTokenHash1
,refreshTokenHash1
,antiCsrfToken
mergeIntoAccessTokenPayload
getAccessToken
on the session) if you need a JWTjwt
prop in the access token payload is removedaccessTokenPayload
tocustomClaimsInAccessTokenPayload
inSessionInformation
(the return value ofgetSessionInformation
). This reflects the fact that it doesn't contain some default claims (sub
,iat
, etc.)Configuration changes
useDynamicAccessTokenSigningKey
(defaults totrue
) option to the Session recipe configexposeAccessTokenToFrontendInCookieBasedAuth
(defaults tofalse
) option to the Session recipe configInterface changes
getSessionData
togetSessionDataFromDatabase
to clarify that it always hits the DBupdateSessionData
toupdateSessionDataInDatabase
sessionData
tosessionDataInDatabase
inSessionInformation
and the input tocreateNewSession
checkDatabase
param toverifySession
andgetSession
status
fromgetJWKS
output (function & API)useStaticSigningKey
param tocreateJWT
updateAccessTokenPayload
andregenerateAccessToken
from the Session recipe interfacegetAccessTokenLifeTimeMS
andgetRefreshTokenLifeTimeMS
functionsConfiguration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.