release: version packages #7427
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR was opened by the Changesets release GitHub action. When you're ready to do a release, you can merge this and publish to npm yourself or setup this action to publish automatically. If you're not ready to do a release yet, that's fine, whenever you add more changesets to master, this PR will be updated.
Releases
@logto/[email protected]
Minor Changes
f2c0a05: added an
updated_at
field to theuser_sso_identities
table to track the last update time for each record.On each successfull SSO sign-in, the
updated_at
field will be set to the current timestamp. This allows for better tracking of when a user's SSO identity was authenticated and updated.db77aad: feat: introduced new
oidc_session_extensions
tableThis change introduces a new table named
oidc_session_extensions
to the Logto database schema. This table is designed to store additional user session-related data for OpenID Connect (OIDC) sessions, allowing for more flexible and extensible session management.50d50f7: manage WebAuthn passkeys in Account API
You can now manage WebAuthn passkeys in Account API, including:
We implemented Related Origin Requests so that you can manage the WebAuthn passkeys in your website which has a different domain from the Logto's sign-in page.
To learn more, checkout the documentation.
@logto/[email protected]
Patch Changes
@logto/[email protected]
Patch Changes
@logto/[email protected]
Minor Changes
db77aad: add user interaction context to custom token claims script
This change introduces the ability to access user interaction details in the custom token claims script within Logto console. The
interaction
context includes information about the user's interaction event, user ID, and verification records, allowing developers to create dynamic and context-aware token claims.@logto/[email protected]
Minor Changes
f2c0a05: added an
updated_at
field to theuser_sso_identities
table to track the last update time for each record.On each successfull SSO sign-in, the
updated_at
field will be set to the current timestamp. This allows for better tracking of when a user's SSO identity was authenticated and updated.50d50f7: manage WebAuthn passkeys in Account API
You can now manage WebAuthn passkeys in Account API, including:
We implemented Related Origin Requests so that you can manage the WebAuthn passkeys in your website which has a different domain from the Logto's sign-in page.
To learn more, checkout the documentation.
db77aad: feat: add user interaction details to the custom token claims context
This update introduces a key feature that allows the storage of user interaction details in the
oidc_session_extensions
table for future reference.Developers can now access user interaction data associated with the current token's authentication session through the context in the custom token claims script, enabling the creation of tailored token claims.
Key Changes:
context.interaction
property, allowing for the creation of dynamic and context-aware token claims. Logto will use thesessionUid
to query theoidc_session_extensions
table and retrieve the user interaction details.interactionEvent
: The event that triggered the interaction, such asSignIn
,Register
.userId
: The unique identifier of the user involved in the interaction.verificationRecords
: An array of verification records, providing details about the verification methods used for user identification and any MFA verification if enabled.Example Use Case:
Developers can read the verification records from the interaction context. If an Enterprise SSO verification record is found, they can pass the user profile from the Enterprise SSO identities as additional token claims.
Patch Changes
47b2547: fix: make
access_token
optional for Azure OIDC SSO connectorPreviously, the Azure OIDC connector strictly required an access token in the token response, which caused issues with Azure B2C applications that only return ID tokens.
This change makes the connector more flexible by:
3cf7ee1: fix potential WebAuthn registration errors by specifying the displayName
This is an optional field, but it's actually required by some browsers. For example, when using Chrome on Windows 11 with the "Use other devices" option (scanning QR code), an empty displayName will cause the registration to fail.
Updated dependencies [f2c0a05]
Updated dependencies [db77aad]
Updated dependencies [db77aad]
Updated dependencies [50d50f7]
@logto/[email protected]
Patch Changes
3cf7ee1: fix potential WebAuthn registration errors by specifying the displayName
This is an optional field, but it's actually required by some browsers. For example, when using Chrome on Windows 11 with the "Use other devices" option (scanning QR code), an empty displayName will cause the registration to fail.