Skip to content

Commit

Permalink
2.1.1
Browse files Browse the repository at this point in the history
  • Loading branch information
panva committed Jun 28, 2018
1 parent 5a15050 commit 6d74b93
Show file tree
Hide file tree
Showing 3 changed files with 16 additions and 8 deletions.
18 changes: 12 additions & 6 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,8 +4,9 @@ Yay for [SemVer](http://semver.org/).

**Table of Contents**

<!-- TOC START min:2 max:2 link:true update:true -->
- [Version 2.1.0](#version-210)
<!-- TOC depthFrom:2 depthTo:2 withLinks:1 updateOnSave:1 orderedList:0 -->

- [Version 2.1.x](#version-21x)
- [Version 2.0.x](#version-20x)
- [Version 1.20.0](#version-1200)
- [Version 1.19.x](#version-119x)
Expand All @@ -31,9 +32,14 @@ Yay for [SemVer](http://semver.org/).
- [Migrating from 0.x to 1.0](#migrating-from-0x-to-10)
- [pre 1.x changelog](#pre-1x-changelog)

<!-- TOC END -->
<!-- /TOC -->

## Version 2.1.x
### Version 2.1.1
- 2018-06-28 [DIFF](https://github.com/panva/node-openid-client/compare/v2.1.0...v2.1.1)
- fixed handling of bearer endpoint responses with www-authenticate headers only. fixes #102

## Version 2.1.0
### Version 2.1.0
- 2018-05-31 [DIFF](https://github.com/panva/node-openid-client/compare/v2.0.4...v2.1.0)
- `node-jose` dependency bumped to major ^1.0.0 - fixes `A\d{3}GCMKW` symmetrical encryption support
- dependency updates
Expand All @@ -56,9 +62,9 @@ Yay for [SemVer](http://semver.org/).
- 2018-04-26 [DIFF](https://github.com/panva/node-openid-client/compare/v2.0.0...v2.0.1)
- fixed `client_secret_basic` requiring the username and password tokens to be `x-www-form-urlencoded`
according to https://tools.ietf.org/html/rfc6749#section-2.3.1
- NOTE: Although technically a fix, this is a breaking change when used with providers that also
- NOTE: Although technically a fix, this is a breaking change when used with providers that also
don't currently follow the standard. A proper way of submitting client_id and client_secret using
`client_secret_basic` is `Authorization: base64(formEncode(client_id):formEncode(client_secret))`.
`client_secret_basic` is `Authorization: base64(formEncode(client_id):formEncode(client_secret))`.
If your client_id and client_secret does contain special characters that need encoding this does not
affect you. If it does, try using `client_secret_post` instead.

Expand Down
4 changes: 3 additions & 1 deletion lib/client.js
Original file line number Diff line number Diff line change
Expand Up @@ -894,7 +894,9 @@ class Client {
headers: { Authorization: bearer(token) },
}))
.then(expectResponseWithBody(200))
.then(response => new this(JSON.parse(response.body), keystore), bearerErrorHandler.bind(this));
.then(
response => new this(JSON.parse(response.body), keystore), bearerErrorHandler.bind(this)
);
}

/**
Expand Down
2 changes: 1 addition & 1 deletion package.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "openid-client",
"version": "2.1.0",
"version": "2.1.1",
"description": "OpenID Connect Relying Party (RP, Client) implementation for Node.js servers, supports passportjs",
"keywords": [
"auth",
Expand Down

0 comments on commit 6d74b93

Please sign in to comment.