All notable changes to this project will be documented in this file. This project adheres to Semantic Versioning.
- resolve issue with IWA in ArcGIS Enterprise not passing expires_in
- resolve issue with IWA in ArcGIS Enterprise not using esri_aopc cookie.
- added support for esri_aopc cookie in ArcGIS Enterprise (will only work on 10.9+, but should not error on downlevel)
- when creating the
UserSession
we were incorrectly assuming theexpires_in
was in minutes, vs seconds.
- for ArcGIS Enterprise, do not store credentials in localStorage
- add support for
esri_aopc
cookie, with calls to platformSelf
- drop support for
esri_auth
cookie
session.hasPrivilege
will handle the case where user.privileges isundefined
, as it is for "public" users.
arcgis-oath-bearer::open
handlesredirectUriQueryString
option by appending it to the redirectUri
- url decode username we get back on the url hash
- allow
customRedirectUri
to be a path (i.e. /redirect.html) instead of just a full url. If a path, prepend the current window.location. - ArcGIS REST JS v2.x is now used under the hood
- ember-auto-import is now used to load ArcGIS REST JS
- nothing - release snafu
- added
@esri/arcgis-rest-common-types
to dependencies
- upgraded to ember-fetch 6.2.0
- bug where subsequent reloads would keep extending the token expiry by a massive factor. On the third reload, the timestamp was so large it was an invalid date.
- do not serialize
UserSession
into local storage - when fetching portalSelf, always use the url from the torii config, as this forces an existing token to be used against the configured API, which will cause things to reject if we have a valid token that's for a different environment (DEV/QA/PROD)
- set isDevelopingAddon to false
session.authMgr.portal
will now be the full ssl org portal url, using the ports and paths from the portalSelf hash
- match behavior of ArcGIS Online cookie, which caches usernames as an
email
.
- correctly cache
username
andemail
when an authentication session is initiated.
- bump arcgis-rest-js dependencies to
v1.7.1
- use shims instead of relying on the
arcgisRest
global.
- use a
GET
to fetch user metadata to sidestep situations in which a302
redirect doesn't pass along the request body.
- adapter was not but should have been
throw
-ing an exception out ofopen
- removed debugger in
redirect.html
- bumped arcgis-rest-js dependencies to 1.2.1
- typo in the 1.0.3 change
- include the
request.umd.js
file which is the actual current build output from ArcGIS Rest JS
- fixed eslint error re: unused var in
/app/ext/torii-provider-arcgis.js
- fixed for Ember 2.18.x build error when vendorTree is null
- support for web-tier authentication
session.authType
with values oftoken
orweb-tier
session.withCredentials
, will betrue
ifauthType === web-tier
session.authMgr
which is anIAuthenticationManager
to allow consuming apps to pass this intoarcgis-rest-js
methods- added
npm run build:ecs
which sets aTARGET
env var to allow theecs
target to use the production build of ember.
- uses
arcgis-rest-js
internally
0.12.0 - 2018-01-22
- upgrade torii to 0.9.6
- isPublicUser CP on session
- isCommunityOrgUser CP on session
- isEsriUser CP on session
- always store token - even if using iframe. This is because portal may not set the
esri_auth
cookie during it's login process, if it's not perfectly configured. So - we will just always store the credentials ourselves.
- upgrade to torii v 0.8.4 for compatibility with ember > 2.12.0
- when constructing the url for iframed oauth, pass the port with the
parent
param, as Firefox now requires an exact match including port on theX-Frame-Options
header
- ability to change remoteServiceName at runtime
- isLevelOne and isLevelTwo CPs to session
- null reference error because this was undefined
- arcgis-oauth-bearer handles options differently - we now do not
set
the options on the bearer - arcgis-oath-bearer now handles additional queryString params: autoAccountCreateForSocial & socialLoginProviderName
isAdmin()
which will returnt true ifrole === 'org_admin' && !roleId
- which is how we know if a user is a FULL org admin
- configuration option to loadGroups during sign-in process. This makes an additional xhr to
/community/users/{username}
which returns the users groups. - added
isGroupMember
to the gatekeeper which is exposed assession.isGroupMember(groupId)
in consuming applications
- typo in gatekeeper.js
- fix error in portalHostname (it used
portalHostName
instead ofportalHostname
from portal.self) - deprecate
portalHostName
in favor ofportalHostname
- removed all use of
ENV.APP.portalBaseUrl
in favor ofENV.torii.providers['arcgis-oauth-bearer'].portalUrl
- support for
ENV.rootURL
while still usingENV.baseURL
if that is set - portalHostName returns protocol-less hostname for Authenticated and Unauthenticated sessions.
- orgPortalUrl marked as deprecated
- now using a fork of torii master that is ~0.8+
- orgPortalUrl CP on session service mixin
- upgrade to ember 2.8
- option to configure a
customRedirectUri
in thetorii:{...}
config section, allowing greater flexibility with where the oAuth redirect page lives. - bumped to node 6.3.0 in
.nvmrc
and.travis.yml
redirect_uri
now respectsENV.baseURL
if set
- gh-pages deploy
- removed gratuitous logging
- the provider finds a cookie with a token, and makes the portals/self call but gets a 200 response that contains an error payload, reject the promise so that the app does not think the user is logged in.
- withdrawn
- option to redirect to static page for much faster iframe auth flows
- fixed typo in some logic in the dummy
- gatekeeper service
- gatekeeper route + template
- fixed .nvmrc typo
- minor updates to readme and package.json
- Example app can sign out when using Application auth
- support for iframe (*.argis.com only apps) oAuth
- support for application (pop-up) oAuth