@supabase/gotrue-js
Advanced tools
Comparing version 2.60.0 to 2.60.1
@@ -249,4 +249,3 @@ import GoTrueAdminApi from './GoTrueAdminApi'; | ||
/** | ||
* Inside a browser context, `signOut()` will remove the logged in user from the browser session | ||
* and log them out - removing all items from localstorage and then trigger a `"SIGNED_OUT"` event. | ||
* Inside a browser context, `signOut()` will remove the logged in user from the browser session and log them out - removing all items from localstorage and then trigger a `"SIGNED_OUT"` event. | ||
* | ||
@@ -256,3 +255,3 @@ * For server-side management, you can revoke all refresh tokens for a user by passing a user's JWT through to `auth.api.signOut(JWT: string)`. | ||
* | ||
* If using others scope, no `SIGNED_OUT` event is fired! | ||
* If using `others` scope, no `SIGNED_OUT` event is fired! | ||
*/ | ||
@@ -276,4 +275,4 @@ signOut(options?: SignOut): Promise<{ | ||
/** | ||
* Sends a password reset request to an email address. | ||
* This method supports the PKCE flow. | ||
* Sends a password reset request to an email address. This method supports the PKCE flow. | ||
* | ||
* @param email The email address of the user. | ||
@@ -280,0 +279,0 @@ * @param options.redirectTo The URL to send the user to after they click the password reset link. |
@@ -40,3 +40,3 @@ "use strict"; | ||
data.weak_password.reasons.length && | ||
data.weak_password.reduce((a, i) => a && typeof i === 'string', true)) { | ||
data.weak_password.reasons.reduce((a, i) => a && typeof i === 'string', true)) { | ||
throw new errors_1.AuthWeakPasswordError(_getErrorMessage(data), error.status, data.weak_password.reasons); | ||
@@ -43,0 +43,0 @@ } |
@@ -1,2 +0,2 @@ | ||
export declare const version = "2.60.0"; | ||
export declare const version = "2.60.1"; | ||
//# sourceMappingURL=version.d.ts.map |
@@ -5,3 +5,3 @@ "use strict"; | ||
// Generated by genversion. | ||
exports.version = '2.60.0'; | ||
exports.version = '2.60.1'; | ||
//# sourceMappingURL=version.js.map |
@@ -249,4 +249,3 @@ import GoTrueAdminApi from './GoTrueAdminApi'; | ||
/** | ||
* Inside a browser context, `signOut()` will remove the logged in user from the browser session | ||
* and log them out - removing all items from localstorage and then trigger a `"SIGNED_OUT"` event. | ||
* Inside a browser context, `signOut()` will remove the logged in user from the browser session and log them out - removing all items from localstorage and then trigger a `"SIGNED_OUT"` event. | ||
* | ||
@@ -256,3 +255,3 @@ * For server-side management, you can revoke all refresh tokens for a user by passing a user's JWT through to `auth.api.signOut(JWT: string)`. | ||
* | ||
* If using others scope, no `SIGNED_OUT` event is fired! | ||
* If using `others` scope, no `SIGNED_OUT` event is fired! | ||
*/ | ||
@@ -276,4 +275,4 @@ signOut(options?: SignOut): Promise<{ | ||
/** | ||
* Sends a password reset request to an email address. | ||
* This method supports the PKCE flow. | ||
* Sends a password reset request to an email address. This method supports the PKCE flow. | ||
* | ||
* @param email The email address of the user. | ||
@@ -280,0 +279,0 @@ * @param options.redirectTo The URL to send the user to after they click the password reset link. |
@@ -37,3 +37,3 @@ var __rest = (this && this.__rest) || function (s, e) { | ||
data.weak_password.reasons.length && | ||
data.weak_password.reduce((a, i) => a && typeof i === 'string', true)) { | ||
data.weak_password.reasons.reduce((a, i) => a && typeof i === 'string', true)) { | ||
throw new AuthWeakPasswordError(_getErrorMessage(data), error.status, data.weak_password.reasons); | ||
@@ -40,0 +40,0 @@ } |
@@ -1,2 +0,2 @@ | ||
export declare const version = "2.60.0"; | ||
export declare const version = "2.60.1"; | ||
//# sourceMappingURL=version.d.ts.map |
// Generated by genversion. | ||
export const version = '2.60.0'; | ||
export const version = '2.60.1'; | ||
//# sourceMappingURL=version.js.map |
{ | ||
"name": "@supabase/gotrue-js", | ||
"version": "2.60.0", | ||
"version": "2.60.1", | ||
"description": "Isomorphic GoTrue client", | ||
@@ -5,0 +5,0 @@ "keywords": [ |
@@ -61,3 +61,3 @@ import { expiresAt, looksLikeFetchResponse } from './helpers' | ||
data.weak_password.reasons.length && | ||
data.weak_password.reduce((a: boolean, i: any) => a && typeof i === 'string', true) | ||
data.weak_password.reasons.reduce((a: boolean, i: any) => a && typeof i === 'string', true) | ||
) { | ||
@@ -64,0 +64,0 @@ throw new AuthWeakPasswordError( |
// Generated by genversion. | ||
export const version = '2.60.0' | ||
export const version = '2.60.1' |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is too big to display
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
744674
13415