Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

@supabase/gotrue-js

Package Overview
Dependencies
Maintainers
7
Versions
303
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@supabase/gotrue-js - npm Package Compare versions

Comparing version 2.60.0 to 2.60.1

9

dist/main/GoTrueClient.d.ts

@@ -249,4 +249,3 @@ import GoTrueAdminApi from './GoTrueAdminApi';

/**
* Inside a browser context, `signOut()` will remove the logged in user from the browser session
* and log them out - removing all items from localstorage and then trigger a `"SIGNED_OUT"` event.
* Inside a browser context, `signOut()` will remove the logged in user from the browser session and log them out - removing all items from localstorage and then trigger a `"SIGNED_OUT"` event.
*

@@ -256,3 +255,3 @@ * For server-side management, you can revoke all refresh tokens for a user by passing a user's JWT through to `auth.api.signOut(JWT: string)`.

*
* If using others scope, no `SIGNED_OUT` event is fired!
* If using `others` scope, no `SIGNED_OUT` event is fired!
*/

@@ -276,4 +275,4 @@ signOut(options?: SignOut): Promise<{

/**
* Sends a password reset request to an email address.
* This method supports the PKCE flow.
* Sends a password reset request to an email address. This method supports the PKCE flow.
*
* @param email The email address of the user.

@@ -280,0 +279,0 @@ * @param options.redirectTo The URL to send the user to after they click the password reset link.

@@ -40,3 +40,3 @@ "use strict";

data.weak_password.reasons.length &&
data.weak_password.reduce((a, i) => a && typeof i === 'string', true)) {
data.weak_password.reasons.reduce((a, i) => a && typeof i === 'string', true)) {
throw new errors_1.AuthWeakPasswordError(_getErrorMessage(data), error.status, data.weak_password.reasons);

@@ -43,0 +43,0 @@ }

@@ -1,2 +0,2 @@

export declare const version = "2.60.0";
export declare const version = "2.60.1";
//# sourceMappingURL=version.d.ts.map

@@ -5,3 +5,3 @@ "use strict";

// Generated by genversion.
exports.version = '2.60.0';
exports.version = '2.60.1';
//# sourceMappingURL=version.js.map

@@ -249,4 +249,3 @@ import GoTrueAdminApi from './GoTrueAdminApi';

/**
* Inside a browser context, `signOut()` will remove the logged in user from the browser session
* and log them out - removing all items from localstorage and then trigger a `"SIGNED_OUT"` event.
* Inside a browser context, `signOut()` will remove the logged in user from the browser session and log them out - removing all items from localstorage and then trigger a `"SIGNED_OUT"` event.
*

@@ -256,3 +255,3 @@ * For server-side management, you can revoke all refresh tokens for a user by passing a user's JWT through to `auth.api.signOut(JWT: string)`.

*
* If using others scope, no `SIGNED_OUT` event is fired!
* If using `others` scope, no `SIGNED_OUT` event is fired!
*/

@@ -276,4 +275,4 @@ signOut(options?: SignOut): Promise<{

/**
* Sends a password reset request to an email address.
* This method supports the PKCE flow.
* Sends a password reset request to an email address. This method supports the PKCE flow.
*
* @param email The email address of the user.

@@ -280,0 +279,0 @@ * @param options.redirectTo The URL to send the user to after they click the password reset link.

@@ -37,3 +37,3 @@ var __rest = (this && this.__rest) || function (s, e) {

data.weak_password.reasons.length &&
data.weak_password.reduce((a, i) => a && typeof i === 'string', true)) {
data.weak_password.reasons.reduce((a, i) => a && typeof i === 'string', true)) {
throw new AuthWeakPasswordError(_getErrorMessage(data), error.status, data.weak_password.reasons);

@@ -40,0 +40,0 @@ }

@@ -1,2 +0,2 @@

export declare const version = "2.60.0";
export declare const version = "2.60.1";
//# sourceMappingURL=version.d.ts.map
// Generated by genversion.
export const version = '2.60.0';
export const version = '2.60.1';
//# sourceMappingURL=version.js.map
{
"name": "@supabase/gotrue-js",
"version": "2.60.0",
"version": "2.60.1",
"description": "Isomorphic GoTrue client",

@@ -5,0 +5,0 @@ "keywords": [

@@ -61,3 +61,3 @@ import { expiresAt, looksLikeFetchResponse } from './helpers'

data.weak_password.reasons.length &&
data.weak_password.reduce((a: boolean, i: any) => a && typeof i === 'string', true)
data.weak_password.reasons.reduce((a: boolean, i: any) => a && typeof i === 'string', true)
) {

@@ -64,0 +64,0 @@ throw new AuthWeakPasswordError(

// Generated by genversion.
export const version = '2.60.0'
export const version = '2.60.1'

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is too big to display

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc