-
Notifications
You must be signed in to change notification settings - Fork 57
WIP: Simplify token strategy configuration #175
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
* What I’m now calling the “OAuth Token” strategy is the default: we store tokens in storage, and the developer can use `getAccessToken()` to fetch it as needed * “Cookie mode” is now opt-in * I’ve renamed the user services accordingly, so it’s more clear what each one is doing * This is technically a breaking change, so I’m writing this up as the 3.0.0 release
the-overengineer
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good except for the few minor typos. The changes are well-explained. One totally minor question, though, is there a reason for renaming the services to kebab-case from PascalCase? The latter seems to be the convention project-wide.
| ## 2.0.0 (January 13, 2017) | ||
|
|
||
| This release adds support for the [Stormpath Client API][], which allows you to authenticate the user directly with Stormpath (authentication does not require extra software in your server). The user receives an access token, which can be used to authorize requests on your server. If you need to authorize requests on your server, you will sill want to use one of our SDKs to make that process simpler. | ||
| *Deprecated* Please use 3.0.0 insetad. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Typo there. "instead"
| *Deprecated* Please use 3.0.0 insetad. | ||
|
|
||
| Please see the Readme for the new instructions for using the Client API. | ||
| This release adds support for the [Stormpath Client API][], which allows you to authenticate the user directly with Stormpath (authentication does not require extra software in your server). The user receives an access token, which can be used to authorize requests on your server. If you need to authorize requests on your server, you will sill want to use one of our SDKs to make that process simpler. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Another typo. "sill want" -> "still want"
| ## Documentation | ||
|
|
||
| For all available routes and components, see the [API Documentation][]. | ||
| For all available routes and components, see the [Stormpath React SDK API Documentation] Documentation][]. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Extra Documentation]
Based on the conversation in #169 , it seems that our approach of using "local domain vs. remote domain" to automatically determine the token storage strategy is not sufficient (I cannot use a local domain AND use the local storage strategy).
In this PR:
getAccessToken()to fetch it as neededTodos:
/oauth/revokeendpoint needs to be added to express-stormpath, so that logout work : Add support for/oauth/revokeexpress-stormpath#591