Skip to content

Commit 83ad6ba

Browse files
authored
[DXEC-763] Release v0.24.0 (#314)
* chore: build rules and bump ver * fix: comment parsing return value * fix: move description to the top of the comment * feat: generate rules.json
1 parent 6d9c1a5 commit 83ad6ba

24 files changed

+63
-183
lines changed

package-lock.json

Lines changed: 2 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"name": "rules-templates",
3-
"version": "0.23.0",
3+
"version": "0.24.0",
44
"description": "Auth0 Rules Repository",
55
"main": "./rules",
66
"scripts": {

rules.json

Lines changed: 39 additions & 159 deletions
Large diffs are not rendered by default.

src/rules/access-on-weekdays-only-for-an-app.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/**
22
* This rule is used to prevent access during weekends for a specific app.
3-
*
3+
*
44
* @title Allow Access during weekdays for a specific App
55
* @overview Prevent access to app during weekends.
66
* @gallery true

src/rules/active-directory-groups.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
* This rule checks if a user belongs to an AD group and if not, it will return Access Denied.
33
*
44
* > Note: you can mix this with `context.clientID` or `clientName` to do it only for specific application
5-
*
5+
*
66
* @title Active Directory group membership
77
* @overview Check Active Directory membership, else return Access Denied.
88
* @gallery true

src/rules/caisson-id-check.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
* **Optional configuration:**
1111
*
1212
* - `CAISSON_DEBUG` Set to "true" to log errors in the console
13-
*
13+
*
1414
* @title Caisson ID Check
1515
* @overview Validate US driver's licenses and international passports in real time.
1616
* @gallery false

src/rules/check-domains-against-connection-aliases.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
* Use this rule to only allow users from specific email domains to login.
66
*
77
* For example, ExampleCo has setup exampleco.com as a managed domain. They add exampleco.com to the email domains list in their SAML connection. Now, only users with an email ending with @exampleco.com (and not @examplecocorp.com) can login via SAML.
8-
*
8+
*
99
* @title Check if user email domain matches configured domain
1010
* @overview Check user email domain matches domains configured in connection.
1111
* @gallery true

src/rules/create-new-contact-add-to-contact-list-hubspot.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
* For more details about the Rules configuration settings, see here https://auth0.com/docs/rules/guides/configuration
88
* For more information about Hubspot API keys see here https://knowledge.hubspot.com/integrations/how-do-i-get-my-hubspot-api-key
99
* Use 1 as the value for HUBSPOT_NEW_MEMBER_LIST_ID for the default list in Hubspot. Otherwise, you can see the ID of any list in HubSpot visiting it, and looking at the URL. It will have this format https://app.hubspot.com/contacts/:portalId/lists/:listId where :listId is the value you want.
10-
*
10+
*
1111
* @title Add New Contact to HubSpot for Marketing
1212
* @overview Add New Contact to HubSpot then add to a List for marketing
1313
* @gallery true

src/rules/cumulio-add-metadata-to-tokens.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
* This integration simplifies the process of making full use of integrated Cumul.io dashboards' multi tenant features
44
* by using Auth0 as its authentication layer. The integration will allow you to set up and use user
55
* information in Auth0 as Cumul.io parameters to filter and structure your Cumul.io dashboards.
6-
*
6+
*
77
* @title User app_metadata for Cumul.io
88
* @overview Add Cumul.io user app_metadata to tokens to be used for Cumul.io dashboard filtering
99
* @gallery false

src/rules/eva-voice-biometric.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
* - `AURAYA_COMMON_DIGITS_PROMPT` A digit string to prompt for common digits (e.g '987654321')
1515
* - `AURAYA_PERSONAL_DIGITS_PROMPT` A string to prompt for personal digits (e.g 'your cell number')
1616
* - `AURAYA_DEBUG` Set to "true" to log errors in the console
17-
*
17+
*
1818
* @title EVA Voice Biometric connector
1919
* @overview EVA Voice Biometric connector rule for Auth0 enables voice enrolment and verification as a second factor
2020
* @gallery false

src/rules/get-fullcontact-profile.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
* **Required configuration** (this Rule will be skipped if any of the below are not defined):
1010
*
1111
* - `FULLCONTACT_KEY` API key found at https://dashboard.fullcontact.com/
12-
*
12+
*
1313
* @title Enrich profile with FullContact
1414
* @overview Get the user profile from FullContact using the email then add a new property to user_metadata.
1515
* @gallery true

src/rules/guardian-multifactor-ip-range.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
/**
22
*
33
* This rule is used to trigger multifactor authentication when the requesting IP is from outside the corporate IP range.
4-
*
4+
*
55
* @title Multifactor when request comes from outside an IP range
66
* @overview Trigger multifactor authentication when IP is outside the expected range.
77
* @gallery true

src/rules/incognia-authentication.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
*
77
* - `INCOGNIA_CLIENT_ID`: The client ID obtained from Incognia's dashboard (My Apps > API Credentials)
88
* - `INCOGNIA_CLIENT_SECRET`: The client secret obtained from Incognia's dashboard (My Apps > API Credentials)
9-
*
9+
*
1010
* @title Incognia Authentication Rule
1111
* @overview Verify if the device logging in is at a trusted location.
1212
* @gallery false

src/rules/incognia-onboarding.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
*
77
* - `INCOGNIA_CLIENT_ID`: The client ID obtained from Incognia's dashboard (My Apps > API Credentials)
88
* - `INCOGNIA_CLIENT_SECRET`: The client secret obtained from Incognia's dashboard (My Apps > API Credentials)
9-
*
9+
*
1010
* @title Incognia Onboarding Rule
1111
* @overview Verify if the device location behavior matches the address declared during onboarding.
1212
* @gallery false

src/rules/ip-address-blocklist.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
/**
22
*
33
* This rule will deny access to an app from a specific set of IP addresses.
4-
*
4+
*
55
* @title IP Address Blocklist
66
* @overview Do not allow access to an app from a specific set of IP addresses.
77
* @gallery true

src/rules/migrate-root-attributes.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
* 1- The rule updates the profile root attribute with the mapped field from user_metadata.
99
* 2- The mapped fields from user_metadata will be removed following the update.
1010
* 3- This rule will be executed on each login event. For signup scenarios, you should only consider using this rule if you currently use a custom signup form or Authentication Signup API, as these signup methods do not support setting the root attributes.
11-
*
11+
*
1212
* @title Move user metadata attributes to profile root attributes
1313
* @overview Moves select data from user_metadata to profile root attributes (family_name, given_name, name, nickname and picture).
1414
* @gallery true

src/rules/netlify-role-management.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
* - `DEFAULT_ROLE_NAME` - name of the default role to be given to a user
66
* - `DEFAULT_ROLE_ID` - id of the role to be given to a user
77
* - `CUSTOM_CLAIMS_NAMESPACE` - namespace for adding custom claims to ID Token
8-
*
8+
*
99
* @title Netlify Role Management
1010
* @overview Adds a default role if the user doesn't have any yet and attaches roles to the ID Token.
1111
* @gallery true

src/rules/onetrust-consent-management.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
* **Optional configuration:**
1212
*
1313
* - `ONETRUST_SKIP_IF_NO_EMAIL` If set to "true" then the Rule will be skipped if there is no email address. Otherwise the Rule will fail with an error.
14-
*
14+
*
1515
* @title OneTrust Consent Management
1616
* @overview Enhance Auth0 user profiles with consent, opt-ins and communication preferences data.
1717
* @gallery false

src/rules/scaled-access-relationships-claim.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
* **Optional configuration:**
1414
*
1515
* - `SCALED_ACCESS_CUSTOMCLAIM` A namespaced ID token claim (defaults to `https://scaledaccess.com/relationships`)
16-
*
16+
*
1717
* @title Scaled Access relationship-based claims
1818
* @overview Adds a claim based on the relationships the subject has in Scaled Access
1919
* @gallery false

src/rules/seczetta-get-risk-score.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
* **Helpful Hints**
1818
*
1919
* - The SecZetta API documentation is located here: `https://{{SECZETTA_BASE_URL}}/api/v1/`
20-
*
20+
*
2121
* @title SecZetta Get Risk Score
2222
* @overview Grab the risk score from SecZetta to use in the authentication flow
2323
* @gallery false

src/rules/sendgrid.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
* We use a persistent property `SignedUp` to track whether this is the first login or subsequent ones.
66
*
77
* In the same way you can use other services like [Amazon SES](http://docs.aws.amazon.com/ses/latest/APIReference/Welcome.html), [Mandrill](https://auth0.com/mandrill) and few others.
8-
*
8+
*
99
* @title Send emails through SendGrid
1010
* @overview Send an email to an administrator through SendGrind on the first login of a user.
1111
* @gallery true

src/rules/slack.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
* **Required configuration** (this Rule will be skipped if any of the below are not defined):
66
*
77
* - `SLACK_HOOK_URL` URL to the Slack hook to notify.
8-
*
8+
*
99
* @title Slack Notification on User Signup
1010
* @overview Slack notification on user signup.
1111
* @gallery true

src/rules/username-attribute.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
* This rule will add one attribute to the user's metadata object on when they log in or sign up
44
*
55
* This is useful for cases where you want to add the username to an email using liquid syntax.
6-
*
6+
*
77
* @title Add Username to AppMetadata
88
* @overview Adds metadata on when an user first signs up or logs in.
99
* @gallery true

src/rules/vouched-verification.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
* - `VOUCHED_API_URL` Your Vouched API URL; leave blank unless instructed by your Vouched rep
1313
* - `VOUCHED_ID_TOKEN_CLAIM` Set a `https://vouchedid/is_verified` claim in the ID token with results
1414
* - `VOUCHED_VERIFICATION_OPTIONAL` Set to "true" to succeed even if verification fails
15-
*
15+
*
1616
* @title Vouched Verification
1717
* @overview Verify a person's identity using Vouched.
1818
* @gallery true

0 commit comments

Comments
 (0)