ci(repo): Version packages#8518
Merged
Merged
Conversation
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
@clerk/astro
@clerk/backend
@clerk/chrome-extension
@clerk/clerk-js
@clerk/dev-cli
@clerk/expo
@clerk/expo-passkeys
@clerk/express
@clerk/fastify
@clerk/hono
@clerk/localizations
@clerk/nextjs
@clerk/nuxt
@clerk/react
@clerk/react-router
@clerk/shared
@clerk/tanstack-react-start
@clerk/testing
@clerk/ui
@clerk/upgrade
@clerk/vue
commit: |
c60badd to
d2884e5
Compare
d2884e5 to
0fd1a90
Compare
0fd1a90 to
c94fa08
Compare
c94fa08 to
75a902c
Compare
75a902c to
b69cd20
Compare
1cc067b to
ba32a0e
Compare
ba32a0e to
e892f88
Compare
e892f88 to
cf0e7af
Compare
cf0e7af to
f77012f
Compare
f77012f to
620fd9e
Compare
620fd9e to
1cb4ac0
Compare
1cb4ac0 to
2b9da33
Compare
2b9da33 to
232a22d
Compare
232a22d to
ef73471
Compare
ef73471 to
add63f0
Compare
add63f0 to
7f26512
Compare
wobsoriano
approved these changes
May 14, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR was opened by the Changesets release GitHub action. When you're ready to do a release, you can merge this and the packages will be published to npm automatically. If you're not ready to do a release yet, that's fine, whenever you add more changesets to main, this PR will be updated.
Releases
@clerk/clerk-js@6.11.0
Minor Changes
user.updateMetadata()for updating current user's metadata attributes by merging existing values with the provided parameters. (#8537) by @brunol95Patch Changes
Fix dev browser recovery by clearing stale partitioned and non-partitioned dev browser cookie variants before minting a new dev browser. (#8538) by @brkalow
Implement the provider selection step of
<__experimental_ConfigureSSO />. Renders the two SAML provider tiles (Okta Workforce and Custom SAML Provider) with real icons sourced fromimg.clerk.com, tracks the picked provider in local state, and gatesStep.Footer.Continueon a selection. Includes a warning callout about provider lock-in and a minorStep.Headeralignment tweak. All user-visible strings are wired through@clerk/localizations, with translations for every supported locale. (#8503) by @iagodahlemAlso extends the flow context with
providerandsetProvider, adds thederiveInitialStephelper, and wires the wizard'sinitialStepIdso the configure flow remounts on the right step after a reload. Continue on Select Provider stages the chosen provider and advances to the next step; the enterprise connection is created on Verify Domain once the user's email is verified and primary.Fix
toMeEnterpriseConnectionBodyto produce the flat snake_case body shape the backend expects foruser.createEnterpriseConnectionanduser.updateEnterpriseConnection. SAML and OIDC fields are now top-level prefixed (e.g.,saml_idp_metadata_url) rather than nested undersaml/oidcobjects. Without this fix, IdP metadata submission in<__experimental_ConfigureSSO />silently fails on the backend. (#8535) by @iagodahlemUpdate
<ConfigureSSO />in the context of organizations to only allow managing enterprise connections based on system permission (#8515) by @LauraBeatrisAdd monotonic token replacement based on
oiatto prevent edge-minted tokens with stale claims from overwriting fresher DB-minted tokens in multi-tab scenarios. (#8097) by @nikosdouvlisAdd verify/add email address step to
<__experimental_ConfigureSSO />(#8520) by @LauraBeatrisUpdated dependencies [
1a4d7d1,a6916b1,1084180,39099b6,18e0a1a]:@clerk/shared@4.11.0
Minor Changes
user.updateMetadata()for updating current user's metadata attributes by merging existing values with the provided parameters. (#8537) by @brunol95Patch Changes
Implement the Okta SAML metadata URL submission path in the Configure step of
<__experimental_ConfigureSSO />. Adds a single text input for the IdP metadata URL; Continue posts{ saml: { idpMetadataUrl } }viauser.updateEnterpriseConnectionwrapped inuseReverification, withuseCardStatedriving the loading state andhandleErrorrouting backend errors inline to the field or to the card-level error surface. Locale keys added underconfigureSSO.configureStepinen-US. Manual entry, file upload, SP-side copy rows, and the Okta admin-console walkthrough ship in follow-up PRs. (#8535) by @iagodahlemImplement the provider selection step of
<__experimental_ConfigureSSO />. Renders the two SAML provider tiles (Okta Workforce and Custom SAML Provider) with real icons sourced fromimg.clerk.com, tracks the picked provider in local state, and gatesStep.Footer.Continueon a selection. Includes a warning callout about provider lock-in and a minorStep.Headeralignment tweak. All user-visible strings are wired through@clerk/localizations, with translations for every supported locale. (#8503) by @iagodahlemAlso extends the flow context with
providerandsetProvider, adds thederiveInitialStephelper, and wires the wizard'sinitialStepIdso the configure flow remounts on the right step after a reload. Continue on Select Provider stages the chosen provider and advances to the next step; the enterprise connection is created on Verify Domain once the user's email is verified and primary.Update
<ConfigureSSO />in the context of organizations to only allow managing enterprise connections based on system permission (#8515) by @LauraBeatrisAdd verify/add email address step to
<__experimental_ConfigureSSO />(#8520) by @LauraBeatris@clerk/ui@1.10.0
Minor Changes
fontFamilyMonoappearance variable for customizing the monospace font used in Clerk components. Defaults toui-monospace, SFMono-Regular, Menlo, Monaco, Consolas, monospaceand is exposed as the--clerk-font-family-monoCSS variable. (#8546) by @alexcarpenterPatch Changes
Implement the Okta SAML metadata URL submission path in the Configure step of
<__experimental_ConfigureSSO />. Adds a single text input for the IdP metadata URL; Continue posts{ saml: { idpMetadataUrl } }viauser.updateEnterpriseConnectionwrapped inuseReverification, withuseCardStatedriving the loading state andhandleErrorrouting backend errors inline to the field or to the card-level error surface. Locale keys added underconfigureSSO.configureStepinen-US. Manual entry, file upload, SP-side copy rows, and the Okta admin-console walkthrough ship in follow-up PRs. (#8535) by @iagodahlemImplement the provider selection step of
<__experimental_ConfigureSSO />. Renders the two SAML provider tiles (Okta Workforce and Custom SAML Provider) with real icons sourced fromimg.clerk.com, tracks the picked provider in local state, and gatesStep.Footer.Continueon a selection. Includes a warning callout about provider lock-in and a minorStep.Headeralignment tweak. All user-visible strings are wired through@clerk/localizations, with translations for every supported locale. (#8503) by @iagodahlemAlso extends the flow context with
providerandsetProvider, adds thederiveInitialStephelper, and wires the wizard'sinitialStepIdso the configure flow remounts on the right step after a reload. Continue on Select Provider stages the chosen provider and advances to the next step; the enterprise connection is created on Verify Domain once the user's email is verified and primary.Update
<ConfigureSSO />in the context of organizations to only allow managing enterprise connections based on system permission (#8515) by @LauraBeatrisfix(ui): don't treat numeric usernames as phone numbers (#8532) by @thiskevinwang
Fixed custom page icons not rendering in React 19 due to a forwarded ref overwriting the internal node reference. (#8534) by @wobsoriano
Add verify/add email address step to
<__experimental_ConfigureSSO />(#8520) by @LauraBeatrisRefactor
<__experimental_ConfigureSSO />into a layered primitive set: a state-driven Wizard, a UI-only Stepper, aStepcompound, and ProfileCard chrome. No public component API change. Drops the central FooterActionsContext registry — each step now renders its own footer viaStep.Footer.Previous/Step.Footer.Continuepurely-presentational compounds. Adds a SelectProviderStep boilerplate filtered out of the breadcrumb. (#8493) by @iagodahlemUpdated dependencies [
1a4d7d1,a6916b1,1084180,39099b6,18e0a1a]:@clerk/astro@3.2.3
Patch Changes
1a4d7d1,a6916b1,1084180,ee25cf2,39099b6,2377305,18e0a1a]:@clerk/backend@3.4.8
Patch Changes
Fix JWT array audience validation (#8470) by @jescalan
Require configured JWT header type. (#8471) by @jescalan
Updated dependencies [
1a4d7d1,a6916b1,1084180,39099b6,18e0a1a]:@clerk/chrome-extension@3.1.25
Patch Changes
a492b1b,1a4d7d1,a6916b1,1a4d7d1,ed76cd7,1084180,a1fc21c,1e2e237,9a360c9,39099b6,18e0a1a,0f8aed2]:@clerk/expo@3.2.11
Patch Changes
a492b1b,1a4d7d1,a6916b1,1a4d7d1,1084180,1e2e237,39099b6,18e0a1a]:@clerk/expo-passkeys@1.0.24
Patch Changes
1a4d7d1,a6916b1,1084180,39099b6,18e0a1a]:@clerk/express@2.1.16
Patch Changes
1a4d7d1,a6916b1,1084180,ee25cf2,39099b6,2377305,18e0a1a]:@clerk/fastify@3.1.26
Patch Changes
1a4d7d1,a6916b1,1084180,ee25cf2,39099b6,2377305,18e0a1a]:@clerk/hono@0.1.26
Patch Changes
1a4d7d1,a6916b1,1084180,ee25cf2,39099b6,2377305,18e0a1a]:@clerk/localizations@4.6.3
Patch Changes
Implement the Okta SAML metadata URL submission path in the Configure step of
<__experimental_ConfigureSSO />. Adds a single text input for the IdP metadata URL; Continue posts{ saml: { idpMetadataUrl } }viauser.updateEnterpriseConnectionwrapped inuseReverification, withuseCardStatedriving the loading state andhandleErrorrouting backend errors inline to the field or to the card-level error surface. Locale keys added underconfigureSSO.configureStepinen-US. Manual entry, file upload, SP-side copy rows, and the Okta admin-console walkthrough ship in follow-up PRs. (#8535) by @iagodahlemImplement the provider selection step of
<__experimental_ConfigureSSO />. Renders the two SAML provider tiles (Okta Workforce and Custom SAML Provider) with real icons sourced fromimg.clerk.com, tracks the picked provider in local state, and gatesStep.Footer.Continueon a selection. Includes a warning callout about provider lock-in and a minorStep.Headeralignment tweak. All user-visible strings are wired through@clerk/localizations, with translations for every supported locale. (#8503) by @iagodahlemAlso extends the flow context with
providerandsetProvider, adds thederiveInitialStephelper, and wires the wizard'sinitialStepIdso the configure flow remounts on the right step after a reload. Continue on Select Provider stages the chosen provider and advances to the next step; the enterprise connection is created on Verify Domain once the user's email is verified and primary.Update
<ConfigureSSO />in the context of organizations to only allow managing enterprise connections based on system permission (#8515) by @LauraBeatrisAdd verify/add email address step to
<__experimental_ConfigureSSO />(#8520) by @LauraBeatrisUpdated dependencies [
1a4d7d1,a6916b1,1084180,39099b6,18e0a1a]:@clerk/nextjs@7.3.4
Patch Changes
1a4d7d1,a6916b1,1084180,ee25cf2,39099b6,2377305,18e0a1a]:@clerk/nuxt@2.4.3
Patch Changes
1a4d7d1,a6916b1,1084180,ee25cf2,39099b6,2377305,18e0a1a]:@clerk/react@6.6.3
Patch Changes
1a4d7d1,a6916b1,1084180,39099b6,18e0a1a]:@clerk/react-router@3.2.4
Patch Changes
1a4d7d1,a6916b1,1084180,ee25cf2,39099b6,2377305,18e0a1a]:@clerk/tanstack-react-start@1.2.4
Patch Changes
1a4d7d1,a6916b1,1084180,ee25cf2,39099b6,2377305,18e0a1a]:@clerk/testing@2.0.28
Patch Changes
1a4d7d1,a6916b1,1084180,ee25cf2,39099b6,2377305,18e0a1a]:@clerk/vue@2.2.3
Patch Changes
1a4d7d1,a6916b1,1084180,39099b6,18e0a1a]:@clerk/msw@0.0.24
Patch Changes
1a4d7d1,a6916b1,1084180,39099b6,18e0a1a]: