Releases: rockcarver/frodo-cli
0.13.3
Added
- rockcarver/frodo-lib#104: Enhanced
frodo journey describe
command to include more details - #60: Support the improved frodo journey describe command with frodo-cli
Changed
- Updated frodo-lib to 0.12.6
0.13.2
Changed
- Updated frodo-lib to 0.12.5
Fixed
- rockcarver/frodo-lib#98: Frodo now properly runs
frodo idm export -A -D ./idm <host>
command - rockcarver/frodo-lib#100: Frodo now properly handles nested realms when specified as
/parent/child
- rockcarver/frodo-lib#101: Frodo now properly sets the identity resource when the realm was specified with a leading slash
- rockcarver/frodo-lib#102: Frodo now properly replaces existing themes on import when the realm was specified with a leading slash
0.13.1
Changed
- Updated frodo-lib to 0.12.4
- Updated binary installation instructions in README.md
0.13.0
Added
-
Frodo now allows two new parameters when adding a connection profile:
--authentication-service [service] Name of the authentication service/tree to use.
--authentication-header-overrides [headers] Map of headers: {"host":"am.example.com:8081"}.
These parameters are currently only supported in the
frodo conn add
command and the configuration elements will be automatically applied to commands issued using that connection profile.% frodo conn add https://platform.example.com:9443/am username password --authentication-service ldapService --authentication-header-overrides '{"host":"am.example.com:8081"}' -k ForgeOps deployment detected. Connected to ForgeRock Access Management 7.2.0 Build 64ef7ebc01ed3df1a1264d7b0400351bc101361f (2022-June-27 08:15) Saving creds in /Users/vscheuber/.frodo/.frodorc... Updating connection profile https://platform.example.com:9443/am Advanced setting: Authentication Service: ldapService Advanced setting: Authentication Header Overrides: { host: 'am.example.com:8081' } %
After the connection profile is created with the additional parameters, the environment can be accessed as usual. In this case it requires the
-k
parameter for every command, as the environment uses a self-signed certificate.% frodo journey list platform alpha -k ForgeOps deployment detected. Connected to ForgeRock Access Management 7.2.0 Build 64ef7ebc01ed3df1a1264d7b0400351bc101361f (2022-June-27 08:15) Listing journeys in realm "alpha"... Agent Example Facebook-ProvisionIDMAccount Google-AnonymousUser Google-DynamicAccountCreation HmacOneTimePassword PersistentCookie PlatformForgottenUsername PlatformLogin PlatformProgressiveProfile PlatformRegistration PlatformResetPassword PlatformUpdatePassword RetryLimit %
Fixed
- rockcarver/frodo-lib#94: Frodo can now connect to improperly configured platform instances
0.12.5
0.12.4
Changed
- Updated frodo-lib to v0.12.2
Fixed
- #33: Describing all journeys in a realm (
frodo journey describe <host>
) now runs properly - #69: AM version is now included in export meta data. This will help identify if an export is suitable for import into a target environment based on both origin and target versions.
- #71: Importing applications into Catalyst demo environments now works properly
- #78:
frodo journey list -l <host>
now runs properly - #80:
frodo idp export -A <host>
now runs properly - #83:
frodo saml export -A <host>
now runs properly - #85:
frodo journey export -A <host>
now runs properly - #90: Exporting journeys from bravo realm of a cloud tenant now works properly
0.12.4-6
What's Changed
- update to frodo-lib 0.12.2-10 by @vscheuber in #42
Full Changelog: v0.12.4-5...v0.12.4-6
0.12.4-5
What's Changed
- update frodo-lib to 0.12.2-9 by @vscheuber in #41
Full Changelog: v0.12.4-4...v0.12.4-5
0.12.4-4
What's Changed
- update to frodo-lib 0.12.2-8 by @vscheuber in #40
Full Changelog: v0.12.4-3...v0.12.4-4
0.12.4-3
What's Changed
- update to frodo-lib 0.12.2-7 by @vscheuber in #38
Full Changelog: v0.12.4-2...v0.12.4-3