Skip to content

Releases: thefrontside/simulacrum

@simulacrum/auth0-cypress v0.6.10

11 Feb 20:22
2f8afd3
Compare
Choose a tag to compare

[0.6.10]

  • Add the refresh_token flow
    • Bumped due to a bump in @simulacrum/auth0-simulator.
    • 7e4e918 Refresh token (#252) on 2023-02-11

@simulacrum/github-api-simulator v0.2.3

05 Dec 14:47
715d641
Compare
Choose a tag to compare

[0.2.3]

  • add repository mock data to github-api-simulator
    • 62e3948 add repository mock data to github-api-simulator (#247) on 2022-12-05

@simulacrum/github-api-simulator v0.2.2

01 Dec 13:04
7900e71
Compare
Choose a tag to compare

[0.2.2]

  • export World and Factory types
    • 1c70396 export World and Factory types (#245) on 2022-12-01

@simulacrum/github-api-simulator v0.2.1

30 Nov 20:20
59aada4
Compare
Choose a tag to compare

[0.2.1]

  • Fix path resolution to github api schema
    • 995b6bb Fix path resolution to github api schema (#243) on 2022-11-30

@simulacrum/github-api-simulator v0.2.0

30 Nov 16:06
a398035
Compare
Choose a tag to compare

[0.2.0]

  • create the @simulacrum/github-api-simulator package
    • 0eb4ebf add changeset on 2022-11-30

@simulacrum/auth0-simulator v0.8.3

30 Nov 16:05
a398035
Compare
Choose a tag to compare

[0.8.3]

  • The auth0-simulator /login/callback is difficult to inspect. We need the client_id passed, but it seems safe to pass the whole wctx object as query strings.
    • 6b18117 /login/callback should pass all wctx (#241) on 2022-11-30
  • The auth0-simulator userData does not consider the Auth0 email verification functionality. Set it to true as a default to enable minimal functionality.
    • 547ef7f default auth0 simulator userData email_verified to true on 2022-11-29
  • The login form needs event.preventDefault() to allow the Auth0 library functions to run instead of default form functionality.
    • 046f49f add event.preventDefault() to login form for submit event on 2022-11-29
  • The auth0-simulator uses a logger that was refactored and broke the middleware logging. As a stopgap to the required, involved refactor, log out based on the debug flag.
    • 67e2f7f add stopgap debug in auth0-simulator (#237) on 2022-11-30

@simulacrum/auth0-cypress v0.6.9

30 Nov 16:06
a398035
Compare
Choose a tag to compare

[0.6.9]

  • The auth0-simulator /login/callback is difficult to inspect. We need the client_id passed, but it seems safe to pass the whole wctx object as query strings.
    • Bumped due to a bump in @simulacrum/auth0-simulator.
    • 6b18117 /login/callback should pass all wctx (#241) on 2022-11-30
  • The auth0-simulator userData does not consider the Auth0 email verification functionality. Set it to true as a default to enable minimal functionality.
    • Bumped due to a bump in @simulacrum/auth0-simulator.
    • 547ef7f default auth0 simulator userData email_verified to true on 2022-11-29
  • The login form needs event.preventDefault() to allow the Auth0 library functions to run instead of default form functionality.
    • Bumped due to a bump in @simulacrum/auth0-simulator.
    • 046f49f add event.preventDefault() to login form for submit event on 2022-11-29
  • The auth0-simulator uses a logger that was refactored and broke the middleware logging. As a stopgap to the required, involved refactor, log out based on the debug flag.
    • Bumped due to a bump in @simulacrum/auth0-simulator.
    • 67e2f7f add stopgap debug in auth0-simulator (#237) on 2022-11-30

@simulacrum/server v0.6.3

28 Nov 18:06
86ac2d3
Compare
Choose a tag to compare

[0.6.3]

  • When creating a person with the person simulator, we now allow passing in a specific id to use.
    • 6793a27 change file on 2022-11-16

@simulacrum/ldap-simulator v0.5.4

28 Nov 18:06
86ac2d3
Compare
Choose a tag to compare

[0.5.4]

  • When creating a person with the person simulator, we now allow passing in a specific id to use.
    • Bumped due to a bump in @simulacrum/server.
    • 6793a27 change file on 2022-11-16

@simulacrum/auth0-simulator v0.8.2

28 Nov 18:06
86ac2d3
Compare
Choose a tag to compare

[0.8.2]

  • Added specific support for the grant_type client_credentials which is required for machine-to-machine tokens. This grant_type specifically does not run the rules. The scope option now accepts an array of objects to specify specific scopes for specific clients.
    • 4ffde63 support client_credentials grant_type on 2022-11-17
    • 9bb1b43 update change file with note about scope adjustments on 2022-11-23
  • Tweaks the login form so the button is a true form submission button. This allows the form to input validate, and enables all form submission options (enter primarily the addition).
    • fa4a9e2 auth0 submit as form button on 2022-11-21
  • The simulator should consider the audience and client_id passed in the request. The values may be important for logic in user defined rules, and is used in validating the token, e.g. in auth0-react.
    • 86cd7d0 consider client_id and audience in auth0 sim request on 2022-11-16