ng-apimock
Advanced tools
Comparing version 1.1.0 to 1.1.1
@@ -0,1 +1,7 @@ | ||
<a name="1.1.1"></a> | ||
# 1.1.1 (2016-06-27) | ||
## Bugfix | ||
- Fix passThrough scenario selection | ||
<a name="1.1.0"></a> | ||
@@ -5,1 +11,5 @@ # 1.1.0 (2016-06-23) | ||
This is the version after separating ng-apimock to a node plugin. | ||
## Breaking change | ||
- The connect middleware function needs to be required from ng-apimock instead of grunt-ng-apimock | ||
@@ -38,3 +38,3 @@ (function () { | ||
if (data.scenario === null) { | ||
if (data.scenario === null || data.scenario === 'passThrough') { | ||
if (ngApimockId !== undefined) { | ||
@@ -41,0 +41,0 @@ delete config.sessions[ngApimockId].selections[data.identifier]; |
{ | ||
"name": "ng-apimock", | ||
"description": "Node plugin that provides the ability to use scenario based api mocking of angular apps", | ||
"version": "1.1.0", | ||
"homepage": "https://github.com/mdasberg/ng-apimock#readme", | ||
"version": "1.1.1", | ||
"homepage": "https://mdasberg.github.io/ng-apimock", | ||
"author": { | ||
@@ -7,0 +7,0 @@ "name": "Mischa Dasberg", |
@@ -7,2 +7,6 @@ # ng-apimock [![Build Status](https://travis-ci.org/mdasberg/ng-apimock.svg?branch=master)](https://travis-ci.org/mdasberg/ng-apimock) [![npm version](https://img.shields.io/node/v/ng-apimock.svg)](https://github.com/mdasberg/ng-apimock) [![dependency Status](https://img.shields.io/david/mdasberg/ng-apimock.svg)](https://david-dm.org/mdasberg/ng-apimock) [![devDependency Status](https://img.shields.io/david/dev/mdasberg/ng-apimock.svg)](https://david-dm.org/mdasberg/gng-apimock#info=devDependencies) [![npm downloads](https://img.shields.io/npm/dm/ng-apimock.svg?style=flat-square)](https://www.npmjs.com/package/ng-apimock) | ||
#### Plugins that use ng-apimock | ||
- [grunt-ng-apimock](https://mdasberg.github.io/grunt-ng-apimock) is a plugin that makes ng-apimock available for [Grunt](http://gruntjs.com/) | ||
- [gulp-ng-apimock](https://mdasberg.github.io/gulp-ng-apimock) is a plugin that makes ng-apimock available for [Gulp](http://gulpjs.com/) | ||
## Getting Started | ||
@@ -172,4 +176,4 @@ | ||
#### selectScenario(json, scenarionName) | ||
Selects the given scenario | ||
#### selectScenario(json, scenarionName) | ||
Selects the given scenario (when calling this function without a scenario or with 'passThrough' as scenario name, the call will be passed through to the actual backend) | ||
@@ -176,0 +180,0 @@ #### setAllScenariosToDefault() |
@@ -52,3 +52,3 @@ (function () { | ||
identifier: identifier, | ||
scenario: scenario | ||
scenario: scenario || null | ||
} | ||
@@ -55,0 +55,0 @@ }); |
Sorry, the diff of this file is not supported yet
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
AI-detected potential code anomaly
Supply chain riskAI has identified unusual behaviors that may pose a security risk.
Found 1 instance in 1 package
Minified code
QualityThis package contains minified code. This may be harmless in some cases where minified code is included in packaged libraries, however packages on npm should not minify code.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 4 instances in 1 package
806818
51
2939
194
5
2
5