This repository has been archived by the owner on May 5, 2021. It is now read-only.
Releases: amzn/oss-attribution-builder
Releases · amzn/oss-attribution-builder
0.9.0
Added
- Auth backends can now specify how a user should be authenticated, via Passport. They should
provide aninitialize
method that is called during app start-up. This can be used to register
Passport strategies, login URLs, or any other session activities. - SPDX license texts are now shipped with the attribution builder.
- License tags can now specify presentation options to influence how they appear in the package
editor. They can be sorted first, annotated with text (both in menu and below), and control
whether users are asked for the full license text. - License tags can also specify "questions" to ask a user when adding a package. This is useful
to gather context-sensitive info. For example, you could only ask for "dynamic/static linking"
if relevant for a given license. - Added a user interface for editing project access lists. This can be accessed by clicking on
the owner on the top right side of the projcet editor. - It is now possible to edit a package and usage information in a project. New package revisions
will be created as necessary, and previous entries will be correctly cleaned up.
Removed
- JWT sessions are no longer in use. See the above addition about auth backends for an alternative.
- The build process no longer requires Gulp.
Changed
- Project ACLs are now sanely validated, with levels of "owner", "editor", and "viewer". A viewer
can only view a project. An editor can change project details, except for the ACL. An owner can
change everything about a project. - Users on a project contact list implicitly have "viewer" permissions unless otherwire specified.
- The format of
/api/licenses
changed. Instead of a list, it returns a {licenses, tags}
structure. The license list is included in thelicense
key.
Fixed
- Some lingering Bootstrap CSS issues were cleaned up.
- The
validateUsage
function (used in tags) was incorrectly documented. extractRequestUser
is now consistently used, making custom auth backends more reliable.
Security
- Users who weren't configured to access package validation systems could still do so, due to
a danglingPromise
. Additional type checks and lints have been enabled to prevent this in the
future
0.8.0
- Initial release