Skip to content

Commit

Permalink
Version to 0.6.0
Browse files Browse the repository at this point in the history
  • Loading branch information
ttu committed Nov 30, 2017
1 parent 4eb3958 commit 085c7ab
Show file tree
Hide file tree
Showing 3 changed files with 6 additions and 3 deletions.
3 changes: 3 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
# Changelog

### [Unreleased]
*

### [0.6.0] - 2017-11-30
* Caching of unchanged resources with ETag and If-None-Match headers
* Avoiding mid-air collisions with ETag and If-Match headers
* Authorization header input to Swagger if authentication is enabled
Expand Down
2 changes: 1 addition & 1 deletion FakeServer/FakeServer.csproj
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
<Authors>Tomi Tuhkanen</Authors>
<Company />
<Description>Fake JSON Server</Description>
<Version>0.5.0</Version>
<Version>0.6.0</Version>
<PackageProjectUrl>https://github.com/ttu/dotnet-fake-json-server</PackageProjectUrl>
<RepositoryUrl>https://github.com/ttu/dotnet-fake-json-server</RepositoryUrl>
<PackageLicenseUrl>https://raw.githubusercontent.com/ttu/dotnet-fake-json-server/master/LICENSE</PackageLicenseUrl>
Expand Down
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -105,11 +105,11 @@ The self-contained application archive contains Fake JSON Server, .NET Core runt
1) Download correct archive matching your OS
1) Extract files and execute

E.g. download and execute version _0.5.0_ for _macOS_
E.g. download and execute version _0.6.0_ for _macOS_

```sh
$ mkdir FakeServer && cd FakeServer
$ wget https://github.com/ttu/dotnet-fake-json-server/releases/download/0.5.0/fakeserver-osx-x64.tar.gz
$ wget https://github.com/ttu/dotnet-fake-json-server/releases/download/0.6.0/fakeserver-osx-x64.tar.gz
$ tar -zxvf fakeserver-osx-x64.tar.gz
$ chmod +x FakeServer
$ ./FakeServer
Expand Down

0 comments on commit 085c7ab

Please sign in to comment.