Skip to content

Commit cfa20c5

Browse files
committed
lint
1 parent b380159 commit cfa20c5

File tree

1 file changed

+14
-8
lines changed

1 file changed

+14
-8
lines changed

changelog/1.39.0.md

+14-8
Original file line numberDiff line numberDiff line change
@@ -7,22 +7,28 @@ There are no breaking changes in 1.39.0.
77
### Features ✨
88

99
- Added the ability to set the maximum age for an API key in the Admin panel.
10-
- Added a toggle to the OIDC provider in the Admin panel to disable automatic user creation.
11-
When toggled on, users will have to be manually created by an administrator with an email
12-
that matches the value provided by the 'email' field in the OIDC payload. The login type
13-
of the user must be set to OIDC in order to successfully login.
10+
- Added a toggle to the OIDC provider in the Admin panel to disable automatic
11+
user creation.
12+
When toggled on, users will have to be manually created by an administrator
13+
with an email that matches the value provided by the 'email' field in the
14+
OIDC payload. The login type of the user must be set to OIDC in order to
15+
successfully login.
1416
- Added a logout action to the audit log to track user logouts.
1517
- Removed the hard limit on total number of images in a deployment.
1618

1719
### Bug fixes 🐛
1820

19-
- Fixed an issue where users couldn't install the code-server PWA (Progressive Web App).
21+
- Fixed an issue where users couldn't install the code-server PWA
22+
(Progressive Web App).
2023
- Fixed various paths where API Keys were not being audited.
2124
- Fixed an issue where deleted users were not shown in the audit log.
2225
- Fixed various UI inconsistencies around images and image tags.
23-
- Fixed an issue that could cause the dashboard to unnecessarily re-render multiple times.
26+
- Fixed an issue that could cause the dashboard to unnecessarily re-render
27+
multiple times.
2428

2529
### Security updates 🔐
2630

27-
- Fixed an issue where exporting audit logs could be vulnerable to a CSV injection.
28-
- Websocket clients are now rejected if they supply an invalid 'sec-websocket-key' header value.
31+
- Fixed an issue where exporting audit logs could be vulnerable to a CSV
32+
injection.
33+
- Websocket clients are now rejected if they supply an invalid
34+
'sec-websocket-key' header value.

0 commit comments

Comments
 (0)