Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): bump @patternfly/react-table from 4.29.37 to 4.30.3 #107

Open
wants to merge 34 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
34 commits
Select commit Hold shift + click to select a range
1ad1b08
fix(Systems page): Correctly parse all URL params (#1172)
leSamo Sep 2, 2021
6641b97
fix: Fix passing systems into opt out function (#1182)
leSamo Sep 2, 2021
e0dff77
chore(release): 1.77.4
semantic-release-bot Sep 2, 2021
a333bc9
chore: Fix axios vulnerability (#1184)
leSamo Sep 6, 2021
c99c502
fix: Correctly refresh previously loaded rows (#1188)
leSamo Sep 6, 2021
88b05e8
chore(release): 1.77.5
semantic-release-bot Sep 6, 2021
07fb775
chore: Update react core (#1190)
leSamo Sep 6, 2021
b7d81ae
chore(deps-dev): bump react-router-dom from 5.2.0 to 5.3.0 (#1187)
dependabot[bot] Sep 6, 2021
111e2ad
chore(deps-dev): bump webpack from 5.51.1 to 5.52.0 (#1186)
dependabot[bot] Sep 6, 2021
d772c33
chore: bump eslint-plugin-react from 7.24.0 to 7.25.1 (#1195)
leSamo Sep 6, 2021
a0d8c4f
fix: Update systems header text for clarity VULN-1921 (#1197)
leSamo Sep 7, 2021
c90021b
chore(release): 1.77.6
semantic-release-bot Sep 7, 2021
d216675
chore(deps-dev): bump @babel/plugin-proposal-decorators (#1196)
dependabot[bot] Sep 8, 2021
674d246
chore(deps-dev): bump babel-jest from 27.0.6 to 27.1.1 (#1199)
dependabot[bot] Sep 8, 2021
be94181
fix: allow kebab actions if the selected item is filtered out (#1204)
tkasparek Sep 13, 2021
e70350d
chore(release): 1.77.7
semantic-release-bot Sep 13, 2021
b5f47c3
chore(build): key-cycle
Jason-RH Sep 15, 2021
038023a
Merge pull request #1211 from RedHatInsights/key-cycle
ryelo Sep 15, 2021
475b460
refactor: Refactor Remediation component
leSamo Sep 13, 2021
b36101b
chore(release): 1.77.8
semantic-release-bot Sep 16, 2021
2269dae
fix: Make status change twice as fast
leSamo Sep 8, 2021
7fc6836
chore(deps-dev): bump @redhat-cloud-services/frontend-components-config
dependabot[bot] Aug 30, 2021
4f678ee
chore: Add script to detect unused translation keys
leSamo Aug 27, 2021
df5dc73
chore: Remove unused translation keys
leSamo Aug 30, 2021
e7f2abf
chore(release): 1.77.9
semantic-release-bot Sep 17, 2021
2f96004
chore(deps): bump @redhat-cloud-services/frontend-components
dependabot[bot] Sep 17, 2021
61bd62a
chore(deps-dev): bump @babel/preset-env from 7.15.0 to 7.15.6
dependabot[bot] Sep 16, 2021
d023a20
chore(deps): bump @babel/runtime from 7.15.3 to 7.15.4
dependabot[bot] Sep 8, 2021
6873d9a
chore(deps-dev): bump @semantic-release/git from 9.0.0 to 9.0.1
dependabot[bot] Sep 6, 2021
32baaaa
fix: Deselect all CVEs when action is completed VULN-1903
leSamo Sep 9, 2021
6c5ea16
chore(deps): bump @redhat-cloud-services/frontend-components-translat…
dependabot[bot] Sep 6, 2021
1b2edeb
chore(release): 1.77.10
semantic-release-bot Sep 17, 2021
2f84cb4
chore(deps): bump @patternfly/react-table from 4.29.37 to 4.30.3
dependabot[bot] Sep 20, 2021
097e3cb
Update snapshots
leSamo Sep 22, 2021
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions .eslintignore
Original file line number Diff line number Diff line change
@@ -1 +1,2 @@
**/*.test.js
scripts/*
Binary file modified .travis/deploy_key.enc
Binary file not shown.
45 changes: 45 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,48 @@
## [1.77.10](https://github.com/RedHatInsights/vulnerability-ui/compare/v1.77.9...v1.77.10) (2021-09-17)


### Bug Fixes

* Deselect all CVEs when action is completed VULN-1903 ([32baaaa](https://github.com/RedHatInsights/vulnerability-ui/commit/32baaaa22bfbc3bd2a63be08680d3e349d3b1692))

## [1.77.9](https://github.com/RedHatInsights/vulnerability-ui/compare/v1.77.8...v1.77.9) (2021-09-17)


### Bug Fixes

* Make status change twice as fast ([2269dae](https://github.com/RedHatInsights/vulnerability-ui/commit/2269dae3f3de9b3d75d4cac63b72cdc077e3ef0d))

## [1.77.8](https://github.com/RedHatInsights/vulnerability-ui/compare/v1.77.7...v1.77.8) (2021-09-16)

## [1.77.7](https://github.com/RedHatInsights/vulnerability-ui/compare/v1.77.6...v1.77.7) (2021-09-13)


### Bug Fixes

* allow kebab actions if the selected item is filtered out ([#1204](https://github.com/RedHatInsights/vulnerability-ui/issues/1204)) ([be94181](https://github.com/RedHatInsights/vulnerability-ui/commit/be941817e813810afd21fe6ee7e7f3fa42c4075e))

## [1.77.6](https://github.com/RedHatInsights/vulnerability-ui/compare/v1.77.5...v1.77.6) (2021-09-07)


### Bug Fixes

* Update systems header text for clarity VULN-1921 ([#1197](https://github.com/RedHatInsights/vulnerability-ui/issues/1197)) ([a0d8c4f](https://github.com/RedHatInsights/vulnerability-ui/commit/a0d8c4f6c6a4e3a3e8566f9fedde41bb6c835d1e))

## [1.77.5](https://github.com/RedHatInsights/vulnerability-ui/compare/v1.77.4...v1.77.5) (2021-09-06)


### Bug Fixes

* Correctly refresh previously loaded rows ([#1188](https://github.com/RedHatInsights/vulnerability-ui/issues/1188)) ([c99c502](https://github.com/RedHatInsights/vulnerability-ui/commit/c99c502342042df9cd550b7dd6eaa20089e549ff))

## [1.77.4](https://github.com/RedHatInsights/vulnerability-ui/compare/v1.77.3...v1.77.4) (2021-09-02)


### Bug Fixes

* **Systems page:** Correctly parse all URL params ([#1172](https://github.com/RedHatInsights/vulnerability-ui/issues/1172)) ([1ad1b08](https://github.com/RedHatInsights/vulnerability-ui/commit/1ad1b08b37a6411bb966f73e6473a64da9ff1388))
* Fix passing systems into opt out function ([#1182](https://github.com/RedHatInsights/vulnerability-ui/issues/1182)) ([6641b97](https://github.com/RedHatInsights/vulnerability-ui/commit/6641b97ff9ef85dd1cfb346b4839a18a02a98d7e))

## [1.77.3](https://github.com/RedHatInsights/vulnerability-ui/compare/v1.77.2...v1.77.3) (2021-08-27)


Expand Down
17 changes: 1 addition & 16 deletions locales/en.json
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,6 @@
"CVEsReport.filters.status": "{prefix} status of <b>{values}</b>",
"CVEsReport.subheader": "The vulnerability service identified <b>{cve_count, plural, one {# CVE} other {# CVEs}}</b> within this criteria that impact at least one of your <b>{system_count} analyzed RHEL systems</b>.",
"CVEsReport.subheaderExploit": "Of the identified CVEs, <b>{knownExploitCount, plural, one {# CVE} other {# CVEs}}</b> {knownExploitCount, plural, one {has} other {have}} a known exploit.",
"CVEsReport.systems": "{systems, plural, one {# analyzed RHEL system} other {# analyzed RHEL systems}}",
"actions": "Actions",
"advisory": "Advisory",
"advisoryTooltip": "An advisory is not available. For more information, view this CVE in the {link}",
Expand All @@ -16,14 +15,11 @@
"businessRiskModal.info": "Business risk can be used to identify, track, and address CVEs that have meaningful impact to your organization.",
"businessRiskModal.title": "Edit business risk",
"cancel": "Cancel",
"configModalAddFilter": "Add filter",
"configModalExportReport": "Export report",
"configModalNoFilters": "No filters applied.",
"configModalTitle": "Report by CVEs",
"count": "Num. systems",
"createCveListByAccount.tooltip": "Status for individual systems may differ from the status of the CVE.",
"current": "current",
"customOnlyCvesWithRulesLabel": "Only include CVEs with associated security rules",
"customReportAnd": "; and",
"customReportCardButton": "Create report",
"customReportCardDescription": "A customizable PDF report of vulnerabilities identified by Red Hat across workloads that may impact your RHEL servers.",
Expand Down Expand Up @@ -60,7 +56,6 @@
"cvePairStatusModal.alert": "Selected pairs have different statuses. Changes will be applied to all",
"cvePairStatusModal.selected": "Change the status of {cveCount, plural, one {<b>{cveId}</b>} other {<b># selected CVEs</b>}} for the {systemCount, plural, one {system <b>{systemName}</b>} other {<b># selected systems</b>}}.",
"cvePairStatusModal.title": "Edit status for {count, plural, one {this CVE and system pair} other {these CVE and system pairs}}",
"cvePairStatusModal.updateSuccessful": "CVE status updated",
"cvePairStatusModal.useOverallCheckbox": "Use overall CVE status",
"cvePairStatusModal.useOverallTooltip": "This pair will use and inherit the status set on the CVE.",
"cveStatus": "CVE status",
Expand All @@ -70,7 +65,6 @@
"cveStatusModal.overwriteTooltip": "When checked, this setting does not change any pre-existing statuses set on individual systems for this CVE.",
"cveStatusModal.selected": "Change the status of {count, plural, one {<b>{cveId}</b>} other {<b># selected CVEs</b>}}.",
"cveStatusModal.title": "Edit status for {count, plural, one {this CVE} other {these CVEs}}",
"cveStatusModal.updateSuccessful": "Status updated for {count, plural, one {# CVE} other {# CVEs}}",
"cveSystemPairStatus": "CVE-system pair status",
"cveTable.columnHeaders.businessRisk": "Business risk",
"cveTable.columnHeaders.cveId": "CVE ID",
Expand All @@ -85,15 +79,11 @@
"cvssVector.popoverTitle": "vector breakdown",
"cvssVector.value": "Value",
"cvssVector.vector": "base score",
"delete": "Delete",
"description": "CVE description",
"downloadExecutive.label": "Download executive report",
"edit": "Edit",
"emptyPage.body": "Connect your systems to keep your Red Hat environment running efficiently, with security and compliance with various standards.",
"emptyPage.button": "Learn more about connecting your systems",
"emptyPage.title": "Do more with your Red Hat Enterprise Linux environment",
"emptyState.editFilterSettings": "To continue, edit your filter settings and search again.",
"emptyState.noCvesForSystem": "No CVEs reported for this system",
"emptyState.noMatchingCves": "No matching CVEs found",
"emptyState.noMatchingSystems": "No matching systems found",
"emptyState.notConnected.bodyText": "To get started, activate the Insights client for this system.",
Expand All @@ -115,7 +105,6 @@
"executiveReport.recentlyPublishedCves": "Recently published CVEs indentified on systems",
"executiveReport.rules": "{rules, plural, one {# security rule} other {# security rules}}",
"executiveReport.securityPanelSecerity": "Severity",
"executiveReport.securityTop3": "Top 3 security rules in your infrastructure",
"executiveReport.subheader": "The vulnerability service is analyzing {systems} and has identified {cves} and {rules} that impact 1 or more of these systems.",
"executiveReport.systems": "{systems, plural, one {# RHEL system} other {# RHEL systems}}",
"executiveReport.top3": "Top 3 vulnerabilities in your infrastructure",
Expand Down Expand Up @@ -163,7 +152,6 @@
"justificationNote": "Justification note",
"kebab.editBusinnesRisk": "Edit business risk",
"kebab.editStatus": "Edit status",
"kebab.excludeAnalysis": "Exclude {count, plural, one {system} other {systems}} from vulnerability analysis",
"kebab.exportAsCsv": "Export as CSV",
"kebab.exportAsJson": "Export as JSON",
"kebab.exportAsPDF": "Export as PDF",
Expand Down Expand Up @@ -242,16 +230,13 @@
"searchFilterByCveId": "Search ID or description",
"searchFilterByName": "Filter by name",
"searchFilterCvssRange": "Filter by CVSS score range",
"searchFilterLabel": "Find a CVE...",
"searchFindByName": "Find by name",
"searchLabel": "Search term",
"securityRuleLabel": "Security rule",
"securityRules": "Security rules",
"selectAll": "Select all ({count, plural, one {# item} other {# items}})",
"selectNone": "Select none (0 items)",
"selectPage": "Select page ({count, plural, one {# item} other {# items}})",
"status": "Status",
"system": "{num, plural, one {# system} other {# systems} }",
"systemExcludedFromAnalysis.body": "This system has been excluded from vulnerability analysis. It is not being evaluated for potential vulnerabilities by Red Hat Insights.",
"systemExcludedFromAnalysis.resumeAnalysis": "Resume vulnerability analysis",
"systemExcludedFromAnalysis.title": "Excluded from vulnerability analysis",
Expand All @@ -263,7 +248,6 @@
"systems.columnHeader.os.tooltip": "Operating system",
"systems.columnHeader.remediation": "Remediation",
"systems.columnHeader.updated": "Last seen",
"systems.row.fixable.playbook": "Playbook",
"systems.row.fixable.tooltip": "Red Hat has not published an Advisory which applies to this system and OS version which addresses this CVE. There are multiple reasons why this may be the case. {link}",
"systems.search.name": "Name",
"systems.table.excluded": "Excluded",
Expand Down Expand Up @@ -308,5 +292,6 @@
"vectorValues.unchanged": "Unchanged",
"viewMoreAboutThisCve": "View more information about this CVE",
"vulnerabilitiesHeader": "Vulnerabilities",
"vulnerabilitySystemsHeader": "Vulnerability systems",
"yes": "Yes"
}
Loading