You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Aug 1, 2021. It is now read-only.
Copy file name to clipboardExpand all lines: CHANGELOG.md
+14Lines changed: 14 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,3 +1,17 @@
1
+
# v.1.2.1
2
+
3
+
Now the components is available through Docker Hub.
4
+
* Generated docker install file to easy test
5
+
* Created a docker-compose based on images from Docker Hub
6
+
* Updated packages for security alerts:
7
+
* bootstrap: [CVE-2019-8331](https://nvd.nist.gov/vuln/detail/CVE-2019-8331) -> Updated for version 4.3.1
8
+
* In Bootstrap 4 before 4.3.1 and Bootstrap 3 before 3.4.1, XSS is possible in the tooltip or popover data-template attribute. For more information, see: https://blog.getbootstrap.com/2019/02/13/bootstrap-4-3-1-and-3-4-1/
* A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.
* An issue was discovered in lib/Server.js in webpack-dev-server before 3.1.11. Attackers are able to steal developer's code because the origin of requests is not checked by the WebSocket server, which is used for HMR (Hot Module Replacement). Anyone can receive the HMR message sent by the WebSocket server via a ws://127.0.0.1:8080/ connection from any origin
2019-03-28 16:12:42.475 -03:00 [INF] User profile is available. Using 'C:\Users\bruno.brito\AppData\Local\ASP.NET\DataProtection-Keys' as key repository and Windows DPAPI to encrypt keys at rest.
2019-03-28 16:16:08.235 -03:00 [WRN] The CORS protocol does not allow specifying a wildcard (any) origin and credentials at the same time. Configure the policy by listing individual origins if credentials needs to be supported.
69891
+
2019-03-28 16:16:08.238 -03:00 [INF] CORS policy execution successful.
69892
+
2019-03-28 16:16:08.246 -03:00 [INF] Request finished in 41.9141ms 204
69893
+
2019-03-28 16:16:08.271 -03:00 [INF] Request starting HTTP/1.1 GET https://localhost:5002/management/user-data
69894
+
2019-03-28 16:16:08.273 -03:00 [WRN] The CORS protocol does not allow specifying a wildcard (any) origin and credentials at the same time. Configure the policy by listing individual origins if credentials needs to be supported.
69895
+
2019-03-28 16:16:08.276 -03:00 [INF] CORS policy execution successful.
69896
+
2019-03-28 16:16:08.590 -03:00 [INF] Successfully validated the token.
69897
+
2019-03-28 16:16:08.598 -03:00 [DBG] AuthenticationScheme: Bearer was successfully authenticated.
2019-03-28 16:16:10.146 -03:00 [INF] Executed action method Jp.Management.Controllers.ManagementController.UserData (Jp.Management), returned result Microsoft.AspNetCore.Mvc.OkObjectResult in 1038.4361000000001ms.
69908
+
2019-03-28 16:16:10.159 -03:00 [INF] Executing ObjectResult, writing value of type 'Jp.Infra.CrossCutting.Tools.Model.DefaultResponse`1[[Jp.Application.ViewModels.UserViewModels.UserViewModel, Jp.Application, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null]]'.
69909
+
2019-03-28 16:16:10.177 -03:00 [INF] Executed action Jp.Management.Controllers.ManagementController.UserData (Jp.Management) in 1385.9533000000001ms
0 commit comments