Juan Fernandez
|
009a87d33e
|
Feature 10196: Add filepath to end-points and third party integrations (#11285)
Adds the software installed path property to the proper end-points and third party integrations (webhook, Zendesk and Jira).
|
2023-05-17 16:53:15 -04:00 |
|
Juan Fernandez
|
62b3f9e672
|
Add missing prop to third party payload preview (#10904)
Add missing prop to third party payload preview
|
2023-03-31 11:26:48 -04:00 |
|
RachelElysia
|
82ff4ab6e3
|
Frontend: New CustomLink component (#8375)
|
2022-10-27 14:06:57 -04:00 |
|
RachelElysia
|
3eaceec64d
|
Fleet UI: App-wide use of host's display_name (#8169)
|
2022-10-14 14:26:15 -05:00 |
|
RachelElysia
|
2668182bda
|
Fleet UI: Hitting enter saves new pack and saves editing a pack (#7789)
|
2022-09-21 13:06:29 -04:00 |
|
RachelElysia
|
13cb716674
|
Fleet UI: Update software automation preview payload modal (#7607)
|
2022-09-07 14:09:25 -04:00 |
|
Juan Fernandez
|
b6d084deec
|
Feature 7559: Include 3rd party severity scores in the vulnerability web-hook payload (#7581)
Premium users should receive vulnerability scores as part of the web-hook payload.
|
2022-09-06 15:12:17 -04:00 |
|
RachelElysia
|
55b844715d
|
UI: Consistent code for anchor elements, specifically external links (#6542)
|
2022-09-02 15:28:42 -04:00 |
|
RachelElysia
|
e64dd73b54
|
Fleet UI: Button loading spinners (#7124)
Co-authored-by: Luke Heath <luke@fleetdm.com>
|
2022-08-29 08:21:37 -07:00 |
|
RachelElysia
|
b058365c4e
|
UI: Spiffier tooltip (#6642)
|
2022-07-15 15:10:35 -04:00 |
|
Martavis Parker
|
384c987389
|
Removed all traces of Redux from the app! (#5287)
* clean up routes and useless components
* component clean up
* removed redux from routes
* rename file
* moved useDeepEffect hook with others
* removed redux, fleet, app_constants dirs; added types to utilities
* style cleanup
* typo fix
* removed unused ts-ignore comments
* removed redux packages!!!
* formatting
* fixed typing for simple search function
* updated frontend readme
|
2022-04-22 09:45:35 -07:00 |
|
RachelElysia
|
6e5aee3cdf
|
Software vulnerability automation modal (#3920)
|
2022-02-04 18:48:35 -06:00 |
|