Branch: refs/heads/2.3.0
Home:
https://github.com/Checkmk/checkmk
Commit: 646725879b35774acb61b509f5aaa705a21528a1
https://github.com/Checkmk/checkmk/commit/646725879b35774acb61b509f5aaa705a…
Author: Hojjat Afsharan <hojjat.afsharan(a)checkmk.com>
Date: 2024-06-13 (Thu, 13 Jun 2024)
Changed paths:
M cmk/gui/htmllib/top_heading.py
M omd/packages/apache-omd/skel/etc/apache/conf.d/security.conf
M tests/integration/omd/test_web_access.py
R web/htdocs/js/modules/jira_issue.ts
Log Message:
-----------
Revert "add jira issue collector link in cse beta banner"
This reverts commit add68a318671edde7576ef458e618624e1455575.
Reason for revert: The change injects code into the users browser during runtime of the
site. This means we deliver code independently from our software deployment workflow,
which are Checkmk version updates. To me this seems like a new attack vector to the
users' environment.
Change-Id: I30e09e4d8dc476b4583cb4de47b100d42d89d67a
To unsubscribe from these emails, change your notification settings at
https://github.com/Checkmk/checkmk/settings/notifications