Skip to content

Commit c175919

Browse files
committed
Merge branch 'changelog-2026-11-1' into 'master'
added changelog for 2026.11.1 and fixed stuff See merge request CodeScoring/docs!655
2 parents ee1652f + d5e7472 commit c175919

5 files changed

Lines changed: 22 additions & 6 deletions

File tree

docs/agent/scan.en.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ The agent is launched using the `scan` command with possible scanning options:
1212
- `scan image`[scanning a container image](/agent/scan-docker.en);
1313
- `scan bom`[scanning a SBOM](/agent/scan-bom.en);
1414
- `scan <technology>` - [scanning a directory using settings for selected technology](/agent/scan-technology.en);
15-
- `scan build`[scanning a build](agent/scan-build.en).
15+
- `scan build`[scanning a build](/agent/scan-build.en).
1616

1717
## Launch options
1818

docs/agent/scan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ hide:
1212
- `scan image`[сканирование контейнерного образа](/agent/scan-docker);
1313
- `scan bom`[сканирование SBOM](/agent/scan-bom);
1414
- `scan <technology>` - [сканирование директории с применением настроек для указанной технологии](/agent/scan-technology);
15-
- `scan build`[сканирование сборки](agent/scan-build).
15+
- `scan build`[сканирование сборки](/agent/scan-build).
1616

1717
## Опции запуска
1818

docs/changelog/on-premise-changelog.en.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,14 @@ hide:
55

66
# Codescoring On-premise Changelog
77

8+
### [2026.11.1] - 2026-03-24
9+
10+
#### Fixed
11+
12+
- Fixed Index API being unavailable for installations running via a proxy
13+
- Fixed the audit log message format for vulnerability updates when the previous update task has not yet completed
14+
- Fixed saving SSVC metrics when receiving vulnerabilities from Index API
15+
816
### [2026.11.0] – 2026-03-13
917

1018
#### Added

docs/changelog/on-premise-changelog.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,19 @@ hide:
55

66
# Codescoring On-premise Changelog
77

8+
### [2026.11.1] - 2026-03-24
9+
10+
#### Исправлено
11+
12+
- Исправлена ошибка недоступности Index API для инсталляций, работающих через прокси
13+
- Исправлен формат сообщения аудит-лога об обновлении уязвимостей, если предыдущая задача обновления ещё не завершилась
14+
- Исправлено сохранение метрик SSVC при получении уязвимостей из Index API
15+
816
### [2026.11.0] – 2026-03-13
917

1018
#### Добавлено
1119

12-
- Добавлена индивидульная страница алерта
20+
- Добавлена индивидуальная страница алерта
1321
- Добавлена поддержка Kaiten в качестве менеджера задач
1422
- <span class="module-tag sca">SCA</span> Добавлено отображение данных EPSS и соответствующие политики безопасности на страницу уязвимости
1523
- <span class="module-tag sca">SCA</span> Добавлено отображение оценок CVSSv4 и соответствующие политики безопасности на страницу уязвимости

docs/on-premise/installation.en.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,14 +19,14 @@ hide:
1919

2020
6. Copy the template file with secrets:
2121

22-
```
23-
cp.env.template.env
22+
```bash
23+
cp .env.template .env
2424
```
2525
If necessary, configure settings in a new file.
2626
If you do not change the parameters in the file, then by default the system will be available at `http://localhost:8081`.
2727

2828
- List of domains for proper operation of CSRF protection. It is recommended to list localhost on the internal and external ports, as well as the external domain (or ip:port combination). Specifying the protocol is mandatory, for example:
29-
- `DJANGO_CSRF_TRUSTED_ORIGINS=http://localhost:18000,https://localhost:8081,https://external ip:8081`
29+
- `DJANGO_CSRF_TRUSTED_ORIGINS=http://localhost:18000,https://localhost:8081,https://example.com:8081`
3030
- Connection parameters to the PostgreSQL database. The database is supplied with the platform. Specifying accesses separately is a precaution and control measure. When using your own database, you must ensure that it corresponds to [requirements](/on-premise/server-requirements.en/#supported-versions-of-external-services).
3131
- `POSTGRES_DB` — database name
3232
- `POSTGRES_USER` — username. When using your own database, you must ensure that the user has the following rights: **Superuser**, **Create role**, **Create DB**, **Replication**, **Bypass RLS**.

0 commit comments

Comments
 (0)