pgadmin4/web/pgadmin/authenticate
Akshay Joshi df2f3460f0 Fix the following SonarQube code smells:
1) Use the "RegExp.exec()" method instead.
2) Remove parameter form or provide default value.
3) Extract this nested ternary operation into an independent statement.
4) Replace this character class by the character itself.
5) Unnecessary use of conditional expression for default assignment.
6) Prefer using an optional chain expression instead, as it's more concise and easier to read.
2024-06-11 18:07:22 +05:30
..
mfa Fixed Typos 2024-05-23 12:52:41 +05:30
static/js Fixed the following code smells: 2024-04-09 19:18:56 +05:30
__init__.py Fixed Multi-Factor Authentication bypass vulnerability (CVE-2024-4215). #7425 2024-04-29 13:41:02 +05:30
internal.py Fix the following SonarQube code smells: 2024-06-11 18:07:22 +05:30
kerberos.py Fix the following SonarQube code smells: 2024-06-11 18:07:22 +05:30
ldap.py Update copyright notices for 2024 2024-01-01 14:13:48 +05:30
oauth2.py Fix the following SonarQube code smells: 2024-06-11 18:07:22 +05:30
registry.py Update copyright notices for 2024 2024-01-01 14:13:48 +05:30
webserver.py Update copyright notices for 2024 2024-01-01 14:13:48 +05:30