All notable changes to the "oci-vscode-toolkit" extension pack will be documented in this file.
Check Keep a Changelog for recommendations on how to structure this file.
- Initial release
- Added new notification banner when Resource Manager plugin is loaded.
-
Changed display name and descriptions for OCI Core extension, Data Science, Functions and Resource Manager plugins.
-
Changed progress notification message when uploading stack changes to the RMS service in Resource Manager plugin.
-
Improved tooltip on stack selection in tree view in Resource Manager plugin.
- Enable view title menus in plugins only when tree view is loaded.
-
Added cannonical names for newly supported OCI regions.
-
Display error notification dialogue when user doesn't have enough permissions while loading the OCI Core extension, Data Science, Functions and Resource Manager plugins.
- Async constructor library.
-
Switch profile action in the tree view for switching between multiple OCI profiles.
-
Translations for strings for OCI Core extension, Data Science, Functions and Resource Manager plugins.
-
Change region action within the plugin to display current user selected region.
-
Included essential policy requirements in the ReadMe file.
-
Appended policy link for accessing error message in cases with insufficient plugin access permissions.
-
Simplified core plugin by removing explicit TypeScript SDK dependency.
-
Refined activation events by excluding the use of *.
-
Incorporated updated modal dialogue for simplified OCI-CLI installation process.
-
Enhanced ReadMe to ensure proper rendering of images.
-
Implemented auto expansion up to the profile node level.
-
Incorporated new regions to the core plugin as supported by OCI Cloud
-
Added support to CREATE, EDIT and DELETE applications within Functions plugin instead of redirecting to console.
-
Mandatory plugins inspect tenancy policy requirement for non-admin users
-
Removed Tenancy parent node from service plugins
- Fixed Logging issues for Plan & Apply stack jobs in RMS plugin
- Fixed vulnerability for uuid