Skip to content

Releases: ayushsharma82/ESP-DASH

Minor Layout Optimization

11 Apr 12:28
Compare
Choose a tag to compare

Optimized grid layout of cards to be consistent

Minor Layout Fix

10 Apr 23:12
Compare
Choose a tag to compare

Minor fix for cards layout where the humidity and status cards had inconsistent width in tablet viewport.

Fixed Progress Bar

05 Apr 14:55
a3e1b98
Compare
Choose a tag to compare

🐞 Fixed an issue: where the minimum and maximum values were not applied to the progress bar.

Fixed String reference issue in Cards

20 Mar 12:37
273261b
Compare
Choose a tag to compare

Related to #107.

🐞 Fixed an issue: where storing strings would cause the card to store references instead

Fixed Generic Card

29 Jan 21:39
Compare
Choose a tag to compare

🐞 Fixed an issue: where using strings of length greater than 8 bytes in the generic card will crash the code.

v3.0.2

24 Oct 22:57
436cd3b
Compare
Choose a tag to compare

Updated PlatformIO Dependency

V3 Major Release!

24 Oct 22:15
afdfa9a
Compare
Choose a tag to compare

This a major release & syntax is not compatible with V2!


ESP-DASH V3 brings along a lot of features with a 10% lower memory footprint than the previous release. The library is refactored to have better semantics and a substantial increase + stability in performance is noticed.

Documentation for V3 is live on https://ayushsharma82.github.io/ESP-DASH/

To get a clear image, I would like you to follow our inbuilt examples and upgrade your projects to ESP-DASH V3 accordingly. This release is very programmer-friendly and makes upgrading a lot easier!


To know what has been changed, please refer to #92 pull request.

Minor Fixes

25 Jun 13:18
0d61afe
Compare
Choose a tag to compare

Fixed code compatibility for ArduinoJSON 6.15.2

More Vulnerability Fixes

03 May 06:08
6e105ba
Compare
Choose a tag to compare
v2.2.4

Update library.properties

Fixed a Security Vulnerability

03 May 06:04
Compare
Choose a tag to compare

Fixed a Security Vulnerability related to tar package in vue-frontend.

Check this report for more info: https://nvd.nist.gov/vuln/detail/CVE-2018-20834