Skip to content

Add May 21 changelog entry#373

Merged
eclairen merged 5 commits into
mainfrom
hypeship/changelog-may-21
May 21, 2026
Merged

Add May 21 changelog entry#373
eclairen merged 5 commits into
mainfrom
hypeship/changelog-may-21

Conversation

@eclairen
Copy link
Copy Markdown
Contributor

@eclairen eclairen commented May 21, 2026

Summary

Adds the May 21 changelog entry covering product and documentation updates from the past two weeks.

Highlights

  • Auto standby for browser pool instances
  • New browser configuration options (chrome_policy on browsers.create(), start_url)
  • Full Projects CRUD in the public API
  • Consolidated managed auth improvements (health checks, auto re-auth, session recording, broader SSO/MFA coverage)
  • proxy.check() url parameter
  • Persistent browsers EOL
  • Refreshed managed auth documentation

Note

Low Risk
Documentation-only change adding a new changelog entry; no runtime code paths or APIs are modified in this repo.

Overview
Adds a new May 21 entry to changelog.mdx summarizing recent product changes (auto-standby for browser pools, new chrome_policy/start_url options, Projects CRUD, managed auth enhancements, proxy.check(url), and persistent browsers EOL) and associated documentation updates (new hCaptcha page, refreshed managed auth docs/navigation/FAQ, and several clarifications/guide updates).

Reviewed by Cursor Bugbot for commit 9ce6754. Bugbot is set up for automated code reviews on this repo. Configure here.

@mintlify
Copy link
Copy Markdown
Contributor

mintlify Bot commented May 21, 2026

Preview deployment for your docs. Learn more about Mintlify Previews.

Project Status Preview Updated (UTC)
Kernel 🟢 Ready View Preview May 21, 2026, 8:58 PM

💡 Tip: Enable Workflows to automatically generate PRs for you.

Updated changelog with new features and improvements, including managed auth enhancements, proxy testing options, and removal of persistent browsers.
cursor[bot]
cursor Bot approved these changes May 21, 2026
Copy link
Copy Markdown

@cursor cursor Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Stale comment

Risk assessment: Very Low

The current diff only adds a May 21 changelog entry to changelog.mdx (19 inserted lines). It doesn’t modify production codepaths, configuration, navigation, infrastructure, API behavior, auth/permissions, or security boundaries. I also didn’t find a CODEOWNERS file requiring owner review for this path.

The PR already has an approval from this automation, so I did not add a duplicate approval. No risk increase found in the current update.

Open in Web View Automation 

Sent by Cursor Automation: Assign PR reviewers

Copy link
Copy Markdown

@cursor cursor Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Stale comment

Risk assessment: Very Low

The current diff only adds a May 21 changelog entry to changelog.mdx (19 inserted lines). It doesn’t modify production codepaths, configuration, navigation, infrastructure, API behavior, auth/permissions, or security boundaries. I also didn’t find a CODEOWNERS file requiring owner review for this path.

The PR is already approved, so I did not add a duplicate approval. No risk increase found in this synchronized update.

Open in Web View Automation 

Sent by Cursor Automation: Assign PR reviewers

@eclairen eclairen marked this pull request as ready for review May 21, 2026 21:39
@eclairen eclairen requested review from dprevoznik and ehfeng May 21, 2026 21:39
Copy link
Copy Markdown

@cursor cursor Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Risk assessment: Very Low

The current diff only adds a May 21 changelog entry to changelog.mdx (19 inserted lines). It doesn’t modify production codepaths, configuration, navigation, infrastructure, API behavior, auth/permissions, or security boundaries. I also didn’t find a CODEOWNERS file requiring owner review for this path.

The PR is already approved, so I did not add a duplicate approval. No risk increase found in the current update.

Open in Web View Automation 

Sent by Cursor Automation: Assign PR reviewers

Copy link
Copy Markdown

@cursor cursor Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Risk assessment: Very Low

The current diff only adds a May 21 entry to changelog.mdx (19 inserted lines). It doesn't modify production codepaths, docs navigation/config, infrastructure, API behavior, auth/permissions, or security boundaries.

I didn't find a CODEOWNERS file requiring owner review for this path. The PR already has an approval recorded, so I did not add another approval. No risk increase found in the current update.

Open in Web View Automation 

Sent by Cursor Automation: Assign PR reviewers

Copy link
Copy Markdown

@cursor cursor Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cursor Bugbot has reviewed your changes and found 1 potential issue.

Fix All in Cursor

❌ Bugbot Autofix is OFF. To automatically fix reported issues with cloud agents, enable autofix in the Cursor dashboard.

Reviewed by Cursor Bugbot for commit 9ce6754. Configure here.

Comment thread changelog.mdx
- Exposed full [Projects](/info/projects) CRUD in the public API, so projects can be created, updated, and deleted programmatically alongside the existing list endpoint.
- Managed auth improvements: Added health check and automatic re-authentication controls to the [managed auth API](/auth/overview), letting you configure check intervals and reauth triggers per connection. Sessions are now automatically recorded — when a connection enters `NEEDS_AUTH` on the dashboard, a "View last login attempt" link routes directly to the session replay, and /auth rows now show a re-auth capability chip. Also, broader SSO and OAuth provider coverage, support for Google's two-step mobile prompt flow, per-connection post-login wait configuration (`post_login.wait_ms`), automatic SSO provider brand icons in auth dialogs, MFA alternatives displayed on the external action waiting screen, and a post-login browser refresh before the profile snapshot is captured for cleaner saved sessions.
- Extended `proxy.check()` with an optional `url` parameter for testing reachability against a specific target domain before assigning the proxy. This is useful for catching proxies that pass generic health checks but are blocked on your target site.
- End of life'd persistent browsers. If you were using persistence, we suggest [`timeout_seconds`](/browsers/termination) with [Profiles](/auth/profiles).
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

New documentation references deprecated persistent browsers feature

Low Severity

This new changelog entry introduces a reference to "persistent browsers," which falls under the project rule that flags any new documentation mentioning "persistent sessions" (the rule explicitly lists "persistent browser sessions" as an example). While the intent here is to announce the EOL of the feature, the rule states these references in new documentation are to be removed or omitted. The migration guidance could be rephrased to avoid naming the deprecated concept directly.

Fix in Cursor Fix in Web

Triggered by learned rule: Flag references to persistent sessions (deprecated feature)

Reviewed by Cursor Bugbot for commit 9ce6754. Configure here.

@eclairen eclairen merged commit 33dee9d into main May 21, 2026
4 checks passed
@eclairen eclairen deleted the hypeship/changelog-may-21 branch May 21, 2026 21:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant