Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency phoenix to v1.7.18 #50

Merged
merged 1 commit into from
Jan 14, 2025
Merged

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jan 14, 2025

This PR contains the following updates:

Package Type Update Change
phoenix (source) prod patch 1.7.10 -> 1.7.18

Release Notes

phoenixframework/phoenix (phoenix)

v1.7.18

Compare Source

v1.7.17

Compare Source

v1.7.16

Compare Source

v1.7.15

Compare Source

v1.7.14

Compare Source

Bug fixes
  • Revert "Add follow_redirect/2 to Phoenix.ConnTest" (#​5797) as this conflicts with follow_redirect/2 in LiveView, which is imported with ConnTest by default

v1.7.13

Compare Source

Bug fixes
  • Fix Elixir 1.17 warning in Cowboy2Adapter
  • Fix verified routes emitting diagnostics without file and position
JavaScript Client Bug Fixes
  • Fix error when sessionStorage is not available on global namespace
Enhancements
  • Add follow_redirect/2 to Phoenix.ConnTest
  • Use LiveView 1.0.0-rc for newly generated applications
  • Use new Phoenix.Component.used_input? for form errors in generated core_components.ex
  • Allow mix ecto.setup from the umbrella root
  • Bump Endpoint static cache manifest on config_change callback

v1.7.12

Compare Source

JavaScript Client Bug Fixes
  • Fix all unjoined channels from being removed from the socket when channel leave is called on any single unjoined channel instance
Enhancements
  • [phx.gen.auth] Add enhanced session fixation protection.
    For applications whichs previously used phx.gen.auth, the following line can be added to the renew_session function in the auth module:

      defp renew_session(conn) do
    +   delete_csrf_token()
    
        conn
        |> configure_session(renew: true)
        |> clear_session()

    Note: because the session id is in a http-only cookie by default, the only way to perform this attack prior to this change is if your application was already vulnerable to an XSS attack, which itself grants more escalated "privileges” than the CSRF fixation.

JavaScript Client Enhancements
  • Only memorize longpoll fallback for browser session if WebSocket never had a successful connection

v1.7.11

Compare Source

Enhancements
  • [phx.new] Default to the Bandit webserver for newly generated applications
  • [phx.new] Enable longpoll transport by default and auto fallback when websocket fails for newly generated applications
JavaScript Client Enhancements
  • Support new longPollFallbackMs option to auto fallback when websocket fails to connect
  • Support new debug option to enable verbose logging
Deprecations
  • Deprecate the c:init/2 callback in endpoints in favor of config/runtime.exs or in favor of {Phoenix.Endpoint, options}

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@Doridian Doridian merged commit b026781 into main Jan 14, 2025
1 check failed
@Doridian Doridian deleted the renovate/phoenix-1.x-lockfile branch January 14, 2025 20:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant