Update dependency phoenix to v1.7.18 #50
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.7.10
->1.7.18
Release Notes
phoenixframework/phoenix (phoenix)
v1.7.18
Compare Source
v1.7.17
Compare Source
v1.7.16
Compare Source
v1.7.15
Compare Source
v1.7.14
Compare Source
Bug fixes
follow_redirect/2
to Phoenix.ConnTest" (#5797) as this conflicts withfollow_redirect/2
in LiveView, which is imported with ConnTest by defaultv1.7.13
Compare Source
Bug fixes
JavaScript Client Bug Fixes
sessionStorage
is not available on global namespaceEnhancements
follow_redirect/2
to Phoenix.ConnTestPhoenix.Component.used_input?
for form errors in generatedcore_components.ex
mix ecto.setup
from the umbrella rootconfig_change
callbackv1.7.12
Compare Source
JavaScript Client Bug Fixes
Enhancements
[phx.gen.auth] Add enhanced session fixation protection.
For applications whichs previously used
phx.gen.auth
, the following line can be added to therenew_session
function in the auth module:defp renew_session(conn) do + delete_csrf_token() conn |> configure_session(renew: true) |> clear_session()
Note: because the session id is in a http-only cookie by default, the only way to perform this attack prior to this change is if your application was already vulnerable to an XSS attack, which itself grants more escalated "privileges” than the CSRF fixation.
JavaScript Client Enhancements
v1.7.11
Compare Source
Enhancements
JavaScript Client Enhancements
longPollFallbackMs
option to auto fallback when websocket fails to connectdebug
option to enable verbose loggingDeprecations
c:init/2
callback in endpoints in favor ofconfig/runtime.exs
or in favor of{Phoenix.Endpoint, options}
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.