Open
Conversation
Contributor
|
🚀 Preview is available at https://039f4b07.enterprise-contract.pages.dev |
4de6708 to
8f5d08f
Compare
Contributor
|
🚀 Preview is available at https://08300ee1.enterprise-contract.pages.dev |
8f5d08f to
063bccc
Compare
Contributor
|
🚀 Preview is available at https://6626ba07.enterprise-contract.pages.dev |
063bccc to
d1bb21f
Compare
Contributor
|
🚀 Preview is available at https://547ec4d3.enterprise-contract.pages.dev |
d1bb21f to
085816e
Compare
Contributor
|
🚀 Preview is available at https://777ca95c.enterprise-contract.pages.dev |
085816e to
04a82b2
Compare
Contributor
|
🚀 Preview is available at https://41dff465.enterprise-contract.pages.dev |
04a82b2 to
d42d94a
Compare
Contributor
|
🚀 Preview is available at https://604b8a26.enterprise-contract.pages.dev |
d3d3ce0 to
8b18491
Compare
8b18491 to
7fc3e4c
Compare
Contributor
|
🚀 Preview is available at https://cfdb8b39.enterprise-contract.pages.dev |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
11.12.1→11.13.04.59.1→4.77.0Release Notes
mermaid-js/mermaid (mermaid)
v11.13.0Compare Source
Minor Changes
#7352
d6db0b0Thanks @remcohaszing! - feat: Export theAsyncIconLoader,SyncIconLoader, andIconLoadertypes.#5932
cdacb0bThanks @exoego! - feat: Add venn-beta diagram#6789
73e9849Thanks @omkarht! - feat: Add half-arrowheads (solid & stick) and central connection support#7387
acce4dbThanks @exoego! - feat: Add Ishikawa diagram (ishikawa-beta)#6995
9745f32Thanks @darshanr0107! - feat: Deprecateflowchart.htmlLabelsin favor of root-levelhtmlLabelsin Mermaid config#5814
2dd29beThanks @kairi003! - feat: allow to put notes in namespaces on classDiagramPatch Changes
#7075
96a766dThanks @darshanr0107! - fix: Prevent HTML tags from being escaped in sandbox label rendering#6843
32723b2Thanks @saurabhg772244! - fix: Support edge animation in hand drawn look#7453
a60e615Thanks @darshanr0107! - fix: ER diagram edge label positioning#6989
1a9d45aThanks @darshanr0107! - fix: Resolved parsing error where direction TD was not recognized within subgraphs#7178
96ca7c0Thanks @omkarht! - fix(treemap): Fixed treemap classDef style application to properly apply user-defined styles#7076
60f6331Thanks @darshanr0107! - fix: Correct viewBox casing and make SVGs responsive#7055
fa15ce8Thanks @darshanr0107! - fix: Improve participant parsing and prevent recursive loops on invalid syntax#7276
33c7c72Thanks @darshanr0107! - fix: respectmarkdownAutoWrap: falseto prevent text auto-wrapping in flowchart markdown labels withhtmlLabelsenabled.Markdown labels with
markdownAutoWrap: false, htmlLabels: falseset doesn't workcorrectly.
#7416
3c069b5Thanks @Crafter-Y! - fix: architecture diagram lines should now have the correct length#6995
9745f32Thanks @darshanr0107! - fix: Support thehtmlLabelsMermaid config value whenever possible#7293
a408b55Thanks @darshanr0107! - fix: Prevent browser hang when using multiline accDescr in XY charts#6119
712c1ecThanks @NealGooch! - fix: correct block positioning when nested blocks span multiple columns#7424
981a62eThanks @knsv! - fix: correct BT orientation arc sweep flags in gitGraph drawArrow()Swapped SVG arc sweep-flag values in the BT (bottom-to-top) orientation branches of
drawArrow()so curves bend in the correct direction. Affects both rerouting and non-rerouting code paths for merge and non-merge arrows.Resolves #6593
#7430
a4bb0b5Thanks @knsv! - fix: allow colons in stateDiagram-v2 transition and state description text#7432
b0f9d5bThanks @knsv! - fix: derive taskTextDarkColor from doneTaskBkgColor in dark theme for readable done-task text#7456
981fbb8Thanks @knsv-bot! - fix(gantt): restore readable outside-text color for done tasks in dark mode#7139
93aa657Thanks @omkarht! - revert: restore original hexagon and roundedRect implementations#7136
6bc6617Thanks @omkarht! - feat: add alias support for new participant syntax of sequence diagrams#7375
9d0669aThanks @kaigritun! - fix(er): recognize '1' cardinality alias before relationship operators#7275
7eed6a1Thanks @darshanr0107! - fix: changecreateLabelto callcreateTextThis adds support for KaTeX and FontAwesome icons loaded via iconpacks in some
older labels. There are some small changes in formatting due to standardizing this code.
#7265
2000680Thanks @omkarht! - fix: prevent unintended opacity on SVG aws icons containing rect elements#7139
b7c66a2Thanks @omkarht! - chore: restore original hexagon and roundedRect implementations#7425
f16bfbbThanks @knsv! - fix: use rounded right-angle edges for ELK layoutELK layout edges now default to
roundedcurve (right-angle segments with rounded corners) instead of inheriting the globalbasisdefault. This fixes ELK edges that were curving instead of routing at right angles (#7213). Non-ELK layouts are unaffected and keep their existingbasisdefault.#7296
aac86f7Thanks @darshanr0107! - fix: Ensure correct edge label rendering for ER and requirement diagrams when flowchart htmlLabels are false#7019
ace0367Thanks @darshanr0107! - fix: Mindmap breaking in ELK layout#6984
09b74f1Thanks @omkarht! - fix(er-diagram): prevent syntax error when using 'u', numbers, and decimals in node names#7276
33c7c72Thanks @darshanr0107! - fix: Restore proper rendering of plain text flowchart labels without auto line-wrappingThis fix restores backwards compatibility with Mermaid v10 by ensuring that plain text labels in flowcharts are rendered correctly. In Mermaid v11, all labels were incorrectly being treated as markdown by default, which caused issues with text wrapping, multiline breaks, and backwards compatibility.
What changed:
\ncharacters now correctly create line breaksIf you want markdown formatting:
You can still use markdown in your flowchart labels by using the proper markdown syntax. Wrap your markdown text with double quotes and backticks:
node["`_markdown_ **text**`"]Example:
#7080
835de00Thanks @darshanr0107! - fix: Support ComponentQueue_Ext to prevent parsing error#7310
a9e4c72Thanks @darshanr0107! - fix: Allow quoted string labels in architecture-beta diagrams#7052
ff15e51Thanks @darshanr0107! - fix: Correct tooltip placement to appear near hovered element#7197
8bfd477Thanks @omkarht! - fix: validate dates and tick interval to prevent UI freeze/crash in gantt diagramtype#7099
b136acdThanks @darshanr0107! - fix: Mindmap rendering issue when the number of Level 2 nodes exceeds 11#7217
e0317acThanks @omkarht! - fix(gitgraph): pass gitGraphConfig to renderer functions for applying directives properly.Updated dependencies [
fd3fc50]:v11.12.3Compare Source
Patch Changes
7243340]:v11.12.2Compare Source
Patch Changes
de7ed10Thanks @shubhamparikh2704! - fix: validate dates and tick interval to prevent UI freeze/crash in gantt diagramtypecloudflare/workers-sdk (wrangler)
v4.77.0Compare Source
Minor Changes
#13023
593c4dbThanks @jamesopstad! - Addwrangler versions uploadsupport for the experimentalsecretsconfiguration propertyWhen the new
secretsproperty is defined,wrangler versions uploadnow validates that all secrets declared insecrets.requiredare configured on the Worker before the upload succeeds. If any required secrets are missing, the upload fails with a clear error listing which secrets need to be set.When
secretsis not defined, the existing behavior is unchanged.#12732
c2e9163Thanks @jamesopstad! - Add deploy support for the experimentalsecretsconfiguration propertyWhen the new
secretsproperty is defined,wrangler deploynow validates that all secrets declared insecrets.requiredare configured on the Worker before the deploy succeeds. If any required secrets are missing, the deploy fails with a clear error listing which secrets need to be set.When
secretsis not defined, the existing behavior is unchanged.Patch Changes
#12896
451dae3Thanks @petebacondarwin! - fix: Add retry and timeout protection to remote preview API callsRemote preview sessions (
wrangler dev --remote) now automatically retry transient 5xx API errors (up to 3 attempts with linear backoff) and enforce a 30-second per-request timeout. Previously, a single hung or failed API response during session creation or worker upload could block the dev session reload indefinitely.#12569
379f2a2Thanks @MattieTK! - Useqwik add cloudflare-workersinstead ofqwik add cloudflare-pagesfor Workers targetsBoth the wrangler autoconfig and C3 Workers template for Qwik were running
qwik add cloudflare-pageseven when targeting Cloudflare Workers. This caused the wrong adapter directory structure to be scaffolded (adapters/cloudflare-pages/instead ofadapters/cloudflare-workers/), and required post-hoc cleanup of Pages-specific files like_routes.json.Qwik now provides a dedicated
cloudflare-workersadapter that generates the correct Workers configuration, includingwrangler.jsoncwithmainandassetsfields, apublic/.assetsignorefile, and the correctadapters/cloudflare-workers/vite.config.ts.Also adds
--skipConfirmation=trueto allqwik addinvocations so the interactive prompt is skipped in automated contexts.#11899
9a1cf29Thanks @hoodmane! - Remove cf-requirements support for Python workers. It hasn't worked with the runtime for a while now.#11800
875da60Thanks @southpolesteve! - Add upgrade hint to unexpected configuration field warnings when an update is availableWhen Wrangler encounters unexpected fields in the configuration file and a newer version of Wrangler is available, it now displays a message suggesting to update. This helps users who may be using configuration options that were added in a newer version of Wrangler.
Updated dependencies [
b8f3309,5aaaab2,5aaaab2,f8516dd,9c9fe30,6a6449e]:v4.76.0Compare Source
Minor Changes
#12893
782df44Thanks @gpanders! - Rewritewrangler containers listto use the paginated Dash API endpointwrangler containers listnow fetches from the/dash/applicationsendpoint instead of/applications, displaying results in a paginated table with columns for ID, Name, State, Live Instances, and Last Modified. Container state is derived from health instance counters (active, degraded, provisioning, ready).The command supports
--per-page(default 25) for interactive pagination with Enter to load more and q/Esc to quit, and--jsonfor machine-readable output. Non-interactive environments load all results in a single request.#12957
62545c9Thanks @natewong1313! - Add Stream binding support to Wrangler and workers-utilsWrangler and workers-utils now recognize the
streambinding in configuration, deployment metadata, and generated worker types. This enables projects to declare Stream bindings inwrangler.jsonand have the binding represented consistently across validation, metadata mapping, and type generation.#12848
ce48b77Thanks @emily-shen! - Enable local explorer by defaultThis ungates the local explorer, a UI that lets you inspect the state of D1, DO and KV resources locally by visiting
/cdn-cgi/explorerduring local development.Note: this feature is still experimental, and can be disabled by setting the env var
X_LOCAL_EXPLORER=false.Patch Changes
#12938
71ab981Thanks @dario-piotrowicz! - Add backward-compatible autoconfig support for Astro v5 and v4 projectsThe
astro add cloudflarecommand in older Astro versions installs the latest adapter version, which causes compatibility issues. This change adds manual configuration logic for projects using Astro versions before 6.0.0:astro add cloudflarecommand (unchanged behavior)@astrojs/cloudflare@12and manually configures the adapter@astrojs/cloudflare@11and manually configures the adapter#11892
7c3c6c6Thanks @staticpayload! - Handle registry ports when matching container image digestsWrangler now strips tags without breaking registry ports when comparing local images to remote digests. This prevents unnecessary pushes for tags like
localhost:5000/app:tag.Updated dependencies [
3c988e2,d028ffb,cb71403,3a1c149,ce48b77,8729f3d]:v4.75.0Compare Source
Minor Changes
#12492
3b81fc6Thanks @thomasgauvin! - feat: addwrangler tunnelcommands for managing Cloudflare TunnelsAdds a new set of commands for managing remotely-managed Cloudflare Tunnels directly from Wrangler:
wrangler tunnel create <name>- Create a new Cloudflare Tunnelwrangler tunnel list- List all tunnels in your accountwrangler tunnel info <tunnel>- Display details about a specific tunnelwrangler tunnel delete <tunnel>- Delete a tunnel (with confirmation)wrangler tunnel run <tunnel>- Run a tunnel using cloudflaredwrangler tunnel quick-start <url>- Start a temporary tunnel (Try Cloudflare)The
runandquick-startcommands automatically download and manage the cloudflared binary, caching it in~/.wrangler/cloudflared/. Users are prompted before downloading and warned if their PATH-installed cloudflared is outdated. You can override the binary location with theCLOUDFLARED_PATHenvironment variable.All commands are marked as experimental.
Patch Changes
#12927
c9b3184Thanks @penalosa! - Bump undici from 7.18.2 to 7.24.4#12875
13df6c7Thanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#12935
df0d112Thanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#12928
81ee98eThanks @petebacondarwin! - Migrate chrome-devtools-patches deployment from Cloudflare Pages to Workers + AssetsThe DevTools frontend is now deployed as a Cloudflare Workers + Assets project instead of a Cloudflare Pages project. This uses
wrangler deployfor production deployments andwrangler versions uploadfor PR preview deployments.The inspector proxy origin allowlists in both wrangler and miniflare have been updated to accept connections from the new
workers.devdomain patterns, while retaining the legacypages.devpatterns for backward compatibility.#12835
c600ce0Thanks @dario-piotrowicz! - Fix execution freezing ondebuggerstatements when DevTools is not attachedPreviously,
wrangleralways sentDebugger.enableto the runtime on connection, even when DevTools wasn't open. This caused scripts to freeze ondebuggerstatements. NowDebugger.enableis only sent when DevTools is actually attached, andDebugger.disableis sent when DevTools disconnects to stop the runtime from performing debugging work.#12894
f509d13Thanks @gpanders! - Simplify description of --json optionRemove extraneous adjectives in the description of the
--jsonoption.#11888
0a7fef9Thanks @staticpayload! - Reject cross-drive module paths in Pages Functions routingOn Windows, module paths using a different drive letter could be parsed in a way that bypassed the project-root check. These paths are now parsed correctly and rejected when they resolve outside the project.
Updated dependencies [
c9b3184,13df6c7,df0d112,81ee98e]:v4.74.0Compare Source
Minor Changes
#10896
351e1e1Thanks @devin-ai-integration! - feat: add--secrets-fileparameter towrangler deployandwrangler versions uploadYou can now upload secrets alongside your Worker code in a single operation using the
--secrets-fileparameter on bothwrangler deployandwrangler versions upload. The file format matches what's used bywrangler versions secret bulk, supporting both JSON and .env formats.Example usage:
Secrets not included in the file will be inherited from the previous version, matching the behavior of
wrangler versions secret bulk.#12873
2b9a186Thanks @gpanders! - Addwrangler containers instances <application_id>command to list container instancesLists all container instances for a given application, matching the Dash instances view. Displays instance ID, state, location, version, and creation time. Supports pagination for applications with many instances. Also adds paginated request support to the containers-shared API client.
Patch Changes
#12873
2b9a186Thanks @gpanders! - AddescapeCodeTimeoutoption toonKeyPressutility for faster Esc key detectionThe
onKeyPressutility now accepts an optionalescapeCodeTimeoutparameter that controls how long readline waits to disambiguate a standalone Esc press from multi-byte escape sequences (e.g. arrow keys). The default remains readline's built-in 500ms, but callers can pass a lower value (e.g. 25ms) for near-instant Esc handling in interactive prompts.#12676
65f1092Thanks @dario-piotrowicz! - Fix autoconfig package installation always failing at workspace rootsWhen running autoconfig at the root of a monorepo workspace, package installation commands now include the appropriate workspace root flags (
--workspace-rootfor pnpm,-Wfor yarn). This prevents errors like "Running this command will add the dependency to the workspace root" that previously occurred when configuring projects at the workspace root.Additionally, autoconfig now allows running at the workspace root if the root directory itself is listed as a workspace package (e.g.,
workspaces: ["packages/*", "."]).#12841
7b0d8f5Thanks @dario-piotrowicz! - Fix unclear error when assets upload session returns anullresponseWhen deploying assets, if the Cloudflare API returns a
nullresponse object, Wrangler now provides a clear error message asking users to retry instead of failing with a confusing error.Updated dependencies [
ade0aed]:v4.73.0Compare Source
Minor Changes
#12853
ff543e3Thanks @gpanders! - Deprecate SSH passthrough flags inwrangler containers sshThe
--cipher,--log-file,--escape-char,--config-file,--pkcs11,--identity-file,--mac-spec,--option, and--tagflags are now deprecated. These flags expose OpenSSH-specific options that are tied to the current implementation. A future release will replace the underlying SSH transport, at which point these flags will be removed. They still function for now.#12815
e63539dThanks @NuroDev! - Support disabling persistence inunstable_startWorker()andunstable_dev()You can now disable persistence entirely by setting
persist: falsein thedevoptions:Or when using
unstable_startWorker():This is useful for testing scenarios where you want to ensure a clean state on each run without any persisted data from previous runs.
Patch Changes
#12861
f7de0fdThanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#12734
8e89e85Thanks @flostellbrink! - Add back support for wrangler d1 exports with multiple tables.Example:
#12807
8d1e130Thanks @MaxwellCalkin! - fix:vectorizecommands now output valid jsonThis fixes:
wrangler vectorize createwrangler vectorize infowrangler vectorize insertwrangler vectorize upsertwrangler vectorize listwrangler vectorize list-vectorswrangler vectorize list-metadata-indexAlso,
wrangler vectorize create --jsonnow also includes thecreated_at,modified_onanddescriptionfields.#12856
6ee18e1Thanks @dario-piotrowicz! - Fix autoconfig for Astro v6 projects to skip wrangler config generationAstro 6+ generates its own wrangler configuration on build, so autoconfig now detects the Astro version and skips creating a
wrangler.jsoncfile for projects using Astro 6 or later. This prevents conflicts between the autoconfig-generated config and Astro's built-in config generation.#12700
4bb61b9Thanks @RiscadoA! - Add client-side validation for VPC service host flagsThe
--hostname,--ipv4, and--ipv6flags onwrangler vpc service createandwrangler vpc service updatenow validate input before sending requests to the API. Previously, invalid values were accepted by the CLI and only rejected by the API with opaque error messages. Now users get clear, actionable error messages for common mistakes like passing a URL instead of a hostname, using an IP address in the--hostnameflag, or providing malformed IP addresses.Updated dependencies [
f7de0fd,ecc7f79,1dda1c8]:v4.72.0Compare Source
Minor Changes
#12746
211d75dThanks @NuroDev! - Add support for inheritable bindings in type generationWhen using
wrangler typeswith multiple environments, bindings from inheritable config properties (likeassets) are now correctly inherited from the top-level config in all named environments. Previously, if you definedassets.bindingat the top level with named environments, the binding would be marked as optional in the generatedEnvtype because the type generation didn't account for inheritance.Example:
{ "assets": { "binding": "ASSETS", "directory": "./public" }, "env": { "staging": {}, "production": {} } }Before this change,
ASSETSwould be typed asASSETS?: Fetcher(optional). Now,ASSETSis correctly typed asASSETS: Fetcher(required). This fix currently applies to theassetsbinding, with an extensible mechanism to support additional inheritable bindings in the future.#12826
de65c58Thanks @gabivlj! - Enable container egress interception in local dev without theexperimentalcompatibility flagContainer local development now always prepares the egress interceptor sidecar image needed for
interceptOutboundHttp(). This makes container-to-Worker interception available by default in Wrangler, Miniflare, and the Cloudflare Vite plugin.Patch Changes
#12790
5451a7fThanks @petebacondarwin! - Bump node-forge to ^1.3.2 to address security vulnerabilitiesnode-forge had ASN.1 unbounded recursion, OID integer truncation, and ASN.1 validator desynchronization vulnerabilities. This is a bundled dependency used for local HTTPS certificate handling.
#12795
82cc2a8Thanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#12811
3c67c2aThanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#12827
d645594Thanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#12808
6ed249bThanks @MaxwellCalkin! - Fixwrangler d1 execute --jsonreturning"null"(string) instead ofnull(JSON null) for SQL NULL valuesWhen using
wrangler d1 execute --jsonwith local execution, SQL NULL values were incorrectly serialized as the string"null"instead of JSONnull. This produced invalid JSON output that violated RFC 4627. The fix removes the explicit null-to-string conversion so NULL values are preserved as proper JSON null in the output.#12824
9f93b54Thanks @jamesopstad! - Strip query strings from module names before writing to diskWhen bundling modules with query string suffixes (e.g.
.wasm?module), the?character was included in the output filename. Since?is not a valid filename character on Windows, this caused an ENOENT error duringwrangler dev. This was particularly visible when using Prisma Client with the D1 adapter, which imports.wasm?modulefiles.The fix strips query strings from module names before writing them to disk, while preserving correct module resolution.
#12771
b8c33f5Thanks @penalosa! - Make remote devexchange_urloptionalThe edge-preview API's
exchange_urlis now treated as optional. When unavailable or when the exchange fails, the initial token from the API response is used directly. Theprewarmstep andinspector_websockethave been removed from the remote dev flow in favour oftail_urlfor live logs.Updated dependencies [
5451a7f,82cc2a8,3c67c2a,d645594,de65c58,cb14820,a7c87d1,e4d9510]:v4.71.0Compare Source
Minor Changes
#11656
ec2459eThanks @prydt! - feat(hyperdrive): add MySQL SSL mode and Custom CA supportHyperdrive now supports MySQL-specific SSL modes (
REQUIRED,VERIFY_CA,VERIFY_IDENTITY) alongside the existing PostgreSQL modes. The--sslmodeflag now validates the provided value based on the database scheme (PostgreSQL or MySQL) and enforces appropriate CA certificate requirements for each.Usage:
Patch Changes
5cc8fcf]:v4.70.0Compare Source
Minor Changes
#11332
6a8aa5fThanks @nikitassharma! - Users are now able to configure DockerHub credentials and have containers reference images stored there.DockerHub can be configured as follows:
Containers can then specify an image from DockerHub in their
wrangler.jsoncas follows:#12649
35b2c56Thanks @gabivlj! - Add experimental support for containers to workers communication with interceptOutboundHttpThis feature is experimental and requires adding the "experimental" compatibility flag to your Wrangler configuration.
#12701
23a365aThanks @jamesopstad! - Add local dev validation for the experimentalsecretsconfiguration propertyWhen the new
secretsproperty is defined,wrangler devandvite devnow validate secrets declared insecrets.required. When required secrets are missing from.dev.varsor.env/process.env, a warning is logged listing the missing secret names.When
secretsis defined, only the keys listed insecrets.requiredare loaded. Additional keys in.dev.varsor.envare excluded. If you are not using.dev.vars, keys listed insecrets.requiredare loaded fromprocess.envas well as.env. TheCLOUDFLARE_INCLUDE_PROCESS_ENVenvironment variable is therefore not needed when using this feature.When
secretsis not defined, the existing behavior is unchanged.#12695
0769056Thanks @jamesopstad! - Add type generation for the experimentalsecretsconfiguration propertyWhen the new
secretsproperty is defined,wrangler typesnow generates typed bindings from the names listed insecrets.required.When
secretsis defined at any config level, type generation uses it exclusively and no longer infers secret names from.dev.varsor.envfiles. This enables running type generation in environments where these files are not present.Per-environment secrets are supported. Each named environment produces its own interface, and the aggregated
Envmarks secrets that only appear in some environments as optional.When
secretsis not defined, the existing behavior is unchanged.#12693
150ef7bThanks @martinezjandrew! - Addwrangler containers registries credentialscommand for generating temporary push/pull credentialsThis command generates short-lived credentials for authenticating with the Cloudflare managed registry (
registry.cloudflare.com). Useful for CI/CD pipelines or local Docker authentication.# Generate push credentials (for uploading images) wrangler conConfiguration
📅 Schedule: Branch creation - Between 12:00 AM and 03:59 AM ( * 0-3 * * * ) (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR was generated by Mend Renovate. View the repository job log.