-
-
Notifications
You must be signed in to change notification settings - Fork 599
feat: Remove Parse.serverAuthType
, Parse.serverAuthToken
infavor of CoreManager REQUEST_HEADERS
config
#2639
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Remove Parse.serverAuthType
, Parse.serverAuthToken
infavor of CoreManager REQUEST_HEADERS
config
#2639
Conversation
…nfavor of `REQUEST_HEADERS`
🚀 Thanks for opening this pull request! |
📝 Walkthrough""" WalkthroughThe changes remove support for the Changes
Sequence Diagram(s)sequenceDiagram
participant Client
participant RESTController
participant CoreManager
Client->>RESTController: Make AJAX request
RESTController->>CoreManager: (No longer queries SERVER_AUTH_TYPE/TOKEN)
RESTController->>RESTController: Add headers (excluding Authorization)
RESTController->>Client: Return response
Assessment against linked issues
Assessment against linked issues: Out-of-scope changesNo out-of-scope changes were found. 📜 Recent review detailsConfiguration used: CodeRabbit UI 📒 Files selected for processing (1)
💤 Files with no reviewable changes (1)
⏰ Context from checks skipped due to timeout of 90000ms (3)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
SupportNeed help? Create a ticket on our support page for assistance with any issues or questions. Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
CodeRabbit Configuration File (
|
🎉 Snyk checks have passed. No issues have been found so far.✅ security/snyk check is complete. No issues have been found. (View Details) |
SERVER_AUTH_TYPE
and SERVER_AUTH_TOKEN
…SERVER_AUTH_TYPE
and SERVER_AUTH_TOKEN
infavor of REQUEST_HEADERS
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## alpha #2639 +/- ##
=========================================
Coverage 100.00% 100.00%
=========================================
Files 63 63
Lines 6195 6185 -10
Branches 1461 1472 +11
=========================================
- Hits 6195 6185 -10 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
Could you suggest a change log entry that describes the breaking change? |
|
SERVER_AUTH_TYPE
and SERVER_AUTH_TOKEN
infavor of REQUEST_HEADERS
Parse.serverAuthType
and Parse.serverAuthToken
infavor of CoreManager REQUEST_HEADERS
config
It seems there are some words missing? What does that mean? |
@mtrezza I updated the wording #2639 (comment) |
Thanks, I'll add that to the release note. |
Parse.serverAuthType
and Parse.serverAuthToken
infavor of CoreManager REQUEST_HEADERS
configParse.serverAuthType
, Parse.serverAuthToken
infavor of CoreManager REQUEST_HEADERS
config
# [7.0.0-alpha.1](6.2.0-alpha.3...7.0.0-alpha.1) (2025-10-14) ### Bug Fixes * Prototype Pollution vulnerability in `SingleInstanceStateController`; fixes security vulnerability [GHSA-9g8m-v378-pcg3](GHSA-9g8m-v378-pcg3) ([#2745](#2745)) ([9e7c1ba](9e7c1ba)) * HTTP status code 3XX redirection for Parse Server URL not handled properly ([#2608](#2608)) ([58e7f58](58e7f58)) * Incorrect type in `ParseObject.fetch` parameter `options` ([#2726](#2726)) ([dc78419](dc78419)) * Prototype pollution in `Parse.Object` and internal APIs; fixes security vulnerability [GHSA-9f2h-7v79-mxw](GHSA-9f2h-7v79-mxw3) ([#2749](#2749)) ([0097398](0097398)) * Unhandled exception when calling `Parse.Cloud.run` with option value `null` ([#2622](#2622)) ([#2623](#2623)) ([2818ed9](2818ed9)) ### Features * Add `Parse.File` upload and download progress in browser and Node environments ([#2503](#2503)) ([d3ca465](d3ca465)) * Add option `Parse.nodeLogging` to fully log `Parse.Object` in Node.js environments ([#1594](#1594)) ([de9d057](de9d057)) * Remove `Parse.serverAuthType`, `Parse.serverAuthToken` infavor of CoreManager `REQUEST_HEADERS` config ([#2639](#2639)) ([ddc66a1](ddc66a1)) ### BREAKING CHANGES * The methods `Parse.serverAuthType()` and `Parse.serverAuthToken()` have been removed; use the CoreManager `REQUEST_HEADER` config to set authorization headers instead. ([ddc66a1](ddc66a1))
🎉 This change has been released in version 7.0.0-alpha.1 |
# [7.0.0](6.1.1...7.0.0) (2025-10-14) ### Bug Fixes * Prototype Pollution vulnerability in `SingleInstanceStateController`; fixes security vulnerability [GHSA-9g8m-v378-pcg3](GHSA-9g8m-v378-pcg3) ([#2745](#2745)) ([9e7c1ba](9e7c1ba)) * HTTP status code 3XX redirection for Parse Server URL not handled properly ([#2608](#2608)) ([58e7f58](58e7f58)) * Incorrect type in `ParseObject.fetch` parameter `options` ([#2726](#2726)) ([dc78419](dc78419)) * Missing error message when returning an internal server error ([#2543](#2543)) ([f91f3f1](f91f3f1)) * Prototype pollution in `Parse.Object` and internal APIs; fixes security vulnerability [GHSA-9f2h-7v79-mxw](GHSA-9f2h-7v79-mxw3) ([#2749](#2749)) ([0097398](0097398)) * Unhandled exception when calling `Parse.Cloud.run` with option value `null` ([#2622](#2622)) ([#2623](#2623)) ([2818ed9](2818ed9)) ### Features * Add `Parse.File` upload and download progress in browser and Node environments ([#2503](#2503)) ([d3ca465](d3ca465)) * Add `Uint8Array` support for `Parse.File` data ([#2548](#2548)) ([6f6bb66](6f6bb66)) * Add option `Parse.nodeLogging` to fully log `Parse.Object` in Node.js environments ([#1594](#1594)) ([de9d057](de9d057)) * Remove `Parse.serverAuthType`, `Parse.serverAuthToken` infavor of CoreManager `REQUEST_HEADERS` config ([#2639](#2639)) ([ddc66a1](ddc66a1)) ### Performance Improvements * Optimize bundle packaging with Vite ([#2553](#2553)) ([a4b19e5](a4b19e5)) ### BREAKING CHANGES * The methods `Parse.serverAuthType()` and `Parse.serverAuthToken()` have been removed; use the CoreManager `REQUEST_HEADER` config to set authorization headers instead. ([ddc66a1](ddc66a1))
🎉 This change has been released in version 7.0.0 |
Pull Request
Issue
This is a breaking change
Closes: #2551
Approach
No longer need for these global headers as
REQUEST_HEADERS
does the same thingTasks
Summary by CodeRabbit
Bug Fixes
Tests