Releases: parse-community/parse-server
Releases Β· parse-community/parse-server
6.0.0-alpha.7
6.0.0-alpha.7 (2022-11-11)
Features
BREAKING CHANGES
- This release upgrades to Redis 4; if you are using the Redis cache adapter with Parse Server then this is a breaking change as the Redis client options have changed; see the Redis migration guide for more details (#8293) (7d622f0)
6.0.0-alpha.6
6.0.0-alpha.6 (2022-11-10)
Features
BREAKING CHANGES
- This release removes support for MongoDB 4.0; the new minimum supported MongoDB version is 4.2. which also removes support for the deprecated MongoDB MMAPv1 storage engine (37245f6)
6.0.0-alpha.5
6.0.0-alpha.5 (2022-11-10)
Bug Fixes
BREAKING CHANGES
- Throwing an error in Cloud Code Triggers
afterLogin
,afterLogout
returns a rejected promise; in previous releases it crashed the server if you did not handle the error on the Node.js process level; consider adapting your code if your app currently handles these errors on the Node.js process level withprocess.on('unhandledRejection', ...)
(130d290)
6.0.0-alpha.4
6.0.0-alpha.4 (2022-11-10)
Features
BREAKING CHANGES
- Config option
directAccess
defaults to true; set this tofalse
in environments where multiple Parse Server instances run behind a load balancer and Parse requests within the current Node.js environment should be routed via the load balancer and distributed as HTTP requests among all instances via theserverURL
. (f535ee6)
6.0.0-alpha.3
6.0.0-alpha.3 (2022-11-10)
Features
- Remove deprecation
DEPPS4
: Remove convenience method for http requestParse.Cloud.httpRequest
(#8287) (2d79c08)
BREAKING CHANGES
- The convenience method for HTTP requests
Parse.Cloud.httpRequest
is removed; use your preferred 3rd party library for making HTTP requests (2d79c08)
6.0.0-alpha.2
6.0.0-alpha.2 (2022-11-10)
Features
6.0.0-alpha.1
6.0.0-alpha.1 (2022-11-10)
Bug Fixes
BREAKING CHANGES
- This release removes Node 12 and Node 17 support (2546cc8)
5.3.3
5.3.3 (2022-11-09)
Bug Fixes
- Prototype pollution via Cloud Code Webhooks; fixes security vulnerability GHSA-93vw-8fm5-p2jf (#8305) (60c5a73)
5.3.2
5.3.2 (2022-11-09)
Bug Fixes
- Parse Server option
requestKeywordDenylist
can be bypassed via Cloud Code Webhooks or Triggers; fixes security vulnerability GHSA-xprv-wvh7-qqqx (#8302) (6728da1)
4.10.20
4.10.20 (2022-11-09)
Bug Fixes
- Prototype pollution via Cloud Code Webhooks; fixes security vulnerability GHSA-93vw-8fm5-p2jf (#8306) (6c63f04)