chore(deps): update dependency wrangler to v4#555
Open
renovate[bot] wants to merge 1 commit intotrunkfrom
Open
chore(deps): update dependency wrangler to v4#555renovate[bot] wants to merge 1 commit intotrunkfrom
renovate[bot] wants to merge 1 commit intotrunkfrom
Conversation
size-limit report 📦
|
c81b62f to
61d49a9
Compare
c370a91 to
6d156e7
Compare
ebeecb1 to
69188a7
Compare
b2a5082 to
5afdbd1
Compare
dedb561 to
622eab4
Compare
f5d2e28 to
1347ae5
Compare
4004eb2 to
21d7980
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
3.114.17→4.86.0Release Notes
cloudflare/workers-sdk (wrangler)
v4.86.0Compare Source
Minor Changes
#13605
ea943ffThanks @danielgek! - Add namespace support towrangler ai-searchcommandsAll
wrangler ai-searchinstance commands (create,list,get,update,delete,stats,search) now accept a--namespace(or-n) flag to target a specific AI Search namespace. When the flag is omitted, commands default to thedefaultnamespace that Cloudflare automatically provisions for every account.wrangler ai-search listnow displays anamespacecolumn, andwrangler ai-search createoffers an interactive picker for existing namespaces (with an option to create a new one) when--namespaceis not supplied in an interactive session.A new
wrangler ai-search namespacesubcommand group is also introduced, withlist,create,get,update, anddeletesubcommands for managing namespaces directly.wrangler ai-search list --namespace blog wrangler ai-search create my-instance --namespace blog --type r2 --source my-bucket wrangler ai-search namespace create blog --description "Blog content"#13637
9eb9e69Thanks @edmundhung! - Add--tunnelflag towrangler devfor sharing your local dev server via Cloudflare Quick TunnelsYou can now expose your local dev server publicly by passing
--tunnel:This starts a Cloudflare Quick Tunnel that gives you a random
*.trycloudflare.comURL to share. The tunnel stops automatically when the dev session ends. Quick tunnels don't require a Cloudflare account or any configuration.A warning is shown when Server-Sent Events (SSE) responses are detected through the tunnel, since quick tunnels don't support SSE.
#13661
0a5db08Thanks @aspizu! -wrangler tailwill now log stack traces. These stack traces already include resolved frames if you have chosen to upload sourcemaps.#13617
118027dThanks @roerohan! - Force Flagship bindings to always use remote mode in local devFlagship bindings now always access the remote Flagship service during local development, matching the behavior of AI bindings. Previously, Flagship supported both local and remote modes, but the local stub only returned default values, providing no real functionality and creating a dual source of truth for flag evaluations.
The
remoteconfig field is retained for backward compatibility but only controls whether a warning is displayed. Settingremote: truesuppresses the warning that Flagship bindings always access remote resources and may incur usage charges in local dev.#13254
e867ac2Thanks @tgarg-cf! - Addwrangler queues consumer listsubcommands for listing queue consumersThree new commands are available for listing consumers on a queue:
wrangler queues consumer list <queue-name>— lists all consumers (both worker and HTTP pull), grouped by typewrangler queues consumer worker list <queue-name>— lists only worker consumerswrangler queues consumer http list <queue-name>— lists only HTTP pull consumersPatch Changes
#13696
62e9f2aThanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13576
2dc6175Thanks @MattieTK! - Restore telemetry tracking for common CLI flags that were unintentionally dropped during sanitisationWhen argument sanitisation was introduced, only explicitly allow-listed args had their values included in telemetry. The allow list was very conservative, which meant common boolean flags like
--remote,--json,--dry-run,--force, and many others were no longer being captured insanitizedArgsdespite previously being tracked. Boolean flags are inherently safe (values are onlytrue/false), so these have now been added back to the global allow list. A small number of fixed-choice args (--local-protocol,--upstream-protocol,--containers-rollout) have also been added with their known value sets.#13649
ae8eae3Thanks @petebacondarwin! - Fix service binding and tail consumerpropsbeing dropped between workers in different local dev instancesWhen a service binding or tail consumer configured with
propstargeted a worker running in a separatewrangler devinstance (via the dev registry), thepropswere silently dropped and the remote entrypoint saw an emptyctx.props. Props are now forwarded correctly across the dev registry boundary, matching the behavior users get when all workers run in a single instance.The target worker's
SessionEntryentrypoint now correctly receives{ tenant: "acme" }onctx.propsregardless of which local dev instance it runs in.#13662
f2e2241Thanks @petebacondarwin! - Fix three resource leaks inunstable_startWorkerteardown that could prevent Node from exiting cleanly afterworker.dispose().bundleWorkeris now disposed when the initial build fails. Previously a failing initial build (e.g. an unresolvable entrypoint, or a worker started with an invalid config viasetConfig) left the esbuild child process running for the lifetime of the parent Node process.runBuild's cleanup function now awaits the in-flight build before running the bundler's stop handler. Previously teardown could return beforeesbuild.BuildContext.dispose()had been called, so the esbuild watcher kept the event loop alive after dispose had resolved.BundlerController.teardown()now runs the esbuild cleanup before removing the bundler's temporary directory, and aborts the in-flight bundle build so it cannot emit stalebundleStart/bundleCompleteevents after teardown. Previously the tmpdir was removed first, which in race with an in-flight rebuild produced confusing "Could not resolve.wrangler/tmp/bundle-XXXX/middleware-loader.entry.ts" errors during dispose.#13674
4f6ed93Thanks @petebacondarwin! - Stop emitting a misleading[wrangler:error] Docker build exited with code: <n>log when the user aborts an in-progress container image build (for example by pressing therrebuild hotkey while the previous build is still running).The abort-detection branch in the local and multi-worker runtime controllers was matching the wrong error message — it checked for
"Build exited with code: 1", but the error thrown by the docker build helper is actually"Docker build exited with code: <n>", and the exit code after a process-group SIGINT/SIGKILL is typically130/137/143, not1. As a result, every legitimate user-initiated rebuild abort produced a spurious error event and[wrangler:error]log line. The check now matches the real error message prefix and ignores any non-zero exit code from the aborted build, so a user-requested rebuild while another build is in progress is silent.#13667
ed2f4ecThanks @emily-shen! - fix: Preserve auth in remote proxy session data to avoid unnecessary session restartsmaybeStartOrUpdateRemoteProxySessionwas not includingauthin its return value, so on subsequent callspreExistingRemoteProxySessionData.authwas alwaysundefined. This caused the auth comparison to always detect a change, disposing and recreating the remote proxy session on every reload even when auth had not changed.#13695
92bb8a5Thanks @alexanderniebuhr! -wrangler types --checkno longer throws when the types file was generated with an explicit boolean flag. Previously, yargs would parse such flags as actual booleans rather than strings, causing an internal parse error.#13662
f2e2241Thanks @petebacondarwin! - Fix thewrangler tailcommand leaking a signal-exit listener after the tail has been cleanly closed.The tail command registered both a
tail.on("close", exit)listener and a process-levelonExit(exit)handler, but never removed the latter afterexit()had run. In long-lived CLI processes this is harmless — the handler eventually runs once on shutdown — but in unit tests that repeatedly invokewrangler tail, every invocation accumulates a handler that fires during test-runner shutdown. Those late invocations calldeleteTail()after the test's auth mocks have been torn down, producing spurious "Not logged in" unhandled rejections which fail the Linux CI runs.The handler is now removed as soon as
exit()runs, andexit()is guarded against re-entry so it is idempotent if both the WebSocketcloseevent and a real signal fire for the same session.#13187
fcc491aThanks @dario-piotrowicz! - Recognize Hydrogen as a known unsupported framework in autoconfigPreviously, Hydrogen projects were incorrectly identified as React Router (since Hydrogen uses React Router under the hood), leading to a confusing autoconfig experience. Hydrogen is now recognized as a distinct unsupported framework, so users see a clear message that Hydrogen is not yet supported instead of being guided through React Router configuration.
#13628
e6c437aThanks @emily-shen! - fix: prioritiseCLOUDFLARE_ACCOUNT_IDover a cached account id for all Pages commandsPreviously, some Pages commands (
pages deploy,pages deployment list/delete/tail,pages download config,pages secret) used a cached account id over theCLOUDFLARE_ACCOUNT_IDenvironment variable. Thepages projectcommands already correctly prioritisedCLOUDFLARE_ACCOUNT_ID.Updated dependencies [
21b87b2,62e9f2a,033d6ec,ae8eae3,ef24ff2,6d27479,118027d]:v4.85.0Compare Source
Minor Changes
#13222
5680287Thanks @maxwellpeterson! - Add enabled and previews_enabled support for custom domain routesCustom domain routes can now include optional
enabledandpreviews_enabledboolean fields to control whether a custom domain serves production and/or preview traffic. When omitted, the API defaults apply (production enabled, previews disabled).Patch Changes
#13622
5a2968aThanks @petebacondarwin! - Fix inheritedai_search_namespacesbinding display inwrangler deployWhen an
ai_search_namespacesbinding inherits from the existing deployment, the bindings table now correctly shows(inherited)instead of a rawSymbol(inherit_binding)string.#13633
3494842Thanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13645
7d728fbThanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13657
df9319dThanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13574
d5e3c57Thanks @dario-piotrowicz! - Detect Cloudflare WAF block pages and include Ray ID in API error messagesWhen the Cloudflare WAF blocks an API request, the response is an HTML page rather than JSON. Previously, this caused a confusing "Received a malformed response from the API" error with a truncated HTML snippet. Wrangler now detects WAF block pages and displays a clear error message explaining that the request was blocked by the firewall, along with the Cloudflare Ray ID (when available) for use in support tickets.
For other non-JSON responses that aren't WAF blocks, the "malformed response" error also now includes the Ray ID to help reference failing requests in support tickets.
#13560
7567ef7Thanks @vaishnav-mk! - Preserve NonRetryableError message and name when theworkflows_preserve_non_retryable_error_messagecompatibility flag is enabled, instead of replacing it with a generic error message.#11784
2831b54Thanks @JPeer264! - fix(wrangler): Bind the console methods directly instead of using a global proxy#13644
377715dThanks @MattieTK! - Update@clack/coreand@clack/promptsto v1.2.0Bumps the bundled
@clack/coredependency used internally by@cloudflare/clifrom0.3.xto1.2.0, and the@clack/promptsdependency increate-cloudflarefrom0.6.xto1.2.0. Clack v1 includes a number of API changes, but no user-facing prompt behaviour changes are expected.Updated dependencies [
3494842,7d728fb,df9319d,3ceeec3,7567ef7,0a95061,7fc50c1,377715d]:v4.84.1Compare Source
Patch Changes
#13615
8fec8b8Thanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13572
a610749Thanks @dario-piotrowicz! - Fixwrangler types --checkignoring--env-interfaceand secondary--configentriesPreviously,
wrangler types --checkran its staleness check before resolving the--env-interfaceflag and before collecting secondary worker entry points from additional--configarguments. This meant it could incorrectly report types as up to date when they were actually stale due to a different env interface name or changes in secondary worker configs. The check now runs after all options are fully resolved, so it correctly detects mismatches.Updated dependencies [
8fec8b8,2f3d7b9]:v4.84.0Compare Source
Minor Changes
#13326
4a9ba90Thanks @mattzcarey! - Add Artifacts binding support to wranglerYou can now configure Artifacts bindings in your wrangler configuration:
Type generation produces the correct
Artifactstype reference from the workerd type definitions:#13567
d8c895aThanks @gpanders! - Rename the documented containers SSH config option tosshWrangler now accepts and documents
containers.sshin config files while continuing to acceptcontainers.wrangler_sshas an undocumented backwards-compatible alias. Wrangler still sends and readswrangler_sshwhen talking to the containers API.#13571
7dc0433Thanks @must108! - Add regional and jurisdictional placement constraints for Containers. Users can now setconstraints.regionsandconstraints.jurisdictionin wrangler config to control where containers run.#12600
50bf819Thanks @penalosa! - Useworkerd's debug port to power cross-process service bindings, Durable Objects, and tail workers via the dev registry. This enables Durable Object RPC via the dev registry, and is an overall stability improvement.Patch Changes
#13160
05f4443Thanks @JoaquinGimenez1! - Log a helpful error message when AI binding requests fail with a 403 authentication errorPreviously, when the AI proxy token expired during a long session, users received an unhelpful 403 error. Now, wrangler detects error code 1031 and suggests running
wrangler loginto refresh the token.#13557
8ca78bbThanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13579
b6e1351Thanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13604
d8314c6Thanks @petebacondarwin! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13515
b35617bThanks @petebacondarwin! - fix: ensure esbuild context is disposed during teardownThe esbuild bundler cleanup function could race with the initial build. If
BundlerController.teardown()ran before the initialbuild()completed, thestopWatchingclosure variable would still beundefined, so the esbuild context was never disposed. This left the esbuild child process running, keeping the Node.js event loop alive and causing processes to hang instead of exiting cleanly.The cleanup function now awaits the build promise before calling
stopWatching, ensuring the esbuild context is always properly disposed.#13470
4fda685Thanks @penalosa! - fix: prevent remote binding sessions from expiring during long-running dev sessionsPreview tokens for remote bindings expire after one hour. Previously, the first request after expiry would fail before a refresh was triggered. This change proactively refreshes the token at 50 minutes so no request ever sees an expired session.
The reactive recovery path is also improved:
error code: 1031responses (returned by bindings such as Workers AI when their session times out) now correctly trigger a refresh, where previously onlyInvalid Workers Preview configurationHTML responses did.Auth credentials are now resolved lazily when a remote proxy session starts rather than at bundle-complete time. This means that if your OAuth access token has been refreshed since
wrangler devstarted, the new token is used rather than the one captured at startup.#12456
59eec63Thanks @venkatnikhilm! - Improve validation and error messaging for R2 CORS configuration files to catch AWS S3-style formatting mistake.#13444
cc1413aThanks @naile! - fix: Passforcequery parameter to API inpages deployment delete#11918
d0a9d1cThanks @ksawaneh! - Allowwrangler r2 bucket listto run without a valid Wrangler configThis is an account-level command and does not require parsing
wrangler.toml/wrangler.jsonc. Previously, an invalid local config could prevent listing buckets, making it harder to fix the config.#13516
4eb1da9Thanks @jonnyparris! - Rename "Browser Rendering" to "Browser Run" in all user-facing strings, error messages, and CLI output.#13575
6d887dbThanks @lambrospetrou! - Add D1 export prompt message for unavailability, use--skip-confirmationto not show the prompt.#13473
5716d69Thanks @MattieTK! - Update am-i-vibing to v0.1.1 for improved agentic environment detectionUpdated dependencies [
4a9ba90,b35617b,8ca78bb,b6e1351,d8314c6,7f50300,4fda685,be5e6a0,e456952,50bf819,4eb1da9,8ca78bb,266c418]:v4.83.0Compare Source
Minor Changes
#13391
60565ddThanks @mikenomitch! - Markwrangler containerscommands as stableThis changes the status of the Containers CLI from open beta to stable. Wrangler no longer shows
[open beta]labels or beta warning text forwrangler containerscommands, so the help output matches the feature's current availability.#13311
6cbcdebThanks @ryanking13! - JS files imported by the Python Workers runtime SDK are now handled as ESM modules.This is not a user-facing change, but Python Workers users should update their wrangler version to make sure to get Python workers SDK working properly.
Patch Changes
#13450
6f63eaaThanks @petebacondarwin! - Fix POST/PUT requests with non-2xx responses throwing "fetch failed"Previously, sending a POST or PUT request that received a non-2xx response (e.g. 401, 400, 403) would throw a
TypeError: fetch failederror. This was caused by an undici bug whereisTraversableNavigable()incorrectly returnedtrue, causing the 401 credential-retry block to execute in Node.js and fail on stream-backed request bodies. This has been fixed upstream in undici v7.24.8, so we've bumped our dependency and removed the previous pnpm patch workaround.#13447
aef9825Thanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13475
eaaa728Thanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13386
5e5bbc1Thanks @mksglu! - Make startup network requests non-blocking on slow connectionsWrangler makes network requests during startup (npm update check,
request.cfdata fetch) that previously blocked the CLI indefinitely on slow or degraded connections (airplane wifi, trains), causing 10+ second delays.update-checklibrary's auth-retry path.request.cffetch: The fetch toworkers.cloudflare.com/cf.jsonnow usesAbortSignal.timeout(3000), falling back to cached/default data on timeout.#13469
07a918cThanks @1000hz! -wrangler previewno longer warns on inheritable binding types being missing frompreviewsconfig.#13463
90aee27Thanks @roerohan! - Remove unnecessaryflagship:readOAuth scopeThe
flagship:readscope is not needed sinceflagship:writealready implies read access. This reduces the OAuth permissions requested during login to only what is required.Updated dependencies [
854d66c,6f63eaa,aef9825,eaaa728,58292f6,5e5bbc1,d5ff5a4,89c7829]:v4.82.2Compare Source
Patch Changes
9b2b6baThanks @jamesopstad! - Add Flagship OAuth scopes towrangler loginv4.82.1Compare Source
Patch Changes
#13453
6b11b07Thanks @petebacondarwin! - Disable flagship OAuth scopes that are not yet valid in the Cloudflare backendThe
flagship:readandflagship:writeOAuth scopes have been temporarily commented out from the default scopes requested during login, as they are not yet recognized by the Cloudflare backend.#13438
dd4e888Thanks @dependabot! - fix: handle Vike config files that use a variable-referenced default exportNewer versions of
create-vike(0.0.616+) generatepages/+config.tsfiles usingconst config: Config = { ... }; export default config;instead of the previousexport default { ... } satisfies Config;. The Wrangler autoconfig AST transformation now resolvesIdentifierexports to their variable declarations, supporting both old and new Vike config file formats.v4.82.0Compare Source
Minor Changes
#13353
5338bb6Thanks @mattzcarey! - Addartifacts:writeto Wrangler's default OAuth scopes, enablingwrangler loginto request access to Cloudflare Artifacts (registries and artifacts).#13139
79fd529Thanks @roerohan! - feat: add Flagship feature flag binding supportAdds end-to-end support for the Flagship feature flag binding, which allows Workers to evaluate feature flags from Cloudflare's Flagship service. Configure it in
wrangler.jsonwith aflagshiparray containingbindingandapp_identries. In local dev, the binding returns default values for all flag evaluations; use"remote": truein the binding to evaluate flags against the live Flagship service.#12983
28bc2beThanks @1000hz! - Added thewrangler previewcommand family for creating Preview deployments (currently in private beta).#13197
4fd138bThanks @shahsimpson! - Addpreviewoutput-file entries forwrangler previewdeploymentswrangler previewnow writes apreviewentry to the Wrangler output file whenWRANGLER_OUTPUT_FILE_PATHorWRANGLER_OUTPUT_FILE_DIRECTORYis configured. The entry includes the Worker name, preview metadata (preview_id,preview_name,preview_slug,preview_urls) and deployment metadata (deployment_id,deployment_urls).This makes preview command runs machine-readable in the same output stream as other Wrangler commands, which helps CI integrations consume preview URLs and IDs directly.
#13159
bafb96bThanks @ruifigueira! - Addwrangler browsercommands for managing Browser Rendering sessionsNew commands for Browser Rendering DevTools:
wrangler browser create [--lab] [--keepAlive <seconds>] [--open]- Create a new sessionwrangler browser close <sessionId>- Close a sessionwrangler browser list- List active sessionswrangler browser view [sessionId] [--target <selector>] [--open]- View a live browser sessionThe
viewcommand auto-selects when only one session exists, or prompts for selection when multiple are available.The
--openflag controls whether to open DevTools in browser (default: true in interactive mode, false in CI/scripts). Use--no-opento just print the DevTools URL.All commands support
--jsonfor programmatic output. Also addsbrowser:writeOAuth scope towrangler login.#13392
2589395Thanks @emily-shen! - Add telemetry to local REST APIThe local REST API (used by the local explorer) now collects anonymous usage telemetry. This respects any existing telemetry preferences, which can be disabled by running the command
wrangler telemetry disable.This only applies when the dev session is started via Wrangler, and not via the Vite plugin or standalone Miniflare.
No actual data values, keys, query contents, or resource IDs are collected.
Event schema:
{ "event": "localapi.<route>.<method>", // e.g. localapi.kv.keys.get "deviceId": "<uuid>", "timestamp": 1234567890, "properties": { "userAgent": "Mozilla/5.0 ...", // Only for localapi.local.workers.get: "workerCount": 2, "kvCount": 3, "d1Count": 1, "r2Count": 0, "doCount": 1, "workflowsCount": 0 } }Note: the Local Explorer and corresponding local REST API is still an experimental feature.
#13137
1313275Thanks @emily-shen! - explorer: expose the local explorer hotkeyList the local explorer's hotkey
[e]in wrangler dev output.Patch Changes
#13393
c50cb5bThanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13424
525a46bThanks @paulelliotco! - Keep proxy notices off stdout for JSON Wrangler commandsWrangler now writes the startup notice for
HTTP_PROXYandHTTPS_PROXYto stderr instead of stdout. This keeps commands likewrangler auth token --jsonmachine-readable when a proxy is configured.Updated dependencies [
79fd529,c50cb5b,2589395,5eff8c1]:v4.81.1Compare Source
Patch Changes
#13337
c510494Thanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13362
8b71ecaThanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13329
7ca6f6eThanks @G4brym! - fix: Treat AI Search bindings as always-remote in local devAI Search namespace (
ai_search_namespaces) and instance (ai_search) bindings are always-remote (they have no local simulation), butpickRemoteBindings()did not include them in its always-remote type list. This caused the remote proxy session to exclude these bindings whenremote: truewas not explicitly set in the config, resulting in broken AI Search bindings duringwrangler dev.Additionally,
removeRemoteConfigFieldFromBindings()in the deploy config-diff logic was not stripping theremotefield from AI Search bindings, which could cause false config diffs during deployment.Updated dependencies [
42c7ef0,c510494,8b71eca,a42e0e8]:v4.81.0Compare Source
Minor Changes
#12932
96ee5d4Thanks @thomasgauvin! - feat: addwrangler email routingandwrangler email sendingcommandsEmail Routing commands:
wrangler email routing list- list zones with email routing statuswrangler email routing settings <domain>- get email routing settings for a zonewrangler email routing enable/disable <domain>- enable or disable email routingwrangler email routing dns get/unlock <domain>- manage DNS recordswrangler email routing rules list/get/create/update/delete <domain>- manage routing rules (usecatch-allas the rule ID for the catch-all rule)wrangler email routing addresses list/get/create/delete- manage destination addressesEmail Sending commands:
wrangler email sending list- list zones with email sendingwrangler email sending settings <domain>- get email sending settings for a zonewrangler email sending enable <domain>- enable email sending for a zone or subdomainwrangler email sending disable <domain>- disable email sending for a zone or subdomainwrangler email sending dns get <domain>- get DNS records for a sending domainwrangler email sending send- send an email using the builder APIwrangler email sending send-raw- send a raw MIME email messageAlso adds
email_routing:writeandemail_sending:writeOAuth scopes towrangler login.Patch Changes
#13241
7d318e1Thanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13305
fa6d84fThanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13193
78cbe37Thanks @dario-piotrowicz! - During autoconfig filter out Hono when there are 2 detected frameworksDuring the auto-configuration process Hono is now treated as an auxiliary framework (like Vite) and automatically filtered out when two frameworks are detected (before Hono was being filtered out only when the other framework was Waku).
#13205
6fa5dfdThanks @petebacondarwin! - fix: useformatConfigSnippetfor compatibility_date warning inwrangler devThe compatibility_date warning shown when no date is configured in
wrangler devwas hardcoded in TOML format. This now usesformatConfigSnippetto render the snippet in the correct format (TOML or JSON) based on the user's config file type.Updated dependencies [
a3e3b57,7d318e1,fa6d84f,7d318e1,7a60d4b]:v4.80.0Compare Source
Minor Changes
#13151
9c4035bThanks @G4brym! - Add type generation for AI Search bindingsRunning
wrangler typesnow generatesAiSearchNamespaceandAiSearchInstancetypes forai_search_namespacesandai_searchconfig bindings respectively. Both simple and per-environment modes are supported.Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.