Releases: blitz-js/blitz
v2.1.3
v2.1.2
🐞 Patches
blitz
@blitzjs/auth
- blitz@2.1.2
@blitzjs/next
- blitz@2.1.2
- @blitzjs/rpc@2.1.2
@blitzjs/rpc
- blitz@2.1.2
@blitzjs/codemod
@blitzjs/generator
v2.1.1
v2.1.0
Releases
Minor Changes
-
3b10b13: feat: add blitz auth support for the Web
Request
API standardUsage using the new
withBlitzAuth
adapter in the App Router:import {withBlitzAuth} from "app/blitz-server" export const {POST} = withBlitzAuth({ POST: async (_request, _params, ctx) => { const session = ctx.session await session.$revoke() return new Response( JSON.stringify({ userId: session.userId, }), {status: 200}, ) }, })
feat: New Blitz RPC handler meant to with the next.js app router
route.ts
filesUsage using the new
rpcAppHandler
function// app/api/rpc/[[...blitz]]/route.ts import {rpcAppHandler} from "@blitzjs/rpc" import {withBlitzAuth} from "app/blitz-server" // Usage with blitz auth export const {GET, POST, HEAD} = withBlitzAuth(rpcAppHandler()) // Standalone usage export const {GET, POST, HEAD} = rpcAppHandler()
chore: Update the app directory starter
Patch Changes
- d53da39: Improved parsing of default export names to handle higher-order components (HOCs) in the
parseDefaultExportName
function.
v2.0.10
🔒 Security
- 318e974: support latest v4 next-auth release that solves GHSA-7r7x-4c4q-c4qf and GHSA-v64w-49xw-qq89
v2.0.9
v2.0.8
v2.0.7
🐞 Patches
-
ee7bf87: Turbopack support for Blitz
This PR includes the changes required to make the Blitz loaders work with Turbopack.
⚠️ Upgrade to latest next canary to use this feature:>14.2.0-canary.25
.
ℹ️ While using turbopack currently fewinvalid
config warnings will be shown, which can be ignored and should be fixed upstream in next.js. For more context: #4314Usage:
pnpm blitz dev --turbo
-
178c152: fix: patch next.js to hide intentional throws of
DYNAMIC_SERVER_USAGE
v2.0.6
v2.0.5
🐞 Patches
- 6f54841: fix: getBlitzContext() can only be used in React Server Components in Nextjs 13 or higher
- 8a41753: fix: remove restriction to use
secure
cookies in localhost / during development following spec in developer.mozilla.org/en-US/docs/Web/HTTP/Cookies#restrict_access_to_cookies