Releases: parse-community/parse-server
Releases · parse-community/parse-server
7.1.0-beta.1
7.1.0-beta.1 (2024-06-30)
Bug Fixes
Parse.Cloud.startJob
andParse.Push.send
not returning status ID when setting Parse Server optiondirectAccess: true
(#8766) (5b0efb2)Required
option not handled correctly for special fields (File, GeoPoint, Polygon) on GraphQL API mutations (#8915) (907ad42)- Facebook Limited Login not working due to incorrect domain in JWT validation (#9122) (9d0bd2b)
- Live query throws error when constraint
notEqualTo
is set tonull
(#8835) (11d3e48) - Parse Server option
extendSessionOnUse
not working for session lengths < 24 hours (#9113) (0a054e6) - Rate limiting can fail when using Parse Server option
rateLimit.redisUrl
with clusters (#8632) (c277739) - SQL injection when using Parse Server with PostgreSQL; fixes security vulnerability GHSA-c2hr-cqg6-8j6r (#9167) (2edf1e4)
Features
- Add
silent
log level for Cloud Code (#8803) (5f81efb) - Add server security check status
security.enableCheck
to Features Router (#8679) (b07ec15) - Prevent Parse Server start in case of unknown option in server configuration (#8987) (8758e6a)
- Upgrade to @parse/push-adapter 6.0.0 (#9066) (18bdbf8)
- Upgrade to @parse/push-adapter 6.2.0 (#9127) (ca20496)
- Upgrade to Parse JS SDK 5.2.0 (#9128) (665b8d5)
7.1.0-alpha.12
7.1.0-alpha.12 (2024-06-30)
Bug Fixes
- SQL injection when using Parse Server with PostgreSQL; fixes security vulnerability GHSA-c2hr-cqg6-8j6r (#9167) (2edf1e4)
6.5.7
6.5.7 (2024-06-30)
Bug Fixes
- SQL injection when using Parse Server with PostgreSQL; fixes security vulnerability GHSA-c2hr-cqg6-8j6r (#9168) (f332d54)