-
Notifications
You must be signed in to change notification settings - Fork 99
fix(deps): update dependency astro to v5.14.3 [security] #3595
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
main
Choose a base branch
from
renovate-npm-astro-vulnerability
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
+295
−389
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
✅ Deploy Preview for brilliant-pasca-3e80ec ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
🚀 Performance Test ResultsTest Configuration:
Test Metrics:
📜 Logs
|
2600748
to
7a64610
Compare
7a64610
to
f59c82c
Compare
f59c82c
to
89d359b
Compare
89d359b
to
ed21e5e
Compare
ed21e5e
to
490f428
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
dependencies
Pull requests that update a dependency
pkg: documentation
Changes in the documentation package.
0 participants
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
5.11.0
->5.14.3
GitHub Vulnerability Alerts
CVE-2025-54793
Summary
There is an Open Redirection vulnerability in the trailing slash redirection logic when handling paths with double slashes. This allows an attacker to redirect users to arbitrary external domains by crafting URLs such as
https://mydomain.com//malicious-site.com/
. This increases the risk of phishing and other social engineering attacks.This affects Astro >=5.2.0 sites that use on-demand rendering (SSR) with the Node or Cloudflare adapter. It does not affect static sites, or sites deployed to Netlify or Vercel.
Background
Astro performs automatic redirection to the canonical URL, either adding or removing trailing slashes according to the value of the
trailingSlash
configuration option. It follows the following rules:trailingSlash
is set to"never"
,https://example.com/page/
will redirect tohttps://example.com/page
trailingSlash
is set to"always"
,https://example.com/page
will redirect tohttps://example.com/page/
It also collapses multiple trailing slashes, according to the following rules:
trailingSlash
is set to"always"
or"ignore"
(the default),https://example.com/page//
will redirect tohttps://example.com/page/
trailingSlash
is set to"never"
,https://example.com/page//
will redirect tohttps://example.com/page
It does this by returning a
301
redirect to the target path. The vulnerability occurs because it uses a relative path for the redirect. To redirect fromhttps://example.com/page
tohttps://example.com/page/
, it sending a 301 response with the headerLocation: /page/
. The browser resolves this URL relative to the original page URL and redirects tohttps://example.com/page/
Details
The vulnerability occurs if the target path starts with
//
. A request forhttps://example.com//page
will send the headerLocation: //page/
. The browser interprets this as a protocol-relative URL, so instead of redirecting tohttps://example.com//page/
, it will attempt to redirect tohttps://page/
. This is unlikely to resolve, but by crafting a URL in the formhttps://example.com//target.domain/subpath
, it will send the headerLocation: //target.domain/subpath/
, which the browser translates as a redirect tohttps://target.domain/subpath/
. The subpath part is required because otherwise Astro will interpret/target.domain
as a file download, which skips trailing slash handling.This leads to an Open Redirect vulnerability.
The URL needed to trigger the vulnerability varies according to the
trailingSlash
setting.trailingSlash
is set to"never"
, a URL in the formhttps://example.com//target.domain/subpath/
trailingSlash
is set to"always"
, a URL in the formhttps://example.com//target.domain/subpath
https://example.com//target.domain/subpath//
Impact
This is classified as an Open Redirection vulnerability (CWE-601). It affects any user who clicks on a specially crafted link pointing to the affected domain. Since the domain appears legitimate, victims may be tricked into trusting the redirected page, leading to possible credential theft, malware distribution, or other phishing-related attacks.
No authentication is required to exploit this vulnerability. Any unauthenticated user can trigger the redirect by clicking a malicious link.
Mitigation
You can test if your site is affected by visiting
https://yoursite.com//docs.astro.build/en//
. If you are redirected to the Astro docs then your site is affected and must be updated.Upgrade your site to Astro 5.12.8. To mitigate at the network level, block outgoing redirect responses with a
Location
header value that starts with//
.CVE-2025-55303
Summary
In affected versions of
astro
, the image optimization endpoint in projects deployed with on-demand rendering allows images from unauthorized third-party domains to be served.Details
On-demand rendered sites built with Astro include an
/_image
endpoint which returns optimized versions of images.The
/_image
endpoint is restricted to processing local images bundled with the site and also supports remote images from domains the site developer has manually authorized (using theimage.domains
orimage.remotePatterns
options).However, a bug in impacted versions of
astro
allows an attacker to bypass the third-party domain restrictions by using a protocol-relative URL as the image source, e.g./_image?href=//example.com/image.png
.Proof of Concept
Create a new minimal Astro project (
[email protected]
).Configure it to use the Node adapter (
@astrojs/[email protected]
— newer versions are not impacted):Build the site by running
astro build
.Run the server, e.g. with
astro preview
.Append
/_image?href=//placehold.co/600x400
to the preview URL, e.g. http://localhost:4321/_image?href=//placehold.co/600x400The site will serve the image from the unauthorized
placehold.co
origin.Impact
Allows a non-authorized third-party to create URLs on an impacted site’s origin that serve unauthorized image content.
In the case of SVG images, this could include the risk of cross-site scripting (XSS) if a user followed a link to a maliciously crafted SVG.
CVE-2025-61925
Summary
When running Astro in on-demand rendering mode using a adapter such as the node adapter it is possible to maliciously send an
X-Forwarded-Host
header that is reflected when using the recommendedAstro.url
property as there is no validation that the value is safe.Details
Astro reflects the value in
X-Forwarded-Host
in output when usingAstro.url
without any validation.It is common for web servers such as nginx to route requests via the
Host
header, and forward on other request headers. As such as malicious request can be sent with both aHost
header and anX-Forwarded-Host
header where the values do not match and theX-Forwarded-Host
header is malicious. Astro will then return the malicious value.This could result in any usages of the
Astro.url
value in code being manipulated by a request. For example if a user follows guidance and usesAstro.url
for a canonical link the canonical link can be manipulated to another site. It is not impossible to imagine that the value could also be used as a login/registration or other form URL as well, resulting in potential redirecting of login credentials to a malicious party.As this is a per-request attack vector the surface area would only be to the malicious user until one considers that having a caching proxy is a common setup, in which case any page which is cached could persist the malicious value for subsequent users.
Many other frameworks have an allowlist of domains to validate against, or do not have a case where the headers are reflected to avoid such issues.
PoC
nvm use
yarn run build
node ./dist/server/entry.mjs
curl --location 'http://localhost:4321/' --header 'X-Forwarded-Host: www.evil.com' --header 'Host: www.example.com'
X-Forwarded-Host
headerFor the more advanced / dangerous attack vector deploy the application behind a caching proxy, e.g. Cloudflare, set a non-zero cache time, perform the above
curl
request a few times to establish a cache, then perform the request without the malicious headers and observe that the malicious data is persisted.Impact
This could affect anyone using Astro in an on-demand/dynamic rendering mode behind a caching proxy.
Release Notes
withastro/astro (astro)
v5.14.3
Compare Source
Patch Changes
#14505
28b2a1d
Thanks @matthewp! - FixesCannot set property manifest
error in test utilities by adding a protected setter for the manifest property#14235
c4d84bb
Thanks @toxeeec! - Fixes a bug where the "tap" prefetch strategy worked only on the first clicked link with view transitions enabledv5.14.1
Compare Source
Patch Changes
a3e16ab
Thanks @florian-lefebvre! - Fixes a case where the URLs generated by the experimental Fonts API would be incorrect in devv5.14.0
Compare Source
Minor Changes
#13520
a31edb8
Thanks @openscript! - Adds a new propertyroutePattern
available toGetStaticPathsOptions
This provides the original, dynamic segment definition in a routing file path (e.g.
/[...locale]/[files]/[slug]
) from the Astro render context that would not otherwise be available within the scope ofgetStaticPaths()
. This can be useful to calculate theparams
andprops
for each page route.For example, you can now localize your route segments and return an array of static paths by passing
routePattern
to a customgetLocalizedData()
helper function. Theparams
object will be set with explicit values for each route segment (e.g.locale
,files
, andslug)
. Then, these values will be used to generate the routes and can be used in your page template viaAstro.params
.v5.13.11
Compare Source
Patch Changes
#14409
250a595
Thanks @louisescher! - Fixes an issue whereastro info
would log errors to console in certain cases.#14398
a7df80d
Thanks @idawnlight! - Fixes an unsatisfiable type definition when callingaddServerRenderer
on an experimental container instance#13747
120866f
Thanks @jp-knj! - Adds automatic request signal abortion when the underlying socket closes in the Node.js adapterThe Node.js adapter now automatically aborts the
request.signal
when the client connection is terminated. This enables better resource management and allows applications to properly handle client disconnections through the standardAbortSignal
API.#14428
32a8acb
Thanks @drfuzzyness! - Force sharpService to return a Uint8Array if Sharp returns a SharedArrayBuffer#14411
a601186
Thanks @GameRoMan! - Fixes relative links to docs that could not be opened in the editor.v5.13.10
Compare Source
Patch Changes
1e2499e
]:v5.13.9
Compare Source
Patch Changes
54dcd04
Thanks @FredKSchott! - Removes warning that caused unexpected console spam when using Bunv5.13.8
Compare Source
Patch Changes
#14300
bd4a70b
Thanks @louisescher! - Adds Vite version & integration versions to output ofastro info
#14341
f75fd99
Thanks @delucis! - Fixes support for declarative Shadow DOM when using the<ClientRouter>
component#14350
f59581f
Thanks @ascorbic! - Improves error reporting for content collections by adding logging for configuration errors that had previously been silently ignored. Also adds a new error that is thrown if a live collection is used incontent.config.ts
rather thanlive.config.ts
.#14343
13f7d36
Thanks @florian-lefebvre! - Fixes a regression in non node runtimesv5.13.7
Compare Source
Patch Changes
#14330
72e14ab
Thanks @ascorbic! - Removes pinned package that is no longer needed.#14335
17c7b03
Thanks @florian-lefebvre! - Bumpssharp
minimal version to0.34.0
v5.13.6
Compare Source
Patch Changes
#14294
e005855
Thanks @martrapp! - Restores the ability to use Google AnalyticsHistory change trigger
with the<ClientRouter />
.#14326
c24a8f4
Thanks @jsparkdev! - Updatesvite
version to fix CVE#14108
218e070
Thanks @JusticeMatthew! - Updates dynamic route split regex to avoid infinite retries/exponential complexity#14327
c1033be
Thanks @ascorbic! - Pins simple-swizzle to avoid compromised versionv5.13.5
Compare Source
Patch Changes
#14286
09c5db3
Thanks @ematipico! - BREAKING CHANGES only to the experimental CSP featureThe following runtime APIs of the
Astro
global have been renamed:Astro.insertDirective
toAstro.csp.insertDirective
Astro.insertStyleResource
toAstro.csp.insertStyleResource
Astro.insertStyleHash
toAstro.csp.insertStyleHash
Astro.insertScriptResource
toAstro.csp.insertScriptResource
Astro.insertScriptHash
toAstro.csp.insertScriptHash
The following runtime APIs of the
APIContext
have been renamed:ctx.insertDirective
toctx.csp.insertDirective
ctx.insertStyleResource
toctx.csp.insertStyleResource
ctx.insertStyleHash
toctx.csp.insertStyleHash
ctx.insertScriptResource
toctx.csp.insertScriptResource
ctx.insertScriptHash
toctx.csp.insertScriptHash
#14283
3224637
Thanks @ematipico! - Fixes an issue where CSP headers were incorrectly injected in the development server.#14275
3e2f20d
Thanks @florian-lefebvre! - Adds support for experimental CSP when using experimental fontsExperimental fonts now integrate well with experimental CSP by injecting hashes for the styles it generates, as well as
font-src
directives.No action is required to benefit from it.
#14280
4b9fb73
Thanks @ascorbic! - Fixes a bug that caused cookies to not be correctly set when using middleware sequences#14276
77281c4
Thanks @ArmandPhilippot! - Adds a missing export forresolveSrc
, a documented image services utility.v5.13.4
Compare Source
Patch Changes
#14260
86a1e40
Thanks @jp-knj! - FixesAstro.url.pathname
to respecttrailingSlash: 'never'
configuration when using a base path. Previously, the root path with a base would incorrectly return/base/
instead of/base
whentrailingSlash
was set to 'never'.#14248
e81c4bd
Thanks @julesyoungberg! - Fixes a bug where actions named 'apply' do not work due to being a function prototype method.v5.13.3
Compare Source
Patch Changes
#14239
d7d93e1
Thanks @wtchnm! - Fixes a bug where the types for the live content collections were not being generated correctly in dev mode#14221
eadc9dd
Thanks @delucis! - Fixes JSON schema support for content collections using thefile()
loader#14229
1a9107a
Thanks @jonmichaeldarby! - EnsuresAstro.currentLocale
returns the correct locale during SSG for pages that use a locale param (such as[locale].astro
or[locale]/index.astro
, which produce[locale].html
)v5.13.2
Compare Source
Patch Changes
4d16de7
Thanks @ematipico! - Improves the detection of remote paths in the_image
endpoint. Nowhref
parameters that start with//
are considered remote paths.Updated dependencies [
4d16de7
]:v5.13.1
Compare Source
Patch Changes
#14409
250a595
Thanks @louisescher! - Fixes an issue whereastro info
would log errors to console in certain cases.#14398
a7df80d
Thanks @idawnlight! - Fixes an unsatisfiable type definition when callingaddServerRenderer
on an experimental container instance#13747
120866f
Thanks @jp-knj! - Adds automatic request signal abortion when the underlying socket closes in the Node.js adapterThe Node.js adapter now automatically aborts the
request.signal
when the client connection is terminated. This enables better resource management and allows applications to properly handle client disconnections through the standardAbortSignal
API.#14428
32a8acb
Thanks @drfuzzyness! - Force sharpService to return a Uint8Array if Sharp returns a SharedArrayBuffer#14411
a601186
Thanks @GameRoMan! - Fixes relative links to docs that could not be opened in the editor.v5.13.0
Compare Source
Minor Changes
#14173
39911b8
Thanks @florian-lefebvre! - Adds an experimental flagstaticImportMetaEnv
to disable the replacement ofimport.meta.env
values withprocess.env
calls and their coercion of environment variable values. This supersedes therawEnvValues
experimental flag, which is now removed.Astro allows you to configure a type-safe schema for your environment variables, and converts variables imported via
astro:env
into the expected type. This is the recommended way to use environment variables in Astro, as it allows you to easily see and manage whether your variables are public or secret, available on the client or only on the server at build time, and the data type of your values.However, you can still access environment variables through
process.env
andimport.meta.env
directly when needed. This was the only way to use environment variables in Astro beforeastro:env
was added in Astro 5.0, and Astro's default handling ofimport.meta.env
includes some logic that was only needed for earlier versions of Astro.The
experimental.staticImportMetaEnv
flag updates the behavior ofimport.meta.env
to align with Vite's handling of environment variables and for better ease of use with Astro's current implementations and features. This will become the default behavior in Astro 6.0, and this early preview is introduced as an experimental feature.Currently, non-public
import.meta.env
environment variables are replaced by a reference toprocess.env
. Additionally, Astro may also convert the value type of your environment variables used throughimport.meta.env
, which can prevent access to some values such as the strings"true"
(which is converted to a boolean value), and"1"
(which is converted to a number).The
experimental.staticImportMetaEnv
flag simplifies Astro's default behavior, making it easier to understand and use. Astro will no longer replace anyimport.meta.env
environment variables with aprocess.env
call, nor will it coerce values.To enable this feature, add the experimental flag in your Astro config and remove
rawEnvValues
if it was enabled:Updating your project
If you were relying on Astro's default coercion, you may need to update your project code to apply it manually:
If you were relying on the transformation into
process.env
calls, you may need to update your project code to apply it manually:You may also need to update types:
See the experimental static
import.meta.env
documentation for more information about this feature. You can learn more about using environment variables in Astro, includingastro:env
, in the environment variables documentation.#14122
41ed3ac
Thanks @ascorbic! - Adds experimental support for automatic Chrome DevTools workspace foldersThis feature allows you to edit files directly in the browser and have those changes reflected in your local file system via a connected workspace folder. This allows you to apply edits such as CSS tweaks without leaving your browser tab!
With this feature enabled, the Astro dev server will automatically configure a Chrome DevTools workspace for your project. Your project will then appear as a workspace source, ready to connect. Then, changes that you make in the "Sources" panel are automatically saved to your project source code.
To enable this feature, add the experimental flag
chromeDevtoolsWorkspace
to your Astro config:See the experimental Chrome DevTools workspace feature documentation for more information.
v5.12.9
Compare Source
Patch Changes
#14020
9518975
Thanks @jp-knj and @asieradzk! - Prevent double-prefixed redirect paths when using fallback and redirectToDefaultLocale togetherFixes an issue where i18n fallback routes would generate double-prefixed paths (e.g.,
/es/es/test/item1/
) whenfallback
andredirectToDefaultLocale
configurations were used together. The fix adds proper checks to prevent double prefixing in route generation.#14199
3e4cb8e
Thanks @ascorbic! - Fixes a bug that prevented HMR from working with inline stylesv5.12.8
Compare Source
Patch Changes
0567fb7
Thanks @ascorbic! - Adds//
to list of internal path prefixes that do not have automated trailing slash handling#13894
b36e72f
Thanks @florian-lefebvre! - Removes Astro Studio commands from the CLI helpUpdated dependencies [
0567fb7
]:v5.12.7
Compare Source
Patch Changes
#14169
f4e8889
Thanks @ascorbic! - Skips trailing slash handling for paths that start with/.
.#14170
34e6b3a
Thanks @ematipico! - Fixes an issue where static redirects couldn't correctly generate a redirect when the destination is a prerendered route, and theoutput
is set to"server"
.#14169
f4e8889
Thanks @ascorbic! - Fixes a bug that prevented images from being displayed in dev when using the Netlify adapter withtrailingSlash
set toalways
Updated dependencies [
f4e8889
]:v5.12.6
Compare Source
Patch Changes
#14153
29e9283
Thanks @jp-knj! - Fixes a regression introduced by a recent optimisation of how SVG images are emitted during the build.#14156
592f08d
Thanks @TheOtterlord! - Fix the client router not submitting forms if the active URL contained a hash#14160
d2e25c6
Thanks @ascorbic! - Fixes a bug that meant some remote image URLs could cause invalid filenames to be used for processed images#14167
62bd071
Thanks @ascorbic! - Fixes a bug that prevented destroyed sessions from being deleted from storage unless the session had been loadedv5.12.5
Compare Source
Patch Changes
#14059
19f53eb
Thanks @benosmac! - Fixes a bug in i18n implementation, where Astro didn't emit the correct pages whenfallback
is enabled, and a locale uses a catch-all route, e.g.src/pages/es/[...catchAll].astro
#14155
31822c3
Thanks @ascorbic! - Fixes a bug that caused an error "serverEntrypointModule[_start] is not a function" in some adaptersv5.12.4
Compare Source
Patch Changes
#14031
e9206c1
Thanks @jp-knj! - Optimized the build pipeline for SVG images. Now, Astro doesn't reprocess images that have already been processed.#14132
976879a
Thanks @ematipico! - Fixes a bug where the propertyAstro.routePattern
/context.routePattern
wasn't updated when using a rewrite via middleware.#14131
aafc4d7
Thanks @florian-lefebvre! - Fixes a case where an error occurring in a middleware would show the dev overlay instead of the custom500.astro
page#14127
2309ada
Thanks @florian-lefebvre! - Upgrades zod#14134
186c201
Thanks @ascorbic! - Throws a more helpful error in dev if trying to use a server island without an adapter#14129
3572d85
Thanks @ematipico! - Fixes a bug where the CSP headers was incorrectly added to a page when using an adapter.v5.12.3
Compare Source
Patch Changes
#14119
14807a4
Thanks @ascorbic! - Fixes a bug that caused builds to fail if a client directive was mistakenly added to an Astro component#14001
4b03d9c
Thanks @dnek! - Fixes an issue wheregetImage()
assigned the resized base URL to the srcset URL ofImageTransform
, which matched the width, height, and format of the original image.v5.12.2
Compare Source
Patch Changes
#14071
d2cb35d
Thanks @Grisoly! - Exposes theCode
componentlang
prop type:#14111
5452ee6
Thanks @ascorbic! - Fixes a bug that prevented "key" from being used as a prop for Astro components in MDX#14106
b5b39e4
Thanks @ascorbic! - Exits with non-zero exit code when config has an error#14112
37458b3
Thanks @ascorbic! - Fixes a bug that meant that SVG components could no longer be serialized withJSON.stringify
#14061
c7a7dd5
Thanks @jonasgeiler! - Add module declaration for?no-inline
asset imports#14109
5a08fa2
Thanks @ascorbic! - Throw a more helpful error if defineLiveCollection is used outside of a live.config file#14110
e7dd4e1
Thanks @ascorbic! - Warn if duplicate IDs are found by file loaderv5.12.1
Compare Source
Patch Changes
#14094
22e9087
Thanks @ascorbic! - Correct types to allowpriority
on all images#14091
26c6b6d
Thanks @ascorbic! - Fixes a bug that caused a type error when defining session options without a driver#14082
93322cb
Thanks @louisescher! - Fixes an issue where Astro's default 404 route would incorrectly match routes containing "/404" in dev#14089
687d253
Thanks @florian-lefebvre! - Fixes a case whereastro:env
would not load the right environments variables in dev#14092
6692c71
Thanks @ascorbic! - Improves error handling in live collections#14074
144a950
Thanks @abcfy2! - Fixes a bug that caused some image service builds to fail#14092
6692c71
Thanks @ascorbic! - Fixes a case where zod could not be imported fromastro:content
virtual module in live collection configv5.12.0
Compare Source
Minor Changes
#13971
fe35ee2
Thanks @adamhl8! - Adds an experimental flagrawEnvValues
to disable coercion ofimport.meta.env
values (e.g. converting strings to other data types) that are populated fromprocess.env
Astro allows you to configure a type-safe schema for your environment variables, and converts variables imported via
astro:env
into the expected type.However, Astro also converts your environment variables used through
import.meta.env
in some cases, and this can prevent access to some values such as the strings"true"
(which is converted to a boolean value), and"1"
(which is converted to a number).The
experimental.rawEnvValues
flag disables coercion ofimport.meta.env
values that are populated fromprocess.env
, allowing you to use the raw value.To enable this feature, add the experimental flag in your Astro config:
If you were relying on this coercion, you may need to update your project code to apply it manually:
See the experimental raw environment variables reference docs for more information.
#13941
6bd5f75
Thanks @aditsachde! - Adds support for TOML files to Astro's built-inglob()
andfile()
content loaders.In Astro 5.2, Astro added support for using TOML frontmatter in Markdown files instead of YAML. However, if you wanted to use TOML files as local content collection entries themselves, you needed to write your own loader.
Astro 5.12 now directly supports loading data from TOML files in content collections in both the
glob()
and thefile()
loaders.If you had added your own TOML content parser for the
file()
loader, you can now remove it as this functionality is now included:Note that TOML does not support top-level arrays. Instead, the
file()
loader considers each top-level table to be an independent entry. The table header is populated in theid
field of the entry object.See Astro's content collections guide for more information on using the built-in content loaders.
Patch Changes
6bd5f75
]:v5.11.2
Compare Source
Patch Changes
#14064
2eb77d8
Thanks @jp-knj! - Allows usingtsconfig
compilerOptions.paths
without settingcompilerOptions.baseUrl
#14068
10189c0
Thanks @jsparkdev! - Fixes the incorrect CSS import path shown in the terminal message during Tailwind integration setup.v5.11.1
Compare Source
Patch Changes
#14045
3276b79
Thanks @ghubo! - Fixes a problem where importing animated.avif
files returns aNoImageMetadata
error.#14041
0c4d5f8
Thanks @dixslyf! - Fixes a<ClientRouter />
bug where the fallback view transition animations when exiting a pageran too early for browsers that do not support the View Transition API.
This bug prevented
event.viewTransition?.skipTransition()
from skipping the page exit animationwhen used in an
astro:before-swap
event hook.Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.