chore(deps): update dependency wrangler to v4.94.0#332
Open
renovate[bot] wants to merge 1 commit into
Open
Conversation
0ed45a6 to
0e3cafa
Compare
b8a966f to
5bc890f
Compare
5bc890f to
58c615f
Compare
58c615f to
8ccaced
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
4.90.1→4.94.0Release Notes
cloudflare/workers-sdk (wrangler)
v4.94.0Compare Source
Minor Changes
#13897
52e9082Thanks @dario-piotrowicz! - Add automatic Cloudflare skills installation for AI coding agentsWrangler now detects AI coding agents and offers to install Cloudflare skill files from the
cloudflare/skillsGitHub repository. Users are prompted once interactively; subsequent runs skip the prompt. Use--install-skillsto install without prompting.#13989
f598eacThanks @MattieTK! - Print a QR code alongside the tunnel URL when sharing via Cloudflare TunnelWhen a tunnel is started (via
wrangler dev --tunnelor the Vite plugin withtunnel: true), a scannable QR code is now printed to the terminal beneath the tunnel URL. This makes it easy to open the tunnel on a mobile device without manually copying the URL.The QR code uses Unicode block characters for a compact representation and is generated best-effort -- if generation fails for any reason, the tunnel URL is still displayed as before.
#13467
3a1fbedThanks @deloreyj! - Addscheduleproperty to Workflow bindings for cron-based triggeringWorkflow bindings in
wrangler.jsonnow accept an optionalschedulefield that configures one or more cron expressions to automatically trigger new workflow instances on a schedule.Multiple schedules can be provided as an array:
{ "workflows": [ { "binding": "MY_WORKFLOW", "name": "my-workflow", "class_name": "MyWorkflow", "schedule": ["0 9 * * 1", "0 17 * * 5"] } ] }The schedule is sent to the Workflows control plane on
wrangler deploy. Configuringscheduleon a workflow binding that references an externalscript_nameis an error — the schedule must be configured on the worker that defines the workflow.Patch Changes
#13993
0733688Thanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#14008
fc1f7b9Thanks @petebacondarwin! - Fix Access Service Token authentication for applications that only allow service tokensWhen using remote bindings against a Worker behind a Cloudflare Access application configured to only allow Service Auth tokens (no interactive user authentication), Wrangler previously ignored the
CLOUDFLARE_ACCESS_CLIENT_IDandCLOUDFLARE_ACCESS_CLIENT_SECRETenvironment variables and the request would fail with a 403.This happened because Wrangler detects Access by looking for a 302 redirect to
cloudflareaccess.com. A service-auth-only Access application has no interactive login path, so it responds with a hard 403 instead of redirecting. Wrangler concluded the domain was not behind Access and skipped attaching the service token headers entirely.The env-var check now runs before the Access detection step, so the configured service token credentials are always used when present.
#12277
8c569c6Thanks @penalosa! - Include column names in D1 SQL export INSERT statementsD1 SQL exports now include column names in INSERT statements (e.g.,
INSERT INTO "table" ("col1","col2") VALUES(...)). This ensures that exported SQL can be successfully imported even when the target table has columns in a different order than the original, which commonly occurs during iterative development when schemas evolve.Updated dependencies [
0733688,30657e1]:v4.93.1Compare Source
Patch Changes
#13978
fa1f61fThanks @sassyconsultingllc! - Bumpwsfrom 8.18.0 to 8.20.1 to address GHSA-58qx-3vcg-4xpxGHSA-58qx-3vcg-4xpx / CVE-2026-45736 reports an uninitialized-memory disclosure in
ws@<8.20.1when aTypedArrayis passed as the reason argument toWebSocket.close(). The fix shipped in ws@8.20.1 on 2026-05-12. This change bumps the workspace catalog entry so thatminiflare,wrangler, and@cloudflare/vite-pluginall pick up the patched release.#13977
2679e05Thanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13984
7e40d98Thanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13963
adc9221Thanks @gabivlj! - Preserve sibling container image tags during local dev cleanupWrangler now keeps other
cloudflare-devimage tags from the same dev session when multiple containers share a Dockerfile. Previously, duplicate-image cleanup could remove earlier container tags if Docker BuildKit produced the same image ID for each build.#13839
735852dThanks @matingathani! - fix: show actionable hint when/membershipsreturns a bad-credentials error (code 9106)Previously,
wranglerthrew a raw Cloudflare API error ("Missing X-Auth-Key, X-Auth-Email or Authorization headers") with no guidance. Now it emits aUserErrorexplaining that an environment variable such asCLOUDFLARE_API_TOKEN,CLOUDFLARE_API_KEY, orCLOUDFLARE_EMAILmay be set to an invalid value, and suggests runningwrangler logout/wrangler loginto re-authenticate.#13912
d803737Thanks @petebacondarwin! - Fix/cdn-cgi/*host validation incorrectly accepting subdomains of exact configured routesMiniflare's
/cdn-cgi/*host/origin validator was treating exact configured routes the same as wildcard configured routes, so a request whoseHostorOriginhostname was a subdomain of an exact route (e.g.sub.my-custom-site.comfor amy-custom-site.com/*route) was incorrectly accepted. Exact configured routes and the configuredupstreamhostname are now required to match the request hostname exactly. Subdomain matching is only applied to wildcard routes such as*.example.com/*. Localhost hostnames continue to be allowed as before.This affects
wrangler devand local development through@cloudflare/vite-plugin, both of which use Miniflare under the hood.#13919
c7eab7fThanks @petebacondarwin! - Fix the outboundCF-Workerheader reflecting the route pattern hostname instead of the parent zone, and falling back to<worker-name>.example.comundervite dev,vitest-pool-workers, andgetPlatformProxyTwo related issues affected the
CF-Workerheader on outbound subrequests in local development:@cloudflare/vite-plugin,@cloudflare/vitest-pool-workers, andgetPlatformProxy, the header fell back to<worker-name>.example.comeven whenrouteswere configured, becauseunstable_getMiniflareWorkerOptionsand the equivalentgetPlatformProxyworker-options path did not propagate azonevalue to Miniflare. This broke local development against services that reject unknownCF-Workerhosts (for example, Apple WeatherKit returns403 Forbidden).wrangler dev --local, when a route used thezone_namefield (for example{ pattern: "foo.example.com/*", zone_name: "example.com" }), the header was set to the pattern's hostname (foo.example.com) rather than the zone name (example.com). Production setsCF-Workerto the zone name that owns the Worker, so this was inconsistent with deployed behaviour.Both bugs are fixed: the new
unstable_getMiniflareWorkerOptions/getPlatformProxypath now propagates azonederived from the first configured route, and all four local-dev paths now prefer a route's explicitzone_nameover the pattern hostname when computing that zone. Whenzone_nameisn't set, the existing best-effort behaviour is preserved — forwrangler devthis meansdev.hostis still honoured as a local override and the pattern hostname is used as a final fallback. Resolving the parent zone forzone_id-only,custom_domain, or plain-string routes would require an API lookup, so locally we still approximate it with the pattern hostname.Note:
dev.hostis intentionally not consulted by theunstable_getMiniflareWorkerOptions/getPlatformProxypaths — thedevconfig block is specific towrangler dev.#13990
e04e180Thanks @petebacondarwin! - Improve the log message shown when an asset upload attempt fails and is retriedThe retry message now reports which attempt is being made (e.g.
Asset upload failed. Retrying... 1 of 5 attempts.), making it easier to gauge how close Wrangler is to exhausting its retry budget. The raw error object is no longer appended to this user-facing message; it is instead logged at debug level (visible viaWRANGLER_LOG=debug).#13954
62abf97Thanks @petebacondarwin! - Read the on-disk OAuth state lazily soCLOUDFLARE_API_TOKENfrom.envtakes priority correctlyWrangler previously read its OAuth state from the user auth config file (for example
~/.config/.wrangler/config/default.toml) eagerly at module-import time. That happens before.envfiles are loaded, so the in-memory state would always hold the OAuth tokens even when the user only wanted to authenticate viaCLOUDFLARE_API_TOKEN. If that stored OAuth token happened to be expired, Wrangler would try to refresh it (and fail), aborting the command withFailed to fetch auth token: 400 Bad RequestandNot logged in.— even though a valid API token was in scope.Wrangler now reads the auth config file on demand, after
.envhas been loaded. WhenCLOUDFLARE_API_TOKEN(orCLOUDFLARE_API_KEY+CLOUDFLARE_EMAIL) is present, the OAuth state on disk is no longer consulted, the OAuth refresh endpoint is no longer called, and the env-based token is used directly. Sibling-process refresh-token rotation is also handled naturally because every check reads the current file contents.Internally, the exported
reinitialiseAuthTokens()function is removed — there is no module-level OAuth cache left to invalidate.Fixes #13744.
#13951
e349fe0Thanks @sejoker! - Enforce minimum 60 second interval for R2 Data Catalog sinksR2 Data Catalog sinks now require a minimum
--roll-intervalof 60 seconds to prevent compaction issues in the R2 Data Catalog. This validation is applied when creating sinks viawrangler pipelines sinks createwith typer2-data-catalog, and during the interactivewrangler pipelines setupflow.Regular R2 sinks are not affected and can still use intervals as low as 10 seconds.
#13959
da0fa8cThanks @dmmulroy! - Recognize Artifacts repositories that are still being createdWrangler's Artifacts repo status type now accepts the
creatinglifecycle state alongside existing in-progress statuses.#13964
a5c9365Thanks @danielrs! - Use dedicated API endpoint forwrangler secret bulkwrangler secret bulknow uses a more efficient, dedicated API endpoint. This reduces the operation from 2 API calls to 1 and eliminates the risk of accidentally affecting non-secret bindings.Updated dependencies [
fa1f61f,2679e05,7e40d98,d803737,59cd880,e8c2031]:v4.93.0Compare Source
Minor Changes
#13901
aac7ca0Thanks @bghira! - Addwrangler ai models schemacommand for fetching model schemasYou can now run
wrangler ai models schema <model>to fetch the input and output schema for a Workers AI model from the public model catalog schema endpoint.#12656
ae047eeThanks @mikenomitch! - Add--containers-rollout=noneThis allows you to skip deploying a container. This is useful if you know that your container is not going to be updated or you don't have Docker locally, but still want to make changes to your Worker.
#13901
aac7ca0Thanks @bghira! - Addwrangler ai models listcommand for querying the Workers AI model catalogwrangler ai models listaccepts--search,--task,--author,--source, and--hide-experimental, matching the public model catalog search endpoint.Patch Changes
#13948
b25dc0dThanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13882
a4f22bcThanks @matingathani! - Throw a clear error when a D1 migration is cancelled instead of silently returning#13950
f78d435Thanks @dario-piotrowicz! - Improve the Docker CLI error message to be more actionable.Include a link to Docker installation docs, platform-specific instructions for starting the daemon, and guidance for alternative Docker-compatible CLIs.
#11896
c5c9e20Thanks @staticpayload! - Surface remote proxy session errorsWhen remote bindings fail to start, include the controller reason and root cause in the error message to make failures like missing
cloudflaredclearer.#13932
ebf4b24Thanks @zebp! - Fix local Workflow startup when compatibility flags includeexperimentalMiniflare now deduplicates compatibility flags for the internal Workflow engine service. This prevents
wrangler devfrom failing withCompatibility flag specified multiple times: experimentalwhen the user's Worker already enables that flag.#13929
895baf5Thanks @Caio-Nogueira! - Prompt to provision a workers.dev subdomain before deploying WorkflowsWrangler now checks for the account-level workers.dev subdomain when deploying Workflows, even if the Worker is not being published to workers.dev. If the subdomain has not been registered yet, Wrangler prompts to create one before calling the Workflows deploy API so users avoid an opaque server-side deployment failure.
#13930
7bcdf45Thanks @shiminshen! - Sweep stale.wrangler/tmp/*dirs left behind by abnormal exitsA
wrangler devsession creates.wrangler/tmp/bundle-*and.wrangler/tmp/dev-*directories at startup and removes them via asignal-exithook on graceful shutdown. When the process exited abnormally (SIGKILL, OOM, host crash) those directories were left behind and accumulated across sessions, slowing down dependency-walking tools that follow the bundle-emitted absolute-path imports.wranglernow sweeps entries in.wrangler/tmp/older than 24 hours when a new temporary directory is requested, bounding the leak regardless of how prior sessions exited.Updated dependencies [
b25dc0d,ebf4b24,b27eb18]:v4.92.0Compare Source
Minor Changes
#13670
506aa02Thanks @elithrar! - Addwrangler artifactscommands for managing Artifacts repos and repo tokens.This adds CLI support for the Artifacts control-plane workflows that were previously only available through the API. You can now list and inspect namespaces, create, list, inspect, and delete repos, and issue repo-scoped tokens when you need to authenticate git access.
The new commands support both human-readable output and
--jsonoutput so they fit existing Wrangler automation patterns.#13916
be8a98cThanks @emily-shen! - Add--keep-varsflag towrangler versions upload, matching the existing behavior inwrangler deploy. When set, environment variables configured via the dashboard are preserved rather than being deleted before the upload.Patch Changes
#13926
19ed49aThanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#11471
3ff0a50Thanks @HW13! - Improvewrangler types --env-interfacefor multi-worker projects.Custom env interfaces generated by
wrangler typesno longer expand fromCloudflare.Env, avoiding some unintended type expansion when multiple workers' generated types are used together.#13910
bf688f7Thanks @timoconnellaus! - FixFailed to fetch auth token: 401 Unauthorizedfrom sibling-rotated refresh tokensrefreshTokenpreviously used the refresh token from module-levellocalState, which is populated once at startup and never re-read. OAuth refresh tokens are single-use, so when a sibling wrangler process (in another repo, another shell, or a parallel script) refreshes first, it rotates the token server-side and writes the new value to the shared config file (~/Library/Preferences/.wrangler/config/default.tomlon macOS). The long-lived process — typicallywrangler dev— then sends its stale in-memory token on the next refresh and gets401 Unauthorizedfromhttps://dash.cloudflare.com/oauth2/token, falling through to interactive login and timing out unattended.refreshTokennow callsreinitialiseAuthTokens()before exchanging, picking up the latest refresh token written by any sibling process. The previously emptycatch {}also now logs the underlying error at debug level so future refresh failures are diagnosable without source-diving.#13843
2e72c83Thanks @nzws! - Fixwrangler versions secret put/delete/bulkto preserve the existing version's placement settingsWhen creating a new version via
wrangler versions secret, the previous code only re-emitted a bare{ mode: "smart" }placement when the API reportedplacement_mode === "smart", dropping any other placement entirely. The new version is now created with the placement settings returned by the API, so placement settings survive a secret put/delete/bulk round-trip.#13908
802eaf4Thanks @shiminshen! - fix: stop rewriting query strings that happen to contain the requestHostwrangler devpreviously rewrote occurrences of the outer host insiderequest.url's query string. For example, a request to?echo=https%3A%2F%2Fdevelopment.test%2FpathwithHost: development.testwould be seen by the user worker as?echo=https%3A%2F%2Fproduction.test%2Fpath, silently mutating opaque application data such asredirect_urivalues in OAuth flows.The proxy worker now sets the internal
MF-Original-URLheader after its blanket host-rewriting pass over request headers, so the URL passed to the user worker preserves the original query string.#13827
8f5cdb1Thanks @greyvugrin! - Fix multi-environment warning when CLOUDFLARE_ENV is setCommands that warn when multiple environments are configured but none is specified (e.g.
wrangler deploy,wrangler secret put) were not accounting for theCLOUDFLARE_ENVenvironment variable when deciding whether to show the warning. This caused a misleading warning to appear even when the target environment was correctly specified viaCLOUDFLARE_ENV.Updated dependencies [
19ed49a]:v4.91.0Compare Source
Minor Changes
#13822
c8be316Thanks @edmundhung! - Add named tunnel support and tunnel shortcuts towrangler devYou can now use
wrangler dev --tunnel --tunnel-name <name>to start a dev session with an existing named Cloudflare Tunnel, or set--tunnel-nameahead of time and start it later by pressingtto start or close the tunnel. This gives you a stable public hostname for local development instead of the temporarytrycloudflare.comURL used by Quick Tunnels.Patch Changes
#13848
d4794a8Thanks @MattieTK! - Condense repeated environment configuration warningsWrangler now summarises repeated missing
varsanddefineentries in environment configuration warnings. Experimentalunsafewarnings are also only emitted once when the field appears at both the top level and in the active environment.#13894
58b4403Thanks @dependabot! - Update dependencies of "miniflare", "wrangler"The following dependency versions have been updated:
#13780
4352f87Thanks @matingathani! - Normalize legacy instance type aliases (standard→standard-1,dev→lite) to prevent phantom EDIT diffs on every deploy#13834
a9e6741Thanks @matingathani! - fix: hotkeys now work with Caps Lock enabledWrangler's dev server hotkeys (e.g.
bto open browser andxto exit) did not respond when Caps Lock was enabled. These hotkeys now work consistently whether or not Caps Lock is on.#13750
da664d5Thanks @matingathani! - fix: automatically delete log files older than 30 days and add WRANGLER_WRITE_LOGS=false to disable disk loggingWrangler previously accumulated log files in
~/.wrangler/logs/indefinitely, causing some users to accumulate gigabytes of logs over time.Log files older than 30 days are now automatically cleaned up on the first log write. Disk logging can be disabled entirely by setting
WRANGLER_WRITE_LOGS=false.#13914
bdc398cThanks @Maximo-Guk! - preserve native shape of non-stringvarsin worker previewswrangler previewpreviously coerced every non-string entry inpreviews.vars(arrays, objects, numbers, booleans) into aplain_textbinding viaJSON.stringify, so at runtime the worker saw a literal string instead of the value declared inwrangler.jsonc.wrangler deployalready serializes non-string vars asjsonbindings so the Workers runtime parses them back into native JS values; previews now match.Before:
After:
#13778
1420f10Thanks @maxwellpeterson! - Propagateunsafe.bindingsand service bindingcross_account_grantto worker previewsWorker previews now propagate
unsafe.bindingsdeclared on thepreviewsconfig block to the deployment metadata, mirroring the deploy-time behavior. Without this, internal binding shapes that wrangler doesn't yet model (notably service bindings carryingcross_account_grant) were silently dropped on previews while working fine on regular deploys. The same change wires throughcross_account_granton typedservicesbindings.Updated dependencies [
58b4403,f781a2b]:Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.