-
Notifications
You must be signed in to change notification settings - Fork 4
Update module github.com/labstack/echo/v4 to v4.15.0 #19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
master
Choose a base branch
from
renovate/github.com-labstack-echo-v4-4.x
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
112e77c to
4379a44
Compare
auto-merge was automatically disabled
August 1, 2025 19:42
Pull request was closed
ba9e533 to
4379a44
Compare
be54227 to
7135713
Compare
auto-merge was automatically disabled
November 20, 2025 13:09
Pull request was closed
7135713 to
d8e80d3
Compare
d8e80d3 to
ead25ca
Compare
| datasource | package | from | to | | ---------- | --------------------------- | ------- | ------- | | go | github.com/labstack/echo/v4 | v4.13.3 | v4.15.0 | Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
ead25ca to
616593e
Compare
Contributor
Author
ℹ️ Artifact update noticeFile name: examples/go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
File name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v4.13.3→v4.15.0Release Notes
labstack/echo (github.com/labstack/echo/v4)
v4.15.0Compare Source
Security
NB: If your application relies on cross-origin or same-site (same subdomain) requests do not blindly push this version to production
The CSRF middleware now supports the Sec-Fetch-Site header as a modern, defense-in-depth approach to CSRF
protection, implementing the OWASP-recommended Fetch Metadata API alongside the traditional token-based mechanism.
How it works:
Modern browsers automatically send the
Sec-Fetch-Siteheader with all requests, indicating the relationshipbetween the request origin and the target. The middleware uses this to make security decisions:
same-originornone: Requests are allowed (exact origin match or direct user navigation)same-site: Falls back to token validation (e.g., subdomain to main domain)cross-site: Blocked by default with 403 error for unsafe methods (POST, PUT, DELETE, PATCH)For browsers that don't send this header (older browsers), the middleware seamlessly falls back to
traditional token-based CSRF protection.
New Configuration Options:
TrustedOrigins []string: Allowlist specific origins for cross-site requests (useful for OAuth callbacks, webhooks)AllowSecFetchSiteFunc func(echo.Context) (bool, error): Custom logic for same-site/cross-site request validationExample:
PR: #2858
Type-Safe Generic Parameter Binding
Added generic functions for type-safe parameter extraction and context access by @aldas in #2856
Echo now provides generic functions for extracting path, query, and form parameters with automatic type conversion,
eliminating manual string parsing and type assertions.
New Functions:
PathParam[T],PathParamOr[T]QueryParam[T],QueryParamOr[T],QueryParams[T],QueryParamsOr[T]FormParam[T],FormParamOr[T],FormParams[T],FormParamsOr[T]ContextGet[T],ContextGetOr[T]Supported Types:
Primitives (
bool,string,int/uintvariants,float32/float64),time.Duration,time.Time(with custom layouts and Unix timestamp support), and custom types implementing
BindUnmarshaler,TextUnmarshaler, orJSONUnmarshaler.Example:
PR: #2856
DEPRECATION NOTICE Timeout Middleware Deprecated - Use ContextTimeout Instead
The
middleware.Timeoutmiddleware has been deprecated due to fundamental architectural issues that causedata races. Use
middleware.ContextTimeoutormiddleware.ContextTimeoutWithConfiginstead.Why is this being deprecated?
The Timeout middleware manipulates response writers across goroutine boundaries, which causes data races that
cannot be reliably fixed without a complete architectural redesign. The middleware:
http.TimeoutHandlerWhat should you use instead?
The
ContextTimeoutmiddleware (available since v4.12.0) provides timeout functionality using Go's standardcontext mechanism. It is:
Migration Guide:
Important Behavioral Differences:
Handler cooperation required: With ContextTimeout, your handlers must check
context.Done()for cooperativecancellation. The old Timeout middleware would send a 503 response regardless of handler cooperation, but had
data race issues.
Error handling: ContextTimeout returns errors through the standard error handling flow. Handlers that receive
context.DeadlineExceededshould handle it appropriately:Enhancements
v4.14.0Compare Source
middleware.Loggerhas been deprecated. For request logging, usemiddleware.RequestLoggerormiddleware.RequestLoggerWithConfig.middleware.RequestLoggerreplacesmiddleware.Logger, offering comparable configuration while relying on theGo standard library’s new
sloglogger.The previous default output format was JSON. The new default follows the standard
sloglogger settings.To continue emitting request logs in JSON, configure
slogaccordingly:Security
Enhancements
v4.13.4Compare Source
Enhancements
Security
Configuration
📅 Schedule: Branch creation - Between 12:00 AM and 03:59 AM ( * 0-3 * * * ) in timezone America/Los_Angeles, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.