ash ai chat
[error] ** (NimbleOptions.ValidationError) unknown options [:unsafe_], valid options are: [:hardbreaks, :github_pre_lang, :full_info_string, :width, :unsafe, :escape, :list_style, :sourcepos, :escaped_char_spans, :ignore_setext, :ignore_empty_links, :gfm_quirks, :prefer_fenced, :figure_with_caption, :tasklist_classes, :ol_width, :experimental_minimize_commonmark] (in options [:render])
(nimble_options 1.1.1) lib/nimble_options.ex:359: NimbleOptions.validate!/2
(mdex 0.7.1) lib/mdex.ex:1376: MDEx.validate_options!/1
(mdex 0.7.1) lib/mdex.ex:951: MDEx.to_html/2
(answer_mentor 0.1.0) lib/answer_mentor_web/live/chat_live.ex:271: AnswerMentorWeb.ChatLive.to_markdown/1
(answer_mentor 0.1.0) lib/answer_mentor_web/live/chat_live.ex:69: anonymous fn/3 in AnswerMentorWeb.ChatLive.render/1
(elixir 1.18.4) lib/enum.ex:4515: anonymous fn/3 in Enum.reduce/3
(phoenix_live_view 1.0.17) lib/phoenix_live_view/live_stream.ex:110: [error] ** (NimbleOptions.ValidationError) unknown options [:unsafe_], valid options are: [:hardbreaks, :github_pre_lang, :full_info_string, :width, :unsafe, :escape, :list_style, :sourcepos, :escaped_char_spans, :ignore_setext, :ignore_empty_links, :gfm_quirks, :prefer_fenced, :figure_with_caption, :tasklist_classes, :ol_width, :experimental_minimize_commonmark] (in options [:render])
(nimble_options 1.1.1) lib/nimble_options.ex:359: NimbleOptions.validate!/2
(mdex 0.7.1) lib/mdex.ex:1376: MDEx.validate_options!/1
(mdex 0.7.1) lib/mdex.ex:951: MDEx.to_html/2
(answer_mentor 0.1.0) lib/answer_mentor_web/live/chat_live.ex:271: AnswerMentorWeb.ChatLive.to_markdown/1
(answer_mentor 0.1.0) lib/answer_mentor_web/live/chat_live.ex:69: anonymous fn/3 in AnswerMentorWeb.ChatLive.render/1
(elixir 1.18.4) lib/enum.ex:4515: anonymous fn/3 in Enum.reduce/3
(phoenix_live_view 1.0.17) lib/phoenix_live_view/live_stream.ex:110: source:
defp to_markdown(text) do
# Note that you must pass the "unsafe_: true" option to first generate the raw HTML
# in order to sanitize it. https://hexdocs.pm/mdex/MDEx.html#module-sanitize
MDEx.to_html(text,
extension: [
strikethrough: true,
tagfilter: true,
table: true,
autolink: true, defp to_markdown(text) do
# Note that you must pass the "unsafe_: true" option to first generate the raw HTML
# in order to sanitize it. https://hexdocs.pm/mdex/MDEx.html#module-sanitize
MDEx.to_html(text,
extension: [
strikethrough: true,
tagfilter: true,
table: true,
autolink: true,did something break?
