Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(HTTP Request Node): Fix AWS credentials to stop removing url params for STS #5790

Merged
merged 2 commits into from Mar 27, 2023

Conversation

Joffcom
Copy link
Member

@Joffcom Joffcom commented Mar 27, 2023

Github issue / Community forum post (link here to close automatically):

@github-actions
Copy link
Contributor

Great PR! Please pay attention to the following items before merging:

Files matching packages/**:

  • If fixing bug, added test to cover scenario.
  • If addressing forum or Github issue, added link to description.

Files matching packages/**/*.ts:

  • Added unit tests to cover new or updated functionality.

Make sure to check off this list before asking for review.

@@ -285,7 +285,7 @@ export class Aws implements ICredentialType {
const method = requestOptions.method;
let body = requestOptions.body;
let region = credentials.region;
const query = requestOptions.qs?.query as IDataObject;
let query = requestOptions.qs?.query as IDataObject;
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should we update this code to either use requestOptions.qs?.query if the JSON object is set, or to create the query object based on rest of the values in requestWithUri.qs, since the UI only allows only one of the options.

@n8n-assistant n8n-assistant bot added n8n team Authored by the n8n team node/improvement New feature or request labels Mar 27, 2023
@codecov
Copy link

codecov bot commented Mar 27, 2023

Codecov Report

Patch coverage has no change and project coverage change: -0.01 ⚠️

Comparison is base (18efaf3) 14.75% compared to head (2dbde02) 14.74%.

❗ Current head 2dbde02 differs from pull request most recent head 33ef733. Consider uploading reports for the commit 33ef733 to get more accurate results

Additional details and impacted files
@@            Coverage Diff             @@
##           master    #5790      +/-   ##
==========================================
- Coverage   14.75%   14.74%   -0.01%     
==========================================
  Files        2475     2475              
  Lines      113355   113357       +2     
  Branches    17699    17699              
==========================================
- Hits        16727    16720       -7     
- Misses      96085    96096      +11     
+ Partials      543      541       -2     
Impacted Files Coverage Δ
packages/nodes-base/credentials/Aws.credentials.ts 0.00% <0.00%> (ø)

... and 7 files with indirect coverage changes

Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here.

☔ View full report in Codecov by Sentry.
📢 Do you have feedback about the report comment? Let us know in this issue.

Copy link
Contributor

@agobrech agobrech left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@Joffcom Joffcom merged commit a1306c6 into master Mar 27, 2023
8 checks passed
@Joffcom Joffcom deleted the node-428-cant-use-sts-correctly-with-the-http branch March 27, 2023 15:56
@n8n-assistant n8n-assistant bot added the Upcoming Release Will be part of the upcoming release label Mar 27, 2023
netroy pushed a commit that referenced this pull request Mar 30, 2023
@janober
Copy link
Member

janober commented Apr 19, 2023

Got released with n8n@0.223.0

sunilrr pushed a commit to fl-g6/qp-n8n that referenced this pull request Apr 24, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
n8n team Authored by the n8n team node/improvement New feature or request Released Upcoming Release Will be part of the upcoming release
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants