-
Notifications
You must be signed in to change notification settings - Fork 6.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(FTP Node): FTP connection failed due to missing password credential in node #8131
fix(FTP Node): FTP connection failed due to missing password credential in node #8131
Conversation
Hey @vacitbaydarman, Thanks for the PR, I have just taken a quick look connecting to an SFTP server using a private key and it is working as expected. Looking at this PR it shouldn't cause anything to break but it would be nice to have a bit more context behind this one, Typically an SFTP server would be configured to accept either key or password based authentication in your configuration is the user password also required when performing key based authentication? |
Hi Jon,
Actually, in our development and test environments also it is working as
you said. But in production, we are using another server from a third
party and we could not connect to their sftp server without passing the
password with a private key. According to my research, some companies can
need a password and private key at the same time and our third party
company that we want to access track this way. So, if this does not affect
the other connector, we are appreciative of you to apply this PR to not
face this issue again at the next version upgrade.
I tested both of them and it seems good for both behaviour (privatekey and
password+privatekey)
Best regards,
*Mehmet Vacit Baydarman*
Solution Architect
Jon ***@***.***>, 2 Oca 2024 Sal, 11:59 tarihinde şunu yazdı:
… Hey @vacitbaydarman <https://github.com/vacitbaydarman>,
Thanks for the PR, I have just taken a quick look connecting to an SFTP
server using a private key and it is working as expected. Looking at this
PR it shouldn't cause anything to break but it would be nice to have a bit
more context behind this one, Typically an SFTP server would be configured
to accept either key or password based authentication in your configuration
is the user password also required when performing key based authentication?
—
Reply to this email directly, view it on GitHub
<#8131 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/A32TR2NQIYAUXSGCF25B63TYMPEAVAVCNFSM6AAAAABA6VSTY6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTQNZTG42TMMBTG4>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
--
The content of this e-mail and its attachments is intended only for the
addressee(s) and may contain confidential or private information. You have
no right to forward, copy, distribute, disclose, store, or use any part of
this message, if you are not the intended addressee. If you have received
this correspondence in error, please delete the message and all copies of
it from your system and notify the sender immediately. The delivery of this
message cannot be guaranteed to be timely, secure and error or virus-free.
The sender accepts no liability for any errors or omissions that may occur.
|
Hey @vacitbaydarman, Perfect thanks, I wondered if that was the case and I was thinking back to my old managed file transfer days around some of the settings that were commonly used and I don't think I ever had a case where someone wanted to use use both key based and password based for the same session 😄 I will give this another test in the morning to make sure it is all good but I can't see this breaking anything. |
Hi Jon,
That great, I agree with you 😀
So, I will wait for your response to be sure that the issue has been
resolved forever.
Thanks a lot for your collaboration.
Best regards,
*Mehmet Vacit Baydarman*
Solution Architect
Jon ***@***.***>, 2 Oca 2024 Sal, 19:27 tarihinde şunu yazdı:
… Hey @vacitbaydarman <https://github.com/vacitbaydarman>,
Perfect thanks, I wondered if that was the case and I was thinking back to
my old managed file transfer days around some of the settings that were
commonly used and I don't think I ever had a case where someone wanted to
use use both key based and password based for the same session 😄
I will give this another test in the morning to make sure it is all good
but I can't see this breaking anything.
—
Reply to this email directly, view it on GitHub
<#8131 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/A32TR2K2PWYKOQEPKENUTULYMQYQHAVCNFSM6AAAAABA6VSTY6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTQNZUGI2TANZVG4>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
--
The content of this e-mail and its attachments is intended only for the
addressee(s) and may contain confidential or private information. You have
no right to forward, copy, distribute, disclose, store, or use any part of
this message, if you are not the intended addressee. If you have received
this correspondence in error, please delete the message and all copies of
it from your system and notify the sender immediately. The delivery of this
message cannot be guaranteed to be timely, secure and error or virus-free.
The sender accepts no liability for any errors or omissions that may occur.
|
* master: ci: Validate docs urls for langchain nodes as well (no-changelog) (#8271) fix: Small ui fixes to workflow cred setup modal (no-changelog) (#8280) fix: Fix issue with API key being required for the Qdrant Node (#8237) feat(Coda Node): Add User-Agent for requests to Coda (no-changelog) (#7771) fix(FTP Node): FTP connection failed due to missing password credential in node (#8131) ci: Fix lint setup in `chat` package (no-changelog) (#8275) ci: Fix codecov reporting, and include all packages (no-changelog) (#8276) fix(core): Fix test webhook deregistration (#8247) docs: Update links in deprecated langchain nodes to avoid linting errors (no-changelog) (#8273) fix: Fix user reinvites on FE and BE (#8261) docs: Update primaryDocumentation urls for nodes updated in #7651 (no-changelog) (#8270) feat: Add Chat Trigger node (#7409) fix(Github Trigger Node): Enforce SSL validation by default (#8265) fix(editor): Tweaking button sizes in execution preview (#8206) fix(core): Avoid wrapping `ExecutionBaseError` to prevent misreporting to Sentry (no-changelog) (#8262)
Summary
The credentials have been defined in the setup, but the password data was not passed to the connect method. As a result, the node throws the following exception.
Related tickets and issues
Review / Merge checklist
(no-changelog)
otherwise. (conventions)