diff --git a/.github/workflows/docker-images-rpi.yml b/.github/workflows/docker-images-rpi.yml index 34c8761ecd..e2990e0d2c 100644 --- a/.github/workflows/docker-images-rpi.yml +++ b/.github/workflows/docker-images-rpi.yml @@ -19,9 +19,10 @@ jobs: run: docker login -u ${{ secrets.DOCKER_USERNAME }} -p ${{ secrets.DOCKER_PASSWORD }} - name: Set up Docker Buildx - uses: crazy-max/ghaction-docker-buildx@v1 + uses: crazy-max/ghaction-docker-buildx@v3 with: - version: latest + buildx-version: latest + qemu-version: latest - name: Run Buildx (push image) if: success() run: | diff --git a/packages/cli/BREAKING-CHANGES.md b/packages/cli/BREAKING-CHANGES.md index 68be5ce947..9269427ae0 100644 --- a/packages/cli/BREAKING-CHANGES.md +++ b/packages/cli/BREAKING-CHANGES.md @@ -2,6 +2,26 @@ This list shows all the versions which include breaking changes and how to upgrade. +## 0.79.0 + +### What changed? + +We have renamed the operations in the Todoist Node for consistency with the codebase. We also deleted the `close_match` and `delete_match` operations as these can be accomplished using the following operations: `getAll`, `close`, and `delete`. + +### When is action necessary? + +When one of the following operations is used: + +- close_by +- close_match +- delete_id +- delete_match + +### How to upgrade: + +After upgrading, open all workflows which contain the Todoist Node. Set the corresponding operation, and then save the workflow. + +If the operations `close_match` or `delete_match` are used, recreate them using the operations: `getAll`, `delete`, and `close`. ## 0.69.0 diff --git a/packages/cli/package.json b/packages/cli/package.json index f275e61c62..e14f9d45d1 100644 --- a/packages/cli/package.json +++ b/packages/cli/package.json @@ -1,6 +1,6 @@ { "name": "n8n", - "version": "0.78.0", + "version": "0.79.0", "description": "n8n Workflow Automation Tool", "license": "SEE LICENSE IN LICENSE.md", "homepage": "https://n8n.io", @@ -101,8 +101,8 @@ "mongodb": "^3.5.5", "mysql2": "^2.0.1", "n8n-core": "~0.43.0", - "n8n-editor-ui": "~0.54.0", - "n8n-nodes-base": "~0.73.0", + "n8n-editor-ui": "~0.55.0", + "n8n-nodes-base": "~0.74.0", "n8n-workflow": "~0.39.0", "oauth-1.0a": "^2.2.6", "open": "^7.0.0", diff --git a/packages/cli/src/Server.ts b/packages/cli/src/Server.ts index b201217f7d..9ff844d36e 100644 --- a/packages/cli/src/Server.ts +++ b/packages/cli/src/Server.ts @@ -213,64 +213,65 @@ class App { const jwtAuthHeader = await GenericHelpers.getConfigValue('security.jwtAuth.jwtHeader') as string; if (jwtAuthHeader === '') { throw new Error('JWT auth is activated but no request header was defined. Please set one!'); - } + } const jwksUri = await GenericHelpers.getConfigValue('security.jwtAuth.jwksUri') as string; if (jwksUri === '') { throw new Error('JWT auth is activated but no JWK Set URI was defined. Please set one!'); - } - const jwtHeaderValuePrefix = await GenericHelpers.getConfigValue('security.jwtAuth.jwtHeaderValuePrefix') as string; - const jwtIssuer = await GenericHelpers.getConfigValue('security.jwtAuth.jwtIssuer') as string; - const jwtNamespace = await GenericHelpers.getConfigValue('security.jwtAuth.jwtNamespace') as string; - const jwtAllowedTenantKey = await GenericHelpers.getConfigValue('security.jwtAuth.jwtAllowedTenantKey') as string; - const jwtAllowedTenant = await GenericHelpers.getConfigValue('security.jwtAuth.jwtAllowedTenant') as string; + } + const jwtHeaderValuePrefix = await GenericHelpers.getConfigValue('security.jwtAuth.jwtHeaderValuePrefix') as string; + const jwtIssuer = await GenericHelpers.getConfigValue('security.jwtAuth.jwtIssuer') as string; + const jwtNamespace = await GenericHelpers.getConfigValue('security.jwtAuth.jwtNamespace') as string; + const jwtAllowedTenantKey = await GenericHelpers.getConfigValue('security.jwtAuth.jwtAllowedTenantKey') as string; + const jwtAllowedTenant = await GenericHelpers.getConfigValue('security.jwtAuth.jwtAllowedTenant') as string; - function isTenantAllowed(decodedToken: object): Boolean { - if (jwtNamespace === '' || jwtAllowedTenantKey === '' || jwtAllowedTenant === '') return true; - else { - for (let [k, v] of Object.entries(decodedToken)) { - if (k === jwtNamespace) { - for (let [kn, kv] of Object.entries(v)) { - if (kn === jwtAllowedTenantKey && kv === jwtAllowedTenant) { - return true; - } - } - } - } - } - return false; - } + function isTenantAllowed(decodedToken: object): boolean { + if (jwtNamespace === '' || jwtAllowedTenantKey === '' || jwtAllowedTenant === '') return true; + else { + for (const [k, v] of Object.entries(decodedToken)) { + if (k === jwtNamespace) { + for (const [kn, kv] of Object.entries(v)) { + if (kn === jwtAllowedTenantKey && kv === jwtAllowedTenant) { + return true; + } + } + } + } + } + return false; + } - this.app.use((req: express.Request, res: express.Response, next: express.NextFunction) => { - if (req.url.match(authIgnoreRegex)) { - return next(); - } + this.app.use((req: express.Request, res: express.Response, next: express.NextFunction) => { + if (req.url.match(authIgnoreRegex)) { + return next(); + } - var token = req.header(jwtAuthHeader) as string; - if (token === undefined || token === '') { - return ResponseHelper.jwtAuthAuthorizationError(res, "Missing token"); - } - if (jwtHeaderValuePrefix != '' && token.startsWith(jwtHeaderValuePrefix)) { - token = token.replace(jwtHeaderValuePrefix + ' ', '').trimLeft(); - } + let token = req.header(jwtAuthHeader) as string; + if (token === undefined || token === '') { + return ResponseHelper.jwtAuthAuthorizationError(res, "Missing token"); + } + if (jwtHeaderValuePrefix != '' && token.startsWith(jwtHeaderValuePrefix)) { + token = token.replace(jwtHeaderValuePrefix + ' ', '').trimLeft(); + } - const jwkClient = jwks({ cache: true, jwksUri }); - function getKey(header: any, callback: Function) { // tslint:disable-line:no-any - jwkClient.getSigningKey(header.kid, (err: Error, key: any) => { // tslint:disable-line:no-any - if (err) throw ResponseHelper.jwtAuthAuthorizationError(res, err.message); + const jwkClient = jwks({ cache: true, jwksUri }); + function getKey(header: any, callback: Function) { // tslint:disable-line:no-any + jwkClient.getSigningKey(header.kid, (err: Error, key: any) => { // tslint:disable-line:no-any + if (err) throw ResponseHelper.jwtAuthAuthorizationError(res, err.message); - const signingKey = key.publicKey || key.rsaPublicKey; - callback(null, signingKey); - }); - } + const signingKey = key.publicKey || key.rsaPublicKey; + callback(null, signingKey); + }); + } - var jwtVerifyOptions: jwt.VerifyOptions = { - issuer: jwtIssuer != '' ? jwtIssuer : undefined, - ignoreExpiration: false - } - jwt.verify(token, getKey, jwtVerifyOptions, (err: jwt.VerifyErrors, decoded: object) => { - if (err) ResponseHelper.jwtAuthAuthorizationError(res, 'Invalid token'); - else if (!isTenantAllowed(decoded)) ResponseHelper.jwtAuthAuthorizationError(res, 'Tenant not allowed'); - else next(); + const jwtVerifyOptions: jwt.VerifyOptions = { + issuer: jwtIssuer !== '' ? jwtIssuer : undefined, + ignoreExpiration: false + }; + + jwt.verify(token, getKey, jwtVerifyOptions, (err: jwt.VerifyErrors, decoded: object) => { + if (err) ResponseHelper.jwtAuthAuthorizationError(res, 'Invalid token'); + else if (!isTenantAllowed(decoded)) ResponseHelper.jwtAuthAuthorizationError(res, 'Tenant not allowed'); + else next(); }); }); } @@ -296,6 +297,8 @@ class App { // Make sure that each request has the "parsedUrl" parameter this.app.use((req: express.Request, res: express.Response, next: express.NextFunction) => { (req as ICustomRequest).parsedUrl = parseUrl(req); + // @ts-ignore + req.rawBody = new Buffer('', 'base64'); next(); }); @@ -309,11 +312,13 @@ class App { // Support application/xml type post data // @ts-ignore - this.app.use(bodyParser.xml({ limit: '16mb', xmlParseOptions: { - normalize: true, // Trim whitespace inside text nodes - normalizeTags: true, // Transform tags to lowercase - explicitArray: false, // Only put properties in array if length > 1 - } })); + this.app.use(bodyParser.xml({ + limit: '16mb', xmlParseOptions: { + normalize: true, // Trim whitespace inside text nodes + normalizeTags: true, // Transform tags to lowercase + explicitArray: false, // Only put properties in array if length > 1 + } + })); this.app.use(bodyParser.text({ limit: '16mb', verify: (req, res, buf) => { @@ -1008,8 +1013,8 @@ class App { hash_function(base, key) { const algorithm = (signatureMethod === 'HMAC-SHA1') ? 'sha1' : 'sha256'; return createHmac(algorithm, key) - .update(base) - .digest('base64'); + .update(base) + .digest('base64'); }, }); @@ -1209,7 +1214,7 @@ class App { // Verify and store app code. Generate access tokens and store for respective credential. this.app.get(`/${this.restEndpoint}/oauth2-credential/callback`, async (req: express.Request, res: express.Response) => { - const {code, state: stateEncoded } = req.query; + const { code, state: stateEncoded } = req.query; if (code === undefined || stateEncoded === undefined) { const errorResponse = new ResponseHelper.ResponseError('Insufficient parameters for OAuth2 callback. Received following query parameters: ' + JSON.stringify(req.query), undefined, 503); @@ -1643,7 +1648,7 @@ class App { response = await this.activeWorkflowRunner.executeWebhook('GET', requestUrl, req, res); } catch (error) { ResponseHelper.sendErrorResponse(res, error); - return ; + return; } if (response.noWebhookResponse === true) { @@ -1835,13 +1840,13 @@ export async function start(): Promise { let server; - if (app.protocol === 'https' && app.sslKey && app.sslCert){ + if (app.protocol === 'https' && app.sslKey && app.sslCert) { const https = require('https'); const privateKey = readFileSync(app.sslKey, 'utf8'); const cert = readFileSync(app.sslCert, 'utf8'); - const credentials = { key: privateKey,cert }; - server = https.createServer(credentials,app.app); - }else{ + const credentials = { key: privateKey, cert }; + server = https.createServer(credentials, app.app); + } else { const http = require('http'); server = http.createServer(app.app); } diff --git a/packages/core/src/ActiveWebhooks.ts b/packages/core/src/ActiveWebhooks.ts index 69bc731b08..5b69fab246 100644 --- a/packages/core/src/ActiveWebhooks.ts +++ b/packages/core/src/ActiveWebhooks.ts @@ -50,20 +50,20 @@ export class ActiveWebhooks { // it gets called this.webhookUrls[webhookKey] = webhookData; - const webhookExists = await workflow.runWebhookMethod('checkExists', webhookData, NodeExecuteFunctions, mode, this.testWebhooks); - if (webhookExists === false) { - // If webhook does not exist yet create it - try { + try { + const webhookExists = await workflow.runWebhookMethod('checkExists', webhookData, NodeExecuteFunctions, mode, this.testWebhooks); + if (webhookExists === false) { + // If webhook does not exist yet create it await workflow.runWebhookMethod('create', webhookData, NodeExecuteFunctions, mode, this.testWebhooks); - } catch (error) { - // If there was a problem unregister the webhook again - delete this.webhookUrls[webhookKey]; - delete this.workflowWebhooks[webhookData.workflowId]; - throw error; } - } + } catch (error) { + // If there was a problem unregister the webhook again + delete this.webhookUrls[webhookKey]; + delete this.workflowWebhooks[webhookData.workflowId]; + throw error; + } this.workflowWebhooks[webhookData.workflowId].push(webhookData); } diff --git a/packages/editor-ui/package.json b/packages/editor-ui/package.json index ec2fcbd4fb..a325c78abd 100644 --- a/packages/editor-ui/package.json +++ b/packages/editor-ui/package.json @@ -1,6 +1,6 @@ { "name": "n8n-editor-ui", - "version": "0.54.0", + "version": "0.55.0", "description": "Workflow Editor UI for n8n", "license": "SEE LICENSE IN LICENSE.md", "homepage": "https://n8n.io", diff --git a/packages/editor-ui/src/Interface.ts b/packages/editor-ui/src/Interface.ts index 881e938b60..2f3973b848 100644 --- a/packages/editor-ui/src/Interface.ts +++ b/packages/editor-ui/src/Interface.ts @@ -417,3 +417,5 @@ export interface ITimeoutHMS { minutes: number; seconds: number; } + +export type WorkflowTitleStatus = 'EXECUTING' | 'IDLE' | 'ERROR'; diff --git a/packages/editor-ui/src/components/CredentialsEdit.vue b/packages/editor-ui/src/components/CredentialsEdit.vue index a69ad78e24..9ea199ef38 100644 --- a/packages/editor-ui/src/components/CredentialsEdit.vue +++ b/packages/editor-ui/src/components/CredentialsEdit.vue @@ -1,7 +1,29 @@