mirror of
https://github.com/n8n-io/n8n.git
synced 2024-11-16 01:24:05 -08:00
1501175b81
* Setup custom endpoints properties in AWS credentials type * Update AWS nodes to use new endpoints (if specified) * Fix a few error scenarios cases where message was being obscured * Extend usage of URL API to validate user inputted endpoints https://nodejs.org/docs/latest-v12.x/api/url.html * Add support to custom endpoints for SES Forgot to add this in my earlier commits… * Fix incorrect Amazon SES endpoint placeholder value * Fixed signing problems with path being ignored. Standardized to avoid future problems * Linting fix * ⚡ Make parameters optinal (wip) * Make sure that we fallback to correct URL without errors if custom endpoints are not used Co-authored-by: Luis Ramos <luis@ramos.dev> Co-authored-by: Omar Ajoue <krynble@gmail.com>
131 lines
4.7 KiB
TypeScript
131 lines
4.7 KiB
TypeScript
import {
|
|
URL,
|
|
} from 'url';
|
|
|
|
import {
|
|
sign,
|
|
} from 'aws4';
|
|
|
|
import {
|
|
get,
|
|
} from 'lodash';
|
|
|
|
import {
|
|
OptionsWithUri,
|
|
} from 'request';
|
|
|
|
import {
|
|
parseString,
|
|
} from 'xml2js';
|
|
|
|
import {
|
|
IExecuteFunctions,
|
|
IHookFunctions,
|
|
ILoadOptionsFunctions,
|
|
IWebhookFunctions,
|
|
} from 'n8n-core';
|
|
|
|
import {
|
|
IDataObject,
|
|
} from 'n8n-workflow';
|
|
|
|
export async function awsApiRequest(this: IHookFunctions | IExecuteFunctions | ILoadOptionsFunctions | IWebhookFunctions, service: string, method: string, path: string, body?: string | Buffer | IDataObject, query: IDataObject = {}, headers?: object, option: IDataObject = {}, region?: string): Promise<any> { // tslint:disable-line:no-any
|
|
const credentials = this.getCredentials('aws');
|
|
if (credentials === undefined) {
|
|
throw new Error('No credentials got returned!');
|
|
}
|
|
|
|
const endpoint = new URL(((credentials.rekognitionEndpoint as string || '').replace('{region}', credentials.region as string) || `https://${service}.${credentials.region}.amazonaws.com`) + path);
|
|
|
|
// Sign AWS API request with the user credentials
|
|
const signOpts = {headers: headers || {}, host: endpoint.host, method, path, body};
|
|
|
|
sign(signOpts, { accessKeyId: `${credentials.accessKeyId}`.trim(), secretAccessKey: `${credentials.secretAccessKey}`.trim()});
|
|
|
|
const options: OptionsWithUri = {
|
|
headers: signOpts.headers,
|
|
method,
|
|
uri: endpoint.href,
|
|
body: signOpts.body,
|
|
};
|
|
|
|
if (Object.keys(option).length !== 0) {
|
|
Object.assign(options, option);
|
|
}
|
|
try {
|
|
return await this.helpers.request!(options);
|
|
} catch (error) {
|
|
const errorMessage = (error.response && error.response.body.message) || (error.response && error.response.body.Message) || error.message;
|
|
|
|
if (error.statusCode === 403) {
|
|
if (errorMessage === 'The security token included in the request is invalid.') {
|
|
throw new Error('The AWS credentials are not valid!');
|
|
} else if (errorMessage.startsWith('The request signature we calculated does not match the signature you provided')) {
|
|
throw new Error('The AWS credentials are not valid!');
|
|
}
|
|
}
|
|
|
|
throw new Error(`AWS error response [${error.statusCode}]: ${errorMessage}`);
|
|
}
|
|
}
|
|
|
|
export async function awsApiRequestREST(this: IHookFunctions | IExecuteFunctions | ILoadOptionsFunctions, service: string, method: string, path: string, body?: string, query: IDataObject = {}, headers?: object, options: IDataObject = {}, region?: string): Promise<any> { // tslint:disable-line:no-any
|
|
const response = await awsApiRequest.call(this, service, method, path, body, query, headers, options, region);
|
|
try {
|
|
return JSON.parse(response);
|
|
} catch (e) {
|
|
return response;
|
|
}
|
|
}
|
|
|
|
export async function awsApiRequestSOAP(this: IHookFunctions | IExecuteFunctions | ILoadOptionsFunctions | IWebhookFunctions, service: string, method: string, path: string, body?: string | Buffer | IDataObject, query: IDataObject = {}, headers?: object, option: IDataObject = {}, region?: string): Promise<any> { // tslint:disable-line:no-any
|
|
const response = await awsApiRequest.call(this, service, method, path, body, query, headers, option, region);
|
|
try {
|
|
return await new Promise((resolve, reject) => {
|
|
parseString(response, { explicitArray: false }, (err, data) => {
|
|
if (err) {
|
|
return reject(err);
|
|
}
|
|
resolve(data);
|
|
});
|
|
});
|
|
} catch (e) {
|
|
return e;
|
|
}
|
|
}
|
|
|
|
export async function awsApiRequestSOAPAllItems(this: IHookFunctions | IExecuteFunctions | ILoadOptionsFunctions | IWebhookFunctions, propertyName: string, service: string, method: string, path: string, body?: string, query: IDataObject = {}, headers: IDataObject = {}, option: IDataObject = {}, region?: string): Promise<any> { // tslint:disable-line:no-any
|
|
|
|
const returnData: IDataObject[] = [];
|
|
|
|
let responseData;
|
|
|
|
do {
|
|
responseData = await awsApiRequestSOAP.call(this, service, method, path, body, query, headers, option, region);
|
|
|
|
//https://forums.aws.amazon.com/thread.jspa?threadID=55746
|
|
if (get(responseData, `${propertyName.split('.')[0]}.NextContinuationToken`)) {
|
|
query['continuation-token'] = get(responseData, `${propertyName.split('.')[0]}.NextContinuationToken`);
|
|
}
|
|
if (get(responseData, propertyName)) {
|
|
if (Array.isArray(get(responseData, propertyName))) {
|
|
returnData.push.apply(returnData, get(responseData, propertyName));
|
|
} else {
|
|
returnData.push(get(responseData, propertyName));
|
|
}
|
|
}
|
|
if (query.limit && query.limit <= returnData.length) {
|
|
return returnData;
|
|
}
|
|
} while (
|
|
get(responseData, `${propertyName.split('.')[0]}.IsTruncated`) !== undefined &&
|
|
get(responseData, `${propertyName.split('.')[0]}.IsTruncated`) !== 'false'
|
|
);
|
|
|
|
return returnData;
|
|
}
|
|
|
|
function queryToString(params: IDataObject) {
|
|
return Object.keys(params).map(key => key + '=' + params[key]).join('&');
|
|
}
|