-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore: release @credo-ts/rest 0.10.0 #240
Conversation
7a72683
to
bca2024
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
First need to update to Credo 0.5
bca2024
to
5dbf90c
Compare
6a8334c
to
4e66138
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The only thing I don't like is the 'trick' of using @Security
decorators to use authorization headers for tenants when they aren't actually meant for auth, but I guess it's something we should live with due to Swagger/TSOA (or their combination) limitations, right?
I think implementing it as auth in TSOA is fine as it's really only internal. Or do you also dislike that? Or is it the header? I do think a header is the simplest approach but I'm open to other solutions. Please let me know which parts you don't like (x-tenant-id header, using tsoa authentication logic for this (which is used internally), or the security mention in the swagger UI). Because all of them can be solved independently of the others |
Yeah using the parameter from the header is absolutely fine. I was referring mostly to the fact of calling it 'auth' because it can lead to some confusions, like the question raised by Warren when you presented this in last Credo contributors call. In practice, as you say, it is just something noticeable in Swagger UI, so it's not that important. Maybe the tenants header could be handled by a |
@genaris I've made improvements in #263, please let me know what you think! I can make ammendments in a follow up version if you would like to see it differently. The behaviour in general stays the same: x-tenant-id header to specify which tenant. But we can tweak how it's shown in SwaggerUI/openapi.json as well as how it works internally (kept it as authentication for now as it applies perfectly for what we're trying to do) |
Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
4e66138
to
bdf8742
Compare
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #240 +/- ##
=======================================
Coverage 57.95% 57.95%
=======================================
Files 95 95
Lines 2528 2528
Branches 513 513
=======================================
Hits 1465 1465
Misses 983 983
Partials 80 80 ☔ View full report in Codecov by Sentry. |
Nicely done, @TimoGlastra ! |
🤖 I have created a release *beep* *boop*
0.10.0 (2024-03-31)
⚠ BREAKING CHANGES
Features
Bug Fixes
Miscellaneous Chores
This PR was generated with Release Please. See documentation.