-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix for issue #11505 #11527
Fix for issue #11505 #11527
Conversation
Fixes the issue Azure#11505 (Azure#11505)
Thank you for your contribution gmantri! We will review the pull request and get back to you soon. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks a lot for your contribution! The changes look good in general, I just have a question about the scenario where an ACL is set without an access policy as the REST API documentation doesn’t seem to explicitly say which elements are required.
The change itself looks good to me. Two additional issues:
export interface SignedIdentifier {
/**
* @member {string} id a unique id
*/
id: string;
/**
* @member {AccessPolicy} accessPolicy
*/
accessPolicy: {
/**
* @member {Date} startsOn the date-time the policy is active.
*/
startsOn: Date;
/**
* @member {string} expiresOn the date-time the policy expires.
*/
expiresOn: Date;
/**
* @member {string} permissions the permissions for the acl policy
* @see https://docs.microsoft.com/en-us/rest/api/storageservices/set-share-acl
*/
permissions: string;
};
}
In File: for (const identifier of shareAcl || []) {
acl.push({
accessPolicy: {
expiresOn: truncatedISO8061Date(identifier.accessPolicy.expiresOn),
permissions: identifier.accessPolicy.permissions,
startsOn: truncatedISO8061Date(identifier.accessPolicy.startsOn)
},
id: identifier.id
});
} In Queue for (const identifier of queueAcl || []) {
acl.push({
accessPolicy: {
expiresOn: identifier.accessPolicy.expiresOn
? truncatedISO8061Date(identifier.accessPolicy.expiresOn)
: undefined,
permissions: identifier.accessPolicy.permissions,
startsOn: identifier.accessPolicy.startsOn
? truncatedISO8061Date(identifier.accessPolicy.startsOn)
: undefined
},
id: identifier.id
});
} |
Also want to hold the merge of this PR till after our October release as we changed the file structure and deleted this file in our feature branch. Merging this now would make it difficult to pick up the changes when merging. |
@ljian3377 ... What's the ETA for the October release? This is a blocking issue for us. One thing you could do is simply take the edits from my PR and make the changes in the feature branch accordingly. |
@gmantri If prerelease version on October 10th doesn't work for you, we may need to think about other workarounds. |
Can't change the accessPolicy in SignedIdentifier's fields and itself to optional as it's a breaking change. |
The change is taken and shipped in @azure/[email protected] with another PR. |
Fixes the issue #11505 (#11505)