-
Notifications
You must be signed in to change notification settings - Fork 107
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add support for Q&A Schema App input #539
feat: add support for Q&A Schema App input #539
Conversation
🦋 Changeset detectedLatest commit: 72ec19d The changes in this PR will be included in the next version bump. This PR includes changesets to release 2 packages
Not sure what this means? Click here to learn what changesets are. Click here if you're a maintainer who wants to add another changeset to this PR |
a0bde6e
to
232d0a4
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A couple of nits and a small UI suggestion
oAuthClientId: stringDef('Partner OAuth Client Id'), | ||
oAuthClientSecret: stringDef('Partner OAuth Client Secret'), | ||
oAuthTokenUrl: stringDef('Partner OAuth Refresh Token URL', { validate: httpsURLValidate }), | ||
oAuthScope: stringDef('Partner OAuth Scope'), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The scope is actually optional. I imagine most real integrations will have it, but Viper doesn't require it and examples sometimes omit it.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed.
icon3x: optionalStringDef('3x Icon URL', { validate: httpsURLValidate }), | ||
oAuthClientId: stringDef('Partner OAuth Client Id'), | ||
oAuthClientSecret: stringDef('Partner OAuth Client Secret'), | ||
oAuthTokenUrl: stringDef('Partner OAuth Refresh Token URL', { validate: httpsURLValidate }), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Minor UI point, but I think it's easier if oauthTokenUrl
immediately follows oauthAuthorizationUrl
since they are both likely to be copied and pasted from the same root URL.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed.
|
||
const helpText = awsHelpText | ||
const initiallyActive = initialValue?.hostingType === 'lambda' | ||
console.error(`initiallyActive is ${initiallyActive} for ${name} because initialValue?.hostingType = ${initialValue?.hostingType}`) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this temporary?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oops, meant to take that out. Fixed.
} | ||
|
||
const initiallyActive = initialValue?.hostingType === 'webhook' | ||
console.error(`initiallyActive is ${initiallyActive} for Webhook URL because initialValue?.hostingType = ${initialValue?.hostingType}`) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this temporary?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oops, didn't mean to leave that in. Fixed.
232d0a4
to
d60ce66
Compare
Not nits at all. Glad to fix those things! |
d60ce66
to
72ec19d
Compare
Add support for Q&A input for Schema Apps.
Checklist
npm run lint
produces no warnings/errors)