Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(api-service): decode special characters #7881

Draft
wants to merge 6 commits into
base: next
Choose a base branch
from

Conversation

djabarovgeorge
Copy link
Contributor

What changed? Why was the change needed?

Screenshots

Expand for optional sections

Related enterprise PR

Special notes for your reviewer

Copy link

linear bot commented Mar 9, 2025

Copy link

netlify bot commented Mar 9, 2025

Deploy Preview for dashboard-v2-novu-staging ready!

Name Link
🔨 Latest commit 2290cc4
🔍 Latest deploy log https://app.netlify.com/sites/dashboard-v2-novu-staging/deploys/67ceabbeb3a03e0008f30f8f
😎 Deploy Preview https://deploy-preview-7881.dashboard-v2.novu-staging.co
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

Copy link

pkg-pr-new bot commented Mar 9, 2025

Open in Stackblitz

npm i https://pkg.pr.new/novuhq/novu/@novu/framework@7881
npm i https://pkg.pr.new/novuhq/novu@7881

commit: 2290cc4

@@ -829,6 +829,19 @@ export class Client {
return getCodeResult;
}
}

type ChannelStepOption = {
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the option type here is not correct and is hard to reuse because of its dynamic nature; therefore, i created a simple type for now.
in addition I created a ticket to solve the typing issue.

Comment on lines +866 to +873
const skipOutputSanitization = (stepType: string, outputKey: string) => {
// Skip sanitization for string values that aren't HTML
if (outputKey === 'subject' && stepType === 'email') {
return true;
}

return false;
};
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We need to change this and do the opposite and sanitize only HTML outputs instead, as this could happen on all of the channels.

@djabarovgeorge djabarovgeorge marked this pull request as draft March 10, 2025 09:06
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant