
Automation Fetch Data Step
Merge Strategy
The merge strategy gives users an option on how they want the data to be populated.replace- overwrite all properties in the Automation Cache with the http response. Removes all properties in the Automation Cache that do not exist in the http response.
soft-merge- only overwrite properties in the Automation Cache with the http response properties that do not yet exist in the Automation Cache.
overwrite- overwrite all properties in the Automation Cache with the properties from the http response.
none- do not make any changes to the Automation Cache if the Automation Cache already exists and has data. Otherwise initialize the Automation Cache.
Authentication Patterns
The Fetch Data step supports various authentication methods for securing your HTTP requests. Here are the most common patterns:1. Bearer Token Authentication
Use static bearer tokens for simple authentication:2. Dynamic Bearer Token (from context)
Reference bearer tokens from your automation context:3. Basic Authentication
Use HTTP Basic Authentication with base64-encoded credentials:4. API Key Authentication
Use custom API key headers:5. Custom Headers with Multiple Auth Elements
Combine multiple authentication elements:6. JavaScript Interpolation (V2 Automation)
Use JavaScript expressions for dynamic values:Security Features
URL Validation
Courier automatically validates URLs for security. Invalid URLs will cause the step to be skipped with an “Invalid URL” status.Request Timeout
All fetch requests have a fixed 10-second timeout to prevent hanging requests. Requests that exceed this timeout will automatically fail with proper error handling.Error Handling
Failed requests are automatically logged and tracked. The automation will continue processing subsequent steps unless explicitly configured otherwise.Best Practices
- Store sensitive tokens in run context data rather than hardcoding them in your automation configuration
- Use step references for authentication flows that require token refresh
- Implement proper error handling in subsequent steps to handle authentication failures
- Validate URLs when possible for security
- Use appropriate merge strategies to avoid overwriting important context data
- Test authentication flows thoroughly in your automation development environment
Accessing the Fetched Run Context
Once data is fetched, it will be populated in the data payload for subsequent steps to reference.
Notification Referencing Data

Notification Referencing Data

Template Rendering Fetched Data