Skip to content

Comments

[feature] SC-166737/improve app proxy security by restricting where token replacements can go#75

Open
HappyPaul55 wants to merge 1 commit intomainfrom
SC-166737/improve-app-proxy-security-by-restricting-where-token-replacements-can-go
Open

[feature] SC-166737/improve app proxy security by restricting where token replacements can go#75
HappyPaul55 wants to merge 1 commit intomainfrom
SC-166737/improve-app-proxy-security-by-restricting-where-token-replacements-can-go

Conversation

@HappyPaul55
Copy link
Contributor

This pull request adds settings injection functionality to the manifest.json file, allowing sensitive credentials to be dynamically injected into API requests. This improves security and flexibility for authentication and authorization.

Settings injection for API requests:

  • Added settingsInjection for the __instance_url__ endpoint, enabling the access_token to be injected into the Authorization header.
  • Added settingsInjection for the https://login.wrike.com/oauth2/.* endpoint, enabling client_id and client_secret to be injected into the request body.

@HappyPaul55 HappyPaul55 requested a review from a team as a code owner November 14, 2025 12:02
@github-actions
Copy link

Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR adds settingsInjection configuration to the manifest.json to enable dynamic credential injection into API requests through the proxy whitelist, improving security by allowing sensitive credentials to be automatically injected rather than manually constructed in code.

  • Added settings injection for the instance URL endpoint to inject access_token into the Authorization header
  • Added settings injection for the Wrike OAuth2 endpoint to inject client_id and client_secret into request bodies

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant