@vfarcic/dot-ai 1.10.1 → 1.10.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/interfaces/mcp.js
CHANGED
|
@@ -403,7 +403,7 @@ class MCPServer {
|
|
|
403
403
|
// Handle CORS for browser-based clients
|
|
404
404
|
res.setHeader('Access-Control-Allow-Origin', '*');
|
|
405
405
|
res.setHeader('Access-Control-Allow-Methods', 'GET, POST, DELETE, OPTIONS');
|
|
406
|
-
res.setHeader('Access-Control-Allow-Headers', 'Content-Type, X-Session-Id, Authorization');
|
|
406
|
+
res.setHeader('Access-Control-Allow-Headers', 'Content-Type, X-Session-Id, Authorization, X-Dot-AI-Authorization');
|
|
407
407
|
if (req.method === 'OPTIONS') {
|
|
408
408
|
res.writeHead(204);
|
|
409
409
|
res.end();
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"middleware.d.ts","sourceRoot":"","sources":["../../../src/interfaces/oauth/middleware.ts"],"names":[],"mappings":"AAAA;;;;;;;;GAQG;AAEH,OAAO,EAAE,eAAe,EAAE,MAAM,WAAW,CAAC;AAE5C,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,SAAS,CAAC;AAG1C;;;;;;;;GAQG;AACH,wBAAgB,eAAe,CAAC,GAAG,EAAE,eAAe,GAAG,UAAU,
|
|
1
|
+
{"version":3,"file":"middleware.d.ts","sourceRoot":"","sources":["../../../src/interfaces/oauth/middleware.ts"],"names":[],"mappings":"AAAA;;;;;;;;GAQG;AAEH,OAAO,EAAE,eAAe,EAAE,MAAM,WAAW,CAAC;AAE5C,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,SAAS,CAAC;AAG1C;;;;;;;;GAQG;AACH,wBAAgB,eAAe,CAAC,GAAG,EAAE,eAAe,GAAG,UAAU,CA4FhE;AAED;;;GAGG;AACH,wBAAgB,aAAa,IAAI,OAAO,CAEvC"}
|
|
@@ -32,8 +32,10 @@ function checkBearerAuth(req) {
|
|
|
32
32
|
message: 'Authentication is not configured. Set DOT_AI_AUTH_TOKEN in your deployment.',
|
|
33
33
|
};
|
|
34
34
|
}
|
|
35
|
-
// Extract Authorization header
|
|
36
|
-
|
|
35
|
+
// Extract Authorization header, with X-Dot-AI-Authorization as fallback.
|
|
36
|
+
// The fallback supports Kubernetes API server proxy scenarios where the
|
|
37
|
+
// standard Authorization header is overwritten with a K8s bearer token.
|
|
38
|
+
const rawAuthHeader = req.headers['x-dot-ai-authorization'] || req.headers['authorization'];
|
|
37
39
|
if (!rawAuthHeader) {
|
|
38
40
|
return {
|
|
39
41
|
authorized: false,
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@vfarcic/dot-ai",
|
|
3
|
-
"version": "1.10.
|
|
3
|
+
"version": "1.10.2",
|
|
4
4
|
"description": "AI-powered development productivity platform that enhances software development workflows through intelligent automation and AI-driven assistance",
|
|
5
5
|
"mcpName": "io.github.vfarcic/dot-ai",
|
|
6
6
|
"main": "dist/index.js",
|