Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Conversation

@jackbridger
Copy link

No description provided.

Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment on lines +60 to +63
return new Response(JSON.stringify(json), {
status: 200,
headers: {
'Content-Type': 'application/json',

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Preserve upstream status and headers when proxying authorize response

The handler always rewraps a successful upstream response into new Response(JSON.stringify(json), { status: 200, headers: { 'Content-Type': 'application/json' } }). This discards the status code and all headers returned by the Layercode endpoint, notably Set-Cookie and any non‑200 status codes. If the authorize endpoint relies on cookies or returns 401/403 for invalid credentials, the caller will never see those headers or the correct status, so the session flow cannot succeed. Consider returning the original response (or cloning it) so status and headers propagate intact.

Useful? React with 👍 / 👎.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants

Morty Proxy This is a proxified and sanitized view of the page, visit original site.