Skip to content

fix: pass X-User-Id header in M2M API calls#9

Merged
raghavyuva merged 1 commit intomainfrom
fix/m2m-user-id-header
Apr 8, 2026
Merged

fix: pass X-User-Id header in M2M API calls#9
raghavyuva merged 1 commit intomainfrom
fix/m2m-user-id-header

Conversation

@raghavyuva
Copy link
Copy Markdown
Contributor

Summary

  • Forward the triggering user's ID from requestContext as an X-User-Id header when making M2M-authenticated API calls to Nixopus, enabling proper user context on the API side.

Test plan

  • Deploy alongside the companion API branch (fix/m2m-user-context-passthrough)
  • Trigger an incident and verify the agent's tool calls to the API succeed with proper user context
  • Verify the X-User-Id header is present in outbound requests when userId is in the request context

Forward the triggering user's ID from requestContext to the Nixopus
API so M2M-authenticated requests carry proper user context.
@raghavyuva raghavyuva merged commit 3f9e825 into main Apr 8, 2026
1 check passed
@raghavyuva raghavyuva deleted the fix/m2m-user-id-header branch April 8, 2026 09:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant