DX - 5416 - feat: added support for the management token#50
Open
DX - 5416 - feat: added support for the management token#50
Conversation
🔒 Security Scan Results
⏱️ SLA Breach Summary
✅ BUILD PASSED - All security checks passed |
1 similar comment
🔒 Security Scan Results
⏱️ SLA Breach Summary
✅ BUILD PASSED - All security checks passed |
aman19K
approved these changes
Mar 25, 2026
sunil-lakshman
approved these changes
Mar 25, 2026
🔒 Security Scan Results
⏱️ SLA Breach Summary
✅ BUILD PASSED - All security checks passed |
aman19K
approved these changes
Mar 25, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
feat/DX-5416 — Stack export:
stack.json,invalidKeys, management-token manifestSummary
Extends the stack export module so exports include a
stack/stack.jsonfile in addition tostack/settings.json, with clear behavior for session auth vs management token flows. Stack metadata is stripped using configurableinvalidKeysso sensitive or non-portable fields are not written to disk.Changes
Full stack export (OAuth / Basic / authtoken — no management token)
settings.json, writesstack.jsonfromstack.fetch(), withlodash/omitapplied usingmodules.stack.invalidKeys(default:SYS_ACL,user_uids,owner_uid).getStack()snapshot when available to avoid a secondstack.fetch()where possible.Management token export
getStack(),exportStack(), orexportStackSettings()for stack metadata files.stack/stack.jsonwith{ "api_key": "<exportConfig.apiKey>" }only (from alias / resolved config). Does not write the management token or other secrets into the file.Config
StackConfig/ defaultmodules.stackincludeinvalidKeyswith the default values above.Other
org_uidresolution usesorg_uid ?? organization_uidwhen applying analysis data.progress-strategy-registry: stack module remains registered withPrimaryProcessStrategy(STACK_SETTINGS).Testing
test/unit/export/modules/stack.test.ts:invalidKeysomit behavior, management-token path writesapi_keyonly and does not call SDK stack methods /getStack,settings.jsonnot written for that scenario.