Skip to content

Conversation

@ibolmo
Copy link
Collaborator

@ibolmo ibolmo commented Jan 24, 2026

No description provided.

@ibolmo ibolmo self-assigned this Jan 24, 2026
@vercel
Copy link

vercel bot commented Jan 24, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Review Updated (UTC)
ai-proxy Ready Ready Preview, Comment Jan 27, 2026 1:39am

Request Review

Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: d881a0a4d3

ℹ️ About Codex in GitHub

Codex has been enabled to automatically review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

When you sign up for Codex through ChatGPT, Codex can also answer questions or update the PR, like "@codex address that feedback".

Comment on lines 40 to 44
auth_type: z
.enum(["iam_credentials", "api_key"])
.default("iam_credentials"),
access_key: z.string().nullish(),
session_token: z.string().nullish(),

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Badge Require access_key when using IAM credentials

The schema now allows access_key to be null for all Bedrock secrets while auth_type defaults to iam_credentials. In that default path the runtime code still dereferences accessKeyId! when building credentials, so a secret created without access_key will pass validation but later send undefined to the AWS SDK and fail authentication at runtime. This only happens when auth_type is omitted or set to iam_credentials, so consider making access_key required for that case (or adding conditional validation) to avoid silent misconfiguration.

Useful? React with 👍 / 👎.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants