fix(iam): auth validation in iam http client#75
Conversation
Greptile SummaryThis PR fixes auth validation in the IAM HTTP client by replacing the ad-hoc Confidence Score: 5/5Safe to merge — logic is correct, no regressions, and the auth validation is strictly improved. All changes are either straightforward validation improvements or routine dependency bumps. The removal of No files require special attention. Important Files Changed
Reviews (1): Last reviewed commit: "fix(iam): auth validation in iam http cl..." | Re-trigger Greptile |
1d81ba3 to
1727b82
Compare
|
🎉 This PR is included in version 1.4.1 🎉 The release is available on: Your semantic-release bot 📦🚀 |
Note
Medium Risk
Touches IAM client authentication/validation logic; mistakes could break IAM calls or unintentionally allow unauthenticated requests, though the change is localized to client creation.
Overview
Tightens
createIAMClientvalidation to require either asessionTokenor access-key credentials (accessKeyId+secretAccessKey), and only enforcesorganizationIdwhen a session token is used.This unblocks IAM calls that authenticate via access keys while still failing fast on missing/invalid auth configuration, without changing the request logic of individual IAM operations (e.g.,
whoami,listAccessKeys).Written by Cursor Bugbot for commit 1727b82. This will update automatically on new commits. Configure here.