-
Notifications
You must be signed in to change notification settings - Fork 33
[Feature] Together AI provider, Synthetic datasets, and QPS-based Traffic Pattern #95
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
[Feature] Together AI provider, Synthetic datasets, and QPS-based Traffic Pattern #95
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
💡 Codex Review
Here are some automated review suggestions for this pull request.
ℹ️ About Codex in GitHub
Codex has been enabled to automatically review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
When you sign up for Codex through ChatGPT, Codex can also answer questions or update the PR, like "@codex address that feedback".
| self.headers = None | ||
| if auth_provider and hasattr(auth_provider, "get_credentials"): | ||
| token = auth_provider.get_credentials() | ||
| if token: | ||
| self.headers = { | ||
| "Authorization": f"Bearer {token}", | ||
| "Content-Type": "application/json", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Open-loop runner forces bearer auth for every backend
Open-loop mode unconditionally builds headers as {"Authorization": f"Bearer {token}"} using whatever get_credentials() returns. For providers where get_credentials() returns a dict or uses non-bearer headers (e.g., Azure OpenAI returns { "api_key": ... }, AWS Bedrock returns AWS credential dict), this sends an invalid Authorization header like Bearer {'api_key': ...} and omits the provider-specific header (api-key, SigV4, etc.), so every request in non-locust mode will be rejected with 401/403. This makes the new open-loop runner unusable for any backend that isn't plain bearer-token auth.
Useful? React with 👍 / 👎.
Description
Please provide a brief description of the changes in this PR.
What type of PR is this?
Related Issue
Fixes #<issue_number>
Changes Made in this PR
How Has This Been Tested?
Checklist
git pull origin main)make checkto ensure code is properly formatted and passes all lint checksmake testormake test_changedto verify test coverage (~90% required)Additional Information
Add any other context, screenshots, or information about the PR here.