Skip to content

Conversation

@waitong94
Copy link

Description

Please provide a brief description of the changes in this PR.

What type of PR is this?

Related Issue

Fixes #<issue_number>

Changes Made in this PR

  • Change 1
  • Change 2

How Has This Been Tested?

Checklist

  • I have rebased my branch on top of the latest main branch (git pull origin main)
  • I have run make check to ensure code is properly formatted and passes all lint checks
  • I have run make test or make test_changed to verify test coverage (~90% required)
  • I have added tests that fail without my code changes (for bug fixes)
  • I have added tests covering variants of new features (for new features)

Additional Information

Add any other context, screenshots, or information about the PR here.

@waitong94 waitong94 changed the title Waitong/synth and no locust loading [Feature] Together AI provider, Synthetic datasets, and QPS-based Traffic Pattern Oct 20, 2025
@JimmyWhitaker JimmyWhitaker mentioned this pull request Nov 5, 2025
5 tasks
@CatherineSue CatherineSue marked this pull request as ready for review November 17, 2025 20:41
Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

ℹ️ About Codex in GitHub

Codex has been enabled to automatically review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

When you sign up for Codex through ChatGPT, Codex can also answer questions or update the PR, like "@codex address that feedback".

Comment on lines +49 to +55
self.headers = None
if auth_provider and hasattr(auth_provider, "get_credentials"):
token = auth_provider.get_credentials()
if token:
self.headers = {
"Authorization": f"Bearer {token}",
"Content-Type": "application/json",

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Open-loop runner forces bearer auth for every backend

Open-loop mode unconditionally builds headers as {"Authorization": f"Bearer {token}"} using whatever get_credentials() returns. For providers where get_credentials() returns a dict or uses non-bearer headers (e.g., Azure OpenAI returns { "api_key": ... }, AWS Bedrock returns AWS credential dict), this sends an invalid Authorization header like Bearer {'api_key': ...} and omits the provider-specific header (api-key, SigV4, etc.), so every request in non-locust mode will be rejected with 401/403. This makes the new open-loop runner unusable for any backend that isn't plain bearer-token auth.

Useful? React with 👍 / 👎.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants