Skip to content

[STG-1573] Add providerOptions for extensible model auth#1822

Open
bbclanker wants to merge 27 commits intomainfrom
shrey/bedrock-auth-passthrough
Open

[STG-1573] Add providerOptions for extensible model auth#1822
bbclanker wants to merge 27 commits intomainfrom
shrey/bedrock-auth-passthrough

Conversation

@bbclanker
Copy link

@bbclanker bbclanker commented Mar 13, 2026

Summary

  • Add providerOptions bag to model config schema for provider-specific auth (Bedrock, Vertex, future providers) without polluting the shared schema with vendor-specific fields
  • Make modelApiKey optional so providers with non-API-key auth (e.g. AWS SigV4) can work without it
  • Server stores modelClientOptions from session start and reuses them on subsequent act/observe/extract/execute calls — SDKs don't need to reimplement this logic
  • Send modelClientOptions (including providerOptions) in the session start request body; server merges stored + per-request config

What this enables

  • Bedrock: pass region, accessKeyId, secretAccessKey, sessionToken via providerOptions
  • Vertex: pass project, location, googleAuthOptions via providerOptions
  • Future providers: any provider with non-standard auth just adds fields to providerOptions — zero schema or server changes needed

Architecture

SDK                          Server                       AI SDK
─────────────────────────    ─────────────────────────    ──────────────
modelClientOptions: {        Stores in session,           createAmazonBedrock({
  apiKey?,                   merges on each request,        apiKey,
  providerOptions: {    ──►  passes to V3 constructor ──►   region,
    region,                                                 accessKeyId,
    accessKeyId,             Server is vendor-agnostic:     secretAccessKey,
    ...                      just passes providerOptions    ...
  }                          through unchanged            })
}

Linked PRs

Testing

image image

@changeset-bot
Copy link

changeset-bot bot commented Mar 13, 2026

⚠️ No Changeset found

Latest commit: 5f06f70

Merging this PR will not cause a version bump for any packages. If these changes should not result in a new version, you're good to go. If these changes should result in a version bump, you need to add a changeset.

This PR includes no changesets

When changesets are added to this PR, you'll see the packages that this PR includes changesets for and the associated semver types

Click here to learn what changesets are, and how to add one.

Click here if you're a maintainer who wants to add a changeset to this PR

@github-actions
Copy link
Contributor

github-actions bot commented Mar 13, 2026

✱ Stainless preview builds

This PR will update the stagehand SDKs with the following commit message.

feat: Bedrock auth passthrough

Edit this comment to update it. It will appear in the SDK's changelogs.

stagehand-go studio · code · diff

Your SDK build had at least one "note" diagnostic, but this did not represent a regression.
generate ✅build ✅lint ✅test ✅

go get github.com/stainless-sdks/stagehand-go@5cf023686f9b08ab0a95652e77af6f5b403b52cd
stagehand-typescript studio · code · diff

Your SDK build had at least one "warning" diagnostic, but this did not represent a regression.
generate ⚠️build ✅lint ✅test ✅

npm install https://pkg.stainless.com/s/stagehand-typescript/7712c27470d60125d019ab36e0430de3323a8c07/dist.tar.gz
stagehand-ruby studio · code · diff

Your SDK build had at least one "note" diagnostic, but this did not represent a regression.
generate ✅build ✅lint ✅test ✅

stagehand-csharp studio · code · diff

Your SDK build had at least one new note diagnostic, which is a regression from the base state.
generate ⚠️build ❗lint ❗test ✅

New diagnostics (1 note)
💡 Name/Renamed: 41 names were renamed due to language constraints, so fallback names will be used instead.
stagehand-java studio · code · diff

Your SDK build had at least one "note" diagnostic, but this did not represent a regression.
generate ✅build ✅lint ✅test ✅

Add the following URL as a Maven source: 'https://pkg.stainless.com/s/stagehand-java/a164116cb9a70015fb60029dbaf730bcb9beec78/mvn'
stagehand-kotlin studio · code · diff

Your SDK build had at least one "note" diagnostic, but this did not represent a regression.
generate ✅build ✅lint ✅test ✅

⚠️ stagehand-python studio · code · diff

Your SDK build had a failure in the lint CI job, which is a regression from the base state.
generate ⚠️build ✅lint ❗ (prev: lint ✅) → test ✅

pip install https://pkg.stainless.com/s/stagehand-python/30129fbb82d1eff298f3bf4e28eaf9c11b60d608/stagehand-3.18.0-py3-none-any.whl
stagehand-php studio · code · diff

Your SDK build had at least one "warning" diagnostic, but this did not represent a regression.
generate ⚠️lint ✅test ✅

stagehand-openapi studio · code · diff

Your SDK build had at least one "note" diagnostic, but this did not represent a regression.
generate ✅


This comment is auto-generated by GitHub Actions and is automatically kept up to date as you push.
If you push custom code to the preview branch, re-run this workflow to update the comment.
Last updated: 2026-03-26 09:48:40 UTC

Copy link
Contributor

@cubic-dev-ai cubic-dev-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

3 issues found across 21 files

Confidence score: 3/5

  • There is some regression risk from configuration merge behavior changes, so this is not a no-risk merge despite looking contained to option-preparation paths (all flagged issues are medium severity at 6/10).
  • Most severe impact is in packages/server-v4/src/lib/header.ts: getRequestModelConfig can ignore body.modelName when body.options.model is an object, which may select the wrong model/provider for clients using mixed old/new payload fields.
  • packages/core/lib/v3/api.ts and packages/server-v3/src/lib/InMemorySessionStore.ts both have spread-order override hazards (apiKey fallback being clobbered, and modelClientOptions.modelName overriding explicit modelName), which could cause auth/config mismatches at runtime.
  • Pay close attention to packages/server-v4/src/lib/header.ts, packages/core/lib/v3/api.ts, packages/server-v3/src/lib/InMemorySessionStore.ts - merge-order and fallback precedence can silently change effective model configuration.
Prompt for AI agents (unresolved issues)

Check if these issues are valid — if so, understand the root cause of each and fix them. If appropriate, use sub-agents to investigate and fix each issue separately.


<file name="packages/server-v4/src/lib/header.ts">

<violation number="1" location="packages/server-v4/src/lib/header.ts:49">
P2: `getRequestModelConfig` short-circuits on `body.options.model` existing as an object, dropping the old fallback to `body.modelName`. If a client sends `{ options: { model: { provider: "bedrock" } }, modelName: "some-model" }`, the old `getModelName` would find `"some-model"` via the `body.modelName` fallback, but the new code returns `undefined` because `getRequestModelConfig` returns the model object (which lacks `modelName`) without ever checking `body.modelName`.</violation>
</file>

<file name="packages/core/lib/v3/api.ts">

<violation number="1" location="packages/core/lib/v3/api.ts:660">
P2: Spread order in `prepareModelConfig` can clobber the resolved `apiKey` fallback. `resolveModelClientOptions` already merges `model` into its result and then adds a fallback `apiKey`—but `...model` is re-spread on top, overwriting that key if `model` carries an explicit `apiKey: undefined`. Swap the spread order so `resolveModelClientOptions` output takes precedence:

```ts
return {
  ...model,
  ...this.resolveModelClientOptions(provider, model),
};

This ensures the fallback apiKey (and any Bedrock credentials) aren't silently clobbered.

P2: The `...modelClientOptions` spread is placed after the explicit `modelName`, so any `modelName` key present in `params.modelClientOptions` (which is not filtered) will silently override the intended model name. Place the spread before `modelName` so the explicit value always takes precedence. ```
Architecture diagram
sequenceDiagram
    participant SDK as Stagehand SDK (V3)
    participant API as API Client
    participant Srv as Server (API Route)
    participant Store as Session Store
    participant AWS as AWS Bedrock

    Note over SDK, AWS: Session Initialization (Start)

    SDK->>API: init(modelClientOptions)
    API->>API: NEW: toSessionStartModelClientOptions()<br/>(Serializes Bedrock region/keys)
    API->>Srv: POST /sessions/start (JSON body)
    Note right of API: Body includes NEW: modelClientOptions<br/>(accessKeyId, secretAccessKey, etc.)
    Srv->>Store: NEW: createSession(modelClientOptions)
    Store->>Store: Persist provider settings for session
    Store-->>Srv: sessionId
    Srv-->>API: 200 OK
    API-->>SDK: Session Ready

    Note over SDK, AWS: Action Execution (e.g., act / extract)

    SDK->>API: act({ input, options })
    API->>API: NEW: prepareModelConfig()<br/>(Resolves default vs override creds)
    API->>Srv: POST /act (JSON body)
    Note right of API: Body contains options.model object<br/>with AWS credentials
    
    Srv->>Srv: NEW: getRequestModelConfig()<br/>(Parses body for Bedrock keys)
    
    alt NEW: Credentials in body
        Srv->>Srv: Use body credentials
    else CHANGED: Credentials missing in body
        Srv->>Srv: Fallback to x-model-api-key header
    end

    Srv->>Store: getV3Options(requestContext)
    Store->>Store: NEW: Merge Session settings + Request overrides
    Store-->>Srv: V3Options (with resolved BedrockProviderSettings)
    
    Srv->>AWS: Execute Model Call
    Note right of Srv: Request authorized using passed-through<br/>AWS Access Key / Session Token
    AWS-->>Srv: Model Response
    Srv-->>API: Streamed Action Results
    API-->>SDK: Result
Loading

Reply with feedback, questions, or to request a fix. Tag @cubic-dev-ai to re-run a review.

@greptile-apps
Copy link
Contributor

greptile-apps bot commented Mar 13, 2026

Greptile Summary

This PR adds AWS Bedrock as a first-class model provider by threading provider-specific credential objects (accessKeyId, secretAccessKey, sessionToken, region, headers) through the full SDK-to-server stack, replacing the single x-model-api-key header approach for providers that require multi-field authentication.

Key changes:

  • BedrockProviderSettings type added to ClientOptions union; new Zod schema fields added to ModelConfigObjectSchema and a new ModelClientOptionsSchema for session-level options
  • Client (api.ts): new resolveModelClientOptions() merges session and per-request credentials; getDefaultModelConfig() injects the session model into every tool call body so the server always receives credentials even when no per-request model is specified; modelApiKey is no longer required at session init (intentional for IAM-role Bedrock usage)
  • Server: getRequestModelConfig() consolidates model config extraction for both session-start and per-request shapes; buildV3Options() merges params.modelClientOptions (stored at session start) with per-request overrides and correctly skips adding apiKey when explicit AWS credentials are present
  • OpenAPI specs updated to make ModelApiKey security scheme optional, reflecting providers that authenticate via request body instead of the header

Issues found:

  • toSessionStartModelClientOptions is called with the raw modelClientOptions argument rather than the fully-merged this.modelClientOptions; when modelApiKey + modelClientOptions are both provided, the merged apiKey is absent from the session body and must be reconstructed per-call from the header
  • The headers serialization guard in toSessionStartModelClientOptions does not explicitly reject Fetch Headers instances, which pass all current checks but serialize to {} via JSON.stringify
  • getRequestModelConfig() in both server-v3 and server-v4 header.ts is a new public export with non-trivial dual-path extraction logic but no JSDoc comment

Confidence Score: 3/5

  • Functionally correct for the primary Bedrock use-cases, but two edge-case logic gaps (session body missing merged apiKey; Headers instance serialization) and missing documentation warrant attention before merging.
  • The overall credential flow is well-thought-out and the tests cover the core Bedrock scenarios. However, the asymmetry between this.modelClientOptions (has merged apiKey) and the session body's modelClientOptions (doesn't) creates a subtle discrepancy that works today due to the header fallback but is fragile if the header mechanism is ever removed. The Headers instance serialization gap is a real edge case for users who pass a Fetch Headers object for custom Bedrock headers. The missing JSDoc on a non-trivial public utility function reduces long-term maintainability. None of these are showstoppers, but together they warrant a round of cleanup.
  • packages/core/lib/v3/api.ts (merged-apiKey inconsistency and Headers filter gap); packages/server-v4/src/lib/header.ts and packages/server-v3/src/lib/header.ts (missing documentation)

Important Files Changed

Filename Overview
packages/core/lib/v3/api.ts Core API client changes: adds modelClientOptions passthrough, getDefaultModelConfig(), resolveModelClientOptions(), and toSessionStartModelClientOptions() to support Bedrock auth. Removes required modelApiKey check. Headers filtering in toSessionStartModelClientOptions has a gap for Headers instances.
packages/core/lib/v3/types/public/model.ts Adds BedrockProviderSettings type picking the relevant fields from @ai-sdk/amazon-bedrock and adds it to the ClientOptions union. Clean addition.
packages/core/lib/v3/types/public/api.ts Adds AWS Bedrock fields (region, accessKeyId, secretAccessKey, sessionToken, headers) to ModelConfigObjectSchema, introduces ModelClientOptionsSchema for session-level credentials, and adds a second security scheme variant without ModelApiKey. Well-structured changes.
packages/server-v4/src/lib/header.ts Replaces getModelName internals with new getRequestModelConfig() helper that also extracts top-level modelClientOptions from session-start requests. Missing JSDoc on the new exported function.
packages/server-v4/src/lib/InMemorySessionStore.ts Refactors buildV3Options to merge session-level modelClientOptions (from session start) with per-request model config, correctly handling the Bedrock case where AWS credentials are used instead of an API key.

Sequence Diagram

sequenceDiagram
    participant SDK as Stagehand SDK (v3.ts)
    participant Client as StagehandAPIClient
    participant Server as Server (start.ts)
    participant Store as InMemorySessionStore
    participant AI as AI Provider (Bedrock / OpenAI)

    Note over SDK,AI: Session Initialization
    SDK->>Client: init({ modelName, modelApiKey?, modelClientOptions? })
    Client->>Client: merge modelApiKey into this.modelClientOptions
    Client->>Server: POST /sessions/start<br/>body: { modelName, modelClientOptions }<br/>header: x-model-api-key (if apiKey present)
    Server->>Store: createSession({ modelName, modelClientOptions })
    Store-->>Server: sessionId
    Server-->>Client: { sessionId, available }

    Note over SDK,AI: Per-Request Tool Call (e.g. act)
    SDK->>Client: act({ input, options? })
    Client->>Client: getDefaultModelConfig()<br/>→ { modelName, ...modelClientOptions }
    Client->>Server: POST /act<br/>body: { options: { model: { modelName, credentials... } } }<br/>header: x-model-api-key (if apiKey present)
    Server->>Server: getRequestModelConfig(request)<br/>→ ctx.modelConfig
    Server->>Store: getOrCreateStagehand(sessionId, ctx)
    Store->>Store: buildV3Options:<br/>merge params.modelClientOptions + ctx.modelConfig<br/>apply ctx.modelApiKey if no explicit creds
    Store->>AI: Stagehand call with merged credentials
    AI-->>Store: result
    Store-->>Server: result
    Server-->>Client: streaming response
Loading

Last reviewed commit: a15158e

The server already stores modelClientOptions from session start and
merges them into subsequent requests. This removes the redundant
client-side persistence (getDefaultModelConfig, resolveModelClientOptions,
modelName/modelClientOptions fields) so that language SDKs don't each
need to reimplement this logic.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Copy link
Contributor

@cubic-dev-ai cubic-dev-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

1 issue found across 2 files (changes from recent commits).

Prompt for AI agents (unresolved issues)

Check if these issues are valid — if so, understand the root cause of each and fix them. If appropriate, use sub-agents to investigate and fix each issue separately.


<file name="packages/core/lib/v3/api.ts">

<violation number="1">
P2: Custom agent: **Any breaking changes to Stagehand REST API client / server implementation must be covered by an integration test under packages/server/test**

These API client changes (removing default model injection on follow-up requests and simplifying `prepareModelConfig` to drop Bedrock credential merging) alter the wire format sent by act/extract/observe/agent calls. Per project rules, breaking changes to `packages/core/lib/v3/api.ts` must be covered by at least one integration test under `packages/server-v3/test/` or `packages/server-v4/test/`. Only a unit test (`packages/core/tests/unit/api-client-model-config.test.ts`) was added — consider adding an integration test that verifies end-to-end model config forwarding (e.g., session-start with `modelClientOptions` followed by an act/extract call that confirms the server receives the expected model configuration).</violation>
</file>

Reply with feedback, questions, or to request a fix. Tag @cubic-dev-ai to re-run a review.

@shrey150 shrey150 changed the title Bedrock auth passthrough STG-1573: Bedrock auth passthrough Mar 13, 2026
@shrey150 shrey150 changed the title STG-1573: Bedrock auth passthrough [STG-1573] Bedrock auth passthrough Mar 13, 2026
Instead of adding AWS-specific fields (region, accessKeyId,
secretAccessKey, sessionToken) as top-level fields in the shared
ModelConfigObjectSchema, move them into a providerOptions bag that
is passed through to the AI SDK provider constructor.

This keeps the shared schema generic (apiKey, baseURL, headers,
providerOptions) and avoids vendor-specific logic in the server.
TypeScript types provide autocomplete for known providers (Bedrock,
Vertex) via a union type on ClientOptions.providerOptions.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Copy link
Contributor

@cubic-dev-ai cubic-dev-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

3 issues found across 8 files (changes from recent commits).

Prompt for AI agents (unresolved issues)

Check if these issues are valid — if so, understand the root cause of each and fix them. If appropriate, use sub-agents to investigate and fix each issue separately.


<file name="packages/core/lib/v3/types/public/api.ts">

<violation number="1" location="packages/core/lib/v3/types/public/api.ts:80">
P2: Custom agent: **Any breaking changes to Stagehand REST API client / server implementation must be covered by an integration test under packages/server/test**

This schema change (removing `region`/`accessKeyId`/`secretAccessKey`/`sessionToken` in favor of `providerOptions`) is a breaking change to the public API surface. No integration test under `packages/server-v4/test/integration/` validates that the new `providerOptions` field (or the session-level `modelClientOptions` carrying it) round-trips correctly through the server routes. Add at least one integration test (e.g., in `start.test.ts` or a new file) that sends a session-start request with `modelClientOptions.providerOptions` and verifies it is preserved end-to-end.</violation>
</file>

<file name="packages/server-v3/src/lib/InMemorySessionStore.ts">

<violation number="1" location="packages/server-v3/src/lib/InMemorySessionStore.ts:219">
P2: Removing the `hasExplicitAwsCredentials` guard means `ctx.modelApiKey` will now be injected into `modelClientOptions` even when AWS credentials (`accessKeyId`, `secretAccessKey`, `sessionToken`) are present. If a hosted environment sets a default model API key via the `x-model-api-key` header and a request supplies Bedrock AWS credentials without an explicit `apiKey`, the injected key could confuse the model client's auth path. Consider either keeping the guard or adding a comment explaining why it's safe to remove (e.g., the downstream client now correctly prioritizes AWS credentials over `apiKey`).</violation>
</file>

<file name="packages/core/lib/v3/llm/LLMProvider.ts">

<violation number="1" location="packages/core/lib/v3/llm/LLMProvider.ts:121">
P2: Shallow spread of `providerOptions` over `restOptions` silently drops the top-level `headers` when both objects carry a `headers` key (e.g., `GoogleVertexProviderSettings` also has `headers`). Consider merging the `headers` fields explicitly to avoid silent data loss.</violation>
</file>

Reply with feedback, questions, or to request a fix. Tag @cubic-dev-ai to re-run a review.

...requestModelClientOptions,
};

if (ctx.modelApiKey && modelClientOptions.apiKey === undefined) {
Copy link
Contributor

@cubic-dev-ai cubic-dev-ai bot Mar 13, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2: Removing the hasExplicitAwsCredentials guard means ctx.modelApiKey will now be injected into modelClientOptions even when AWS credentials (accessKeyId, secretAccessKey, sessionToken) are present. If a hosted environment sets a default model API key via the x-model-api-key header and a request supplies Bedrock AWS credentials without an explicit apiKey, the injected key could confuse the model client's auth path. Consider either keeping the guard or adding a comment explaining why it's safe to remove (e.g., the downstream client now correctly prioritizes AWS credentials over apiKey).

Prompt for AI agents
Check if this issue is valid — if so, understand the root cause and fix it. At packages/server-v3/src/lib/InMemorySessionStore.ts, line 219:

<comment>Removing the `hasExplicitAwsCredentials` guard means `ctx.modelApiKey` will now be injected into `modelClientOptions` even when AWS credentials (`accessKeyId`, `secretAccessKey`, `sessionToken`) are present. If a hosted environment sets a default model API key via the `x-model-api-key` header and a request supplies Bedrock AWS credentials without an explicit `apiKey`, the injected key could confuse the model client's auth path. Consider either keeping the guard or adding a comment explaining why it's safe to remove (e.g., the downstream client now correctly prioritizes AWS credentials over `apiKey`).</comment>

<file context>
@@ -216,16 +216,7 @@ export class InMemorySessionStore implements SessionStore {
-      modelClientOptions.apiKey === undefined &&
-      !hasExplicitAwsCredentials
-    ) {
+    if (ctx.modelApiKey && modelClientOptions.apiKey === undefined) {
       modelClientOptions.apiKey = ctx.modelApiKey;
     }
</file context>
Suggested change
if (ctx.modelApiKey && modelClientOptions.apiKey === undefined) {
const hasExplicitAwsCredentials =
modelClientOptions.accessKeyId !== undefined ||
modelClientOptions.secretAccessKey !== undefined ||
modelClientOptions.sessionToken !== undefined;
if (
ctx.modelApiKey &&
modelClientOptions.apiKey === undefined &&
!hasExplicitAwsCredentials
) {

✅ Addressed in 93410e3

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This says it was addressed but maybe the fix was reverted? As is:

if (ctx.modelApiKey && modelClientOptions.apiKey === undefined) {
  modelClientOptions.apiKey = ctx.modelApiKey;
}

a request using accessKeyId / secretAccessKey can still get a top-level apiKey added on top I believe

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Addressed in 2eca76af — added a hasBedrockCredentials guard so requests with accessKeyId/secretAccessKey skip the apiKey injection.

shrey150 and others added 2 commits March 12, 2026 20:16
- LLMProvider: verify providerOptions is flattened into AI SDK
  constructor args (bedrock with region, empty providerOptions,
  no providerOptions)
- API client: verify prepareModelConfig attaches apiKey for
  same-provider overrides and works without apiKey for Bedrock
  per-call overrides with providerOptions

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
- Regenerate openapi.v3.yaml and openapi.v4.yaml to include
  modelClientOptions with providerOptions in SessionStartRequest
- Remove Record<string, unknown> fallback from providerOptions
  union type so TypeScript autocomplete works for Bedrock and
  Vertex provider options

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@shrey150 shrey150 changed the title [STG-1573] Bedrock auth passthrough [STG-1573] Add providerOptions for extensible model auth Mar 13, 2026
Hosted deployments (core) don't persist modelClientOptions
server-side. Store the serialized session model config in the
SDK client and resend it as options.model on each act/observe/
extract/agentExecute call when no explicit model is provided.

This is a simple passthrough — no vendor logic, no complex
merging. The SDK just echoes back what the server needs.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Copy link
Contributor

@cubic-dev-ai cubic-dev-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

1 issue found across 2 files (changes from recent commits).

Prompt for AI agents (unresolved issues)

Check if these issues are valid — if so, understand the root cause of each and fix them. If appropriate, use sub-agents to investigate and fix each issue separately.


<file name="packages/core/lib/v3/api.ts">

<violation number="1" location="packages/core/lib/v3/api.ts:223">
P2: Redundant call to `toSessionStartModelClientOptions` — `serializedMco` computed three lines above is the same result and should be reused in the request body.</violation>
</file>

Reply with feedback, questions, or to request a fix. Tag @cubic-dev-ai to re-run a review.

Copy link
Contributor

@cubic-dev-ai cubic-dev-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

3 issues found across 13 files (changes from recent commits).

Prompt for AI agents (unresolved issues)

Check if these issues are valid — if so, understand the root cause of each and fix them. If appropriate, use sub-agents to investigate and fix each issue separately.


<file name="packages/server-v3/openapi.v3.yaml">

<violation number="1" location="packages/server-v3/openapi.v3.yaml:94">
P2: Copy-paste error: `baseURL` example in all four Bedrock-specific schemas shows `https://api.openai.com/v1` instead of a Bedrock endpoint. This will confuse consumers of the API docs / generated SDK examples.</violation>

<violation number="2" location="packages/server-v3/openapi.v3.yaml:202">
P2: `GenericModelConfigObject.provider` enum includes `bedrock`, which overlaps with the dedicated Bedrock schemas in the `anyOf`. A Bedrock request supplying only `modelName` validates against the generic branch, silently skipping the Bedrock-required `providerOptions`. Consider removing `bedrock` from the generic enum (it is covered by the two Bedrock-specific schemas) or adding a `discriminator` on the `provider` field.</violation>
</file>

<file name="packages/core/lib/v3/types/public/api.ts">

<violation number="1" location="packages/core/lib/v3/types/public/api.ts:339">
P1: Custom agent: **Any breaking changes to Stagehand REST API client / server implementation must be covered by an integration test under packages/server/test**

Breaking API schema changes (`ModelConfigObjectSchema` → union, `ModelClientOptionsSchema` → union, `providerOptions` narrowed from open record to strict typed union) have no corresponding integration tests in `packages/server-v3/test/` or `packages/server-v4/test/`. Add integration tests to `start.test.ts` (or a new test file) in both server packages covering at least: (1) session start with Bedrock API-key auth, (2) session start with Bedrock AWS credentials, and (3) session start with generic/non-Bedrock provider options.</violation>
</file>

Reply with feedback, questions, or to request a fix. Tag @cubic-dev-ai to re-run a review.

Copy link
Contributor

@cubic-dev-ai cubic-dev-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

1 issue found across 9 files (changes from recent commits).

Prompt for AI agents (unresolved issues)

Check if these issues are valid — if so, understand the root cause of each and fix them. If appropriate, use sub-agents to investigate and fix each issue separately.


<file name="packages/server-v3/src/lib/InMemorySessionStore.ts">

<violation number="1" location="packages/server-v3/src/lib/InMemorySessionStore.ts:223">
P2: This check hardcodes AWS credential field names in the vendor-agnostic session store, contradicting the PR's extensibility design. Consider a generic signal instead—e.g. a `skipApiKey` boolean in `providerOptions`—so future non-API-key providers don't require server-side changes.

Additionally, this non-obvious interaction between `providerOptions` and `apiKey` injection deserves an inline comment explaining why AWS credentials suppress the API key fallback.

(Based on your team's feedback about documenting complex logic and edge-case interactions inline.) [FEEDBACK_USED]</violation>
</file>

Reply with feedback, questions, or to request a fix. Tag @cubic-dev-ai to re-run a review.

Copy link
Contributor

@cubic-dev-ai cubic-dev-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

2 issues found across 3 files (changes from recent commits).

Prompt for AI agents (unresolved issues)

Check if these issues are valid — if so, understand the root cause of each and fix them. If appropriate, use sub-agents to investigate and fix each issue separately.


<file name="packages/server-v3/openapi.v3.yaml">

<violation number="1">
P1: The provider enum is missing `vertex` and several other supported AI SDK providers, which will cause OpenAPI validation to incorrectly reject valid models.</violation>

<violation number="2" location="packages/server-v3/openapi.v3.yaml:83">
P2: The `ProviderOptions` schema will reject arbitrary fields for new providers, contradicting the PR's claim that future providers require "zero schema changes".</violation>
</file>

Reply with feedback, questions, or to request a fix. Tag @cubic-dev-ai to re-run a review.

Copy link
Contributor

@cubic-dev-ai cubic-dev-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

3 issues found across 2 files (changes from recent commits).

Prompt for AI agents (unresolved issues)

Check if these issues are valid — if so, understand the root cause of each and fix them. If appropriate, use sub-agents to investigate and fix each issue separately.


<file name="packages/core/lib/v3/types/public/api.ts">

<violation number="1" location="packages/core/lib/v3/types/public/api.ts:262">
P2: Use a nested apiKey path when validating `SessionStartRequestSchema`; the current hardcoded `['apiKey']` points to the wrong field.</violation>

<violation number="2" location="packages/core/lib/v3/types/public/api.ts:289">
P1: Custom agent: **Any breaking changes to Stagehand REST API client / server implementation must be covered by an integration test under packages/server/test**

Rule 2 requires integration coverage for changed public API request-shape behavior, but these new Bedrock validation branches were added without corresponding server integration tests (especially the new rejection paths). Add `packages/server-*/test/integration/*` cases that exercise the new Bedrock validation outcomes.</violation>
</file>

<file name="packages/core/tests/unit/model-config-schema.test.ts">

<violation number="1" location="packages/core/tests/unit/model-config-schema.test.ts:114">
P3: This test is scoped to `SessionStartRequestSchema` but validates `ModelClientOptionsSchema`, so it doesn't actually verify session-start acceptance for generic provider options.</violation>
</file>

Reply with feedback, questions, or to request a fix. Tag @cubic-dev-ai to re-run a review.

Copy link
Contributor

@cubic-dev-ai cubic-dev-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

1 issue found across 6 files (changes from recent commits).

Prompt for AI agents (unresolved issues)

Check if these issues are valid — if so, understand the root cause of each and fix them. If appropriate, use sub-agents to investigate and fix each issue separately.


<file name="packages/server-v3/test/integration/v3/agentExecute.test.ts">

<violation number="1" location="packages/server-v3/test/integration/v3/agentExecute.test.ts:335">
P2: Ensure browser harness cleanup still runs when `endSession` fails; the current `await` order can skip `browserHarness.close()` and leak test resources.</violation>
</file>

Reply with feedback, questions, or to request a fix. Tag @cubic-dev-ai to re-run a review.

shrey150 and others added 7 commits March 24, 2026 20:44
Resolve merge conflicts in:
- packages/core/lib/v3/types/public/api.ts: keep providerConfig + main's updated headers description
- packages/server-v3/openapi.v3.yaml: keep providerConfig schema entries + main's headers descriptions
- packages/server-v3/src/routes/v1/sessions/_id/observe.ts: combine imports (ModelConfiguration from bedrock + ObserveOptions/Variables from main)

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Wrap endSession in nested try/finally so browserHarness.close() always
runs even if endSession throws, preventing test resource leaks.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Use delete instead of underscore-prefixed destructuring to exclude
properties from rest spreads, avoiding no-unused-vars lint errors.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
...requestModelClientOptions,
};

if (ctx.modelApiKey && modelClientOptions.apiKey === undefined) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This says it was addressed but maybe the fix was reverted? As is:

if (ctx.modelApiKey && modelClientOptions.apiKey === undefined) {
  modelClientOptions.apiKey = ctx.modelApiKey;
}

a request using accessKeyId / secretAccessKey can still get a top-level apiKey added on top I believe

@monadoid
Copy link
Contributor

For strictness, could add a superRefine that requires:region OR
exactly one auth mode: apiKey or accessKeyId + secretAccessKey with optional sessionToken

This would better follow "parse, don't validate", but maybe falls under "taste". Otherwise, LGTM.

shrey150 and others added 2 commits March 26, 2026 02:37
Prevents Bedrock requests with accessKeyId/secretAccessKey from
getting a spurious apiKey added via the x-model-api-key header fallback.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@shrey150 shrey150 force-pushed the shrey/bedrock-auth-passthrough branch from 2eca76a to e287c46 Compare March 26, 2026 09:39
Extends the existing superRefine in addProviderConfigValidation to
catch mutually exclusive auth modes at parse time.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@shrey150
Copy link
Contributor

Addressed in 5f06f70c — extended the existing superRefine in addProviderConfigValidation to reject configs that pass both apiKey and Bedrock credentials (accessKeyId/secretAccessKey).

@shrey150 shrey150 requested a review from monadoid March 26, 2026 09:43
Copy link
Contributor

@cubic-dev-ai cubic-dev-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

2 issues found across 1 file (changes from recent commits).

Prompt for AI agents (unresolved issues)

Check if these issues are valid — if so, understand the root cause of each and fix them. If appropriate, use sub-agents to investigate and fix each issue separately.


<file name="packages/core/lib/v3/types/public/api.ts">

<violation number="1" location="packages/core/lib/v3/types/public/api.ts:61">
P2: Mutual-exclusion validation for `apiKey` and Bedrock credentials is only enforced for `ModelConfig`, not for `SessionStartRequest.modelClientOptions`, so conflicting auth can still be accepted at session start.</violation>

<violation number="2" location="packages/core/lib/v3/types/public/api.ts:70">
P1: Custom agent: **Any breaking changes to Stagehand REST API client / server implementation must be covered by an integration test under packages/server/test**

Rule 3 violation: this new Bedrock auth mutual-exclusion validation changes public API request behavior, but there is no integration test covering the new rejection case. Add a server-v3 integration test that sends `model` with `apiKey` plus Bedrock `providerConfig.options.accessKeyId/secretAccessKey` and asserts a 400 with the validation error.

(Based on your team's feedback about checking providerConfig-related coverage in server-v3 integration tests first.) [FEEDBACK_USED]</violation>
</file>

Reply with feedback, questions, or to request a fix. Tag @cubic-dev-ai to re-run a review.

"accessKeyId" in providerConfig.options &&
"secretAccessKey" in providerConfig.options;

if (hasApiKey && hasAwsCredentials) {
Copy link
Contributor

@cubic-dev-ai cubic-dev-ai bot Mar 26, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1: Custom agent: Any breaking changes to Stagehand REST API client / server implementation must be covered by an integration test under packages/server/test

Rule 3 violation: this new Bedrock auth mutual-exclusion validation changes public API request behavior, but there is no integration test covering the new rejection case. Add a server-v3 integration test that sends model with apiKey plus Bedrock providerConfig.options.accessKeyId/secretAccessKey and asserts a 400 with the validation error.

(Based on your team's feedback about checking providerConfig-related coverage in server-v3 integration tests first.)

View Feedback

Prompt for AI agents
Check if this issue is valid — if so, understand the root cause and fix it. At packages/core/lib/v3/types/public/api.ts, line 70:

<comment>Rule 3 violation: this new Bedrock auth mutual-exclusion validation changes public API request behavior, but there is no integration test covering the new rejection case. Add a server-v3 integration test that sends `model` with `apiKey` plus Bedrock `providerConfig.options.accessKeyId/secretAccessKey` and asserts a 400 with the validation error.

(Based on your team's feedback about checking providerConfig-related coverage in server-v3 integration tests first.) </comment>

<file context>
@@ -57,6 +57,24 @@ function addProviderConfigValidation<
+      "accessKeyId" in providerConfig.options &&
+      "secretAccessKey" in providerConfig.options;
+
+    if (hasApiKey && hasAwsCredentials) {
+      ctx.addIssue({
+        code: z.ZodIssueCode.custom,
</file context>
Fix with Cubic

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Integration tests exist in packages/server-v3/tests/integration/v3/start.test.ts covering session start with typed providerConfig (acceptance + rejection of mismatched config). Server-v4 doesn't have providerConfig plumbing, so no analogous tests needed there.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Got it—I'll check the server-v3 integration tests at packages/server-v3/tests/integration/v3/start.test.ts and avoid asking for server-v4 providerConfig tests.

});
}

const hasApiKey = "apiKey" in value && typeof value.apiKey === "string";
Copy link
Contributor

@cubic-dev-ai cubic-dev-ai bot Mar 26, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2: Mutual-exclusion validation for apiKey and Bedrock credentials is only enforced for ModelConfig, not for SessionStartRequest.modelClientOptions, so conflicting auth can still be accepted at session start.

Prompt for AI agents
Check if this issue is valid — if so, understand the root cause and fix it. At packages/core/lib/v3/types/public/api.ts, line 61:

<comment>Mutual-exclusion validation for `apiKey` and Bedrock credentials is only enforced for `ModelConfig`, not for `SessionStartRequest.modelClientOptions`, so conflicting auth can still be accepted at session start.</comment>

<file context>
@@ -57,6 +57,24 @@ function addProviderConfigValidation<
       });
     }
+
+    const hasApiKey = "apiKey" in value && typeof value.apiKey === "string";
+    const hasAwsCredentials =
+      providerConfig?.provider === "bedrock" &&
</file context>
Fix with Cubic

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

By design — SessionStartRequest.modelClientOptions is the raw transport bag and doesn't carry apiKey at the top level (the fallback API key comes from the x-model-api-key header, not the request body). The mutual-exclusion validation is enforced on ModelConfigSchema which is the canonical shape used in act/extract/observe/agent requests where both apiKey and providerConfig can appear together.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the feedback! I've updated an existing learning with this new information.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants