feat(aws): add IAM and STS integrations#4137
Conversation
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
️✅ There are no secrets present in this pull request anymore.If these secrets were true positive and are still valid, we highly recommend you to revoke them. 🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request. |
PR SummaryHigh Risk Overview Implements authenticated Next.js API endpoints plus shared AWS SDK clients/utilities for IAM (users/roles/policies/groups/access keys) and STS (assume role, caller identity, session token, access key info), and wires them into the tool/block registries so they can be invoked as Reviewed by Cursor Bugbot for commit 64acaa6. Configure here. |
63f9a32 to
b57464e
Compare
Greptile SummaryAdds AWS IAM (18 operations) and STS (4 operations) integrations following the standard tools/block/icon/route pattern. Prior review feedback on Confidence Score: 5/5Safe to merge — all findings are P2 quality suggestions with no blocking defects. Prior review concerns (durationSeconds range validation, STS version format, distinct STSIcon) are fully addressed. The two remaining findings are minor: a missing JSON refine on assumeRolePolicyDocument and a missing .int() on maxItems. Neither causes incorrect behavior in the normal flow. apps/sim/app/api/tools/iam/create-role/route.ts (JSON validation), apps/sim/app/api/tools/iam/list-{users,roles,groups,policies}/route.ts (integer validation for maxItems) Important Files Changed
Sequence DiagramsequenceDiagram
participant UI as Workflow UI
participant Exec as Executor
participant Route as API Route
participant Utils as IAM/STS Utils
participant AWS as AWS SDK
UI->>Exec: Run IAM/STS block
Exec->>Route: POST /api/tools/iam/{operation}
Note over Route: checkInternalAuth
Note over Route: Zod schema validation
Route->>Utils: createIAMClient(credentials)
Utils-->>Route: IAMClient
Route->>Utils: operation(client, params)
Utils->>AWS: SDK Command (e.g. CreateUserCommand)
AWS-->>Utils: AWS response
Utils-->>Route: Mapped result object
Note over Route: client.destroy()
Route-->>Exec: JSON response
Exec-->>UI: Tool output (block outputs)
Reviews (2): Last reviewed commit: "lint" | Re-trigger Greptile |
- Fix CrowdStrike tags to include "security" (unintended removal) - Standardize STS tool versions to '1.0.0' (matching IAM convention) - Add range validation to durationSeconds in Zod schemas Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
a8ee591 to
64acaa6
Compare
|
@greptile |
|
@cursor review |
There was a problem hiding this comment.
Cursor Bugbot has reviewed your changes and found 1 potential issue.
❌ Bugbot Autofix is OFF. To automatically fix reported issues with cloud agents, enable autofix in the Cursor dashboard.
Reviewed by Cursor Bugbot for commit 64acaa6. Configure here.

Summary
Type of Change
Testing
Tested manually
Checklist