Skip to content

Conversation

@adamrefaey
Copy link
Collaborator

Change

Add permission to read Perplexity API key from Secrets Manager

Does this PR introduce a breaking change?

{...}

What needs to be documented once your changes are merged?

{...}

Additional Comments

{...}

@adamrefaey adamrefaey requested a review from Copilot April 24, 2025 17:01
@adamrefaey adamrefaey self-assigned this Apr 24, 2025
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR adds permission for the backend to read the Perplexity API key from AWS Secrets Manager.

  • Introduces a new IAM policy statement for Secrets Manager access.
  • Adds the policy to the taskRole in the backend-stack configuration.
Comments suppressed due to low confidence (1)

backend/src/iac/backend-stack.ts:185

  • Verify that the secret ARN correctly matches the actual ARN format for Secrets Manager. If the secret name includes extra characters or a version suffix, consider using a wildcard to avoid potential permission issues.
          `arn:aws:secretsmanager:${this.region}:${this.account}:secret:med-ai-perplexity-key`,

@adamrefaey adamrefaey requested a review from GuidoBR April 24, 2025 17:08
@GuidoBR GuidoBR merged commit 33f9b16 into main Apr 24, 2025
1 check passed
@adamrefaey adamrefaey deleted the NO-TICKET-FIX-ROLE-SECRETS-PERPLEXITY branch April 24, 2025 17:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants