-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Permit Request Authentication #71
Comments
/wallet 0xad40a8E345cB00b4530b3EBF39A22a99e1A43287 |
/query @aybanda |
/help |
Available Commands
|
Sorry @aybanda we just set up this new @ubiquity-os organization and it seems like we forgot to install our plugins. Let me work on that and then you should be able to set your wallet after! |
/help |
Available Commands
|
/query @aybanda |
@gentlementlegen query doesn't seem to work |
/start |
/query @0x4007 {
"truncated": false,
"outcome": "ok",
"scriptVersion": {
"id": "24cefe2f-72ad-491e-8af4-1aa61116d714"
},
"scriptName": "ubiquibot-command-query-user-development",
"diagnosticsChannelEvents": [],
"exceptions": [],
"logs": [],
"eventTimestamp": 1727294494442,
"event": {
"request": {
"url": "https://ubiquibot-command-query-user-development.ubiquity.workers.dev/manifest.json",
"method": "GET",
"headers": {
"accept-encoding": "gzip",
"cf-connecting-ip": "2a06:98c0:3600::103",
"cf-ipcountry": "US",
"cf-ray": "8c8d9b5e1234380c",
"cf-visitor": "{\"scheme\":\"https\"}",
"cf-worker": "ubq.workers.dev",
"connection": "Keep-Alive",
"host": "ubiquibot-command-query-user-development.ubiquity.workers.dev",
"x-forwarded-proto": "https",
"x-real-ip": "2a06:98c0:3600::103"
},
"cf": {
"longitude": "-97.82200",
"httpProtocol": "HTTP/1.1",
"tlsCipher": "",
"continent": "NA",
"asn": 36459,
"country": "US",
"tlsClientAuth": {
"certIssuerDNLegacy": "",
"certIssuerSKI": "",
"certSubjectDNRFC2253": "",
"certSubjectDNLegacy": "",
"certFingerprintSHA256": "",
"certNotBefore": "",
"certSKI": "",
"certSerial": "",
"certIssuerDN": "",
"certVerified": "NONE",
"certNotAfter": "",
"certSubjectDN": "",
"certPresented": "0",
"certRevoked": "0",
"certIssuerSerial": "",
"certIssuerDNRFC2253": "",
"certFingerprintSHA1": ""
},
"tlsVersion": "",
"colo": "IAD",
"timezone": "America/Chicago",
"verifiedBotCategory": "",
"edgeRequestKeepAliveStatus": 1,
"tlsClientRandom": "",
"tlsClientExtensionsSha1": "",
"tlsClientHelloLength": "",
"asOrganization": "GitHub",
"requestPriority": "",
"latitude": "37.75100"
}
},
"response": {
"status": 200
}
},
"id": 0
}
|
It runs for every event because this is just the manifest fetch, not a run call. The kernel on its side outputs {
"message": [
"Error in event handler",
"HttpError: Resource not accessible by integration - https://docs.github.com/rest/actions/workflows#create-a-workflow-dispatch-event"
],
"level": "error",
"timestamp": 1727320366632
} Did you set the proper permissions? |
I can review permissions but I had both windows open side by side |
I think the logs can be improved so we know what error is for which plugin. |
/start |
Tip
|
Another possibly viable approach could be using the EVM key pair or X25519 to auth as well. Can you clarify this a bit? |
@whilefoo rfc you know best |
The authentication already works for Worker plugin and is supported out of the box if you use the SDK. For Action plugins the authentication is inferred by Github so only those with permissions can call the plugin, but we could also make even stricter auth for Action plugins so that only kernel can call it @0x4007 |
Sounds good please explain to the assignee what they need to do, or you can handle it because I don't have enough context on this |
/start |
/help |
Available Commands
|
Available Commands
|
/start |
/wallet 0xB13260bfEe08DcA208F2ECc735171B21763EaaF6 |
+ Successfully registered wallet address |
/start |
Sorry we have a temporary misconfig with /start |
Very likely due to ubiquity-os/ubiquity-os-kernel#120 |
@0x4007 the auth is now implemented in the SDK, so either we change this plugin to use the SDK or copy the lines related to the auth to this plugin but anyway this plugin should be changed to Worker plugin |
/help |
Available Commands
|
/start |
! This issue is already assigned. Please choose another unassigned task. |
@0x4007 Seems ubiquity-os/ubiquity-os-kernel#120 fixed the |
/stop |
Stop working too |
/start |
Tip
|
Passed the deadline and no activity is detected, removing assignees: @hhio618. |
/start |
Tip
|
I believe this issue can be closed since #96 converts this plugin into a worker and auth is built in already |
I agree, as long as the SK is used it embeds verification through the private / public key check so only our kernel can actually run it. |
Use GitHub authentication to verify that the kernel is requesting a permit to be generated when accessing this plugin remotely.
Authentication is required to prove that the request originated from an organization with an encrypted private key in their config. Then it is likely that it is not a fraudulent request to spend an organization's money.
Originally posted by @whilefoo in #69 (comment)
The text was updated successfully, but these errors were encountered: