Skip to content

Conversation

@vsilent
Copy link
Collaborator

@vsilent vsilent commented Jan 16, 2026

No description provided.

vsilent and others added 30 commits June 27, 2024 09:43
… updates, Prevented auth middleware panic by returning Poll::Pending if the mutex is busy.Increased heartbeat wait timeout to align with long-polling. Left the duplicate Casbin migration as a no-op to avoid conflicts. Added a rule to casbin for public registration of agent(testing purpose)
vsilent and others added 15 commits January 12, 2026 13:54
…and catalog, capability filtering, and payload including status, heartbeat, version, system_info, raw capabilities, and allowed commands. Unit tests cover filtering and payload cases.remove duplicates
Problem:
Status Panel agents authenticate with 'agent' role but get 403
when accessing /api/v1/agent/commands/report endpoint.

Root Cause:
- Agent authentication (f_agent.rs) creates pseudo-user with role 'agent'
- Earlier migration (20251222160220) added agent permissions
- However, permissions may be missing on remote server

Solution:
- Create idempotent migration ensuring agent role has necessary permissions
- Grant 'agent' role access to:
  * POST /api/v1/agent/commands/report (command reporting)
  * GET /api/v1/agent/commands/wait/:deployment_hash (command polling)
- Ensure agent role inherits from group_anonymous

This allows Status Panel agents to report command results without
requiring per-agent Casbin rules, leveraging Vault token management
for authentication.

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
@gitguardian
Copy link

gitguardian bot commented Jan 16, 2026

⚠️ GitGuardian has uncovered 1 secret following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

🔎 Detected hardcoded secret in your pull request
GitGuardian id GitGuardian status Secret Commit Filename
24149610 Triggered Bearer Token 0a8b589 src/connectors/admin_service/jwt.rs View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the implications of revoking this secret by investigating where it is used in your code.
  2. Replace and store your secret safely. Learn here the best practices.
  3. Revoke and rotate this secret.
  4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

To avoid such incidents in the future consider


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

@vsilent vsilent merged commit 7d93d66 into main Jan 16, 2026
10 of 12 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants