-
-
Notifications
You must be signed in to change notification settings - Fork 393
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add server config to disable user registered agents #4206
Add server config to disable user registered agents #4206
Conversation
Deployment of preview was torn down |
Why do we need separate fields in |
It looked nicer but the only real answer is that i did not come up witj a combined name for the var |
What about |
fixed the fail and added test for it! |
Co-authored-by: qwerty287 <[email protected]>
OK. If you think old ones still should be usable I need to dive more into the code of org/user agents first. |
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #4206 +/- ##
==========================================
+ Coverage 26.46% 26.73% +0.27%
==========================================
Files 376 376
Lines 27455 27463 +8
==========================================
+ Hits 7265 7342 +77
+ Misses 19525 19440 -85
- Partials 665 681 +16 ☔ View full report in Codecov by Sentry. |
OK, I checked it out. If I understand it correctly, if this feature is disabled now and all agents are still manageable from the admin interface, the admin interface will use the api routes for global agents. So we should just disable the org-specific routes I think. Otherwise the PR seems fine to me. |
well this would allow instance admins to still create org agents ... but not normal users there is no much downside in doing so ... this is the same argument i wana have repo agents. It is easier in therms of UX for the user and do not add much code on our side to maintain |
I don't get that. The ui for this is completely hidden, so the only way how you can create a new org agent is directly using the api. |
Would probably help to ask: What would be the argument for an instance admin to disable user agents in general. |
I wrote that argument also into the docs |
I still think the org agent routes should be disabled completely if the feature is disabled. Or you extend the admin UI to allow to create user agents from there. |
now the flack disable the function & ui alltogether |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code lgtm, untested
As user-/org-agents allow normal (non instance admins) to extract secrets if they know how from the repos they are admin at, this is an hardening option.
normally you already trust users who are admin but in edge cases you want to forbid them to register own agents ...