-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update "Dude, Where's My Stuff?" to v2.7.0 #6252
Conversation
Includes non-plugin changes
|
2c8e6fb
to
ea91d5d
Compare
ea91d5d
to
f30ab90
Compare
Sorry, trying to create a PR for hotfix and accidentally pushed to this branch |
@Thource as a reminder you pushed this branch to have no changes, also I pushed this plugin back 1 commit to before the cat_h changes, just so you are aware when/if you resolve this PR. |
6406ac6
to
59e3509
Compare
Thanks @Felanbird, I believe this should be ready now |
138b3eb
to
c154081
Compare
<component group="org.xerial" name="sqlite-jdbc" version="3.46.0.0"> | ||
<artifact name="sqlite-jdbc-3.46.0.0.jar"> | ||
<sha256 value="e697df15be3f95219d80773c5f1002030e33e932adda186c1c86fd51df6691a9" origin="Generated by Gradle"/> | ||
</artifact> | ||
<artifact name="sqlite-jdbc-3.46.0.0.pom"> | ||
<sha256 value="3c16325e9917957ada3cda84fb50296145aa4f3aa73e7a5d63af9719cee2a7ac" origin="Generated by Gradle"/> | ||
</artifact> | ||
</component> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Am I missing something? This doesn't actually seem different, just moved.
Is there a reason you need the newer gsheets dependency? Does |
We thought it’d be best to use an updated version, rather than the 2019 version. See here: https://discord.com/channels/301497432909414422/419891709883973642/1259902701165351053
…
On Nov 12, 2024 at 3:20 AM, <Rhea ***@***.***)> wrote:
Is there a reason you need the newer gsheets dependency? Does v4-rev581-1.25.0, which is already approved, no longer work?
—
Reply to this email directly, view it on GitHub (#6252 (comment)), or unsubscribe (https://github.com/notifications/unsubscribe-auth/AA7KA5KPTSWQPUFBMK76XKL2AFXXVAVCNFSM6AAAAABKOZZN7KVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDINRZGUYTCMZXHA).
You are receiving this because you were mentioned.Message ID: ***@***.***>
|
We tried to downgrade our We believe the best option for the plugin is to add these new dependencies, rather than the alternative. |
this is not supposed to be public https://github.com/Thource/dude-wheres-my-stuff/blob/19dc452292300d48d96ce0fa14a905ee6409c875/src/main/resources/credentials.json#L8 |
Hey, chiming in as the person who worked on this and had this discussion with Thource too. We actually scoped this as a native app which means the client-secret is actually not treated as sensitive on Google's side since it needs to be deployed with the application (and so the user would have access to it). From their docs:
The desktop app requests no restricted scopes which means that the key is unable to list or search for any of the sheets it creates. This means that someone with these creds can only access documents that they know the sheet ID of (which is on the order of UUID levels of difficulty to guess) and that the current authenticated user has access to. "While the user is present" is guaranteed by the Google Auth Flow. The auth flow in this case is the user gets a browser opened to auth with the Dude Where's My Stuff App, they complete the auth, and now the plugin is able to create and modify the spreadsheet provided assuming the authenticated google account has access to the sheet id provided (if no sheet id provided, it creates one). We did consider storing the secret on a secret store of some kind and retrieving it, but ultimately the secret is still going to be on the users machine (either in memory or in the jar), so it doesn't seem worth the hassle. The worst case scenario, we could surmise, is that someone decided to impersonate the app, which still requires the user to go through the oauth flow, and even if they do they will find they can only modify new google sheets that the app has created and that they already know the id of. Ultimately doing that would just be obfuscation, not really "security". It's probably ideal for it not to be in plain text... but I am not sure we gain much by obfuscating it either. Just wanted to share the context. |
Hmm, OK. I would expect Google to use a pkce flow without a client secret, but the docs seem to indicate otherwise, so that is okay I guess. Obfuscating it wouldn't be useful or add anything, so this seems fine. Do you know its excluding grpc is possible? It looks almost entirely unused. |
So I just confirmed it is on the runtime classpath for the google api client and http client. I recall us trying to remove it and it causing the integration to totally fail. I dug up the chat here which confirmed we couldn't remove opencensus. I wanted to make sure about grpc, so I went ahead and tried again. When I add:
the application ultimately fails with:
|
not blocking, but you should use int[] here. Thource/dude-wheres-my-stuff@749e63e...Thource:19dc452292300d48d96ce0fa14a905ee6409c875#diff-6e5d858f33efa0e0391d79d78318fb1423603c06103c4486f44d96851f83b364R14 |
Release notes: https://github.com/Thource/dude-wheres-my-stuff/releases/tag/v2.7.0