feat(core): support authenticated A2A agent card discovery#20622
feat(core): support authenticated A2A agent card discovery#20622SandyTao520 merged 7 commits intomainfrom
Conversation
Summary of ChangesHello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request significantly enhances the A2A (Agent-to-Agent) communication capabilities by introducing robust support for authenticated remote agents. It allows agents to be discovered and registered even when their Highlights
Changelog
Activity
Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here. You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension. Footnotes
|
|
Size Change: +1.54 kB (+0.01%) Total Size: 25.8 MB
ℹ️ View Unchanged
|
There was a problem hiding this comment.
Code Review
This pull request introduces critical security vulnerabilities related to dynamic value resolution in resolveAuthValue, including Remote Code Execution (RCE) via shell command execution and potential credential exfiltration, which violates the rule for sanitizing environment variable expansion in HTTP headers. The A2A server also contains hardcoded credentials. It is strongly recommended to address these security issues, particularly removing the shell command execution feature and implementing strict controls over environment variable resolution, before merging. Additionally, consider refactoring duplicated error handling logic in AgentRegistry for better maintainability.
| } | ||
| await Promise.allSettled( | ||
| userAgents.agents.map((agent) => this.registerAgent(agent)), | ||
| userAgents.agents.map(async (agent) => { |
There was a problem hiding this comment.
thanks! This should help with the UX Robustness as well!
Could we make this function a helper since we have it a few time? (it can take in scope: string to plut into user/project/extension)
e95fec3 to
3ab8505
Compare
…auth-ui-feedback # Conflicts: # packages/a2a-server/src/http/app.ts # packages/core/src/agents/auth-provider/http-provider.ts # packages/core/src/agents/registry.test.ts # packages/core/src/agents/registry.ts # packages/core/src/agents/remote-invocation.ts
…mini#20622) Co-authored-by: Adam Weidman <adamfweidman@google.com> Co-authored-by: Adam Weidman <65992621+adamfweidman@users.noreply.github.com>
…mini#20622) Co-authored-by: Adam Weidman <adamfweidman@google.com> Co-authored-by: Adam Weidman <65992621+adamfweidman@users.noreply.github.com>
…mini#20622) Co-authored-by: Adam Weidman <adamfweidman@google.com> Co-authored-by: Adam Weidman <65992621+adamfweidman@users.noreply.github.com>
Summary
This PR enables support for A2A remote agents whose `AgentCard` discovery endpoint (`/.well-known/agent-card.json`) is protected by authentication. It also improves user feedback when agent discovery or registration fails.
Details
Related Issues
Closes #17607
How to Validate
Pre-Merge Checklist