-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[core] How does a job invoker provide secrets to the module runner at runtime" #174
Comments
I think we need to look at the big picture here. The request comes from "how would we run lilypad build on the lilypad network". I still have some concerns with that, like running a build to fix the network when it's down. But perhaps the real question is, "how does a module invoker (do we have a better term for that?) provide secrets to the module runner at runtime". It seems like a ws callback (or https) could be a practical solution. We could define this url in the module spec so that there's a standard way for module authors and module invokers to achieve that. |
This needs to start at the client side when the job is requested and signed using the module requesting the user wallet or an on-chain encryption service. The actors in the process, the job initiator, will need to easily pass unencrypted inputs, which are then encrypted and sent to the network to be processed. The RP selected to run the job then decrypts the input. Once the job is run, the output is encrypted and sent back to the requestor. The validator can then decrypt the results to validate the job. As a side note, this process would need to be light and fast so that it doesn't take up too much processing time and is easy enough for a requesting user to pass inputs. |
@developersteve that was my initial thought too, but the job initiator doesn't know who's going to run the job so maybe I'm missing how they'd decrypt it? |
Ahhh true, and if we wait until the deal is agreed to get the public address and send the encrypted secrets, at that point in time we might have to do it via a ws callback.
I'd definitely go with an approach that has a plan b: keep the github actions that can deploy around but these can only be triggered manually, if the Lilypad network cannot run the
Updated the title, thanks for the suggestion |
https://infisical.com might be an option to investigate |
The idea here is to have an open discussion on how to give modules some inputs that are considered sensitive.
The text was updated successfully, but these errors were encountered: