
Security News
Open Source Maintainers Demand Ability to Block Copilot-Generated Issues and PRs
Open source maintainers are urging GitHub to let them block Copilot from submitting AI-generated issues and pull requests to their repositories.
github.com/threefoldtech/grid_proxy_server
Interact with TFgridDB using rest APIs
$ make help
To list all the available tasks for running:
Install swag and export to exec path
go install github.com/swaggo/swag/cmd/swag@latest
export PATH=$(go env GOPATH)/bin:$PATH
Run make docs
.
GIT_COMMIT=$(git describe --tags --abbrev=0) && \
cd cmds/proxy_server && CGO_ENABLED=0 GOOS=linux go build -ldflags "-w -s -X main.GitCommit=$GIT_COMMIT -extldflags '-static'" -o server
msgbusd --mnemonics "YOUR MNEMONICS" --substrate "wss://tfchain.dev.grid.tf"
go run cmds/proxy_server/main.go --address :8080 --log-level debug -no-cert --postgres-host 127.0.0.1 --postgres-db tfgrid-graphql --postgres-password postgres --postgres-user postgres
Option | Description |
---|---|
-address | Server ip address (default ":443" ) |
-ca | certificate authority used to generate certificate (default "https://acme-staging-v02.api.letsencrypt.org/directory" ) |
-cert-cache-dir | path to store generated certs in (default "/tmp/certs" ) |
-domain | domain on which the server will be served |
email address to generate certificate with | |
-log-level | log level [debug|info|warn|error|fatal|panic] (default "info" ) |
-no-cert | start the server without certificate |
-postgres-db | postgres database |
-postgres-host | postgres host |
-postgres-password | postgres password |
-postgres-port | postgres port (default 5432) |
-postgres-user | postgres username |
-redis | redis url (default "tcp://127.0.0.1:6379" ) |
-substrate-user | substrate url (default"wss://tfchain.dev.grid.tf/ws" ) |
-rmb-timeout | timeout for rmb requests (default 30 seconds) |
-v | shows the package version |
http://localhost:8080/<endpoint>
Start the msgbus systemd service with a machine MNEMONICS linked to its yggdrasil IP or public ip if there, download and more info
Download the latest binary here
add the execution permission to the binary and move it to the bin directory
chmod +x ./gridproxy-server
mv ./gridproxy-server /usr/local/bin/gridproxy-server
Add a new systemd service
# create msgbus service
cat << EOF > /etc/systemd/system/gridproxy-server.service
[Unit]
Description=grid proxy server
After=network.target
After=msgbus.service
[Service]
ExecStart=gridproxy-server --domain gridproxy.dev.grid.tf --email omar.elawady.alternative@gmail.com -ca https://acme-v02.api.letsencrypt.org/directory --substrate wss://tfchain.dev.grid.tf/ws --postgres-host 127.0.0.1 --postgres-db db --postgres-password password --postgres-user postgres
Type=simple
Restart=always
User=root
Group=root
[Install]
WantedBy=multi-user.target
Alias=gridproxy.service
EOF
enable the service
systemctl enable gridproxy.service
start the service
systemctl start gridproxy.service
check the status
systemctl status gridproxy.service
The command options:
systemctl restart gridproxy-server.service
/etc/systemd/system/gridproxy-server.service
you have to run this command firstsystemctl daemon-reload
To build & run dockerfile
docker build -t threefoldtech/gridproxy .
docker run --name gridproxy -e MNEMONICS="" -e SUBSTRATE="wss://tfchain.dev.grid.tf/ws" -e PUBLIC_KEY="5011157c2451b238c99247b9f0793f66e5b77998272c00676d23767fe3d576d8" -e PRIVATE_KEY="ff5b3012dbec23e86e2fde7dcd3c951781e87fe505be225488b50a6bb27662f75011157c2451b238c99247b9f0793f66e5b77998272c00676d23767fe3d576d8" -e POSTGRES_HOST="127.0.0.1" -e POSTGRES_PORT="5432" -e POSTGRES_DB="db" -e POSTGRES_USER="postgres" -e POSTGRES_PASSWORD="password" -e RMB_TIMEOUT="30" --cap-add=NET_ADMIN threefoldtech/gridproxy
helm lint charts/gridproxy
helm package -u charts/gridproxy
helm repo index --url https://threefoldtech.github.io/tfgridclient_proxy/ .
Adding the repo to your helm
helm repo add gridproxy https://threefoldtech.github.io/tfgridclient_proxy/
install a chart
helm install gridproxy/gridproxy
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Open source maintainers are urging GitHub to let them block Copilot from submitting AI-generated issues and pull requests to their repositories.
Research
Security News
Malicious Koishi plugin silently exfiltrates messages with hex strings to a hardcoded QQ account, exposing secrets in chatbots across platforms.
Research
Security News
Malicious PyPI checkers validate stolen emails against TikTok and Instagram APIs, enabling targeted account attacks and dark web credential sales.