-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(commands): granular permissions with /tools #1054
base: main
Are you sure you want to change the base?
Conversation
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #1054 +/- ##
==========================================
- Coverage 13.83% 13.68% -0.15%
==========================================
Files 2361 2361
Lines 204895 203623 -1272
Branches 185259 183987 -1272
==========================================
- Hits 28348 27872 -476
+ Misses 175052 174365 -687
+ Partials 1495 1386 -109 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
Implements aws#921 which describes trusting and untrusting specific tools for the current session. - Start with default permissions. Users can change them from command line or within chat via /tools - `/acceptall` and `--accept-all` were deprecated in favor of `--trust-all-tools` and `/tools trustall`. They will continue to work, but display a notice and activation functionality of the new commands. - Command::AcceptAll no longer exists - UI has been reword a little, see screenshots. - `report_issue` will include trust override settings in the report. - Chat supports multiple tool use requests from Q at once. I have refactored the tool flow to allow asking permissions for individual tool requests at a time - Now, ExecuteTools (checks for acceptance one tool at a time) -> PromptUser (ask for acceptance) -> HandleInput (handle acceptance) -> ExecuteTools (find next tool that needs acceptance OR trigger execution if none remaining). - I was not able to find a prompt that made Q send multiple tool_uses in a single request coming from Q. It seems to do them iteratively even when asked to do them in parallel. - In any case, that original logic to support parallel requests is preserved with this new structure. Risks: May conflict with aws#999
bc196a7
to
0ba142d
Compare
pub struct ToolPermission { | ||
pub trusted: bool, | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Are we future proofing ourselves here, just curious. What are some of the other things we might be adding to this in the future?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, instead of blanket trust bool, we can expand this to account for things like sub commands and directories.
@@ -350,12 +353,12 @@ impl ConversationState { | |||
} | |||
|
|||
/// Sets the next user message with "cancelled" tool results. | |||
pub fn abandon_tool_use(&mut self, tools_to_be_abandoned: Vec<(String, super::tools::Tool)>, deny_input: String) { | |||
pub fn abandon_tool_use(&mut self, tools_to_be_abandoned: Vec<QueuedTool>, deny_input: String) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If the user accepts a partial list of tools, and without running it, interrupts it the workflow.
Do we now accept the permission granted in this interaction? Or do we revoke the permissions granted?
Right now it looks like what's granted would be remembered without running as well.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, for trust
only. Future calls on accepted tools will still request it. IMO this is desirable because the user is declaring that they trust the tool regardless of future attempts. Maybe they trust fs_writes, but once they see that it will run execute_bash, they cancel. That doesn't mean that that they don't trust fs_writes afterall.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That makes sense. Just wanted to make sure. The tool level permission should be largely context free.
self.conversation_state | ||
.tools | ||
.iter() | ||
.for_each(|FigTool::ToolSpecification(spec)| { | ||
self.tool_permissions.trust_tool(spec.name.as_str()); | ||
}); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there an advantage to explicitly marking every tool as trusted as opposed to checking a flag.
i.e. is there a source of truth that will allow us to know if trustall has been enabled?
If someone is to add a new tool during a session, is the expectation here that the new tool is trusted? Or do we need to prompt the user again?
Not a big deal now though. We can always change this later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there an advantage to explicitly marking every tool as trusted as opposed to checking a flag.
i.e. is there a source of truth that will allow us to know if trustall has been enabled?
We still need it for non-trust-all instances, but yes we could skip iteration of we had a trust-all flag. I didn't add this because:
Most if not all cases the there will only be one tool to iterate for. We can remove complexity of maintaining a trust-all flag since we already have the iteration code.
It doesn't seem that we can add tools mid-session at this time, but if we could in the future, we may want to re-evaluate trustall for that tool.
If someone is to add a new tool during a session, is the expectation here that the new tool is trusted? Or do we need to prompt the user again?
Currently the expectation is that the user needs to trust the new tool once it is added. I am open to discussing this, but it makes sense to me. Especially if the tool is added via some automation.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Seems mostly aligned with the RFC referenced.
Implementation seems sound to me.
Feel free to request reviews from people who are involved in the RFC discussion.
Implements #921 which describes trusting and untrusting specific tools for the current session.
/acceptall
and--accept-all
were deprecated in favor of--trust-all-tools
and/tools trustall
. They will continue to work, but display a notice and activation functionality of the new commands.report_issue
will include trust override settings in the report.Risks: Likely conflicts with #999
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.