mirror of
https://github.com/NousResearch/hermes-agent.git
synced 2026-05-03 17:27:37 +08:00
Broad drift audit against origin/main (b52b63396).
Reference pages (most user-visible drift):
- slash-commands: add /busy, /curator, /footer, /indicator, /redraw, /steer
that were missing; drop non-existent /terminal-setup; fix /q footnote
(resolves to /queue, not /quit); extend CLI-only list with all 24
CLI-only commands in the registry
- cli-commands: add dedicated sections for hermes curator / fallback /
hooks (new subcommands not previously documented); remove stale
hermes honcho standalone section (the plugin registers dynamically
via hermes memory); list curator/fallback/hooks in top-level table;
fix completion to include fish
- toolsets-reference: document the real 52-toolset count; split browser
vs browser-cdp; add discord / discord_admin / spotify / yuanbao;
correct hermes-cli tool count from 36 to 38; fix misleading claim
that hermes-homeassistant adds tools (it's identical to hermes-cli)
- tools-reference: bump tool count 55 -> 68; add 7 Spotify, 5 Yuanbao,
2 Discord toolsets; move browser_cdp/browser_dialog to their own
browser-cdp toolset section
- environment-variables: add 40+ user-facing HERMES_* vars that were
undocumented (--yolo, --accept-hooks, --ignore-*, inference model
override, agent/stream/checkpoint timeouts, OAuth trace, per-platform
batch tuning for Telegram/Discord/Matrix/Feishu/WeCom, cron knobs,
gateway restart/connect timeouts); dedupe the Cron Scheduler section;
replace stale QQ_SANDBOX with QQ_PORTAL_HOST
User-guide (top level):
- cli.md: compression preserves last 20 turns, not 4 (protect_last_n: 20)
- configuration.md: display.platforms is the canonical per-platform
override key; tool_progress_overrides is deprecated and auto-migrated
- profiles.md: model.default is the config key, not model.model
- sessions.md: CLI/TUI session IDs use 6-char hex, gateway uses 8
- checkpoints-and-rollback.md: destructive-command list now matches
_DESTRUCTIVE_PATTERNS (adds rmdir, cp, install, dd)
- docker.md: the container runs as non-root hermes (UID 10000) via
gosu; fix install command (uv pip); add missing --insecure on the
dashboard compose example (required for non-loopback bind)
- security.md: systemctl danger pattern also matches 'restart'
- index.md: built-in tool count 47 -> 68
- integrations/index.md: 6 STT providers, 8 memory providers
- integrations/providers.md: drop fictional dashscope/qwen aliases
Features:
- overview.md: 9 image models (not 8), 9 TTS providers (not 5),
8 memory providers (Supermemory was missing)
- tool-gateway.md: 9 image models
- tools.md: extend common-toolsets list with search / messaging /
spotify / discord / debugging / safe
- fallback-providers.md: add 6 real providers from PROVIDER_REGISTRY
(lmstudio, kimi-coding-cn, stepfun, alibaba-coding-plan,
tencent-tokenhub, azure-foundry)
- plugins.md: Available Hooks table now includes on_session_finalize,
on_session_reset, subagent_stop
- built-in-plugins.md: add the 7 bundled plugins the page didn't
mention (spotify, google_meet, three image_gen providers, two
dashboard examples)
- web-dashboard.md: add --insecure and --tui flags
- cron.md: hermes cron create takes positional schedule/prompt, not
flags
Messaging:
- telegram.md: TELEGRAM_WEBHOOK_SECRET is now REQUIRED when
TELEGRAM_WEBHOOK_URL is set (gateway refuses to start without it
per GHSA-3vpc-7q5r-276h). Biggest user-visible drift in the batch.
- discord.md: HERMES_DISCORD_TEXT_BATCH_SPLIT_DELAY_SECONDS default
is 2.0, not 0.1
- dingtalk.md: document DINGTALK_REQUIRE_MENTION /
FREE_RESPONSE_CHATS / MENTION_PATTERNS / HOME_CHANNEL /
ALLOW_ALL_USERS that the adapter supports
- bluebubbles.md: drop fictional BLUEBUBBLES_SEND_READ_RECEIPTS env
var; the setting lives in platforms.bluebubbles.extra only
- qqbot.md: drop dead QQ_SANDBOX; add real QQ_PORTAL_HOST and
QQ_GROUP_ALLOWED_USERS
- wecom-callback.md: replace 'hermes gateway start' (service-only)
with 'hermes gateway' for first-time setup
Developer-guide:
- architecture.md: refresh tool/toolset counts (61/52), terminal
backend count (7), line counts for run_agent.py (~13.7k), cli.py
(~11.5k), main.py (~10.4k), setup.py (~3.5k), gateway/run.py
(~12.2k), mcp_tool.py (~3.1k); add yuanbao adapter, bump platform
adapter count 18 -> 20
- agent-loop.md: run_agent.py line count 10.7k -> 13.7k
- tools-runtime.md: add vercel_sandbox backend
- adding-tools.md: remove stale 'Discovery import added to
model_tools.py' checklist item (registry auto-discovery)
- adding-platform-adapters.md: mark send_typing / get_chat_info as
concrete base methods; only connect/disconnect/send are abstract
- acp-internals.md: ACP sessions now persist to SessionDB
(~/.hermes/state.db); acp.run_agent call uses
use_unstable_protocol=True
- cron-internals.md: gateway runs scheduler in a dedicated background
thread via _start_cron_ticker, not on a maintenance cycle; locking
is cross-process via fcntl.flock (Unix) / msvcrt.locking (Windows)
- gateway-internals.md: gateway/run.py ~12k lines
- provider-runtime.md: cron DOES support fallback (run_job reads
fallback_providers from config)
- session-storage.md: SCHEMA_VERSION = 11 (not 9); add migrations
10 and 11 (trigram FTS, inline-mode FTS5 re-index); add
api_call_count column to Sessions DDL; document messages_fts_trigram
and state_meta in the architecture tree
- context-compression-and-caching.md: remove the obsolete 'context
pressure warnings' section (warnings were removed for causing
models to give up early)
- context-engine-plugin.md: compress() signature now includes
focus_topic param
- extending-the-cli.md: _build_tui_layout_children signature now
includes model_picker_widget; add to default layout
Also fixed three pre-existing broken links/anchors the build warned
about (docker.md -> api-server.md, yuanbao.md -> cron-jobs.md and
tips#background-tasks, nix-setup.md -> #container-aware-cli).
Regenerated per-skill pages via website/scripts/generate-skill-docs.py
so catalog tables and sidebar are consistent with current SKILL.md
frontmatter.
docusaurus build: clean, no broken links or anchors.
265 lines
8.2 KiB
Markdown
265 lines
8.2 KiB
Markdown
---
|
|
title: "Github Auth — GitHub auth setup: HTTPS tokens, SSH keys, gh CLI login"
|
|
sidebar_label: "Github Auth"
|
|
description: "GitHub auth setup: HTTPS tokens, SSH keys, gh CLI login"
|
|
---
|
|
|
|
{/* This page is auto-generated from the skill's SKILL.md by website/scripts/generate-skill-docs.py. Edit the source SKILL.md, not this page. */}
|
|
|
|
# Github Auth
|
|
|
|
GitHub auth setup: HTTPS tokens, SSH keys, gh CLI login.
|
|
|
|
## Skill metadata
|
|
|
|
| | |
|
|
|---|---|
|
|
| Source | Bundled (installed by default) |
|
|
| Path | `skills/github/github-auth` |
|
|
| Version | `1.1.0` |
|
|
| Author | Hermes Agent |
|
|
| License | MIT |
|
|
| Tags | `GitHub`, `Authentication`, `Git`, `gh-cli`, `SSH`, `Setup` |
|
|
| Related skills | [`github-pr-workflow`](/docs/user-guide/skills/bundled/github/github-github-pr-workflow), [`github-code-review`](/docs/user-guide/skills/bundled/github/github-github-code-review), [`github-issues`](/docs/user-guide/skills/bundled/github/github-github-issues), [`github-repo-management`](/docs/user-guide/skills/bundled/github/github-github-repo-management) |
|
|
|
|
## Reference: full SKILL.md
|
|
|
|
:::info
|
|
The following is the complete skill definition that Hermes loads when this skill is triggered. This is what the agent sees as instructions when the skill is active.
|
|
:::
|
|
|
|
# GitHub Authentication Setup
|
|
|
|
This skill sets up authentication so the agent can work with GitHub repositories, PRs, issues, and CI. It covers two paths:
|
|
|
|
- **`git` (always available)** — uses HTTPS personal access tokens or SSH keys
|
|
- **`gh` CLI (if installed)** — richer GitHub API access with a simpler auth flow
|
|
|
|
## Detection Flow
|
|
|
|
When a user asks you to work with GitHub, run this check first:
|
|
|
|
```bash
|
|
# Check what's available
|
|
git --version
|
|
gh --version 2>/dev/null || echo "gh not installed"
|
|
|
|
# Check if already authenticated
|
|
gh auth status 2>/dev/null || echo "gh not authenticated"
|
|
git config --global credential.helper 2>/dev/null || echo "no git credential helper"
|
|
```
|
|
|
|
**Decision tree:**
|
|
1. If `gh auth status` shows authenticated → you're good, use `gh` for everything
|
|
2. If `gh` is installed but not authenticated → use "gh auth" method below
|
|
3. If `gh` is not installed → use "git-only" method below (no sudo needed)
|
|
|
|
---
|
|
|
|
## Method 1: Git-Only Authentication (No gh, No sudo)
|
|
|
|
This works on any machine with `git` installed. No root access needed.
|
|
|
|
### Option A: HTTPS with Personal Access Token (Recommended)
|
|
|
|
This is the most portable method — works everywhere, no SSH config needed.
|
|
|
|
**Step 1: Create a personal access token**
|
|
|
|
Tell the user to go to: **https://github.com/settings/tokens**
|
|
|
|
- Click "Generate new token (classic)"
|
|
- Give it a name like "hermes-agent"
|
|
- Select scopes:
|
|
- `repo` (full repository access — read, write, push, PRs)
|
|
- `workflow` (trigger and manage GitHub Actions)
|
|
- `read:org` (if working with organization repos)
|
|
- Set expiration (90 days is a good default)
|
|
- Copy the token — it won't be shown again
|
|
|
|
**Step 2: Configure git to store the token**
|
|
|
|
```bash
|
|
# Set up the credential helper to cache credentials
|
|
# "store" saves to ~/.git-credentials in plaintext (simple, persistent)
|
|
git config --global credential.helper store
|
|
|
|
# Now do a test operation that triggers auth — git will prompt for credentials
|
|
# Username: <their-github-username>
|
|
# Password: <paste the personal access token, NOT their GitHub password>
|
|
git ls-remote https://github.com/<their-username>/<any-repo>.git
|
|
```
|
|
|
|
After entering credentials once, they're saved and reused for all future operations.
|
|
|
|
**Alternative: cache helper (credentials expire from memory)**
|
|
|
|
```bash
|
|
# Cache in memory for 8 hours (28800 seconds) instead of saving to disk
|
|
git config --global credential.helper 'cache --timeout=28800'
|
|
```
|
|
|
|
**Alternative: set the token directly in the remote URL (per-repo)**
|
|
|
|
```bash
|
|
# Embed token in the remote URL (avoids credential prompts entirely)
|
|
git remote set-url origin https://<username>:<token>@github.com/<owner>/<repo>.git
|
|
```
|
|
|
|
**Step 3: Configure git identity**
|
|
|
|
```bash
|
|
# Required for commits — set name and email
|
|
git config --global user.name "Their Name"
|
|
git config --global user.email "their-email@example.com"
|
|
```
|
|
|
|
**Step 4: Verify**
|
|
|
|
```bash
|
|
# Test push access (this should work without any prompts now)
|
|
git ls-remote https://github.com/<their-username>/<any-repo>.git
|
|
|
|
# Verify identity
|
|
git config --global user.name
|
|
git config --global user.email
|
|
```
|
|
|
|
### Option B: SSH Key Authentication
|
|
|
|
Good for users who prefer SSH or already have keys set up.
|
|
|
|
**Step 1: Check for existing SSH keys**
|
|
|
|
```bash
|
|
ls -la ~/.ssh/id_*.pub 2>/dev/null || echo "No SSH keys found"
|
|
```
|
|
|
|
**Step 2: Generate a key if needed**
|
|
|
|
```bash
|
|
# Generate an ed25519 key (modern, secure, fast)
|
|
ssh-keygen -t ed25519 -C "their-email@example.com" -f ~/.ssh/id_ed25519 -N ""
|
|
|
|
# Display the public key for them to add to GitHub
|
|
cat ~/.ssh/id_ed25519.pub
|
|
```
|
|
|
|
Tell the user to add the public key at: **https://github.com/settings/keys**
|
|
- Click "New SSH key"
|
|
- Paste the public key content
|
|
- Give it a title like "hermes-agent-<machine-name>"
|
|
|
|
**Step 3: Test the connection**
|
|
|
|
```bash
|
|
ssh -T git@github.com
|
|
# Expected: "Hi <username>! You've successfully authenticated..."
|
|
```
|
|
|
|
**Step 4: Configure git to use SSH for GitHub**
|
|
|
|
```bash
|
|
# Rewrite HTTPS GitHub URLs to SSH automatically
|
|
git config --global url."git@github.com:".insteadOf "https://github.com/"
|
|
```
|
|
|
|
**Step 5: Configure git identity**
|
|
|
|
```bash
|
|
git config --global user.name "Their Name"
|
|
git config --global user.email "their-email@example.com"
|
|
```
|
|
|
|
---
|
|
|
|
## Method 2: gh CLI Authentication
|
|
|
|
If `gh` is installed, it handles both API access and git credentials in one step.
|
|
|
|
### Interactive Browser Login (Desktop)
|
|
|
|
```bash
|
|
gh auth login
|
|
# Select: GitHub.com
|
|
# Select: HTTPS
|
|
# Authenticate via browser
|
|
```
|
|
|
|
### Token-Based Login (Headless / SSH Servers)
|
|
|
|
```bash
|
|
echo "<THEIR_TOKEN>" | gh auth login --with-token
|
|
|
|
# Set up git credentials through gh
|
|
gh auth setup-git
|
|
```
|
|
|
|
### Verify
|
|
|
|
```bash
|
|
gh auth status
|
|
```
|
|
|
|
---
|
|
|
|
## Using the GitHub API Without gh
|
|
|
|
When `gh` is not available, you can still access the full GitHub API using `curl` with a personal access token. This is how the other GitHub skills implement their fallbacks.
|
|
|
|
### Setting the Token for API Calls
|
|
|
|
```bash
|
|
# Option 1: Export as env var (preferred — keeps it out of commands)
|
|
export GITHUB_TOKEN="<token>"
|
|
|
|
# Then use in curl calls:
|
|
curl -s -H "Authorization: token $GITHUB_TOKEN" \
|
|
https://api.github.com/user
|
|
```
|
|
|
|
### Extracting the Token from Git Credentials
|
|
|
|
If git credentials are already configured (via credential.helper store), the token can be extracted:
|
|
|
|
```bash
|
|
# Read from git credential store
|
|
grep "github.com" ~/.git-credentials 2>/dev/null | head -1 | sed 's|https://[^:]*:\([^@]*\)@.*|\1|'
|
|
```
|
|
|
|
### Helper: Detect Auth Method
|
|
|
|
Use this pattern at the start of any GitHub workflow:
|
|
|
|
```bash
|
|
# Try gh first, fall back to git + curl
|
|
if command -v gh &>/dev/null && gh auth status &>/dev/null; then
|
|
echo "AUTH_METHOD=gh"
|
|
elif [ -n "$GITHUB_TOKEN" ]; then
|
|
echo "AUTH_METHOD=curl"
|
|
elif [ -f ~/.hermes/.env ] && grep -q "^GITHUB_TOKEN=" ~/.hermes/.env; then
|
|
export GITHUB_TOKEN=$(grep "^GITHUB_TOKEN=" ~/.hermes/.env | head -1 | cut -d= -f2 | tr -d '\n\r')
|
|
echo "AUTH_METHOD=curl"
|
|
elif grep -q "github.com" ~/.git-credentials 2>/dev/null; then
|
|
export GITHUB_TOKEN=$(grep "github.com" ~/.git-credentials | head -1 | sed 's|https://[^:]*:\([^@]*\)@.*|\1|')
|
|
echo "AUTH_METHOD=curl"
|
|
else
|
|
echo "AUTH_METHOD=none"
|
|
echo "Need to set up authentication first"
|
|
fi
|
|
```
|
|
|
|
---
|
|
|
|
## Troubleshooting
|
|
|
|
| Problem | Solution |
|
|
|---------|----------|
|
|
| `git push` asks for password | GitHub disabled password auth. Use a personal access token as the password, or switch to SSH |
|
|
| `remote: Permission to X denied` | Token may lack `repo` scope — regenerate with correct scopes |
|
|
| `fatal: Authentication failed` | Cached credentials may be stale — run `git credential reject` then re-authenticate |
|
|
| `ssh: connect to host github.com port 22: Connection refused` | Try SSH over HTTPS port: add `Host github.com` with `Port 443` and `Hostname ssh.github.com` to `~/.ssh/config` |
|
|
| Credentials not persisting | Check `git config --global credential.helper` — must be `store` or `cache` |
|
|
| Multiple GitHub accounts | Use SSH with different keys per host alias in `~/.ssh/config`, or per-repo credential URLs |
|
|
| `gh: command not found` + no sudo | Use git-only Method 1 above — no installation needed |
|