-
Notifications
You must be signed in to change notification settings - Fork 54
Favour Secret tokens over String tokens #60
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Favour Secret tokens over String tokens #60
Conversation
|
Hi @daniel-beck this is the patch for SECURITY-839 that I didn't get time to do in March. Would you mind giving it a quick review? Also @jenkinsci/code-reviewers if anyone has time. This version uses your suggestion of simply changing over to use Secrets from String. Much simpler! I wish I had done this sooner. |
|
Hi @daniel-beck any final thoughts on this before I merge it in? What would you recommend to put in the changelog on the wiki page? Just something to say users should consider their credentials compromised and to change them? Or something else? Many thanks. |
|
Most of the content of this patch is unnecessary. You can change the field type, and the next time this gets saved, the secret will be encrypted on disk. Change the form field type and a few getter/setter types and you should be done. |
Depends on the setup. If there are other users with local disk access, or backups that exclude |
|
Thanks, this plugin has some odd legacy use cases with default tokens that I really struggled with. If there is unnecessary stuff in the PR, at this stage, I don't mind. I want to deprecate this plugin because the service is being shutdown at the end of the year. If anyone else wants to spend time wrestling with this code base then I'd welcome a hand but for now I'm done. Anyways, thanks for the reviews. Appreciate it. |
|
What does the new Jenkins pipeline API look like? We upgraded our plugin and the build is now failing. It appears |
|
@njtman If you can roll back then give that a go. Clearly I don't understand Jenkins as I thought. I thought changing the type to Secret was transparent to using a String (which does seem to be the case for Free style jobs) but not for pipelines. I'll look into a fix over the weekend. Apologies. |
|
@mezpahlan Thanks for the response. Yes, we did rollback and everything is running normally. Before rolling back, we did get this to work by changing Ideally, the interface should remain the same and only the internal implementation should change. I discovered the interface change after my pipeline failed and I tried regenerating the pipeline script from the |
This reverts commit 9b91ae2
Deprecates the use of String tokens as the old method stored credentials in plain text.
Note: This plugin is to be deprecated soon as the HockeyApp service is going to be closed at the end of the year. So I don't particularly mind if the implementation could be better. The whole plugin is going to be re-written anyway.
This is an alternative to #59 . I'll be happy to accept one or the other. I don't think we need both.