-
Notifications
You must be signed in to change notification settings - Fork 95
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[JENKINS-73849] [JEP-237] remove the ability to disable SSL and token validation in FIPS mode #423
Conversation
This changes the Google OAuth library which is in maintainance mode with a supported library (nimbusds via pac4j) The library requires that the Issuer is set to enforce security and there is no option to disable this requirement as it is mandated in the specificiation. As such users must first update to 4.355.v3a_fb_fca_b_96d4 to set the Issuer before updating to this version. fixes: jenkinsci#313
This changes the Google OAuth library which is in maintainance mode with a supported library (nimbusds via pac4j) The library requires that the Issuer is set to enforce security and there is no option to disable this requirement as it is mandated in the specificiation. As such users must first update to 4.355.v3a_fb_fca_b_96d4 to set the Issuer before updating to this version. fixes: jenkinsci#313
…-plugin into JENKINS_73849
Co-authored-by: Francisco Javier Fernandez <[email protected]>
@@ -1371,6 +1390,22 @@ | |||
return this.doCheckFieldName(tokenFieldToCheckKey, FormValidation.ok()); | |||
} | |||
|
|||
@RequirePOST | |||
public FormValidation doCheckDisableSslVerification(@QueryParameter Boolean disableSslVerification) { |
Check warning
Code scanning / Jenkins Security Scan
Stapler: Missing permission check Warning
} | ||
|
||
@RequirePOST | ||
public FormValidation doCheckDisableTokenVerification(@QueryParameter Boolean disableTokenVerification) { |
Check warning
Code scanning / Jenkins Security Scan
Stapler: Missing permission check Warning
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## master #423 +/- ##
============================================
- Coverage 71.91% 71.88% -0.03%
- Complexity 199 206 +7
============================================
Files 16 16
Lines 883 900 +17
Branches 120 126 +6
============================================
+ Hits 635 647 +12
- Misses 185 186 +1
- Partials 63 67 +4 ☔ View full report in Codecov by Sentry. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah codecov happy lol 😂
@@ -65,20 +66,20 @@ public void testAuthenticate_withUsernamePasswordAuthenticationToken() throws Ex | |||
} | |||
|
|||
@Test | |||
public void testGetAuthenticationGatewayUrl() throws IOException { | |||
public void testGetAuthenticationGatewayUrl() throws IOException, Descriptor.FormException { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
FYI: generally for test methods I would just use throws Exception
to reduce any maintenance burden
https://issues.jenkins.io/browse/JENKINS-73849
https://github.com/jenkinsci/jep/tree/master/jep/237
When Jenknis is running in FIPS-140 mode, SSL and token verificaiton can no longer be disabled.
This change adds a form validation that will warn the user, fails with an
IllegalArgumentException
if trying to save regardless the warning and checks values onreadResolve
, in case config file was manually modified, or the plugin has been upgraded and was configured before these checks where enabled.NOTE: This change does not ensure that the plugin is FIPS-140 compliant, and further changes are required.
Testing done
Added 3 tests and checked manually.
Submitter checklist