[ 
https://issues.apache.org/jira/browse/MGPG-105?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Tamas Cservenak updated MGPG-105:
---------------------------------
    Description: 
Storing any kind of "password-like" things on disk in files is bad (and no, 
SecDispatcher IS a joke).

Passphrase should be acquired only by two means:
 * using gpg-agent (when on workstation locally) either to show pop up to ask 
for pw and just ask it non-interactively fow cached password
 * using env variables (when on CI where they are set up as "secrets") to go 
fully off gpg-agent,

-Plugin should in fact FAIL to warn user about presence of any secrets in 
settings/properties/projects. That is wrong way.-

This last stance has been softened (to provide full backward compatibility): by 
default, plugin goes into "compat mode", will not fail if those above violated. 
Still, introduced {{bestPractice}} configuration that IF set to {{true}} makes 
plugin safe, and will fail if these principles are violated.

  was:
Storing any kind of "password-like" things on disk in files is bad (and no, 
SecDispatcher IS a joke).

Passphrase should be acquired only by two means:
 * using gpg-agent (when on workstation locally) either to show pop up to ask 
for pw and just ask it non-interactively fow cached password
 * using env variables (when on CI where they are set up as "secrets") to go 
fully off gpg-agent,

-Plugin should in fact FAIL to warn user about presence of any secrets in 
settings/properties/projects. That is wrong way.-

This last stance has been softened (to provide full backward compatibility): by 
default, plugin will fail if those above violated. Still, introduced 
{{bestPractice}} configuration that IF set to {{false}} makes plugin regain all 
the "old way" of passphrase configuration (but will still warn).


> Stop propagating bad practices; but allow for "compat mode"
> -----------------------------------------------------------
>
>                 Key: MGPG-105
>                 URL: https://issues.apache.org/jira/browse/MGPG-105
>             Project: Maven GPG Plugin
>          Issue Type: Improvement
>            Reporter: Tamas Cservenak
>            Assignee: Tamas Cservenak
>            Priority: Major
>             Fix For: 3.2.0
>
>
> Storing any kind of "password-like" things on disk in files is bad (and no, 
> SecDispatcher IS a joke).
> Passphrase should be acquired only by two means:
>  * using gpg-agent (when on workstation locally) either to show pop up to ask 
> for pw and just ask it non-interactively fow cached password
>  * using env variables (when on CI where they are set up as "secrets") to go 
> fully off gpg-agent,
> -Plugin should in fact FAIL to warn user about presence of any secrets in 
> settings/properties/projects. That is wrong way.-
> This last stance has been softened (to provide full backward compatibility): 
> by default, plugin goes into "compat mode", will not fail if those above 
> violated. Still, introduced {{bestPractice}} configuration that IF set to 
> {{true}} makes plugin safe, and will fail if these principles are violated.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to