Re: Jenkins Security Scan now generally available

2022-02-22 Thread 'Daniel Beck' via Jenkins Developers
On Tue, Feb 22, 2022 at 10:17 PM 'Jesse Glick' via Jenkins Developers < jenkinsci-dev@googlegroups.com> wrote: > I suppose any results would appear in `/security/code-scanning` to repo > admins only? > PR-specific results are shown directly and publicly in the PR. GitHub compares results from

Re: Jenkins Security Scan now generally available

2022-02-22 Thread 'Jesse Glick' via Jenkins Developers
Tried it out on a plugin I maintain. Seems to work. I suppose any results would appear in `/security/code-scanning` to repo admins only? Will the *Checks* tab of a PR or trunk commit always be green so long as scanning completed, even if there are violations? The scan should pass `-ntp` to Maven

Re: Jenkins Security Scan now generally available

2022-02-22 Thread 'Gavin Mogan' via Jenkins Developers
> I'm not sure how feasible that is without defeating the purpose of the GitHub > action, though I'm dropping his feedback here nevertheless :P I know one of my goals when i get a minute is to try to update analytics/warnings-ng to support the github log format -

Re: Interested to become a Maintainer

2022-02-22 Thread Mark Waite
On Tuesday, February 22, 2022 at 1:06:50 PM UTC-7 you wrote: > Hi All, > > I have been a Jenkins Admin and User for more than 5 years now. I would > love to contribute to better the tool and part of this journey. > > I came across the "Adopt a Plugin" initiative a couple of years ago but

Re: Interested to become a Maintainer

2022-02-22 Thread 'Gavin Mogan' via Jenkins Developers
What information are you looking for? There's a large tutorial being worked (or might actually be merged now) for becoming a maintainer, I'm sure JMM or Marc will reply with that information soon. The key things will be to upgrade the dependencies to something modern so the full test suite can

Re: Jenkins Security Scan now generally available

2022-02-22 Thread 'Herve Le Meur' via Jenkins Developers
I thought about integrating it in ci.jenkins.io shared pipelines, but didn't took the time to discuss it with Daniel yet. This first GHA step will be nice to round the corners before eventually planning a larger integration I think. Hervé On Tue, Feb 22, 2022 at 8:41 PM Alex wrote: > Huge +1

Interested to become a Maintainer

2022-02-22 Thread Mohammed Abdullah
Hi All, I have been a Jenkins Admin and User for more than 5 years now. I would love to contribute to better the tool and part of this journey. I came across the "Adopt a Plugin" initiative a couple of years ago but my lack of knowledge in development kept me at bay. I have decided to

Re: Jenkins Security Scan now generally available

2022-02-22 Thread Alex
Huge +1 from me. It's nice to have the rules publicly available and it overall integrating seamless with GitHub's code scan alerts. Hopefully we can get some more feedback on it, due it now being available to everyone and super simple to enable for plugin devs. olamy commented on my security

Artifact Promotion Plugin - Searching new maintainer

2022-02-22 Thread Halil-Cem Gürsoy
Hi Folks, unfortunately I've not the time to maintain this plugin and, shame on me, I haven't bothered about this for a long time. It would be fine if someone can take it over. Even in times of Docker images there is IMHO still the need for 'classic' artifacts and the handling of them. So

Re: Jenkins Security Scan now generally available

2022-02-22 Thread 'Daniel Beck' via Jenkins Developers
On Tue, Feb 22, 2022 at 6:59 PM 'Jesse Glick' via Jenkins Developers < jenkinsci-dev@googlegroups.com> wrote: > Do we generally recommend this for any plugin? If so, it would be great to > add this to `archetypes`. > > That's where I think we should end up, but I'd like to get some more scan

Re: Jenkins Security Scan now generally available

2022-02-22 Thread 'Jesse Glick' via Jenkins Developers
Do we generally recommend this for any plugin? If so, it would be great to add this to `archetypes`. -- You received this message because you are subscribed to the Google Groups "Jenkins Developers" group. To unsubscribe from this group and stop receiving emails from it, send an email to

Jenkins Security Scan now generally available

2022-02-22 Thread 'Daniel Beck' via Jenkins Developers
Hi everyone, I've published the previously private[1] Jenkins code scanning rules for CodeQL. These are static analysis rules covering mostly Jenkins-specific issues, like unprotected Stapler web methods and use of APIs that are generally not a good idea in the context of Jenkins plugins. While

Re: Configuration as code round trip test fails with parent pom 4.35

2022-02-22 Thread 'Jesse Glick' via Jenkins Developers
To follow up, 4.36 should fix this. -- You received this message because you are subscribed to the Google Groups "Jenkins Developers" group. To unsubscribe from this group and stop receiving emails from it, send an email to jenkinsci-dev+unsubscr...@googlegroups.com. To view this discussion on

Re: Understanding Jenkins Core Vulnerabilities in plugin s

2022-02-22 Thread Niv Keidan
Thanks for the info, very helpful. And as to your question, no. Must be a coincidence. This has come up on our end by simply reviewing the current status. Cheers. On Tuesday, February 22, 2022 at 10:11:37 AM UTC+2 db...@cloudbees.com wrote: > On Tue, Feb 22, 2022 at 7:25 AM Niv Keidan wrote:

Re: Understanding Jenkins Core Vulnerabilities in plugin s

2022-02-22 Thread 'Daniel Beck' via Jenkins Developers
On Tue, Feb 22, 2022 at 7:25 AM Niv Keidan wrote: > I am running Jenkins 2.319.3 and using a plugin that has 2.277.4 defined > as in its pom.xml. > Am I exposed to the vulnerabilities in 2.277.4? > No, this only defines the minimum compatible version. The same applies to dependencies to other