-
-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Consider no longer using http_request
plugin
#3075
Comments
I do not think we want to do this. It fills a need that was not adequately met otherwise. jenkins-infra/pipeline-library#210 by @timja |
Release 1.16 of the http request plugin has been delivered. The changelog reports that the security issue is resolved. Thanks to @offa for making that change! What additional steps are required in order to show the issue as resolved in the Jenkins update center? |
Nothing relevant changed since I filed this issue. We weren't affected by the vulnerability before. The problem is that the plugin is essentially unmaintained (Basil's availability is very limited per jenkins-infra/repository-permissions-updater#2019, Oleg last released a plugin more than a year ago, and Janario was unresponsive). |
I think Mark was asking about how to remove the "Passwords stored in plain text" warning from the latest version which I think just needs a PR to |
Submitted jenkins-infra/update-center2#628 to note in update center that the issue is resolved. |
Off topic, but FTR documented on https://www.jenkins.io/security/plugins/ which is linked from every unresolved advisory entry since this year. |
|
As I wrote in #3075 (comment),
If you want to reject this request because we really need the plugin (basically Jesse's comment) and consider it being unmaintained an acceptable risk, that's fine. But this request has nothing to do with the vulnerability that was announced, then fixed. That just made it clear that the plugin is unmaintained. It's not maintained any better now, there are no new maintainers. |
For what it is worth, I think the same is true for other plugins we rely on, such as In some ways, a poorly maintained plugin that we still rely on is better than an unmaintained one that we still rely on, because at least someone is available to merge PRs and cut emergency releases if need be. Without that, problems can escalate quickly. I do wish I had more time and interest to work on plugins like |
Service(s)
ci.jenkins.io
Summary
ci.jenkins.io uses
http_request
plugin for https://github.com/jenkins-infra/pipeline-library/blob/aa9213e20d368a84369a78a00ea6599c0db6ff12/vars/infra.groovy#L345-L352 (and potentially more).We announced an unresolved security vulnerability in this plugin today: https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2053
While it doesn't affect us given how we're using the plugin, we should still consider implementing this differently, so the unmaintained/improperly maintained plugin is no longer needed and can be uninstalled.
Reproduction steps
No response
The text was updated successfully, but these errors were encountered: