Closed netomi closed 1 year ago
Security audit, information and commands
The security team is auditing all the hosting requests, to ensure a better security by default.
This message informs you that a security scan was triggered on your repository. It takes ~10 minutes to complete.
/audit-ok
=> the audit is complete, the hosting can continue :tada:./audit-skip
=> the audit is not necessary, the hosting can continue :tada:./audit-required
=> the superficial audit was not sufficient, a deeper look is necessary :mag:./audit-findings
=> the audit reveals some issues that require corrections :pencil2:./request-security-scan
=> the findings from the security scan were corrected, this command will re-scan your repository :mag:./audit-review
=> the findings from the audits were corrected, this command will ping the security team to review the findings :eyes:.
It's only applicable when the previous audit required changes.(automatically generated message, version: 1.15.8)
:x: CodeQL Scan failed. The Security team was notified about this.
Hello from your friendly Jenkins Hosting Checker
It appears you have some issues with your hosting request. Please see the list below and correct all issues marked Required. Your hosting request will not be approved until these issues are corrected. Issues marked with Warning or Info are just recommendations and will not stall the hosting process.
You can re-trigger a check by editing your hosting request or by commenting /hosting re-check
Hello from your friendly Jenkins Hosting Checker
It appears you have some issues with your hosting request. Please see the list below and correct all issues marked Required. Your hosting request will not be approved until these issues are corrected. Issues marked with Warning or Info are just recommendations and will not stall the hosting process.
You can re-trigger a check by editing your hosting request or by commenting /hosting re-check
The repository must be hosted on GitHub, don't add .git
at the end of the URL @netomi
Hello from your friendly Jenkins Hosting Checker
It appears you have some issues with your hosting request. Please see the list below and correct all issues marked Required. Your hosting request will not be approved until these issues are corrected. Issues marked with Warning or Info are just recommendations and will not stall the hosting process.
You can re-trigger a check by editing your hosting request or by commenting /hosting re-check
ok ty, I already guessed something like that. We will move the repo first to github and then start the migration.
Hello from your friendly Jenkins Hosting Checker
It appears you have some issues with your hosting request. Please see the list below and correct all issues marked Required. Your hosting request will not be approved until these issues are corrected. Issues marked with Warning or Info are just recommendations and will not stall the hosting process.
You can re-trigger a check by editing your hosting request or by commenting /hosting re-check
Hello from your friendly Jenkins Hosting Checker
It appears you have some issues with your hosting request. Please see the list below and correct all issues marked Required. Your hosting request will not be approved until these issues are corrected. Issues marked with Warning or Info are just recommendations and will not stall the hosting process.
<scm>
block in your pom.xml. See https://maven.apache.org/pom.html#SCM for more information.io.jenkins.plugins
.slsa-provenance
) is incorrect, it should be slsa
('New Repository Name' field with "-plugin" removed)You can re-trigger a check by editing your hosting request or by commenting /hosting re-check
/hosting re-check
Hello from your friendly Jenkins Hosting Checker
It appears you have some issues with your hosting request. Please see the list below and correct all issues marked Required. Your hosting request will not be approved until these issues are corrected. Issues marked with Warning or Info are just recommendations and will not stall the hosting process.
You can re-trigger a check by editing your hosting request or by commenting /hosting re-check
/hosting re-check
Hello from your friendly Jenkins Hosting Checker
It appears you have some issues with your hosting request. Please see the list below and correct all issues marked Required. Your hosting request will not be approved until these issues are corrected. Issues marked with Warning or Info are just recommendations and will not stall the hosting process.
You can re-trigger a check by editing your hosting request or by commenting /hosting re-check
/request-security-scan
The CodeQL Scan discovered 2 finding(s) :mag:. For each of them, either apply the recommended correction, suppress the warning or provide a justification.
Once you're done, either re-run the scan with /request-security-scan
or request the Security team to review your justifications with /audit-review
.
You can find detailed information about this finding here.
Hey @netomi,
thanks for moving on to GitHub. I took a brief look over the hosting request and have some feedback for you:
<dependencies>
block. They don't need to be included if they are unused..github
directory within the repository root with the following files and subdirectories: https://github.com/jenkinsci/archetypes/tree/master/common-files/.github.mvn
folder within the repository root with the following files: https://github.com/jenkinsci/archetypes/tree/master/common-files/.mvnjenkins-table
attribute: https://weekly.ci.jenkins.io/design-library/Table/
That aligns with the overall table design in core.Additionally, depending on if available:
thanks for the quick and thorough feedback, I will work on these items. I understand its still in an early stage and missing tests, but this will come step after step :D
/request-security-scan
The CodeQL Scan discovered 2 finding(s) :mag:. For each of them, either apply the recommended correction, suppress the warning or provide a justification.
Once you're done, either re-run the scan with /request-security-scan
or request the Security team to review your justifications with /audit-review
.
You can find detailed information about this finding here.
thanks for the quick and thorough feedback, I will work on these items
Sounds great!
main
./request-security-scan
:x: CodeQL Scan failed. The Security team was notified about this.
[ASSIST]
[ERROR] Failed to execute goal org.jenkins-ci.tools:maven-hpi-plugin:3.41:validate (default-validate) on project slsa: The plugin org.jenkins-ci.tools:maven-hpi-plugin:3.41 requires Maven version 3.8.1 -> [Help 1]
I will dig the problem :)
Note for myself: Recent maven tooling require 3.8.1 which is not available by default in Debian Bullseye which is the base image used to run Jenkins security scan.
Image updated to install maven directly instead of relying on Debian packages. Worked locally, let's try :)
/request-security-scan
:x: CodeQL Scan failed. The Security team was notified about this.
/request-security-scan
The security-scan workflow of the repo itself seems to work properly: https://github.com/netomi/slsa-jenkins-plugin/actions/runs/4713231330
[ASSIST] @netomi they are different workflows, using the same scanner internally :)
After merging the 2 PR from dependabot:
https://github.com/netomi/slsa-jenkins-plugin/commit/bf782166039778720e70fdff01ef1ffa2ab3822b https://github.com/netomi/slsa-jenkins-plugin/commit/d9c6536da3fe87ea7b644889f9be88902a7a5564
it started to fail.
Yeah, there was a new requirement for Maven :) normally I updated the scanner image to include an up-to-date version of Maven. Current run seems running better
The CodeQL Scan did not find anything dangerous with your plugin, congratulations! :tada:
/hosting re-check
Hello from your friendly Jenkins Hosting Checker
It looks like you have everything in order for your hosting request. A human volunteer will check over things that I am not able to check for (code review, README content, etc) and process the request as quickly as possible. Thank you for your patience.
Hosting team members can host this request with /hosting host
Looks alright to me. The produced .hpi file sizes ~12M. I'd recommend removing unused dependencies from the pom.xml
and applying <exclusion>
s to strip parts of dependencies this plugin doesn't need, to reduce the size a bit, if applicable.
Thanks for following up on this, I will check the dependencies to further reduce the size.
The reason why the plugin accumulates to 12 MB is the inclusion of the bouncycastle provider jar. Will refactor the plugin to not require that or use the available shared library.
Will refactor the plugin to not require that or use the available shared library.
Thanks! If you rely on bouncycastle, you may depend on the corresponding Jenkins plugin: https://plugins.jenkins.io/bouncycastle-api/dependencies/ and don't need to bundle it yourself.
The dependency org.eclipsefdn.security.slsa:attestation
has been updated to remove the bouncy castle dependency for now as the plugin currently can not generate signed attestations. This will be added in a future version.
The size of the plugin is now
.rw-rw-r-- 2,2M tn 24 Apr 22:45 slsa.hpi
Thanks a lot!
Would you mind dropping the unused plugin dependencies from your pom.xml? https://github.com/netomi/slsa-jenkins-plugin/blob/409d2351163f28f73f806140c216084909636e22/pom.xml#L138-L168 No need to install plugins you don't depend on.
I cleaned the dependencies to other plugins.
Some additional changes that I made:
currently, only git is supported as SCM provider, will work on adding support also for others. There does not seem to be a generic way to get the SCM url from an SCM object at least I could not find a way yet. So each SCM provider needs to get custom handling.
/hosting re-check
Hello from your friendly Jenkins Hosting Checker
It looks like you have everything in order for your hosting request. A human volunteer will check over things that I am not able to check for (code review, README content, etc) and process the request as quickly as possible. Thank you for your patience.
Hosting team members can host this request with /hosting host
/request-security-scan
The Jenkins Security Scan did not find anything dangerous with your plugin, congratulations! :tada:
:bulb: The Security team recommends that you are setting up the scan in your repository by following our guide.
/hosting host
Hosting request complete, the code has been forked into the jenkinsci project on GitHub as https://github.com/jenkinsci/slsa-plugin
GitHub issues has been selected for issue tracking and was enabled for the forked repo.
A pull request has been created against the repository permissions updater to setup release permissions. Additional users can be added by modifying the created file.
Please delete your original repository (if there are no other forks), under 'Danger Zone', so that the jenkinsci organization repository is the definitive source for the code. If there are other forks, please contact GitHub support to make the jenkinsci repo the root of the fork network (mention that Jenkins approval was given in support request 569994). Also, please make sure you properly follow the documentation on documenting your plugin so that your plugin is correctly documented.
You will also need to do the following in order to push changes and release your plugin:
In order for your plugin to be built by the Jenkins CI Infrastructure and check pull requests, please add a Jenkinsfile to the root of your repository with the following content: https://github.com/jenkinsci/archetypes/blob/master/common-files/Jenkinsfile
Welcome aboard!
Repository URL
https://github.com/netomi/slsa-jenkins-plugin
New Repository Name
slsa-plugin
Description
The Eclipse Security Team has been developing a jenkins plugin to create SLSA provenance attestations (https://slsa.dev/attestation-model) during a build hosted in the repository above.
Its still early work, but already functional, and we would like to start the process of migrating it to the jenkinsci organization.
GitHub users to have commit permission
@netomi @mbarbero @fredg02
Jenkins project users to have release permission
netomi
Issue tracker
GitHub issues