Skip to content

Add support for GroupAccessToken credentials, fix credential integration #479

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

mzellho
Copy link

@mzellho mzellho commented Mar 5, 2025

As a follow-up to #478, this PR adds another type of credentials for GroupAccessToken (which are not really any different to PersonalAccessToken or even project access tokens - it might be worth refactoring it towards a generic AccessToken) and fixes PersonalAccessToken and GroupAccessToken to be StandardUsernameCredentials, so they can also be used for the checkout.

@mzellho
Copy link
Author

mzellho commented Mar 5, 2025

Review highly appreciated!

*/
@Restricted(NoExternalUse.class) // stapler
@SuppressWarnings("unused")
public FormValidation doCheckToken(@QueryParameter String value) {

Check warning

Code scanning / Jenkins Security Scan

Stapler: Missing permission check Warning

Potential missing permission check in DescriptorImpl#doCheckToken
*/
@Restricted(NoExternalUse.class) // stapler
@SuppressWarnings("unused")
public FormValidation doCheckToken(@QueryParameter String value) {

Check warning

Code scanning / Jenkins Security Scan

Stapler: Missing POST/RequirePOST annotation Warning

Potential CSRF vulnerability: If DescriptorImpl#doCheckToken connects to user-specified URLs, modifies state, or is expensive to run, it should be annotated with @POST or @RequirePOST
@mzellho mzellho marked this pull request as ready for review March 5, 2025 14:40
@mzellho mzellho requested a review from jetersen as a code owner March 5, 2025 14:40
@mzellho mzellho marked this pull request as draft March 6, 2025 06:47
@mzellho mzellho marked this pull request as ready for review March 6, 2025 07:50
@mzellho mzellho changed the title Add support for GroupAccessToken credentials, fix unauthorized API calls Add support for GroupAccessToken credentials, fix credential integration Mar 6, 2025
@mzellho
Copy link
Author

mzellho commented Apr 15, 2025

hey, @jetersen , any chance you could do a review here? thank you!

@mzellho
Copy link
Author

mzellho commented Apr 25, 2025

...or may I kindly ask you, @mifitous ?

@mzellho
Copy link
Author

mzellho commented Apr 30, 2025

...or maybe you, @rsandell?

@mzellho
Copy link
Author

mzellho commented May 8, 2025

...or maybe you, @basil?

@basil
Copy link
Member

basil commented May 8, 2025

Hi @mzellho, unfortunately we don't have any developers actively reviewing incoming pull requests for this plugin. We don't want your pull request to be in limbo forever; you can step forward to become a maintainer of this plugin following the instructions here:

https://www.jenkins.io/doc/developer/plugin-governance/adopt-a-plugin/

@gounthar
Copy link
Contributor

gounthar commented May 9, 2025

@mzellho

Please let us know if we can assist you with becoming a maintainer.

@mzellho
Copy link
Author

mzellho commented May 13, 2025

@gounthar: thank you kindly for the offer - I am sorry, I cannot do that. I feel that my knowledge on how Jenkins works internally is not good enough to make a good maintainer.

In our organization, we decided to keep on deploying or self-built hpi until a new release is out (that will hopefully feature this PR), just as we did since this PR was created (until now, we didn't see anything break, btw).

Again, thanks for the offer and sorry to not take over here.

@gounthar
Copy link
Contributor

@mzellho : thank you for your message and for the work you've already done on the PR—it's a significant contribution! Remember, just by submitting a working PR, you're already making great strides in understanding the Jenkins codebase. This shows your capability and potential as a maintainer. 🌟

Being a maintainer isn't about having all the answers or implementing new features all the time. It's about keeping the project afloat by reviewing incoming PRs, whether they're from bots or fellow contributors. When the time comes, you can simply let it go without repercussions. There’s no need to commit for longer than you’re comfortable with.

I understand your hesitation, but I believe you have what it takes to step into a maintainer role, even if it’s just until the next release of the plugin. It could be a valuable experience for you, and the community is here to support you every step of the way.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants