-
-
Notifications
You must be signed in to change notification settings - Fork 9.2k
make the MANAGE permission enabled by default #23873
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Removed experimental warning for MANAGE permission and enable it by default.
| Messages._Jenkins_Manage_Description(), | ||
| ADMINISTER, | ||
| SystemProperties.getBoolean("jenkins.security.ManagePermission"), | ||
| true, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
see #4909 (review) from when system read went GA
May not be as bad as its 1 permission instead of 3, but GA and enabled by default are separate things
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would argue that the permission is already GA (having had the @Beta restriction removed in #10183 but that left the javadoc comment meaning the comment did not match the contract), thus this is really just enabling it by default which matches the PR title.
Whilst I agree that things are different between GA and being enabled by default I do not see a reason to keep this disabled by default as unlike Overall/SystemRead developers have to have opted into this permission.
Whilst SystemRead could have had issues where secrets where unintentionally leaked just by granting someone Overall/SystemRead a developer has to have updated their plugin to make use of Overall/Manage (and core has been adapted as part of creating the Manage permission) so there should not be any security issues arising from enabling this (administrators would still need to grant this permission too!).
Any complaints about "too many permissions" and its too "hard to manage permissions" should be mitigated by properly killing off RunScripts, ConfigureUpdateCenter, and UploadPlugins. Removing the afore mentioned permissions when combined with this PR would have the net effect of reducing the number of permissions by 2.
//cc @daniel-beck as the original author of the comment.
jglick
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
OK I think
mikecirioli
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thanks @jtnord
|
Is it worth running this through ATH and bom ? |
Adapts to jenkinsci/jenkins#23873 so the tests pass on the current Jenkins version as well as a version containing the PR
Adapts to jenkinsci/jenkins#23873 so the tests pass on the current Jenkins version as well as a version containing the PR discovered by jenkinsci/bom#6031 in preparation for jenkinsci/jenkins#23873 tested with mvn test -Djenkins.version=2.540-rc37747.87da_150079a_1
Adapts to jenkinsci/jenkins#23873 so the tests pass on the current Jenkins version as well as a version containing the PR discovered by jenkinsci/bom#6031 in preparation for jenkinsci/jenkins#23873 tested with mvn test -Djenkins.version=2.540-rc37747.87da_150079a_1
…nkins version as well as a version containing the PR discovered by jenkinsci/bom#6031 in preparation for jenkinsci/jenkins#23873 tested with mvn test -Djenkins.version=2.540-rc37747.87da_150079a_1
Adapts to jenkinsci/jenkins#23873 so the tests pass on the current Jenkins version as well as a version containing the PR discovered by jenkinsci/bom#6031 in preparation for jenkinsci/jenkins#23873 tested with mvn test -Djenkins.version=2.540-rc37747.87da_150079a_1
ATH was passing, PRs filed to adapt plugins.
As the adaptions is purely for tests and not production code I would prefer that we would merge this and then skip the affected tests in the BOM until plugins catch up (I can file a PR to exclude them). WDYT? |
We can do although lets give them a little bit of time first, there's no rush here as there's a security release next week so there's at least 2 weeks before this can be released. |
I really want this in the next LTS - so to me there is a rush so this lands in this weeks release :) |
…nkins version as well as a version containing the PR (#401) discovered by jenkinsci/bom#6031 in preparation for jenkinsci/jenkins#23873 tested with mvn test -Djenkins.version=2.540-rc37747.87da_150079a_1
It won't, unless the LTS decision is delayed even further. |
I don't follow And yes tomorrow's weekly would not meet the strict 2 week guidelines but that's not stopped us before. |
This week's weekly is already out. I don't think they were ever released on Wednesdays unless coinciding with a security release. Since there's going to be security releases next week (TBA properly probably tomorrow), and we never include non-security changes in security fix weeklies, anything currently unreleased will not be released before Dec 16. |
oh, I don't think I ever noticed that distinction I thought I had another day :( |
Adapts to jenkinsci/jenkins#23873 so the tests pass on the current Jenkins version as well as a version containing the PR
Removed experimental warning for MANAGE permission and enable it by default.
JEP-223
Fixes #16423
follows up #10183
Testing done
Proposed changelog entries
Overall/ManagePermission by default. This permission when granted to users allows them to configure certain parts of Jenkins' global configuration without the ability to execute arbitrary code.Proposed changelog category
Proposed upgrade guidelines
As the permission is now enabled by default users can uninstall the
Overall/Manage permission enablerpluginSubmitter checklist
@Restrictedor have@since TODOJavadocs, as appropriate.@Deprecated(since = "TODO")or@Deprecated(forRemoval = true, since = "TODO"), if applicable.evalto ease future introduction of Content Security Policy (CSP) directives (see documentation).Desired reviewers
@mikecirioli
Before the changes are marked as
ready-for-merge:Maintainer checklist
upgrade-guide-neededlabel is set and there is a Proposed upgrade guidelines section in the pull request title (see example).lts-candidateto be considered.