-
-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Configure SystemRead on weekly.ci #3993
base: main
Are you sure you want to change the base?
Conversation
Credentials at least (I guess there is a GH App credential at least). Ping @daniel-beck @Wadeck @timja @MarkEWaite @jglick can i still your knowledge to help us answer Alex's question here? As an OPS, I have a bit of reluctance but maybe that it me being too paranoid. Additionnaly: setting the whole system in full tmpfs (instead of persistence) with a daily reset could leverage risks (and avoid any future manual changes in the UI without putting it as code) |
I am not able to see weekly.ci, whatever that is, so I can offer no advice. |
The point of system read is that nothing sensitive should be exposed assuming plugins are being sensible I doubt there’s anything that would be bad but would need to check it (it’s down atm) |
https://weekly.ci.jenkins.io/ is down for you? (I can see it) |
You can see it now, it was down at the time I checked |
Thanks for your message @timja : it allowed us to see that weekly.ci.jenkins.io was restarting regularly due to its helm release failing to deploy changes in #3991 (rollbacked in #3996). It should be stable now: can you confirm? (cc @NotMyFault ) |
I checked https://weekly.ci.jenkins.io/manage/configuration-as-code/ the only two interesting values I saw are the ldap configuration and the github app for weekly. It looks fine to me but up to you all. |
The LDAP password should not be available at all (even encrypted) in an ideal world. For the GH app, it's up to you @timja as I believe it's only for jenkinsci GH organization: is that correct? |
I think it's fine without ldap
it is yes, tbh not sure if it even needs a github app, but fine for it as-is |
Thanks for confirming. I propose (cc @NotMyFault ) that we update weekly.ci.jenkins.io setup to ensure we can use the System read safely:
|
Works for me 👍 |
From his message, I assume that Jesse was not aware of https://weekly.ci.jenkins.io/, as it was refered to "weekly.ci" only. From what I can see the https://weekly.ci.jenkins.io/manage/credentials/store/system/domain/_/credential/github-app-weekly/ credentials could be removed as it's used only for kubernetes-management/config/jenkins_weekly.ci.jenkins.io.yaml Lines 102 to 103 in d4fbff8
(💡 same thing with kubernetes-management/config/jenkins_infra.ci.jenkins.io.yaml Lines 423 to 424 in d4fbff8
💡 I don't know if the configuration of "pipeline-library" is for the demo purpose, it's not used. None of the pipeline is using shared libraries. No concerns from my side 👍 |
Rate limiting can be an issue, but no real danger in app credentials that can read a single repo (or even all public repos in the org), which is how they should be configured. |
The shared library is not used so 🤷♂️ |
Is this safe to enable? Given weekly.ci is a show-off instance, with a public configuration, I'd assume there's nothing sensitive extended read would expose, would it?