-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Indusface WAS CICD plugin publish #4187
Comments
Security audit, information and commands The security team is auditing all the hosting requests, to ensure a better security by default. This message informs you that a Jenkins Security Scan was triggered on your repository. CommandsThe bot will parse all comments, and it will check if any line start with a command. Security team only:
Anyone:
Only one command can be requested per comment. (automatically generated message, version: 1.31.74) |
Hello from your friendly Jenkins Hosting Checker It appears you have some issues with your hosting request. Please see the list below and correct all issues marked Required. Your hosting request will not be approved until these issues are corrected. Issues marked with Warning or Info are just recommendations and will not stall the hosting process.
You can re-trigger a check by editing your hosting request or by commenting |
The Jenkins Security Scan discovered 2 finding(s) 🔍. For every identified issue, please do one of the following:
After addressing the findings through one of the above methods:
Jenkins: Plaintext password storageYou can find detailed information about this finding here. SamplePostBuildAction.java#29
ScanAndBuildStatus.java#7
|
/hosting re-check |
/request-security-scan |
The Jenkins Security Scan discovered 2 finding(s) 🔍. For every identified issue, please do one of the following:
After addressing the findings through one of the above methods:
Jenkins: Plaintext password storageYou can find detailed information about this finding here. SamplePostBuildAction.java#29
ScanAndBuildStatus.java#7
|
/audit-review I have changed the field type to text , so it is not required to store as a password |
/audit-findings
The presence of that field in an object that is stored on disk is sufficient to have the confidential information stored in plain text. You have to use a Secret to store it securely. |
/request-security-scan |
The Jenkins Security Scan discovered 1 finding(s) 🔍. For every identified issue, please do one of the following:
After addressing the findings through one of the above methods:
Jenkins: Plaintext password storageYou can find detailed information about this finding here. ScanAndBuildStatus.java#7
|
/request-security-scan |
I Missed it Thank you. I have removed the dependency. |
@mawinter69 I have updated pom . |
/hosting re-check |
/request-security-scan |
Hello from your friendly Jenkins Hosting Checker It looks like you have everything in order for your hosting request. A member of the Jenkins hosting team will check over things that I am not able to check(code review, README content, etc) and process the request as quickly as possible. Thank you for your patience. Hosting team members can host this request with |
The Jenkins Security Scan did not find anything dangerous with your plugin, congratulations! 🎉 💡 The Security team recommends that you are setting up the scan in your repository by following our guide. |
/hosting host |
@productteam-was |
Hosting request complete, the code has been forked into the jenkinsci project on GitHub as https://github.com/jenkinsci/indusface-was-plugin A Jira component named [indusface-was-plugin](https://issues.jenkins.io/issues/?jql=project+%3D+JENKINS+AND+component+%3D+ indusface-was-plugin)has also been created with indusface_jenkins_plugin as the default assignee for issues. A pull request has been created against the repository permissions updater to setup release permissions. Additional users can be added by modifying the created file. Please delete your original repository (if there are no other forks), under 'Danger Zone', so that the jenkinsci organization repository is the definitive source for the code. If there are other forks, please contact GitHub support to make the jenkinsci repo the root of the fork network (mention that Jenkins approval was given in support request 569994). Also, please make sure you properly follow the documentation on documenting your plugin so that your plugin is correctly documented. You will also need to do the following in order to push changes and release your plugin:
Welcome aboard! |
Hi Team @jenkins-infra-bot Invitation link is Expired Can You Please Resend the invitation to the Jenkins CI Org on Github |
resent |
Hi Team @jenkins-infra-bot , Details: Username: productteam-was |
Hi @timja Can you please help getting access to RPU |
You need to open a PR from your own fork of this repo. You can't push directly. |
Thank you |
Hi Team, I followed the steps provided to release the plugin. However, the release workflow did not automate as expected, and I had to execute Release manually. Could you please help me identify if I am missing something in the setup? How long does it usually take for the plugin to become available in the Jenkins Marketplace after the release? |
For the CD to automatically jump in you need to give the pull request a label. Not all of the labels lead to a new release. |
when I search From Jenkins dashboard navigate to Manage Jenkins > Manage Plugins and select the Available tab. I'm not able to see the plugin |
Jenkins is caching the available plugins. You might want to refresh by clicking on the button in the upper right. I can see the plugin on my instance |
Hi @mawinter69 We are unable to see the plugin in our Jenkins instance, even after refreshing . |
Then potentially you're using a Jenkins version lower than 2.462.3 which you've chosen as minimum required Jenkins version for your plugin |
Hi @mawinter69 Can we release the plugin the same way Creating PR if there are any code changes? |
For automatic releases you need a Pull Request. Give the PR a meaningful label and when merged the release happens automatically. |
Repository URL
https://github.com/productteam-was/indusface-was-scan
New Repository Name
indusface-was-plugin
Description
-If your plugin provides a more user-friendly interface or simplified configuration process.
GitHub users to have commit permission
@productteam-was
@techieabhishekakash
Jenkins project users to have release permission
indusface_jenkins_plugin
Issue tracker
Jira
The text was updated successfully, but these errors were encountered: