-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
[JENKINS-73506] Enforce use of TLS in FIPS mode #1611
Conversation
3ecaeee
to
bc82b51
Compare
Signed-off-by: Olivier Lamy <olamy@apache.org>
8ed93a7
to
f1ec735
Compare
Signed-off-by: Olivier Lamy <olamy@apache.org>
Signed-off-by: Olivier Lamy <olamy@apache.org>
Signed-off-by: Olivier Lamy <olamy@apache.org>
Signed-off-by: Olivier Lamy <olamy@apache.org>
Signed-off-by: Olivier Lamy <olamy@apache.org>
Signed-off-by: Olivier Lamy <olamy@apache.org>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Minor comment
@@ -58,6 +61,9 @@ public UserRemoteConfig(String url, String name, String refspec, @CheckForNull S | |||
this.name = fixEmpty(name); | |||
this.refspec = fixEmpty(refspec); | |||
this.credentialsId = fixEmpty(credentialsId); | |||
if (FIPS140.useCompliantAlgorithms() && StringUtils.isNotEmpty(this.credentialsId) && StringUtils.startsWith(this.url, "http:")) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I assume that the use of the unauthenticated git://
protocol is outside the scope of FIPS compliance, since it does not require any credential and allows read access to anyone that can access that network port on the host.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
good catch. using git://
protocol with a credentials should be restricted in FIPS env.
done with rev 08a38cf
Signed-off-by: Olivier Lamy <olamy@apache.org>
Signed-off-by: Olivier Lamy <olamy@apache.org>
Remain consistent with other usages in plugin. These would be the first imports fo commons.lang3 in the plugin and a method of the same name is already provided by commons.lang.
Eventually the whole repo will use spotless Use spotless for this new file
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks very, very much!
I think this is ready to merge so long as you're OK with the method name isFIPSLtsCompliant
. I don't understand the use of Lts
in that method name, but I'm not aware of the details of FIPS, so it may just be my failure to understand.
the only reason I can see is a typo ;) I will fix that |
Auto-merge enabled. Thanks! |
Signed-off-by: Olivier Lamy olamy@apache.org
JENKINS-73506 - Enforce use of TLS in FIPS mode
Enforce use of transport layer security (TLS) when running in a mode compatible with Federal Information Processing Standard 140-2 (FIPS 140-2)
Checklist
Types of changes
What types of changes does your code introduce?