-
Notifications
You must be signed in to change notification settings - Fork 119
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Whitelist of ip's for incoming http posts #61
Comments
I would love to say this is a MUST have- however, with a grain of salt. Someone can just setup an org and point their webhooks at the bot and get around it. This means it will be extremely important for scripts to verify the source org in the payload... well, really, this should probably be done at the core of the bot rather than in each script. It's easy to add. I'm not sure if Github guarantees the ip address(s?) will not change. Webhooks allow you to set a "secret"- we should utilize this too. |
For github its more appropriate to use a secret as part of the uri; but since we can control Jenkins<>gh bot we should use a whitelist for that. |
@jbergstroem how do we get a hold of the IPs to whitelist? Copy-n-paste from build/setup? Or maybe request the master Jenkins instance to validate there's a slave with a given IP? |
@phillipj it will be a small list, almost never changing. Just adding an environment variable where we can throw ip's separated by space/comma would be fine. |
Whitelist will be applied to unauthenticated requests without a token (aka Jenkins), right? |
Yes, but we could use both as well. No point in allowing anyone but Jenkins hosts to talk to that api anyway. |
@jbergstroem now that this is merged.. Any tips on getting a hold of the IPs of all the Jenkins workers? |
We should be able to limit from where we accept incoming http posts so we don't have to rely on obscurity for endpoint url.
The text was updated successfully, but these errors were encountered: