Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Whitelist of ip's for incoming http posts #61

Closed
jbergstroem opened this issue Aug 8, 2016 · 7 comments
Closed

Whitelist of ip's for incoming http posts #61

jbergstroem opened this issue Aug 8, 2016 · 7 comments

Comments

@jbergstroem
Copy link
Member

We should be able to limit from where we accept incoming http posts so we don't have to rely on obscurity for endpoint url.

@williamkapke
Copy link
Contributor

I would love to say this is a MUST have- however, with a grain of salt.

Someone can just setup an org and point their webhooks at the bot and get around it. This means it will be extremely important for scripts to verify the source org in the payload... well, really, this should probably be done at the core of the bot rather than in each script. It's easy to add.

I'm not sure if Github guarantees the ip address(s?) will not change.

Webhooks allow you to set a "secret"- we should utilize this too.

@jbergstroem
Copy link
Member Author

For github its more appropriate to use a secret as part of the uri; but since we can control Jenkins<>gh bot we should use a whitelist for that.

@phillipj
Copy link
Member

@jbergstroem how do we get a hold of the IPs to whitelist? Copy-n-paste from build/setup? Or maybe request the master Jenkins instance to validate there's a slave with a given IP?

@jbergstroem
Copy link
Member Author

@phillipj it will be a small list, almost never changing. Just adding an environment variable where we can throw ip's separated by space/comma would be fine.

@Starefossen
Copy link
Member

Starefossen commented Aug 13, 2016

Whitelist will be applied to unauthenticated requests without a token (aka Jenkins), right?

@jbergstroem
Copy link
Member Author

@Starefossen said:
Whitelist will be applied to unauthenticated requests without a token (aka Jenkins), right?

Yes, but we could use both as well. No point in allowing anyone but Jenkins hosts to talk to that api anyway.

@phillipj
Copy link
Member

@jbergstroem now that this is merged.. Any tips on getting a hold of the IPs of all the Jenkins workers?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants