You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Jenkins' stores its proxy configs in proxy.yaml. Currently the module can handle the tags: 'name', 'port' and 'noProxyHost' but 'username' and 'secretPassword' are missing.
This would be easy to implement but the password in the config file seems to be encrypted by Jenkins. Has anybody an idea is the puppet module able to do the encryption for the password? I wonder how this enhancement could be implemented.
The text was updated successfully, but these errors were encountered:
However, while the password could be encrypted via Hiera eyaml, once the groovy script is local on the Jenkins server (e.g. a template for init.groovy.d), it would be unencrypted there. Could this be run via CLI, and if so, would that keep the password from being stored unencrypted on the Jenkins server?
Alternatively, how much can the init.groovy.d scripts be locked down (i.e. do they have to be world readable)?
Note: this is a similar issue when dealing with LDAP authentication or anything else that has credentials. I don't know if the types / providers process handles it better - it very well might.
Jenkins' stores its proxy configs in proxy.yaml. Currently the module can handle the tags: 'name', 'port' and 'noProxyHost' but 'username' and 'secretPassword' are missing.
Example of proxy.yaml:
This would be easy to implement but the password in the config file seems to be encrypted by Jenkins. Has anybody an idea is the puppet module able to do the encryption for the password? I wonder how this enhancement could be implemented.
The text was updated successfully, but these errors were encountered: