-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update parent pom + adjustments #46
Conversation
<dependency> | ||
<groupId>org.jenkins-ci.plugins.workflow</groupId> | ||
<artifactId>workflow-step-api</artifactId> | ||
<version>2.22</version> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
or use BOM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1.
But it's not required for this request.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will do in a follow-up
.../org/jenkinsci/plugins/authorizeproject/strategy/SpecificUsersAuthorizationStrategyTest.java
Outdated
Show resolved
Hide resolved
.../org/jenkinsci/plugins/authorizeproject/strategy/SpecificUsersAuthorizationStrategyTest.java
Outdated
Show resolved
Hide resolved
String stderr = result.stderr(); | ||
int ret = result.returnCode(); | ||
|
||
assertEquals(stderr, 0, ret); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There is a custom assertion type in CLICommandInvoker
BTW.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
…SpecificUsersAuthorizationStrategyTest.java Co-authored-by: Jesse Glick <jglick@cloudbees.com>
Co-authored-by: Jesse Glick <jglick@cloudbees.com>
…SpecificUsersAuthorizationStrategyTest.java Co-authored-by: Jesse Glick <jglick@cloudbees.com>
Backgrounds of changes in tests:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The changes look good to me.
But I'm not sure I should merge this request as the latest LTS is not necessary for authorize-project itself. It's only required for #47, which is still in draft.
Is it make sense to create a branch for JENKINS-5303?
@@ -1 +1 @@ | |||
buildPlugin(configurations: buildPlugin.recommendedConfigurations()) | |||
buildPlugin() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Note: The default behavior of buildPlugin:
- platform=[linux, windows] x jdkVersion=8 x jenkinsVersions=null
It might be better to add jdk11 and latest LTS, but it's another issue and not required for this request.
@@ -36,17 +36,26 @@ | |||
</licenses> | |||
|
|||
<properties> | |||
<jenkins.version>2.89.4</jenkins.version> | |||
<jenkins.version>2.235.1</jenkins.version> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Note:
The latest LTS as this is the preparation for #47 to accept a upcoming Jenkins core.
<dependency> | ||
<groupId>org.jenkins-ci.plugins.workflow</groupId> | ||
<artifactId>workflow-step-api</artifactId> | ||
<version>2.22</version> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1.
But it's not required for this request.
String stderr = result.stderr(); | ||
int ret = result.returnCode(); | ||
|
||
assertEquals(stderr, 0, ret); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't think there is any urgency here :) |
No, but it is generally helpful to keep the source base fresh by making sure everything works on a current version of Jenkins. After all, if you are using anything older than the current LTS, you are deliberately declining to receive patches for disclosed vulnerabilities…so why would you expect to get updates to a security-related plugin? |
Availavilities and compatibilities are more important than security for some instances, especially instances in almost-offlined environments. It costs much to keep versions up-to-date in those environments. It’s helpful in those environments if you can update a specific plugin to the latest to use new features or to apply bug fixes of that plugin. “Should plugins use the latest LTS?” is supposed to consist of many issues:
I think I can work on the guideline if there’s a community guideline for the target core version. |
Remember that even offline servers are not immune to CSRF attacks. My general preference, FWIW, is to just set a recent LTS baseline in plugin |
@jglick But the policy for plugins to use latest LTS cores results maintainers to update and make new releases so often. So the some automated mechanism like the one you planed are required Introducing
|
Does not seem to be marked as being up for adoption yet. It is possible to do this now via a GH repo tag. A
Many plugins do use Dependabot for plugin and library deps as well as for parent POM and BOM. Does not currently work for the core dep due to technical limitations. |
I thought this is preparation #47, but #47 is closed. I don't know the background of this pull request... (maybe PCT failed?) This plugin is now |
@jglick I suppose it cannot be automated to pick up commits to backport ( |
Just that as part of testing the impact of something like jenkinsci/jenkins#4848 it is helpful to be able to take some plugin and run PCT on it, or even more lighter-weight mvn -f some-plugin test -Djenkins.version=2.xxx-SNAPSHOT and having a really outdated baseline in the plugin makes that more complicated and painful. The older the baselines in widely used and sensitive plugins, the harder it is to maintain them as part of the whole Jenkins ecosystem.
I would only propose a backport of some critical and safe fix to begin with, not every change to trunk. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Time to ship it finally
<dependency> | ||
<groupId>org.jenkins-ci.plugins.workflow</groupId> | ||
<artifactId>workflow-step-api</artifactId> | ||
<version>2.22</version> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will do in a follow-up
Update the pom.xml to use latest dependencies and adjust the tests to be compatible.