Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use upstream Spotless configuration #290

Merged
merged 1 commit into from
Apr 10, 2023
Merged

Use upstream Spotless configuration #290

merged 1 commit into from
Apr 10, 2023

Conversation

basil
Copy link
Member

@basil basil commented Apr 9, 2023

As of jenkinsci/plugin-pom#733 the upstream plugin parent POM provides a standard Spotless configuration that Jenkins plugins can opt into by adding a .mvn_exec_spotless file. This PR removes the custom Spotless configuration in this repository in favor of the upstream one and reformats the entire repository accordingly. The benefit of this PR is increased consistency and standardization with the rest of the Jenkins ecosystem. If this PR is accepted, the next step would be to check in a .git-blame-ignore-revs file so that this commit doesn't clutter up the Git blame view.

return Messages.Dashboard_IframePortlet();
}

public FormValidation doCheckIframeSource(@QueryParameter String value) {

Check warning

Code scanning / Jenkins Security Scan

Stapler: Missing POST/RequirePOST annotation

Potential CSRF vulnerability: If DescriptorImpl#doCheckIframeSource connects to user-specified URLs, modifies state, or is expensive to run, it should be annotated with @POST or @RequirePOST
return FormValidation.error(error);
}
return FormValidation.ok();
public FormValidation doCheckImageUrl(@QueryParameter String value) {

Check warning

Code scanning / Jenkins Security Scan

Stapler: Missing POST/RequirePOST annotation

Potential CSRF vulnerability: If DescriptorImpl#doCheckImageUrl connects to user-specified URLs, modifies state, or is expensive to run, it should be annotated with @POST or @RequirePOST
*
* @return the jobExecutionMode items
*/
public ListBoxModel doFillDisplayStatusItems() {

Check warning

Code scanning / Jenkins Security Scan

Stapler: Missing POST/RequirePOST annotation

Potential CSRF vulnerability: If DescriptorImpl#doFillDisplayStatusItems connects to user-specified URLs, modifies state, or is expensive to run, it should be annotated with @POST or @RequirePOST
return Messages.Dashboard_IframePortlet();
}

public FormValidation doCheckIframeSource(@QueryParameter String value) {

Check warning

Code scanning / Jenkins Security Scan

Stapler: Missing permission check

Potential missing permission check in DescriptorImpl#doCheckIframeSource
return FormValidation.error(error);
}
return FormValidation.ok();
public FormValidation doCheckImageUrl(@QueryParameter String value) {

Check warning

Code scanning / Jenkins Security Scan

Stapler: Missing permission check

Potential missing permission check in DescriptorImpl#doCheckImageUrl
*
* @return the jobExecutionMode items
*/
public ListBoxModel doFillDisplayStatusItems() {

Check warning

Code scanning / Jenkins Security Scan

Stapler: Missing permission check

Potential missing permission check in DescriptorImpl#doFillDisplayStatusItems
@TobiX TobiX merged commit 32d3ce1 into jenkinsci:main Apr 10, 2023
@TobiX
Copy link
Contributor

TobiX commented Apr 10, 2023

Thanks, @basil, much appreciated! 👍

@TobiX TobiX added chore dependencies Update dependencies labels Apr 10, 2023
@basil
Copy link
Member Author

basil commented Oct 18, 2023

Thanks, @basil, much appreciated! 👍

You're welcome! I wanted to take this opportunity to remind you that as a long-time contributor, you are eligible to vote in the upcoming Jenkins Board and Officer Elections at https://community.jenkins.io/g/election-voter-2023

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
chore dependencies Update dependencies
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants