Community
Participate
Working Groups
I'm scared every time I have to enter my SSH login and SSH password into the Hudson web UI. Please implement authentication against the Bugzilla database. so that I con login using my Eclipse Site login (Bugzilla username and password).
Can you explain why you'd like this feature? Is there a plugin that provides this functionality? -M.
The SSH password is a cryptic one that changes regularly. I generally don't like to use those password but rely on key authentication. Thus, I always have to look it up from my password safe. I just think it would be more convenient to use the Eclipse Site login for Hudson. Entering my SSH login credentials on a website makes me feel unsafe. Guess there is some history. ;) There is a MySQL Authentication plugin. Not sure if that could be used.
Please also have a look at the discussion in bug 332321 on the protection of SSH logins.
Hudson is the only web property (other than the Portal) that uses LDAP to authenticate. If we can switch to the Site login (preferably), or Apache+Bugzilla auth[1], MySQL auth with reasonably low effort, then I believe we should do so sooner rather than later. Confirming this as a bug since it has a security implication. [1] https://bugzilla.mozilla.org/show_bug.cgi?id=392482
Gunnar, what are your thoughts on code commits (SVN, Git) over https, which essentially transmit the Committer credentials over https?
Good point. Personally, I don't use those for the very same reasons. Ideally they would be decoupled from SSH logins as well. But I guess that isn't possible. I think it would be inconvenient for those committers as well. If it's too much work to integrate the site login than you should focus on the more important things. We can leave that one open or close and re-open when there is time to work on this. Merry Christmas and Happy Holidays!
I wasn't actually trying to make a point... But it is something to consider. We highly discourage commit-over-https access, but at least that form of authentication is handled by an Apache module. Regardless, I still thing switching Hudson over to BZ auth would be a good thing.
We've been experimenting with BZ auth against LDAP. We might have something up our sleeve.
(In reply to comment #8) > We've been experimenting with BZ auth against LDAP. We might have something up > our sleeve. AFAICT, I am now able to use my LDAP credentials to log into Hudson. Can we mark this one as fixed?
Yes. Works like a charm.