All Projects → jenkinsci → Credentials Binding Plugin

jenkinsci / Credentials Binding Plugin

Licence: mit

Programming Languages

java
68154 projects - #9 most used programming language

Projects that are alternatives of or similar to Credentials Binding Plugin

ssh-credentials-plugin
No description or website provided.
Stars: ✭ 23 (-41.03%)
Mutual labels:  credentials, secrets
Aws Secrets Manager Credentials Provider Plugin
AWS Secrets Manager Credentials Provider for Jenkins
Stars: ✭ 45 (+15.38%)
Mutual labels:  secrets, credentials
kubernetes-credentials-plugin
Credential classes to access Kubernetes clusters
Stars: ✭ 15 (-61.54%)
Mutual labels:  credentials, secrets
Passcat
Passwords Recovery Tool
Stars: ✭ 164 (+320.51%)
Mutual labels:  secrets, credentials
webextension
Detect secrets in your request/response using secretlint.
Stars: ✭ 40 (+2.56%)
Mutual labels:  credentials, secrets
Mxtract
mXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (+1179.49%)
Mutual labels:  credentials
Secretscanner
Find secrets and passwords in container images and file systems
Stars: ✭ 895 (+2194.87%)
Mutual labels:  secrets
Upash
🔒Unified API for password hashing algorithms
Stars: ✭ 484 (+1141.03%)
Mutual labels:  credentials
Vault
A tool for secrets management, encryption as a service, and privileged access management
Stars: ✭ 22,383 (+57292.31%)
Mutual labels:  secrets
Transcrypt
transparently encrypt files within a git repository
Stars: ✭ 993 (+2446.15%)
Mutual labels:  secrets
Drone Vault
Drone plugin for integrating with the Vault secrets manager
Stars: ✭ 36 (-7.69%)
Mutual labels:  secrets
Vault Guides
Example usage of HashiCorp Vault secrets management
Stars: ✭ 636 (+1530.77%)
Mutual labels:  secrets
Aws Vault
A vault for securely storing and accessing AWS credentials in development environments
Stars: ✭ 5,626 (+14325.64%)
Mutual labels:  credentials
Subdomainizer
A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
Stars: ✭ 915 (+2246.15%)
Mutual labels:  secrets
Swifty
🔑 Free Offline Password Manager
Stars: ✭ 496 (+1171.79%)
Mutual labels:  credentials
Kubernetes Credentials Provider Plugin
Credentials provider that allows storing credentials in Kubernetes
Stars: ✭ 37 (-5.13%)
Mutual labels:  credentials
Repo Supervisor
Scan your code for security misconfiguration, search for passwords and secrets. 🔍
Stars: ✭ 482 (+1135.9%)
Mutual labels:  secrets
Torus Cli
A secure, shared workspace for secrets
Stars: ✭ 611 (+1466.67%)
Mutual labels:  secrets
Guardedbox
Online client-side manager for secure storage and secrets sharing.
Stars: ✭ 34 (-12.82%)
Mutual labels:  secrets
Git Hound
Reconnaissance tool for GitHub code search. Finds exposed API keys using pattern matching, commit history searching, and a unique result scoring system.
Stars: ✭ 602 (+1443.59%)
Mutual labels:  secrets

Jenkins Credentials Binding Plugin

Allows credentials to be bound to environment variables for use from miscellaneous build steps.

You may have a keystore for jarsigner, a list of passwords, or other confidential files or strings which you want to be used by a job but which should not be kept in its SCM, or even visible from its config.xml. Saving these files on the server and referring to them by absolute path requires you to have a server login, and does not work on agents. This plugin gives you an easy way to package up all a job’s secret files and passwords and access them using a single environment variable during the build.

To use, first go to the Credentials link and add items of type Secret file and/or Secret text. Now in a freestyle job, check the box Use secret text(s) or file(s) and add some variable bindings which will use your credentials. The resulting environment variables can be accessed from shell script build steps and so on. (You probably want to start any shell script with set +x, or batch script with @echo off. JENKINS-14731).

For more details of how this works, check the Injecting secrets into builds article at CloudBees.

From a Pipeline job, define your credentials, then check Snippet Generator for a syntax example of the withCredentials step. Any secrets in the build log will be masked automatically.

A typical example of a username password type credential (example from here) would look like: 

withCredentials([usernamePassword(credentialsId: 'amazon', usernameVariable: 'USERNAME', passwordVariable: 'PASSWORD')]) {
  // available as an env variable, but will be masked if you try to print it out any which way
  // note: single quotes prevent Groovy interpolation; expansion is by Bourne Shell, which is what you want
  sh 'echo $PASSWORD'
  // also available as a Groovy variable
  echo USERNAME
  // or inside double quotes for string interpolation
  echo "username is $USERNAME"
}

Note

You should use a single quote (') instead of a double quote (") whenever you can. This is particularly important in Pipelines where a statement may be interpreted by both the Pipeline engine and an external interpreter, such as a Unix shell (sh) or Windows Command (bat) or Powershell (ps). This reduces complications with password masking and command processing. The first step in the above example properly demonstrates this. The next two steps use the basic Pipeline echo step. The first one references the Groovy variable and needs no quotes. The second one needs to use double quotes, so that the interpolation is performed in Groovy.

For more information, see the Pipeline step reference for Credentials Binding Plugin.

Changelog

See GitHub Releases for new releases, or the old changelog for history.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].