Uploaded image for project: 'Jenkins'
  1. Jenkins
  2. JENKINS-43386

Not sending mail to user with permission to view

    • Icon: Bug Bug
    • Resolution: Unresolved
    • Icon: Minor Minor
    • email-ext-plugin
    • None
    • Jenkins LTS 2.46.1, EmailExtPlugin 2.57.1, role based matrix used

      After the latest update with the security patch, no mails sended anymore to "requester" of a job.

      The error message in job console looks like this:
      Not sending mail to user user@mail.com with no permission to view currentJob
      When setting the suggested property 

      -Dhudson.tasks.MailSender.SEND_TO_USERS_WITHOUT_READ=true

      it works.

       

      The user has overall read permission (matrix based security setup) and for the conrete job the permission:

      Job: View,Discover,Read,Workspace

      Run: Update

      The user has an account (if I click on the user which started the job .. also belongs to this job (can seen in the user view)) and the mail address is correct.

      What permissions or settings are required to avoid this problem? We do not like to have this system property enabled.

      Thanks for the great plugin and support!

      Regards,

      • Thomas

          [JENKINS-43386] Not sending mail to user with permission to view

          catonyx That suggests that the email attached to the jenkins user is not the email it's trying to send to, they must match or it will put them into the no access category. And by jenkins user I mean the one they login to not the fake users you see under the people link that it creates for each seen committer 

          David van Laatum added a comment - catonyx That suggests that the email attached to the jenkins user is not the email it's trying to send to, they must match or it will put them into the no access category. And by jenkins user I mean the one they login to not the fake users you see under the people link that it creates for each seen committer 

          Todd B added a comment -

          davidvanlaatum You are right and that is what is in most logs/consoles. Not sure if I can force this or not. We login with our employee number which is a LDAP server, I think. In our CM tool, we have first.last@company.com. So, then Jenkins seems to find both the CM variation and the number @ company.com. I tried editing some of the "people" to use the other e-mail and so far no luck.

          Todd B added a comment - davidvanlaatum You are right and that is what is in most logs/consoles. Not sure if I can force this or not. We login with our employee number which is a LDAP server, I think. In our CM tool, we have first.last@company.com. So, then Jenkins seems to find both the CM variation and the number @ company.com. I tried editing some of the "people" to use the other e-mail and so far no luck.

          Not sure if it will just get undone again but users can try login to jenkins clicking their name up in the top right then configure on the left and changing their email

          David van Laatum added a comment - Not sure if it will just get undone again but users can try login to jenkins clicking their name up in the top right then configure on the left and changing their email

          Todd B added a comment -

          After many unsuccessful tries to give "unknown" users read access, I found this is the only way which essentially disables the security. In particular, I used the second one below and e-mail notification seem to be back to our normal. Bummer there isn't a better way. Also, it seems I only needed to do this on the master (which after digging, I found that modifying the jenkins.xml was the easiest way).

           

          If the security fix is undesirable in a particular instance, it can be disabled with either or both of the following two system properties:

          • -Dhudson.tasks.MailSender.SEND_TO_UNKNOWN_USERS=true: send mail to build culprits even if they do not seem to be associated with a valid Jenkins login.
          • -Dhudson.tasks.MailSender.SEND_TO_USERS_WITHOUT_READ=true: send mail to build culprits associated with a valid Jenkins login even if they would not otherwise have read access to the job.

          Todd B added a comment - After many unsuccessful tries to give "unknown" users read access, I found this is the only way which essentially disables the security. In particular, I used the second one below and e-mail notification seem to be back to our normal. Bummer there isn't a better way. Also, it seems I only needed to do this on the master (which after digging, I found that modifying the jenkins.xml was the easiest way).   If the security fix is undesirable in a particular instance, it can be disabled with either or both of the following two system properties: -Dhudson.tasks.MailSender.SEND_TO_UNKNOWN_USERS=true: send mail to build culprits even if they do not seem to be associated with a valid Jenkins login. -Dhudson.tasks.MailSender.SEND_TO_USERS_WITHOUT_READ=true: send mail to build culprits associated with a valid Jenkins login even if they would not otherwise have read access to the job.

          Matt Drees added a comment -

          We've run into this too. We're using the " Github Authentication Plugin" and the "GitHub Committer Authorization Strategy". I noticed it appears that email addresses owned by admins (as defined by users listed in the GitHub Authorization Settings->Admin User Names field) are not filtered out. Non-admin jenkins user's email addresses are filtered out with the "Not sending mail to user user@cru.org with no permission to view" message.

           

          So this leads me to hypothesize there's a bug in either the github plugin, or how it is used by other components for authorization decisions.

          Matt Drees added a comment - We've run into this too. We're using the " Github Authentication Plugin" and the "GitHub Committer Authorization Strategy". I noticed it appears that email addresses owned by admins (as defined by users listed in the GitHub Authorization Settings->Admin User Names field) are not filtered out. Non-admin jenkins user's email addresses are filtered out with the "Not sending mail to user user@cru.org with no permission to view" message.   So this leads me to hypothesize there's a bug in either the github plugin, or how it is used by other components for authorization decisions.

          Steve Graham added a comment -

          Just updated my Gitlab Oauth settings with a Group name for all users. Works as expected, only authorised users who belong to the group set on Gitlab can log in to Jenkins 

          Unfortunately I also now get the messages 

          Not sending mail to user <username@...> with no permission to view <Jenkins Jobname> 

          If I set Global Security->Gitlab OAuth Settings -> Authenticated Users to allow View Read it works ok.

          if I set the same using the Group Name ist does not work.

          I would rate this as a more serious bug - I will try the workaround mentioned above ( SEND_TO_USERS_WIITHOUT_READ ) - it is a workaround.

          ( I also had to set SEND_TO_UNKNOWN_USERS a long time ago... - also a bug, users are known)

          Jenkins Version 2.176 ( just about to go to 2.177)

          Email Extension plugin  - 2.66

          Gitlab OAuth 1.4

           

          Steve Graham added a comment - Just updated my Gitlab Oauth settings with a Group name for all users. Works as expected, only authorised users who belong to the group set on Gitlab can log in to Jenkins  Unfortunately I also now get the messages  Not sending mail to user <username@...> with no permission to view <Jenkins Jobname>  If I set Global Security->Gitlab OAuth Settings -> Authenticated Users to allow View Read it works ok. if I set the same using the Group Name ist does not work. I would rate this as a more serious bug - I will try the workaround mentioned above ( SEND_TO_USERS_WIITHOUT_READ ) - it is a workaround. ( I also had to set SEND_TO_UNKNOWN_USERS a long time ago... - also a bug, users are known) Jenkins Version 2.176 ( just about to go to 2.177) Email Extension plugin  - 2.66 Gitlab OAuth 1.4  

          David Adams added a comment -

          Experiencing similar issues as sgjenkins. Using github oauth client for a github organization and can't get email to send. I've tried checking "Allow sending to unregistered users" with no change. I still get: 

          "Not sending mail to user myemail@gmail.com with no permission to view My Project » my-branch#40An attempt to send an e-mail to empty list of recipients, ignored."

          David Adams added a comment - Experiencing similar issues as sgjenkins . Using github oauth client for a github organization and can't get email to send. I've tried checking "Allow sending to unregistered users" with no change. I still get:  "Not sending mail to user myemail@gmail.com with no permission to view My Project » my-branch#40An attempt to send an e-mail to empty list of recipients, ignored."

          Hokwang Lee added a comment -

          suffering this problem, one more here.

          Hokwang Lee added a comment - suffering this problem, one more here.

          in this area i am seeing something like this (with some obfuscation):

          {{}}
          Warning: user1@company.com is not a recognized user, but sending mail anyway
          Not sending mail to user user2@company.com with no permission to view PROJECT_repo » task/master/branch_name #3Warning: user3@company.com is not a recognized user, but sending mail anyway
          Sending email to: user1@company.com user3@company.com
          I feel like there should be a line break between "#3" and "Warning".

          used platform is: Jenkins 2.235.5

          Alexander Stohr added a comment - in this area i am seeing something like this (with some obfuscation): {{}} Warning: user1@company.com is not a recognized user, but sending mail anyway Not sending mail to user user2@company.com with no permission to view PROJECT_repo » task/master/branch_name #3Warning: user3@company.com is not a recognized user, but sending mail anyway Sending email to: user1@company.com user3@company.com I feel like there should be a line break between "#3" and "Warning". used platform is: Jenkins 2.235.5

          Derek Atkins added a comment -

          For what it's worth, I am seeing this same issue after I turned on the Bitbucket OAuth Plugin and enabling the Authorization Matrix.  So I think it's based on the AuthZ matrix and not necessarily the OAuth plugin in use (as it seems that people are seeing this with Github, Gitlab, and Bitbucket OAuth).

          I do NOT have the 'allow any authenticated user read access' because it appears any user with a valid BB account can authenticate, even if they are not a member of my group.

          I'm on Jenkins 2.319.2

          Derek Atkins added a comment - For what it's worth, I am seeing this same issue after I turned on the Bitbucket OAuth Plugin and enabling the Authorization Matrix.  So I think it's based on the AuthZ matrix and not necessarily the OAuth plugin in use (as it seems that people are seeing this with Github, Gitlab, and Bitbucket OAuth). I do NOT have the 'allow any authenticated user read access' because it appears any user with a valid BB account can authenticate, even if they are not a member of my group. I'm on Jenkins 2.319.2

            Unassigned Unassigned
            waffel Thomas Wabner
            Votes:
            18 Vote for this issue
            Watchers:
            31 Start watching this issue

              Created:
              Updated: