-
Bug
-
Resolution: Fixed
-
Major
If the permissions of an user are granted on organization membership rather than team membership. The PR from the user aren't considered trusted. But are considered if the user push directly to the repository.
- is blocked by
-
JENKINS-43426 Refactor UX for GitHub and Bitbucket branch sources
-
- Closed
-
- is duplicated by
-
JENKINS-45359 Collaborator with write access is said to not be trusted in the first PR when the project doesn't have a Jenkinsfile yet
-
- Resolved
-
-
JENKINS-40705 Multibranch Pipeline fails to index GitHub repos using GitHub readonly credentials
-
- Closed
-
-
JENKINS-37931 PR build can use PR's head/merge Jenkinsfile insted of master branch.
-
- Resolved
-
- is related to
-
JENKINS-37608 Configurability of GitHub Branch Source to use Scan User with only Read permission
-
- Resolved
-
- links to
- mentioned in
-
Page Loading...
[JENKINS-36240] Default repository permission are not considered
Remote Link | New: This issue links to "current poor implementation (Web Link)" [ 14597 ] |
Workflow | Original: JNJira [ 172934 ] | New: JNJira + In-Review [ 184836 ] |
Link |
New:
This issue is related to |
Assignee | Original: Jesse Glick [ jglick ] |
Assignee | New: Jesse Glick [ jglick ] |
Status | Original: Open [ 1 ] | New: In Progress [ 3 ] |
Remote Link | New: This issue links to "PR 96 (Web Link)" [ 15139 ] |
Status | Original: In Progress [ 3 ] | New: In Review [ 10005 ] |
Link |
New:
This issue is duplicated by |
Comment |
[ Using a multibranch pipeline project with the latest SCM API 2.0 release, we have also noticed PR's from contributors getting flagged as untrusted sources.. Despite the PR author having admin privileges as a contributor and is the member of a Github team that also has Write permissions for the repository. To test this.. # Submit a PR with changes to a project's Jenkinsfile (add an echo or something) # Open up a PR and scan the repository. # Observe, In the scan log, your PR will look something like the following: {code} Checking pull request #1817 (not from a trusted source) Job name: PR-1817 ‘Jenkinsfile’ found Met criteria {code} Since it's not a trusted source, when building this pull request, Jenkins will revert to using the Jenkinsfile on the base branch.. The log in the Jenkins PR job will look like this: {code} Loading trusted files from base branch dev at {commit} rather than {commit} {code} Seems related to this issue. I can file another defect for this, but I wanted to check in here first. ] |