Details
-
New Feature
-
Status: Reopened (View Workflow)
-
Major
-
Resolution: Unresolved
Description
The plugin currently has no way to block untrusted users from making a PR from a fork and having this PR built by Jenkins. The GitHub Pull Request Builder does have this feature which is very useful for open source projects to protect the build system from malicious changes. The documentation on the GitHub Pull Request Builder wiki page says to move from the GHPRB plugin to the GitHub Branch source plugin which causes the user to lose this extremely useful functionality.
Attachments
Issue Links
- is duplicated by
-
JENKINS-55778 Github branch source plugin builds untrusted builds during scan
-
- Resolved
-
- relates to
-
JENKINS-46795 Abort builds with untrusted Jenkinsfile, but only given passive cause
-
- In Review
-
-
JENKINS-53753 Misleading documentation for permissions
-
- Open
-
- links to
You aren’t thinking this through. Suppose, for example, you are running a Maven command within a withCredentials block…same for running Make, ant, etc. change the build file being run and now you can grab the environment variables in any rogue script…