-
Bug
-
Resolution: Unresolved
-
Major
-
None
-
RHEL6, Java 8, Jenkins Master 2.138.4 running in Tomcat 8.5.30, Kubernetes Plugin 1.14.9, Folders Plugin 6.7, AWS EKS cluster 1.11+
I have a Jenkins Master v2.138.4 running kubernetes plugin v1.14.9 connected to an AWS EKS cluster 1.11+.
- I check "Restrict pipeline support to authorized folders" in the managed Jenkins page under the Kubernetes cloud config.
- I then configure Kubernetes Pod Template with the Name, Namespace, and Label use the "Raw yaml for the Pod" section.
- Then after, I purposely do not configure the folder containing my Jenkins Declarative pipeline.
- When I click "Build Now" on my pipeline, the plugin does not seem to be Restricting my pipeline from running or using the Kubernetes Cloud.
The is also true when configuring the Kubernetes Pod and Container Template directly in the UI Jenkins manage page.
I read the instructions on the plugin READ.md: https://github.com/jenkinsci/kubernetes-plugin#restricting-what-jobs-can-use-your-configured-cloud
Jenkinsfile:
pipeline { agent { label('aws-jenkins-kube-agent') } options { ansiColor('xterm') timestamps() buildDiscarder logRotator(artifactDaysToKeepStr: '', artifactNumToKeepStr: '', daysToKeepStr: '10', numToKeepStr: '10') disableConcurrentBuilds() } stages { stage ("Run Maven"){ steps { container('maven') { stage('Get Maven Version') { sh ''' mvn -v ''' } } } } } }
Any thoughts?
- causes
-
JENKINS-68661 Recent security changes in kubernetes-plugin increase security risks.
-
- Open
-
I'm seeing the same behavior for the 1.18.1 version of the plugin running on Jenkins 2.176.2 (latest LTS).