https://github.com/buildbot/buildbot-docker-example-config/blob/master/multimaster/docker-compose.yml

Buildbot is very configurable

Gav...

On Fri, Jan 11, 2019 at 6:28 AM Joan Touzet <woh...@apache.org> wrote:

> > > I believe this is the missing piece for Jenkins CI.
> >
> > Nope. Though configuring the behaviour for untrusted refs is a bit of
> > a dark magic. For one the Authorize Project plugin was implemented
> > without anyone paying attention to the permissions stuff in the
> > Credentials plugin... so there are some minor pitfalls there...
> > mostly around people not actually understanding what the different
> > credentials stores are for. Then the SCM API trusted refs stuff is
> > poorly understood... and finally on top of all that Pipeline
> > currently runs the Groovy script on the master so you cannot verify
> > untrusted refs that change the Jenkinsfile while having the security
> > protections.
> >
> > But you can most certainly set up Jenkins to have access to a user's
> > deployment credentials when triggered by the user wanting to deploy
> > while preventing PRs from accessing those credentials... However it
> > probably requires a Jenkins Ninja such as myself, KK, Jesse or Oleg
> > to set it up!
> >
> > New initiatives in Jenkins will help make these things accessible to
> > people not intimately aware of the finer details of how Jenkins
> > works
>
> I'm willing to believe that Jenkins, the software, is incapable of
> this, though more detail would be nice rather than just "trust me,
> it's hard."
>
> What about buildbot? Or another technology we could use with INFRA's
> support? Last time I looked at buildbot, its integration with Docker
> was very poor.
>
> I don't have any special attachment to Jenkins.
>
> -Joan
>


-- 
Gav...

Reply via email to