hmm

http://docs.buildbot.net/current/manual/configuration/workers-docker.html

might be better



On Fri, Jan 11, 2019 at 5:58 PM Gavin McDonald <ipv6g...@gmail.com> wrote:

>
> https://github.com/buildbot/buildbot-docker-example-config/blob/master/multimaster/docker-compose.yml
>
> Buildbot is very configurable
>
> Gav...
>
> On Fri, Jan 11, 2019 at 6:28 AM Joan Touzet <woh...@apache.org> wrote:
>
>> > > I believe this is the missing piece for Jenkins CI.
>> >
>> > Nope. Though configuring the behaviour for untrusted refs is a bit of
>> > a dark magic. For one the Authorize Project plugin was implemented
>> > without anyone paying attention to the permissions stuff in the
>> > Credentials plugin... so there are some minor pitfalls there...
>> > mostly around people not actually understanding what the different
>> > credentials stores are for. Then the SCM API trusted refs stuff is
>> > poorly understood... and finally on top of all that Pipeline
>> > currently runs the Groovy script on the master so you cannot verify
>> > untrusted refs that change the Jenkinsfile while having the security
>> > protections.
>> >
>> > But you can most certainly set up Jenkins to have access to a user's
>> > deployment credentials when triggered by the user wanting to deploy
>> > while preventing PRs from accessing those credentials... However it
>> > probably requires a Jenkins Ninja such as myself, KK, Jesse or Oleg
>> > to set it up!
>> >
>> > New initiatives in Jenkins will help make these things accessible to
>> > people not intimately aware of the finer details of how Jenkins
>> > works
>>
>> I'm willing to believe that Jenkins, the software, is incapable of
>> this, though more detail would be nice rather than just "trust me,
>> it's hard."
>>
>> What about buildbot? Or another technology we could use with INFRA's
>> support? Last time I looked at buildbot, its integration with Docker
>> was very poor.
>>
>> I don't have any special attachment to Jenkins.
>>
>> -Joan
>>
>
>
> --
> Gav...
>


-- 
Gav...

Reply via email to