This is particularly important for FLOSS projects wanting to use jenkins 
and test GitHub PR with it.

This was triggered by some problem with one PR, that for some reason ends 
up with a workspace without a git repo in it, combined with the fact that 
we use git itself to version Jenkins configuration.
So, when this happened, the pipeline script included a command to make sure 
the repo is clean, using `git reset --hard`. Since there was no `.git` in 
the workspace, the Jenkins config git was affected, thus losing data.

So it looks like the workspace is not isolated via `chroot` or other means. 
What happens if a malicious user just use `rm -rf $JENKINS_HOME` as the 
pipeline build script in a PR?

How would you recommend to protect against these kind of issues? Is there 
any way to force all pipeline jobs to run inside a docker *before* running 
any commands found in the Jenkinsfile?

Thank you!

-- 
You received this message because you are subscribed to the Google Groups 
"Jenkins Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to jenkinsci-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/jenkinsci-users/84775341-aa18-494b-9af7-0809cbd1f63b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to