Tom Limoncelli wrote: > What is Jenkins' security model? In addition to what Mike Devlin <[email protected]> already wrote, it's worth noting that a very typical way of using Jenkins is to check out code from a repository (it supports most of the common ones like git and subversion) then run that code. This lets you use the same controls on your Jenkins job and your repository (plus the added benefit of commit messages and everything else that comes with a VCS) so you don't have to build yet another access control mechanism.
Adam _______________________________________________ Discuss mailing list [email protected] https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss This list provided by the League of Professional System Administrators http://lopsa.org/
