[JIRA] (JENKINS-37608) Configurability of GitHub Branch Source to use Scan User with only Read permission

2016-10-14 Thread jgl...@cloudbees.com (JIRA)
Title: Message Title


 
 
 
 

 
 
 

 
   
 Jesse Glick commented on  JENKINS-37608  
 

  
 
 
 
 

 
 
  
 
 
 
 

 
  Re: Configurability of GitHub Branch Source to use Scan User with only Read permission   
 

  
 
 
 
 

 
 Would rather fix this right. Currently stephenconnolly is doing some work on the plugin, though not in this area.  
 

  
 
 
 
 

 
 
 

 
 
 Add Comment  
 

  
 

  
 
 
 
  
 

  
 
 
 
 

 
 This message was sent by Atlassian JIRA (v7.1.7#71011-sha1:2526d7c)  
 
 

 
   
 

  
 

  
 

   





-- 
You received this message because you are subscribed to the Google Groups "Jenkins Issues" group.
To unsubscribe from this group and stop receiving emails from it, send an email to jenkinsci-issues+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[JIRA] (JENKINS-37608) Configurability of GitHub Branch Source to use Scan User with only Read permission

2016-10-14 Thread bksavi...@gmail.com (JIRA)
Title: Message Title


 
 
 
 

 
 
 

 
   
 Brian Saville commented on  JENKINS-37608  
 

  
 
 
 
 

 
 
  
 
 
 
 

 
  Re: Configurability of GitHub Branch Source to use Scan User with only Read permission   
 

  
 
 
 
 

 
 In our case, we are using GitHub enterprise and we automatically trust all PRs. While what you are proposing makes a lot of sense for github.com, it doesn't make as much sense for Enterprise GH. If we could add some configuration to just disable the check, that would be great. Right now I'm pulling the source, override the isTrusted method to return true, and building a custom version of the plugin since it is unacceptable for our users right now to add our API user with write permissions to their org. I feel that this is really a bug in GitHub's API, but to work around it, I'm happy to submit a PR that adds something so you can configure if you want to trust all explicitly without checking collaborators and requiring write access. What do you think Jesse Glick?  
 

  
 
 
 
 

 
 
 

 
 
 Add Comment  
 

  
 

  
 
 
 
  
 

  
 
 
 
 

 
 This message was sent by Atlassian JIRA (v7.1.7#71011-sha1:2526d7c)  
 
 

 
   
 

  
 

  
 

   





-- 
You received this message because you are subscribed to the Google Groups "Jenkins Issues" group.
To unsubscribe from this group and stop receiving emails from it, send an email to jenkinsci-issues+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[JIRA] (JENKINS-37608) Configurability of GitHub Branch Source to use Scan User with only Read permission

2016-09-19 Thread jgl...@cloudbees.com (JIRA)
Title: Message Title


 
 
 
 

 
 
 

 
   
 Jesse Glick commented on  JENKINS-37608  
 

  
 
 
 
 

 
 
  
 
 
 
 

 
  Re: Configurability of GitHub Branch Source to use Scan User with only Read permission   
 

  
 
 
 
 

 
 Probably the plugin needs to be reworked to use this new API. Requires study. CC James Dumay.  
 

  
 
 
 
 

 
 
 

 
 
 Add Comment  
 

  
 

  
 
 
 
  
 

  
 
 
 
 

 
 This message was sent by Atlassian JIRA (v7.1.7#71011-sha1:2526d7c)  
 
 

 
   
 

  
 

  
 

   





-- 
You received this message because you are subscribed to the Google Groups "Jenkins Issues" group.
To unsubscribe from this group and stop receiving emails from it, send an email to jenkinsci-issues+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[JIRA] (JENKINS-37608) Configurability of GitHub Branch Source to use Scan User with only Read permission

2016-08-24 Thread jgl...@cloudbees.com (JIRA)
Title: Message Title


 
 
 
 

 
 
 

 
   
 Jesse Glick commented on  JENKINS-37608  
 

  
 
 
 
 

 
 
  
 
 
 
 

 
  Re: Configurability of GitHub Branch Source to use Scan User with only Read permission   
 

  
 
 
 
 

 
 So this would be quite problematic. If the user associated with the scan access token has no permissions to check whether other users would be able to push to repositories, then to be on the safe side it would need to assume that all users are untrusted, which would prevent any forked pull request from modifying Jenkinsfile, even if it is coming from an authorized user.  
 

  
 
 
 
 

 
 
 

 
 
 Add Comment  
 

  
 

  
 
 
 
  
 

  
 
 
 
 

 
 This message was sent by Atlassian JIRA (v7.1.7#71011-sha1:2526d7c)  
 
 

 
   
 

  
 

  
 

   





-- 
You received this message because you are subscribed to the Google Groups "Jenkins Issues" group.
To unsubscribe from this group and stop receiving emails from it, send an email to jenkinsci-issues+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[JIRA] (JENKINS-37608) Configurability of GitHub Branch Source to use Scan User with only Read permission

2016-08-24 Thread jgl...@cloudbees.com (JIRA)
Title: Message Title


 
 
 
 

 
 
 

 
   
 Jesse Glick commented on  JENKINS-37608  
 

  
 
 
 
 

 
 
  
 
 
 
 

 
  Re: Configurability of GitHub Branch Source to use Scan User with only Read permission   
 

  
 
 
 
 

 
 Status notifications is a separate permission, repo:status. You should not need write access AFAIK. Checking for trusted PRs is another matter. As noted in JENKINS-36240, the current implementation is just a heuristic, since GitHub offers no official API for this. But whatever it offers, it is unlikely to work with permissions lower than organizational administrator.  
 

  
 
 
 
 

 
 
 

 
 
 Add Comment  
 

  
 

  
 
 
 
  
 

  
 
 
 
 

 
 This message was sent by Atlassian JIRA (v7.1.7#71011-sha1:2526d7c)  
 
 

 
   
 

  
 

  
 

   





-- 
You received this message because you are subscribed to the Google Groups "Jenkins Issues" group.
To unsubscribe from this group and stop receiving emails from it, send an email to jenkinsci-issues+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[JIRA] (JENKINS-37608) Configurability of GitHub Branch Source to use Scan User with only Read permission

2016-08-22 Thread aburdajew...@cloudbees.com (JIRA)
Title: Message Title


 
 
 
 

 
 
 

 
   
 Allan BURDAJEWICZ commented on  JENKINS-37608  
 

  
 
 
 
 

 
 
  
 
 
 
 

 
  Re: Configurability of GitHub Branch Source to use Scan User with only Read permission   
 

  
 
 
 
 

 
 I believe this would require the following: 
 
Ability to configure/control whether the status should be automatically updated or no. 
Ability to configure/control whether non trusted PR should be accepted or no. 
  
 

  
 
 
 
 

 
 
 

 
 
 Add Comment  
 

  
 

  
 
 
 
  
 

  
 
 
 
 

 
 This message was sent by Atlassian JIRA (v7.1.7#71011-sha1:2526d7c)  
 
 

 
   
 

  
 

  
 

   





-- 
You received this message because you are subscribed to the Google Groups "Jenkins Issues" group.
To unsubscribe from this group and stop receiving emails from it, send an email to jenkinsci-issues+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[JIRA] (JENKINS-37608) Configurability of GitHub Branch Source to use Scan User with only Read permission

2016-08-22 Thread aburdajew...@cloudbees.com (JIRA)
Title: Message Title


 
 
 
 

 
 
 

 
   
 Allan BURDAJEWICZ created an issue  
 

  
 
 
 
 

 
 
  
 
 
 
 

 
 Jenkins /  JENKINS-37608  
 
 
  Configurability of GitHub Branch Source to use Scan User with only Read permission   
 

  
 
 
 
 

 
Issue Type: 
  New Feature  
 
 
Assignee: 
 Unassigned  
 
 
Components: 
 github-branch-source-plugin  
 
 
Created: 
 2016/Aug/23 4:46 AM  
 
 
Environment: 
 github-branch-source:1.9  Jenkins:2.7  
 
 
Priority: 
  Major  
 
 
Reporter: 
 Allan BURDAJEWICZ  
 

  
 
 
 
 

 
 The scan user needs Write permission on a repository: 
 
to be able to update the commit status via GitHub Branch Source (see GitHubBuildStatusNotification) 
to check whether a PR/Branch is trusted (see GitHubSCMSource) 
 Grant a single user with Write permissions to all organization repositories is a security concern. Git writes and status updates could instead be handle inside the Pipeline/Jenkinsfile. This request is about a configurable solution so that a scan user don’t need Read permissions to scan PR/Branches.