Uploaded image for project: 'Jenkins'
  1. Jenkins
  2. JENKINS-37499

Triggering builds with the project api token should not be using "anonymous" access rights

XMLWordPrintable

    • Icon: Improvement Improvement
    • Resolution: Won't Fix
    • Icon: Major Major
    • _unsorted, core
    • Jenkins 2.18

      Currently, when using the project token to trigger builds via the api, the request is impersonating the "anonymous" user; requiring this user to have global and job-related READ privilege (interestingly, BUILD privilege is not required when using matrix access).
      If configured like this, every unauthenticated user can see all build jobs in jenkins, which should absolutely not be intended.

      I suggest in this case, the privilege should not be required, or, alternatively, requests made with the project api token should impersonate a second, virtual user "api" or something, who can than be assigned the correct privileges independent from the anonymous user.

            Unassigned Unassigned
            mcnetic Nicolai Ehemann
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated:
              Resolved: