Replies: 2 comments 10 replies
-
The latest changes to Those are the main risks I know of (feel free to highlight other categories):
My suggestion would be to change the approach of mitigating these risks a bit. Instead of locking down secrets and allowed plugins Woodpecker should be more restrictive which pipelines are executed based on the user submitting them and require approvals where necessary. For example forks should probably always require approvals. By default PRs from outside contributors as well. I started such an approach in #3348 introducing following approval modes:
I would provide a few modes covering most common configs (not over complicating settings for "normal" users) and as suggested this could be extendable in the future using a simple approval http service returning sth like http code 200 for approved and 400 for require approval. |
Beta Was this translation helpful? Give feedback.
-
Iirc if you specify just the image without a tag, it should allow all tags. Otherwise this seems a bug to me |
Beta Was this translation helpful? Give feedback.
-
The current implementation is a pain in practice for both admins and users.
No matter if in a public or private instance.
The implementation should ideally allow to
>=
etc, so one can e.g. say>=4.0.0
Yes, not so easy to implement as the backend needs to be able to interpret semver ranges and likely only semver would be supported at all.
With the current approach, user workflows might fail by simply bumping the image (either manually or automated) if it is not explicitly whitelisted. Often enough, users don't even know which tags are whitelisted as they do not even have access to the server configuration. This will then turn into everyone using
:latest
in the workflows and server config as this is the only config to not touch the server config and get into trouble in pipelines -> not good! 😒Beta Was this translation helpful? Give feedback.
All reactions