-
Notifications
You must be signed in to change notification settings - Fork 166
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Audit trail for CI #347
Comments
Here's an idea... Jenkins already provides a (limited) job history, but the job parameters only include git references that can be deleted after the job is run. I am thinking we could push every change that gets submitted to a dedicated repo, with a tag name that includes:
Problems to solve:
|
Most of the changes will be just a tag to a commit that would be there otherwise, or with a very insignificant size after compressed. The problem here is binaries.
|
Restricting the binary jobs to be only invokeable from their intended parents sounds like the way to go. I guess a good place to inject this would be in the rebase scripts. Do we still use the git-rebase job? |
For both fanned jobs, yes. |
Is this still an issue? Should it remain open? |
Closing for now as something that would be nice to have, but seems to not currently be within our means. If someone wants to tackle this, please feel free to reopen. |
Based on discussion at the last Build WG meeting, we might want to implement an audit trail to record commits that are run through CI, so that we can actively or re-actively identify potential malicious actions.
Let us discuss here how we could implement that.
The text was updated successfully, but these errors were encountered: