Jenkins does have a way of storing credentials. However, I don’t know if there 
is a way to limit which jobs can use the credentials.

Ralph

> On Jun 13, 2018, at 6:48 AM, Stefan Bodewig <bode...@apache.org> wrote:
> 
> On 2018-06-13, Dominik Psenner wrote:
> 
>> As far as I can tell, the secrets stored in jenkins.a.o are
>> trustworthy. For instance I used a github access token generated from
>> my github account that grants jenkins access to the log4net-logging
>> repository on github. I am convinced that nobody else can steal that
>> token without logging in to jenkins using my credentials. Stefan,
>> would you please elaborate the reasonings of why you do not trust pgp
>> signatures issued by builds.a.o?
> 
> Maybe just because I'm paranoid. How would you store the private part of
> a PGP key in Jenkins in a way that cannot be compromised by people who
> log in to Jenkins or a malicious Jenkins addon that gets installed?
> 
> Stefan
> 


Reply via email to