|
Why was this closed? This seems like a legitimate request. The use case would be:
-
A Jenkins administrator and/or a group of trusted users are the only ones able to create jobs.
-
Regular users are only able run jobs.
If the job creators need functionality outside of the whitelisted/sandbox methods; then they have to approve those scripts. If you have a lot of jobs or your job configurations come from automated methods (version control, provisioning software like puppet or chef); it's not exactly easy or efficient to have another step to approve the scripts.
In the scenario I describe (trusted job creators and script writers but "untrusted" job runners), script security isn't needed. In that scenario, administrators should be able to disable script security for Groovy Postbuild so that it works like it did prior to the 2.0 release.
|