Do not expose access to injected variables

Looking at the injected variables is potentially dangerous
as it could expose any sensitive information that was
configured as an environment variable to the Gerrit server
or agents.

Change-Id: I9e8969bcc21eb66b3d5d614f549f6d9d8298a5e7
1 file changed
tree: 623dd1b767ccb55578a397262682c5fafc5dc942
  1. jenkins/
  2. jenkins-docker/
  3. jenkins-internal/
  4. vars/
  5. worker/
  6. .gitignore
  7. Jenkinsfile
  8. README.md
  9. yamllint-config.yaml
README.md

Gerrit CI scripts

Providing jobs

This project uses Jenkins Jobs Builder [1] to generate jobs from yaml descriptor files.

To add new jobs reuse existing templates, defaults etc. as much as possible. E.g. adding a job to build an additional branch of a project may be as easy as adding the name of the branch to an existing project.

To ensure well readable yaml-files, use yamllint [2] to lint the yaml-files. Yamllint can be downloaded using Python Pip:

pip3 install --require-hashes yamllint

To run the linter, execute this command from the project's root directory:

yamllint -c yamllint-config.yaml jenkins/**/*.yaml

Yamllint will not fix detected issues itself.

[1] https://docs.openstack.org/infra/jenkins-job-builder/index.html [2] https://pypi.org/project/yamllint/