Internet Explorer is no longer supported. Many things will still work, but your experience will be degraded and some things won't function. Please use a modern browser such as Edge, Chrome, or Firefox.

Creating and Customizing Tasks

Modified on July 26, 2024view on GitHub

BuildMaster's built-in security tasks are a good starting point, but as you expand within your organization, you may want to customize tasks to help model governance and compliance policies.

To customize the tasks available in BuildMaster, navigate to Admin > Users & Tasks > Tasks, and click [Customize Tasks]. From there, you can add, edit, and delete tasks.

What is Task in BuildMaster?

A task has a Name, Description, and a number of Security Attributes.

Security Attributes

Security Attributes determine what will happen when the tasks is used in a permission or restriction.

Some attributes are considered application-scopable and/or environment-scopeable, which means they can be applied to specific applications and/or environments. Other attributes can only be applied to the system scope. For example, infrastructure (servers and environments) is managed at the system level, so the "Manage Infrastructure" attribute cannot be scoped to a single application or environment.

If a task has only application-scopeable tasks, then the task may be used in a application-specific permission or restriction. The same holds true with environment-scopable tasks.

Security Attribute Reference

Some of the attributes are denoted with a superscript E or A. E indicates that they are scopeable by environment and A indicates that they are scopeable by application (or by extension, application group).

Administration: Configure BuildMaster

It is a sort of "administrative catch all" that is used to secure pages in the administration section not covered by other attributes, including security, extensions, and all settings.

Administration: Manage Applications

Allows users to create, deactivate, and purge applications.

Applications: ViewA

View allows users to view everything within an application with the exception of deployment logs, Git source control, script contents, and configuration file instances.

Applications: View SourceA

View allows users to view Git repositories in an application.

Applications: ManageA

Manage allows users to do the following:

  • change the application's name, description, or other behavioral settings (build number format, enabling BuildMaster issue tracking)
  • edit configuration variables scoped to the application
  • soft delete (i.e. not purge)

Builds: Add NotesA

This allows users to create release/build notes.

Builds: CreateA

Create allows users to only create new builds.

Builds: DeployA E

Deploy allows users to promote a build to a stage that it is eligible to deploy to (i.e. passed gates, deployment windows, etc).

Builds: Edit NotesA

This allows users to edit or delete release/build notes.

Builds: ForceA E

Force allows users to bypass gates.

Builds: ManageA

Manage allows users to upload artifacts, change variables, and change build status.

Builds: View Deployment Debug LogsA E

The "Debug" logs will hide only the debug-level logs (which is where most tools will log sensitive data).

Builds: View Deployment LogsA E

View Deployment Logs and View Deployment Debug Logs are primarily designed to restrict sensitive data that is consequently logged.

Calendars: ManageA

This allows users to create, edit, and delete system calendars.

Configuration Files: View InstanceA E

View allows users to open configuration files and view the contents for a specific environment.

Configuration Files: Edit InstanceA E

Edit will allow users to create, edit, and delete configuration file instances in a specific environment.

Configuration Files: DeployA E

Deploy will allow users to deploy configuration file instances to a specific environment outside the context of an executing plan.

Credentials: Manage A E

Manage will allow users to create, edit, delete credentials, as well as view all sensitive (encrypted) fields.

Credentials: View PasswordsA E

View Passwords will allow users to view sensitive (encrypted) fields on resource credentials.

Infrastructure; Manage

This allows users to create, edit, and delete infrastructure (servers, roles, and environments).

Pipelines: ManageA

This allows users to create, edit, and delete pipelines. This provides transitive access to deploy to force packages to environments, as a user can simply edit a pipeline to remove any gates or deployment windows.

Releases: ManageA

This allows users to create releases, change variables, and change release status.

Releases: Manage Issues A

This allows users to create, edit, or delete built-in BuildMaster issues, and configure external issue sources for an application.

Scripts: View ContentsA

View allows users to open scripts and view the contents.

Scripts: ManageA

Manage will allow users to create, edit, and delete scripts. Note that this provides transitive access to all servers that a user can deploy to.

SQL Scripts: View ContentsA

View allows users to view SQL change scripts for an application.

SQL Scripts: ManageA

Manage allows users to edit, delete, and change releases for SQL change scripts in an application, but also manage database connections.

SQL Scripts: DeployAE

Deploy will allow users to deploy SQL change scripts to a specific environment outside the context of an executing plan.

Task Best Practices

The granular nature of BuildMaster's security attributes may yield to undesired results, including giving users permissions that you don't want. When creating or customizing tasks, there are three important concepts to keep in mind: Permission by Proxy, Nonsensical Access, and Transitive Access.

Proxy Security Attributes

Any system that allows for granular security attributes has the concept of "granting by proxy", or proxy attributes. For example, even if you only grant permission to create and delete files on a file system, you are still granting edit permission by proxy; a user can simply delete and then create a file as a workaround for not being able to edit it. Likewise, users with only edit permissions can delete by proxy, because they can simply edit the file to have no content.

There is no sensible way for any software to prevent proxy operations, which is why it's important to understand what proxy attributes you may be unintentionally allowing.

Nonsensical Security Attributes

Granular security attributes can also lead towards creating "nonsensical" policies. For example, giving manage but not view permissions is nonsensical because you can't manage something you can't view. In this case, the behavior is undefined; generally, you'll be able to view the thing, but there are some places where it might not be visible.

While you wouldn't intentionally create such a policy, it might occur if you create multiple overlapping restrictions and permissions across multiple overlapping groups. The best way to mitigate this risk is to carefully plan your use of restrictions.

Transitive Access

Even with well-planned security restrictions in one part of a system, users can bypass those restrictions from another part of the system that didn't consider the same security restrictions. For example, simply denying view privileges on sensitive files on a network drive is not enough to protect sensitive data; anyone with access to the backups will have transitive access to all those files. Of course, you can encrypt the backups, but then anyone with the decryption key will have transitive access to all the backups.

With BuildMaster, it's especially important to consider transitive access. If BuildMaster can access a production server, and you give users administrative access to BuildMaster, then they can also deploy to that server -- there's just no way around that.