- Mar 31, 2014
-
-
Kohsuke Kawaguchi authored
-
- Mar 28, 2014
-
-
Kohsuke Kawaguchi authored
-
Jesse Glick authored
-
Jesse Glick authored
-
Jesse Glick authored
-
- Mar 27, 2014
-
-
Jesse Glick authored
[FIXED JENKINS-22382] Need to restore deprecated overload of BuildAuthorizationToken.checkPermission for binary compatibility.
-
Kohsuke Kawaguchi authored
User.current() can return null, so this better check for null
-
Jesse Glick authored
[FIXED JENKINS-20500] Pass ${it} as an alias for ${view} to t:queue and t:executors, correcting regression introduced in 8e6a3f7f.
-
- Mar 26, 2014
-
-
Larry Shatzer, Jr authored
(cherry picked from commit 20651de1)
-
Harald Albers authored
-
Larry Shatzer, Jr authored
-
Larry Shatzer, Jr authored
-
- Mar 25, 2014
-
-
Kohsuke Kawaguchi authored
This is just a locally patched version, so not meant to be used outside core.
-
Kohsuke Kawaguchi authored
-
- Mar 24, 2014
-
-
Jesse Glick authored
-
Kohsuke Kawaguchi authored
-
- Mar 22, 2014
-
-
Jesse Glick authored
[FIXED JENKINS-19544] When OldDataMonitor is reported a Run, just remember the ID rather than holding a strong reference.
-
- Mar 21, 2014
-
-
Daniel Beck authored
-
Kohsuke Kawaguchi authored
Integrated the new version of XStream that contains the fix.
-
Jesse Glick authored
-
- Mar 20, 2014
-
-
Jesse Glick authored
-
- Mar 18, 2014
-
-
Jesse Glick authored
-
- Mar 17, 2014
-
-
Jesse Glick authored
-
Kohsuke Kawaguchi authored
-
Kohsuke Kawaguchi authored
-
- Mar 14, 2014
-
-
Jesse Glick authored
-
- Mar 13, 2014
-
-
Kohsuke Kawaguchi authored
-
- Mar 12, 2014
-
-
Kohsuke Kawaguchi authored
Jenkins now remembers the authorities (read group memberships) that the user had carried when he/she last time interactively logged in. This information is exposed via User.impersonate(), which is used when using Jenkins SSH, Jenkins CLI, or access via API tokens. Previously this was impossible for a subset of SecurityRealms that does not allow us to read group membership information without successful login (such as Active Directory, OpenID, etc.) For security reasons, if the backend determines that the user does not exist (as opposed to the backend who cannot tell if the user exists or not), then the impersonation will fail. I need to check AD plugin is reporting a failure correctly in this case, before marking as JENKINS-20064 fixed.
-
- Mar 11, 2014
-
-
Kohsuke Kawaguchi authored
An unexpected failure in processing remember me cookie should be handled gracefully. In particular, possibly problematic cookie should be removed, or else the browser will keep bombarding the server with the same cookie, and will never be able to get through. It's much better to just drop the cookie.
-
- Mar 10, 2014
-
-
Daniel Beck authored
-
Kohsuke Kawaguchi authored
-
Kohsuke Kawaguchi authored
-
- Mar 08, 2014
-
-
Daniel Beck authored
-
- Mar 03, 2014
-
-
Kohsuke Kawaguchi authored
-
Kohsuke Kawaguchi authored
-
- Feb 27, 2014
-
-
Jesse Glick authored
[FIXED JENKINS-21780] Revised fix to make cache work properly without introducing a new remote call to find hash codes.
-
Jesse Glick authored
-
- Feb 26, 2014
-
-
Jesse Glick authored
[FIXED JENKINS-21958] FilePath.copyRecursiveTo given a scanner including a symlink but not any regular file in the same directory would neglect to create the parent directory on the destination and thus not copy the link. (Util.createSymlink is partly to blame for not throwing a descriptive IOException when it fails to create a link, but this is its historical behavior needed for compatibility. copyRecursiveTo also continues to suppress error text from this method because there is nowhere for it to go. Perhaps need a new variant of createSymlink that is guaranteed to either have created the link or throw an exception.)
-
- Feb 25, 2014
-
-
Kohsuke Kawaguchi authored
-
Kohsuke Kawaguchi authored
-