(If a thread is a part of Jenkins and not serving any user request, like Executor{ }s, then it carries an almighty "system" Authentication object.) ACL, which ...
Missing: book/ | Show results with:book/
Security advisories are the primary way to publicly inform Jenkins users about security issues in Jenkins and Jenkins plugins. You can find all past security ...
Missing: book/ | Show results with:book/
Jenkins Parameters. Jenkins initialization can also be controlled by run time parameters passed as arguments. Command line arguments can adjust networking, ...
Jenkins – an open source automation server which enables developers around the world to reliably build, test, and deploy their software.
Missing: book/ | Show results with:book/
Query the test-results of a completed build. Get objects representing the latest builds of a job. Search for artifacts by simple criteria. Block until jobs are ...
... find what they need on jenkins.io. This project was tracked in the WEBSITE-742 EPIC. Documentation Reviews. Reviewing Jenkins documentation bug reports.
Set to true to allow CLI access via WebSocket connections without Origin header check (the default before introduction of this system property). Set to false to ...
That program will install Jenkins as a service using a 64 bit JVM chosen by the user. Keep in mind that to run Jenkins as a service, the account that runs ...
Cross-Site Request Forgery (CSRF or XSRF) is a type of security vulnerability in web applications. Without protection from CSRF, a Jenkins user or ...
Random: The TCP port is chosen at random to avoid collisions on the Jenkins controller. The downside to randomized ports is that they are chosen during the ...