×
Query the test-results of a completed build. Get objects representing the latest builds of a job. Search for artifacts by simple criteria. Block until jobs are ...
(If a thread is a part of Jenkins and not serving any user request, like Executor{ }s, then it carries an almighty "system" Authentication object.) ACL, which ...
Resource Root URL. As an alternative to relaxing Content-Security-Policy , administrators can configure Jenkins to serve files from potentially less trusted ...
Jenkins – an open source automation server which enables developers around the world to reliably build, test, and deploy their software.
Missing: book/ | Show results with:book/
That program will install Jenkins as a service using a 64 bit JVM chosen by the user. Keep in mind that to run Jenkins as a service, the account that runs ...
Random: The TCP port is chosen at random to avoid collisions on the Jenkins controller. The downside to randomized ports is that they are chosen during the ...
Cross-Site Request Forgery (CSRF or XSRF) is a type of security vulnerability in web applications. Without protection from CSRF, a Jenkins user or ...
The command line interface can be accessed over SSH or with the Jenkins CLI client, a .jar file distributed with Jenkins. This document assumes Jenkins 2.54 or ...
The Jenkins WAR file bundles Winstone, a Jetty servlet container wrapper, and can be started on any operating system or platform with a version of Java ...
Missing: access- | Show results with:access-
The Manage Jenkins >> System Information page provides detailed information about what is available on this Jenkins instance: System Properties that can be used ...
Missing: access- | Show results with:access-