×
Query the test-results of a completed build. Get objects representing the latest builds of a job. Search for artifacts by simple criteria. Block until jobs are ...
Resource Root URL. As an alternative to relaxing Content-Security-Policy , administrators can configure Jenkins to serve files from potentially less trusted ...
That program will install Jenkins as a service using a 64 bit JVM chosen by the user. Keep in mind that to run Jenkins as a service, the account that runs ...
Cross-Site Request Forgery (CSRF or XSRF) is a type of security vulnerability in web applications. Without protection from CSRF, a Jenkins user or ...
Set to true to allow CLI access via WebSocket connections without Origin header check (the default before introduction of this system property). Set to false to ...
It allows us to use different environments for each build project balancing the workload among multiple agents running jobs in parallel. The Jenkins controller ...
Random: The TCP port is chosen at random to avoid collisions on the Jenkins controller. The downside to randomized ports is that they are chosen during the ...
The Jenkins WAR file bundles Winstone, a Jetty servlet container wrapper, and can be started on any operating system or platform with a version of Java ...
Missing: access- | Show results with:access-
The command line interface can be accessed over SSH or with the Jenkins CLI client, a .jar file distributed with Jenkins. This document assumes Jenkins 2.54 or ...
Jenkins provides two methods for installing plugins on the controller: Using the "Plugin Manager" in the web UI. Using the Jenkins CLI install-plugin command.