-
New Feature
-
Resolution: Fixed
-
Major
-
None
-
Jenkins 1.580.1
Swarm Plugin 1.20
"Prevent Cross Site Request Forgery exploits" - Disabled
I updated the Swarm plugin from 1.16 to 1.20 and began experiencing this issue. Enabling the CSRF prevention works fine.
java -jar swarm.jar -executors 2 -mode exclusive -fsroot '~/jenkins' -master http://jenkins:8079/ -name <NAME> -username eric -password <PW> Discovering Jenkins master Attempting to connect to http://jenkins:8079/ aeac4e35-fe09-4da7-bb5c-579658910ff5 Could not obtain CSRF crumb. Response code: 404 Nov 3, 2014 5:19:48 PM org.apache.commons.httpclient.auth.AuthChallengeProcessor selectAuthScheme INFO: basic authentication scheme selected Nov 3, 2014 5:19:48 PM org.apache.commons.httpclient.HttpMethodDirector processWWWAuthChallenge INFO: Failure authenticating with BASIC 'Jenkins'@jenkins:8079 Failed to create a slave on Jenkins CODE: 401 Retrying in 10 seconds
- is duplicated by
-
JENKINS-36667 swarm client 2.1 unable to connect to jenkins instance
- Closed
-
JENKINS-47281 swarm client 3.4 encounters 403 obtaining jnlp while 2.0 connects
- Closed