|
||||||||
|
This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators. For more information on JIRA, see: http://www.atlassian.com/software/jira |
||||||||
You received this message because you are subscribed to the Google Groups "Jenkins Issues" group.
To unsubscribe from this group and stop receiving emails from it, send an email to [email protected].
For more options, visit https://groups.google.com/d/optout.

Now it will send the crumb needed when "Prevent Cross Site Request Forgery exploits" is enabled.
Fixed in commit:
https://github.com/Diabol/delivery-pipeline-plugin/commit/ff39674516baed00bf0c071e00ec8324ed6b0b75
There is a build containing the fix here:
http://build.diabol.se/jenkins/job/Delivery%20Pipeline%20Plugin/job/build/89/se.diabol.jenkins.pipeline$delivery-pipeline-plugin/artifact/se.diabol.jenkins.pipeline/delivery-pipeline-plugin/0.8.2-SNAPSHOT/delivery-pipeline-plugin-0.8.2-SNAPSHOT.hpi
Please test it and report back the result.
Will be released later this week.