From 7f322bc54d0b1e0000d5e7307d769c11db122503 Mon Sep 17 00:00:00 2001 From: Danny Rawlins Date: Sat, 29 Jul 2017 19:14:19 +1000 Subject: [PATCH] jenkins: 1.658 -> 2.71 FS#1443 thank you Alexandr Savca (chinarulezzz) --- jenkins/.md5sum | 2 +- jenkins/.signature | 6 +++--- jenkins/Pkgfile | 6 +++--- jenkins/README | 16 ++++++++++++++++ jenkins/pre-install | 2 +- 5 files changed, 24 insertions(+), 8 deletions(-) create mode 100644 jenkins/README diff --git a/jenkins/.md5sum b/jenkins/.md5sum index 572af0d9c..47232417b 100644 --- a/jenkins/.md5sum +++ b/jenkins/.md5sum @@ -1,3 +1,3 @@ 9a39a724f6de3fb4da9d01c672a05345 jenkins.conf f9667704d220576e2ff3f30b74982c99 jenkins.rc -e9f545de1638c5cdf681fafb55fd0b63 jenkins.war +8aa9e57ac54fbaed966bff30fcbd6130 jenkins.war diff --git a/jenkins/.signature b/jenkins/.signature index 2d4e8a568..ddca4407d 100644 --- a/jenkins/.signature +++ b/jenkins/.signature @@ -1,7 +1,7 @@ untrusted comment: verify with /etc/ports/contrib.pub -RWSagIOpLGJF34YsSHCYVrRXLyjcqt7gZHRh4W0s9Pgl75x2YwYtxUFglTiuguEGMn8NcVnEKW634k+JBI8XTxPAeJJDCIb63wA= -SHA256 (Pkgfile) = ab4e533e3555cca4547b081924c8bdc8c82a9021a530d6b10ac2addf627eb75d +RWSagIOpLGJF34iK1gJooQkyWR0iXr7qCOMeiKvtEz6I0adY0AuXHnbuACghMgbLrwoPODqekkZmVUlIR2pQYkc5dd1mFVukeAI= +SHA256 (Pkgfile) = 30c28e03bdb8cf86202ef8e56c04517e09027ba9c7595b12b4c5a5941ebe06f5 SHA256 (.footprint) = 2c6357e834b19efd641fa73bc526f3f7abf18242a32fa4d275efcb3110c1f3a0 -SHA256 (jenkins.war) = 6946523708f5e43f1ae26f98c0a1d71222f44b2fdc59d8b67613b70df027deaa +SHA256 (jenkins.war) = 14727da24054e956dc8b8514998e19001c99efce637891f544d2a9b3d9ea752c SHA256 (jenkins.rc) = ffd41d851271f9458a1bba0c6abe680e34400af3f34257e39cb2bd0b3a8fc8f1 SHA256 (jenkins.conf) = ff391998f4182ef540f8d526939cb211a789b4c5fc6d2e9d54c45821478a6e05 diff --git a/jenkins/Pkgfile b/jenkins/Pkgfile index 2a7cd3544..9301eca40 100644 --- a/jenkins/Pkgfile +++ b/jenkins/Pkgfile @@ -1,13 +1,13 @@ # Description: An extensible open source continuous integration server -# URL: http://jenkins-ci.org/ +# URL: http://jenkins.io/ # Maintainer: Jose V Beneyto, sepen at crux dot nu # Packager: Jose V Beneyto, sepen at crux dot nu # Depends on: jdk name=jenkins -version=1.658 +version=2.71 release=1 -source=(http://mirrors.jenkins-ci.org/war/$version/$name.war \ +source=(http://mirrors.jenkins.io/war/$version/$name.war \ $name.rc $name.conf) build() { diff --git a/jenkins/README b/jenkins/README new file mode 100644 index 000000000..65dce566e --- /dev/null +++ b/jenkins/README @@ -0,0 +1,16 @@ +README for jenkins + + +POST INSTALL + + noexec and /tmp troubleshooting + ------------------------------- + + Many simple exploits that are used against servers rely upon being able + to execute commands in /tmp. As a security precaution, /tmp is mounted + with noexec. This is a good thing and should generally stay this way, + but jenkins doesn't think so, and it will give an error like: + "UnsatisfiedLinkError: ... failed to map segment from shared object". + + In this situation, we need to edit file /usr/etc/jenkins.conf and add + "-Djava.io.tmpdir=/your/chrooted/tmp" into JENKINS_JAVA_OPTIONS variable. diff --git a/jenkins/pre-install b/jenkins/pre-install index 8a4595c08..87c0734e6 100755 --- a/jenkins/pre-install +++ b/jenkins/pre-install @@ -5,6 +5,6 @@ group="jenkins" home="/var/lib/$user" /usr/bin/getent group $group >/dev/null || /usr/sbin/groupadd $group -/usr/bin/getent passwd $user >/dev/null || /usr/sbin/useradd -s /sbin/nologin -d $home -g $group $user +/usr/bin/getent passwd $user >/dev/null || /usr/sbin/useradd -s /bin/sh -d $home -g $group $user # End of file