Releases: jenkinsci/ec2-plugin
EC2 Plugin 1.50.2
Downgrade from 1.50.2, 1.49.2, 1.46.3 to a previous version
If you updated to 1.50.2, or 1.49.2 or 1.46.3 and you need to downgrade back to the previous version, be sure to remove the
file JENKINS_HOME/ec2.xml
before doing that. This file is created if you click on the button Dismiss these messages of
the monitor that warns you when there are some template with a weak strategy. If you don't do that, Jenkins will start and
will overwrite its config.xml file losing your cloud configuration.
At this moment, it seems related with a race-condition between the plugin and the OldDataMonitor
class of Jenkins Core.
See https://issues.jenkins-ci.org/browse/JENKINS-62231
π Bug Fixes
- SECURITY-1408, SECURITY-381, SECURITY-1528 (@jvz, @rsandell, @MRamonLeon)
EC2 Plugin 1.50.1
π Bug Fixes
- FIX: Bad filter passed to DescribeSpotInstanceRequests API (#453) @bwagner5
- JENKINS-62043 - Fix NPE which broke Jenkins builds (#452) @roundtrip-rslobojan
- JENKINS-59048 - Export the spotBlockReservationDurationStr constructor parameter for JCasc (#443) @multani
EC2 Plugin 1.49.2
Downgrade from 1.50.2, 1.49.2, 1.46.3 to a previous version
If you updated to 1.50.2, or 1.49.2 or 1.46.3 and you need to downgrade back to the previous version, be sure to remove the
file JENKINS_HOME/ec2.xml
before doing that. This file is created if you click on the button Dismiss these messages of
the monitor that warns you when there are some template with a weak strategy. If you don't do that, Jenkins will start and
will overwrite its config.xml file losing your cloud configuration.
At this moment, it seems related with a race-condition between the plugin and the OldDataMonitor
class of Jenkins Core.
See https://issues.jenkins-ci.org/browse/JENKINS-62231
π Bug Fixes
- SECURITY-1408, SECURITY-381, SECURITY-1528 (@jvz, @rsandell, @MRamonLeon)
EC2 Plugin 1.46.3
Downgrade from 1.50.2, 1.49.2, 1.46.3 to a previous version
If you updated to 1.50.2, or 1.49.2 or 1.46.3 and you need to downgrade back to the previous version, be sure to remove the
file JENKINS_HOME/ec2.xml
before doing that. This file is created if you click on the button Dismiss these messages of
the monitor that warns you when there are some template with a weak strategy. If you don't do that, Jenkins will start and
will overwrite its config.xml file losing your cloud configuration.
At this moment, it seems related with a race-condition between the plugin and the OldDataMonitor
class of Jenkins Core.
See https://issues.jenkins-ci.org/browse/JENKINS-62231
π Bug Fixes
- SECURITY-1408, SECURITY-381, SECURITY-1528 (@jvz, @rsandell, @MRamonLeon)
EC2 Plugin 1.50
π New features and improvements
- Use Spot Pagination API (#449) @bwagner5
- Offload terminates to separate thread (#433) @res0nance
π Bug Fixes
- Conditionally set AWS network configuration directly on EC2 request if associate public ip is true (#447) @jzyeezy
- JENKINS-36544 - Fix Node Properties on Jenkins 2.205+ (#440) @jhansche
- Handle cases where SlaveTemplate has been removed (#429) @res0nance
π Documentation updates
- Editorial changes (#441) @adamdmharvey
π» Maintenance
- Use ACI agents (#434) @res0nance
- Added null-check in MinimumInstanceChecker (#431) @Thylossus
- Misc cleanups (#435) @res0nance
- Pom updates (#444) @res0nance
EC2 Plugin 1.49.1
π Bug Fixes
- Exclude other bouncy castle version which collides during test execution causing failures (#428) @jeffret-b
π Documentation updates
EC2 Plugin 1.49
π New features and improvements
- Add Per-AMI Spare Instance parameter (#413) @hughsaunders
π» Maintenance
- JENKINS-51316 - Remove generateKey functionality (#426) @MRamonLeon
EC2 Plugin 1.48
π Bug Fixes
- SECURITY-1004 / CVE-2020-2090, CVE-2020-2091 - Perform permission checks in methods performing form validation and requiere POST requests.
EC2 Plugin 1.46.2
π Bug Fixes
- SECURITY-1004 / CVE-2020-2090, CVE-2020-2091 - Perform permission checks in methods performing form validation and requiere POST requests.
EC2 Plugin 1.42.2
π Bug Fixes
- SECURITY-1004 / CVE-2020-2090, CVE-2020-2091 - Perform permission checks in methods performing form validation and requiere POST requests.