See the full list of issues at JIRA
No longer tracked in this file. See GitHub releases instead.
- Fix: JENKINS-47274 - Fire event after the user has been loaded from the Jenkins user management service (#10)
- Fix: Set
hd
param value to*
when configured with a list of Google Apps domains (#11) - Task: Add Jenkinsfile for ci.jenkins.io. (#12)
- Fix: Remove leading and trailing spaces from domain (#9)
- Fix: JENKINS-36706 - Improve session timeout handling (#8)
- Task: Update parent POM. Raises Jenkins Core requirement to 2.60.1
- Task: fix findbugs issues
- Task: Update inline help based on latest Google Developers Console UI
- Fix: Avoid 'Committed' stacktraced in logs
- Feature: Allow multiple domains separated by comma (#3)
- Fix: JENKINS-37749 - Disable autocomplete on clientId and clientSecret
- Fix: JENKINS-33286 - Redirect to a logged out page
- Fix: JENKINS-30965 - Error when browsing user configuration page.
- Fix: SECURITY-208 - CVE-2015-5298 - The Google Login Plugin (versions 1.0 and 1.1) allows malicious anonymous users to authenticate successfully against Jenkins instances that are supposed to be locked down to a particular Google Apps domain through client-side request modification.