Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id 6B9D3200C74 for ; Sat, 29 Apr 2017 10:21:15 +0200 (CEST) Received: by cust-asf.ponee.io (Postfix) id 6A386160BA0; Sat, 29 Apr 2017 08:21:15 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id B6CDD160BA9 for ; Sat, 29 Apr 2017 10:21:14 +0200 (CEST) Received: (qmail 93296 invoked by uid 500); 29 Apr 2017 08:21:13 -0000 Mailing-List: contact builds-help@apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: builds@apache.org Delivered-To: mailing list builds@apache.org Received: (qmail 93174 invoked by uid 99); 29 Apr 2017 08:21:13 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd1-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Sat, 29 Apr 2017 08:21:13 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd1-us-west.apache.org (ASF Mail Server at spamd1-us-west.apache.org) with ESMTP id D6B8FC05B6; Sat, 29 Apr 2017 08:21:12 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd1-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: 1.9 X-Spam-Level: * X-Spam-Status: No, score=1.9 tagged_above=-999 required=6.31 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FSL_HELO_NON_FQDN_1=0.001, HTML_MESSAGE=2, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=disabled Authentication-Results: spamd1-us-west.apache.org (amavisd-new); dkim=pass (1024-bit key) header.d=16degrees.com.au Received: from mx1-lw-eu.apache.org ([10.40.0.8]) by localhost (spamd1-us-west.apache.org [10.40.0.7]) (amavisd-new, port 10024) with ESMTP id HkLWS2NeNYdg; Sat, 29 Apr 2017 08:21:07 +0000 (UTC) Received: from 16degrees (excalibur.16degrees.com.au [138.201.119.238]) by mx1-lw-eu.apache.org (ASF Mail Server at mx1-lw-eu.apache.org) with ESMTP id 2F4E25F664; Sat, 29 Apr 2017 08:21:06 +0000 (UTC) Received: from localhost (localhost.localdomain [127.0.0.1]) by 16degrees (Postfix) with ESMTP id 4CB0B138C2C; Sat, 29 Apr 2017 08:21:06 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at 16degrees.com.au Received: from 16degrees ([127.0.0.1]) by localhost (mail.16degrees.com.au [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YZnkj5T5x1Qb; Sat, 29 Apr 2017 08:21:03 +0000 (UTC) Received: from [192.168.88.249] (unknown [218.185.235.166]) by 16degrees (Postfix) with ESMTPSA id 77400138C21; Sat, 29 Apr 2017 08:21:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=16degrees.com.au; s=mail; t=1493454063; bh=7foTpuL4qK+N0eEU9WgBjq2eXt+lnDTqvv4wfT6XiMM=; h=From:Subject:Date:Cc:To:From; b=sRaCC0KIdyIqH2jClLHbNXgrXVozRgufyUNtwNTWLvWWKNW//u89mOyQ8ymi7cea1 4qF+KCvdt2il0s438LsXx6xuwP18+disaCCbtrdOqipXei2SCKYUcBKGOKlgnbx0Jq ibGMMks6MPSjZGYfIt3AxFVo6Feb/SRGm2lcYARA= From: Gavin McDonald Content-Type: multipart/alternative; boundary="Apple-Mail=_BDA7B134-0A11-44F9-9645-00D36A6FCF64" Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\)) Subject: Jenkins (builds.a.o) upgraded to latest version Message-Id: <54085440-8E55-4FB2-AAFE-E23074323BFC@16degrees.com.au> Date: Sat, 29 Apr 2017 18:20:55 +1000 Cc: ASF Operations To: builds@apache.org X-Mailer: Apple Mail (2.3273) archived-at: Sat, 29 Apr 2017 08:21:15 -0000 --Apple-Mail=_BDA7B134-0A11-44F9-9645-00D36A6FCF64 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 HI All, Jenkins was today upgraded from 2.32.2 LTS to 2.46.2 LTS. We were not planning on this upgrade just yet , but a blog post=20 [1] detailing security vulnerabilities, some major, one critical , sort=20= of made it obvious we needed to bump our schedule forward to=20 immediately upgrade. In addition, the upgrade was not announced ahead of time due=20 to the security issues. We did notify by twitter 2 hours before and=20 1 hour before and then again once the upgrade was complete. The upgrade itself went fine. We started off by doing some pre-upgrade=20= plugin updates. Then the upgrade. The post upgrade plugin updates.=20 So, everything is now bang up to date. Projects should make themselves aware of some major changes that=20 have happened since 2.32.2 LTS :up to the current 2.46.2 LTS release. If any project is affected by any of these changes, they should seek out=20= the documentation which details the specific changes made, and what=20 the alternate configurations might be. See the Jenkins Upgrade Guide at [2] for details. Also note that in the last month or two, we have added in probably a = dozen=20 new plugins that have been requested, including Blue Ocean, so feel free to have look around. As always, any issues, please do create an INFRA Jira ticket and/or = email=20 the builds@apache.org mailing list. I = encourage all projects to use the=20 builds list as a self service list for sharing in configurations,hints = and tips,=20 etc. Thanks Gav=E2=80=A6 (ASF Infra) [1] - https://jenkins.io/blog/2017/04/26/security-advisory/ = =20 [2] - https://jenkins.io/doc/upgrade-guide/2.46/ = =20 --Apple-Mail=_BDA7B134-0A11-44F9-9645-00D36A6FCF64--