[ https://issues.jenkins-ci.org/browse/JENKINS-13600?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=162375#comment-162375 ]
dogfood commented on JENKINS-13600: ----------------------------------- Integrated in !http://ci.jenkins-ci.org/images/16x16/blue.png! [jenkins_ui-changes_branch #26|http://ci.jenkins-ci.org/job/jenkins_ui-changes_branch/26/] [FIXED JENKINS-13600] API token authentication was broken in 1.461. (Revision fdaee7eba3eb2e4fae59255138fa70aa5ada19dc) Result = SUCCESS Kohsuke Kawaguchi : [fdaee7eba3eb2e4fae59255138fa70aa5ada19dc|https://github.com/jenkinsci/jenkins/commit/fdaee7eba3eb2e4fae59255138fa70aa5ada19dc] Files : * changelog.html * core/src/main/java/hudson/security/ACL.java > Cannot access JNLP URL with apiToken after upgrade to 1.461 > ----------------------------------------------------------- > > Key: JENKINS-13600 > URL: https://issues.jenkins-ci.org/browse/JENKINS-13600 > Project: Jenkins > Issue Type: Bug > Components: core > Reporter: Sidnei da Silva > > Accessing the JNLP URL on an OpenID-protected instance does not work anymore > after upgrading to 1.461. Reverting to 1.459 makes it work again. > Error with 1.461: > Exception: Unexpected authentication type: > org.acegisecurity.providers.UsernamePasswordAuthenticationToken@9f6d50cd: > Username: hal; Password: [PROTECTED]; Authenticated: false; Details: > org.acegisecurity.ui.WebAuthenticationDetails@957e: RemoteIpAddress: > 127.0.0.1; SessionId: null; Not granted any authorities > To test: > curl -kinsecure -u user:apitoken > https://localhost/computer/computer-name/slave-agent.jnlp -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.jenkins-ci.org/secure/ContactAdministrators!default.jspa For more information on JIRA, see: http://www.atlassian.com/software/jira