|
||||||||||||||
This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators. For more information on JIRA, see: http://www.atlassian.com/software/jira |
[JIRA] (JENKINS-16372) Password parameter is malformed
gregory.boissi...@gmail.com (JIRA) Sat, 19 Jan 2013 16:15:16 -0800
- [JIRA] (JENKINS-16372) Password paramet... balb...@gmail.com (JIRA)
- [JIRA] (JENKINS-16372) Password pa... gregory.boissi...@gmail.com (JIRA)
- [JIRA] (JENKINS-16372) Password pa... gregory.boissi...@gmail.com (JIRA)
- [JIRA] (JENKINS-16372) Password pa... balb...@gmail.com (JIRA)
- [JIRA] (JENKINS-16372) Password pa... gregory.boissi...@gmail.com (JIRA)
- [JIRA] (JENKINS-16372) Password pa... scm_issue_l...@java.net (JIRA)
- [JIRA] (JENKINS-16372) Password pa... balb...@gmail.com (JIRA)
- [JIRA] (JENKINS-16372) Password pa... gregory.boissi...@gmail.com (JIRA)
In the Jenkins log, password values passed from EnvInject plugin are masked. However, from the script they are decrypted.
For example, test in your script 'echo $1 > out.txt' and call your script with $PASSWORD_VAR and you should see that you have the plain value of the var.