Difference between revisions of "User:Minooz/RepoSyncProj/Hudson"

From CDOT Wiki
Jump to: navigation, search
(Hudosn Help)
(Hudosn Help)
 
Line 27: Line 27:
 
::Problem fixed!
 
::Problem fixed!
 
::In configure part, follow these steps: 1- Check "enable security". 2- check "Hudson's own user database" "Allow users to sign up" (Then save and add some users in sign up page.) 3- Check "Matrix-based security", then add those users and give specific permissions to each of them and also to "Anonymous" user.
 
::In configure part, follow these steps: 1- Check "enable security". 2- check "Hudson's own user database" "Allow users to sign up" (Then save and add some users in sign up page.) 3- Check "Matrix-based security", then add those users and give specific permissions to each of them and also to "Anonymous" user.
 +
:5-Blogs
 +
::[http://malor.se/blog/?p=57 Martin's Blog]

Latest revision as of 09:34, 1 November 2010

Hudosn Help

Hudson
Interview with kosuke
Meet+Hudson
Hudson demo
Steps to how to use Hudson
1- Installation
Installation on Windows
Hudson became self executable[1]
Video Kosuke With slides @http://marakana.com/forums/java/general/79.html
Security
To change the port from 8080 to e.g.8081 (https) -> java -jar hudson.war -httpPort=8081
2- Plugins
Mercurial Plugin
Eclipse Plugin
How to Install plugins
Good plugin installation
3- Start a Job
Building Project
How to use post build scripts with Hudson using regex in log text[2]
4- Authorizing Hudson
Security configurations
While trying to configure users' roles using security matrix, and starting Hudson with this command:
$ java -jar hudson.war --argumentsRealm.passwd.user=password --argumentsRealm.roles.user=adminlogin even as admin was unsuccessful. So, I deleted the config file in Hudson directory and restarted the service and the system again.
Problem fixed!
In configure part, follow these steps: 1- Check "enable security". 2- check "Hudson's own user database" "Allow users to sign up" (Then save and add some users in sign up page.) 3- Check "Matrix-based security", then add those users and give specific permissions to each of them and also to "Anonymous" user.
5-Blogs
Martin's Blog