-
-
Notifications
You must be signed in to change notification settings - Fork 746
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tests in upstream playbooks fail with "Cannot get CSRF" #203
Comments
One quick fix I tried: - name: Set Jenkins credentials (for testing).
set_fact:
jenkins_admin_username: ''
jenkins_admin_password: '' That seems to have worked, at least somewhat... I'm testing this stuff on Ubuntu currently, and I think what's happening is Jenkins is starting up on install (I hate that Debian packages do that sometimes), so the So my idea is to add a |
Ha, except that we have a check for |
The Groovy Hook Script seems like it has to be in place before first startup, otherwise it seems the initial admin password gets locked in :( |
I tried adding another groovy init script (this one: jenkinsci/docker#310 (comment)), but that ran and didn't seem to cause the setup wizard to be skipped ( So now I'm trying adding the option |
Hmm... might have to be in
So... trying that. Stinks if that's the whole reason this playbook (and a couple other ones I maintain) are breaking builds just because of that change :P |
That... was it. Grr. |
Just FYI,
According to Ansible docs (https://docs.ansible.com/ansible/latest/modules/apt_module.html#apt-module) this can be avoided by setting the RUNLEVEL environment variable to 1 You probably know this already but just in case... |
failed: [localhost] (item=git) => {"ansible_loop_var": "item", "changed": false, "details": "Request failed: <urlopen error [Errno 111] Connection refused>", "item": "git", "msg": "Cannot get CSRF"} |
In many of my upstream playbooks, after the change to make the role compatible with the updated jenkins_plugin module in 2.5, automated builds are failing with:
Note that normal playbook runs which use a vault-encrypted admin password seem to still work okay, so it could be something with the way I have the CI jobs set up. Just wanted to document this here since I've hit this error on a few different playbooks that use this role.
The text was updated successfully, but these errors were encountered: