Closed jenkins-infra-bot closed 4 years ago
Please activate code scanning for plugins maintained by uhafner. If this needs to be done manually, please activate at least:
Well, I need to build the list but that's all I do manually Would that be it?
jenkinsci/analysis-config-plugin jenkinsci/analysis-core-plugin jenkinsci/analysis-model-api-plugin jenkinsci/analysis-test-plugin jenkinsci/autograding-plugin jenkinsci/bootstrap4-api-plugin jenkinsci/checks-api-plugin jenkinsci/checkstyle-plugin jenkinsci/cobertura-plugin jenkinsci/code-coverage-api-plugin jenkinsci/data-tables-api-plugin jenkinsci/database-h2-plugin jenkinsci/dry-plugin jenkinsci/echarts-api-plugin jenkinsci/findbugs-plugin jenkinsci/font-awesome-api-plugin jenkinsci/forensics-api-plugin jenkinsci/git-forensics-plugin jenkinsci/github-checks-plugin jenkinsci/jquery3-api-plugin jenkinsci/plot-plugin jenkinsci/plugin-util-api-plugin jenkinsci/pmd-plugin jenkinsci/popper-api-plugin jenkinsci/publish-over-ftp-plugin jenkinsci/swarm-plugin jenkinsci/tasks-plugin jenkinsci/warnings-ng-plugin jenkinsci/warnings-plugin
Forgot
jenkinsci/analysis-collector-plugin
in the above list, but I guess you don't care much about this anymore?
Yes I do not care about the old plugins anymore...
Ulli Hafner Could you provide a list (perhaps based on mine in the first comment) of plugins for which I should enable code scanning? Then this is not ambiguous
Yes here we go:
jenkinsci/analysis-model jenkinsci/autograding-plugin jenkinsci/checks-api-plugin jenkinsci/code-coverage-api-plugin jenkinsci/data-tables-api-plugin jenkinsci/echarts-api-plugin jenkinsci/forensics-api-plugin jenkinsci/git-forensics-plugin jenkinsci/github-checks-plugin jenkinsci/plugin-util-api-plugin jenkinsci/warnings-ng-plugin
Thanks!
jenkinsci/analysis-model
Please note that these checks are all Jenkins/Stapler specific, so general purpose libraries are unlikely to benefit.
Thanks for signing up!
An initial scan is finished, and I added the repo(s) to the list for future re-scans.
Unresolved findings are shown with an "unread indicator" on the "Security" tab on each repo.
I've also done a basic sanity check of some of the findings and filtered out the obvious garbage due to limitations of current queries. This doesn't mean what's left are true positive findings, just that those are not due to really bad queries.
If you think a finding is a true positive security issue, please file those in the SECURITY tracker so we can review the fix in private and coordinate a release.
We're using GitHub's CodeQL as the tool for this, but only execute our own, Jenkins-specific queries. For general purpose queries, you can check out the plugin repo(s) on lgtm.com, or add regular CodeQL code scanning to your plugins.
If you have questions or feedback, please reach out to me directly, or email the Jenkins security team at jenkinsci-cert@googlegroups.com
Please activate code scanning for plugins maintained by uhafner. If this needs to be done manually, please activate at least:
Originally reported by drulli, imported from: Code scanning for plugins maintained by uhafner