Closed devcatalin closed 7 months ago
Security audit, information and commands
The security team is auditing all the hosting requests, to ensure a better security by default.
This message informs you that a Jenkins Security Scan was triggered on your repository. It takes ~10 minutes to complete.
/audit-ok
=> the audit is complete, the hosting can continue :tada:./audit-skip
=> the audit is not necessary, the hosting can continue :tada:./audit-findings
=> the audit reveals some issues that require corrections :pencil2:./request-security-scan
=> the findings from the Jenkins Security Scan were corrected, this command will re-scan your repository :mag:./audit-review
=> the findings from the audit were corrected, this command will ping the security team to review the findings :eyes:.
It's only applicable when the previous audit required changes.(automatically generated message, version: 1.26.28)
Hello from your friendly Jenkins Hosting Checker
It appears you have some issues with your hosting request. Please see the list below and correct all issues marked Required. Your hosting request will not be approved until these issues are corrected. Issues marked with Warning or Info are just recommendations and will not stall the hosting process.
testkube-cli-setup
) is incorrect, it should be testkube-cli
('New Repository Name' field with "-plugin" removed)You can re-trigger a check by editing your hosting request or by commenting /hosting re-check
/hosting re-check
Hello from your friendly Jenkins Hosting Checker
It appears you have some issues with your hosting request. Please see the list below and correct all issues marked Required. Your hosting request will not be approved until these issues are corrected. Issues marked with Warning or Info are just recommendations and will not stall the hosting process.
You can re-trigger a check by editing your hosting request or by commenting /hosting re-check
The Jenkins Security Scan discovered 1 finding(s) :mag:. For each of them, either apply the recommended correction, suppress the warning or provide a justification.
Once you're done, either re-run the scan with /request-security-scan
or request the Security team to review your justifications with /audit-review
.
You can find detailed information about this finding here.
/hosting re-check
/request-security-scan
Hello from your friendly Jenkins Hosting Checker
It looks like you have everything in order for your hosting request. A member of the Jenkins hosting team will check over things that I am not able to check(code review, README content, etc) and process the request as quickly as possible. Thank you for your patience.
Hosting team members can host this request with /hosting host
The Jenkins Security Scan did not find anything dangerous with your plugin, congratulations! :tada:
:bulb: The Security team recommends that you are setting up the scan in your repository by following our guide.
Hello,
in your pom.xml
, please:
Rather than having your own CD process (.github/workflows/build-and-release.yml
), may I suggest that you use the community designed one: https://www.jenkins.io/doc/developer/publishing/releasing-cd/
Please fix the team name in .github/CODEOWNERS
to be @jenkinsci/testkube-cli-plugin-developers
(based on requested repository name and artifactId
)
thanks @alecharp , I just made the updates you requested, let me know if there's anything else I should do
And about the release workflow?
I've done the following:
.github/workflows/cd.yaml
based on the provided exampledependabot.yml
.mvn/maven.config
mvn validate
commands with successIs there anything else that I should do?
You should be able to get rid of the version for the json-api
plugin but that's a detail.
Is the account testkube
a technical account used within your company? With the setup of cd.yml
, the release will be done when a pull request is merged with an "interesting" label.
The labels are listed here. The labels are used to create categories in the release note draft and those are prefixed with a emoji. The emoji is parsed by the "interesting" action here which determines if a release should occur.
I have looked at the plugin code. To my knowledge there is no other plugin providing what you developed the plugin for.
I would like to give 24-48hrs for other on the hosting team to be able to review your request before finalizing it.
io.jenkins.plugins.testkube.cli
mvn clean verify package
, because I can spot various spotbugs violations left to fix@alecharp yes, the account testkube
is a technical support account used within my company. Thanks for the information about labels, will keep that in mind for releases.
@NotMyFault I fixed the path and all the violations from running mvn clean verify package
Thank you for your reviews! Let me know if there's anything else to do
/hosting host
Hosting request complete, the code has been forked into the jenkinsci project on GitHub as https://github.com/jenkinsci/testkube-cli-plugin
GitHub issues has been selected for issue tracking and was enabled for the forked repo.
A pull request has been created against the repository permissions updater to setup release permissions. Additional users can be added by modifying the created file.
Please delete your original repository (if there are no other forks), under 'Danger Zone', so that the jenkinsci organization repository is the definitive source for the code. If there are other forks, please contact GitHub support to make the jenkinsci repo the root of the fork network (mention that Jenkins approval was given in support request 569994). Also, please make sure you properly follow the documentation on documenting your plugin so that your plugin is correctly documented.
You will also need to do the following in order to push changes and release your plugin:
In order for your plugin to be built by the Jenkins CI Infrastructure and check pull requests, please add a Jenkinsfile to the root of your repository with the following content: https://github.com/jenkinsci/archetypes/blob/master/common-files/Jenkinsfile
Welcome aboard!
Repository URL
https://github.com/kubeshop/testkube-jenkins-plugin
New Repository Name
testkube-cli-plugin
Description
This plugin provides pipeline scripts for initializing and configuring the Testkube CLI in a pipeline. Allowing users to trigger test runs from Jenkins. It also provides the same logic for Build Steps in the UI for freestyle projects.
GitHub users to have commit permission
@devcatalin @olensmar
Jenkins project users to have release permission
testkube
Issue tracker
GitHub issues