Open zaman-akib opened 3 hours ago
Security audit, information and commands
The security team is auditing all the hosting requests, to ensure a better security by default.
This message informs you that a Jenkins Security Scan was triggered on your repository. It takes ~10 minutes to complete.
/audit-ok
=> the audit is complete, the hosting can continue :tada:./audit-skip
=> the audit is not necessary, the hosting can continue :tada:./audit-findings
=> the audit reveals some issues that require corrections :pencil2:./request-security-scan
=> the findings from the Jenkins Security Scan were corrected, this command will re-scan your repository :mag:./audit-review
=> the findings from the audit were corrected, this command will ping the security team to review the findings :eyes:.
It's only applicable when the previous audit required changes.(automatically generated message, version: 1.29.21)
Hello from your friendly Jenkins Hosting Checker
It appears you have some issues with your hosting request. Please see the list below and correct all issues marked Required. Your hosting request will not be approved until these issues are corrected. Issues marked with Warning or Info are just recommendations and will not stall the hosting process.
You can re-trigger a check by editing your hosting request or by commenting /hosting re-check
:x: Jenkins Security Scan failed. The Security team was notified about this.
Hello from your friendly Jenkins Hosting Checker
It appears you have some issues with your hosting request. Please see the list below and correct all issues marked Required. Your hosting request will not be approved until these issues are corrected. Issues marked with Warning or Info are just recommendations and will not stall the hosting process.
org.apache.httpcomponents:httpclient
should be replaced with a dependency to the api plugin org.jenkins-ci.plugins:apache-httpcomponents-client-4-api
org.apache.commons:commons-text
should be replaced with a dependency to the api plugin io.jenkins.plugins:commons-text-api
You can re-trigger a check by editing your hosting request or by commenting /hosting re-check
/request-security-scan
The Jenkins Security Scan discovered 15 finding(s) :mag:.
For every identified issue, please do one of the following:
After addressing the findings through one of the above methods:
/request-security-scan
command./audit-review
command.You can find detailed information about this finding here.
You can find detailed information about this finding here.
You can find detailed information about this finding here.
Repository URL
https://github.com/blackduck-inc/blackduck-coverity-on-polaris-plugin
New Repository Name
blackduck-coverity-on-polaris-plugin
Description
Black Duck Coverity on Polaris for Jenkins simplifies implementing Coverity on Polaris static analysis in Jenkins builds.
Currently we have a similar kind of plugin in Jenkins marketplace -https://plugins.jenkins.io/synopsys-polaris/ which we will deprecate after releasing this new plugin as we are re-branding the Synopsys products as Black Duck products.
GitHub users to have commit permission
@zaman-akib @blackduck-saraf @manjeet-s
Jenkins project users to have release permission
zaman_akib
Issue tracker
GitHub issues