Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add jenkins-security-scan template #68

Merged

Conversation

daniel-beck
Copy link
Member

@daniel-beck daniel-beck commented Feb 17, 2022

If you're curious, these are the repos being used:

Screenshot:

Screenshot

@timja
Copy link
Member

timja commented Feb 17, 2022

Could you add this to a repo and show what it looks like?

This sounds really cool in general nice work 😄 .

@daniel-beck
Copy link
Member Author

Could you add this to a repo and show what it looks like?

There's a screenshot from my test org, or WDYM? Otherwise it's just another action and the findings are the same as in jenkins-security-scan-enabled repos, or those signed up via INFRA tickets.

@timja
Copy link
Member

timja commented Feb 17, 2022

I mean of an app using this action, does it report it as check annotations / a check result?

Or just in the security section of the repo.

I didn't mean of what the workflow-template looks like, the action itself

@daniel-beck
Copy link
Member Author

daniel-beck commented Feb 17, 2022

I mean of an app using this action, does it report it as check annotations / a check result?

Or just in the security section of the repo.

Both. These are repos currently getting branches and PRs checked, so you can see the checks on open PRs, and the Security section has findings for the default branch.

@timja
Copy link
Member

timja commented Feb 17, 2022

It goes green with new issues?
jenkinsci/git-plugin#930

=/

Can't say I would ever see that in 17 other checks

@daniel-beck
Copy link
Member Author

daniel-beck commented Feb 17, 2022

Interesting. Since I'm not setting any check results (this is GitHub itself based on uploads of complete scans of both the target branch and the PR), I have no control over that. The first screenshot here indicates this is expected behavior. I'll try to get help from GH.

Would you consider this a blocker, or something we'll just need to document and done?

@timja
Copy link
Member

timja commented Feb 17, 2022

Not a blocker at all just a bit of poor UX that would be great to improve

@daniel-beck
Copy link
Member Author

daniel-beck commented Feb 17, 2022

Looks like it's intentional:

If the code scanning results check finds any problems with a severity of error, critical, or high, the check fails and the error is reported in the check results. If all the results found by code scanning have lower severities, the alerts are treated as warnings or notes and the check succeeds.

This one is just a warning. Unsure whether these levels already existed and were used in this manner when I originally defined these checks. This one in particular is (still) notoriously false-positive heavy too, so it makes some sense at least in this case. We should probably discuss whether any finding should fail the check.

@daniel-beck daniel-beck marked this pull request as ready for review February 18, 2022 19:31
@daniel-beck daniel-beck merged commit d295897 into jenkinsci:master Feb 22, 2022
@daniel-beck daniel-beck deleted the jenkins-security-scan-template branch February 22, 2022 21:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants