Uploaded image for project: 'Jenkins'
  1. Jenkins
  2. JENKINS-61396

Configure the plugin to not generate any report on Jenkins

    • Icon: New Feature New Feature
    • Resolution: Unresolved
    • Icon: Minor Minor
    • checkmarx-plugin
    • None

      The administrator must be able to choose if the vulnerabilities returned by checkmarx can be visibles or not on Jenkins.

      The option "Hide results" in the global configuration only hide vulnerabilities display on the project's page of Jenkins.

      But if the user configure his build to generate the json and/or the xml report, the report file will be accessible in the build workspace.

       

      We don't want to see any details of Checkmarx analysis on Jenkins, we only use the Jenkins plugin to run scans and we prefer to access directly on Checkmarx to consult the results.

       

      It is possible to add the options :

      • "Never create OSA report"
      • "Never create SAST report"
      • "Never create SCA report"

      in the Jenkins global configuration ?

       

      For the moment, we comment the call of the methods "createSastReports", "createScaReports" and "createOsaReports" in CxScanBuilder.java.

      But we have to rebuild at every release.

       

      • Jenkins 2.277.4
      • checkmarx-plugin 2021.2.94

       

       

          [JENKINS-61396] Configure the plugin to not generate any report on Jenkins

          mat1e created issue -
          mat1e made changes -
          Description Original: If Jenkins is used as services with many project, the administrator must be able to choose if the project can show their vulnerabilities.

           

          I purpose to add an option on the global level to block all checkmarx reports generation on Jenkins.

          With this option enabled, the plugin will just run a analysis and get the status.

          To see the full details of the analysis, the user must have the rights to connect to checkmarx.
          New: If Jenkins is used as services with many project, the administrator must be able to choose if the projects can show their vulnerabilities.

           

          I purpose to add an option on the global level to block all checkmarx reports generation on Jenkins.

          With this option enabled, the plugin will just run a analysis and get the status.

          To see the full details of the analysis, the user must have the rights to connect to checkmarx.
          mat1e made changes -
          Attachment New: image-2020-03-11-11-47-29-476.png [ 50642 ]
          mat1e made changes -
          Description Original: If Jenkins is used as services with many project, the administrator must be able to choose if the projects can show their vulnerabilities.

           

          I purpose to add an option on the global level to block all checkmarx reports generation on Jenkins.

          With this option enabled, the plugin will just run a analysis and get the status.

          To see the full details of the analysis, the user must have the rights to connect to checkmarx.
          New: The administrator must be able to choose if the vulnerabilities returned by checkmarx can be visibles or not on Jenkins.

           

          For now, we just patched the plugin to not generate the reports :

           

          !image-2020-03-11-11-47-29-476.png|width=812,height=393!

           

          I purpose to add an option on the global configuration of the plugin to block all checkmarx reports generation on Jenkins.

          With this option enabled, the plugin will just run a analysis and get the status.

          To see the full details of the analysis, the user must have the rights to connect to checkmarx.

           

           
          mat1e made changes -
          Assignee Original: Sergey Kadaner [ sergeyk ] New: Liran Stern [ sternlir ]
          mat1e made changes -
          Description Original: The administrator must be able to choose if the vulnerabilities returned by checkmarx can be visibles or not on Jenkins.

           

          For now, we just patched the plugin to not generate the reports :

           

          !image-2020-03-11-11-47-29-476.png|width=812,height=393!

           

          I purpose to add an option on the global configuration of the plugin to block all checkmarx reports generation on Jenkins.

          With this option enabled, the plugin will just run a analysis and get the status.

          To see the full details of the analysis, the user must have the rights to connect to checkmarx.

           

           
          New: The administrator must be able to choose if the vulnerabilities returned by checkmarx can be visibles or not on Jenkins.

           

          For now, we only patched the plugin to not generate reports :

           

          !image-2020-03-11-11-47-29-476.png|width=812,height=393!

           

          I purpose to add an option on the global configuration of the plugin to block all checkmarx reports generation on Jenkins.

          With this option enabled, the plugin will just run a analysis and get the status.

          To see the full details of the analysis, the user must have the rights to connect to checkmarx.

           

           
          mat1e made changes -
          Description Original: The administrator must be able to choose if the vulnerabilities returned by checkmarx can be visibles or not on Jenkins.

           

          For now, we only patched the plugin to not generate reports :

           

          !image-2020-03-11-11-47-29-476.png|width=812,height=393!

           

          I purpose to add an option on the global configuration of the plugin to block all checkmarx reports generation on Jenkins.

          With this option enabled, the plugin will just run a analysis and get the status.

          To see the full details of the analysis, the user must have the rights to connect to checkmarx.

           

           
          New: The administrator must be able to choose if the vulnerabilities returned by checkmarx can be visibles or not on Jenkins.

           

          For now, we only patched the plugin to not generate reports :

           

          !image-2020-03-11-11-47-29-476.png|width=812,height=393!

           

          I purpose to add an option on the global configuration of the plugin to block all checkmarx reports generation on Jenkins.

          With this option enabled, the plugin will just run a analysis and get the status.

          To see the full details of the analysis, the user must have the rights to connect to checkmarx.

           
           * Jenkins 2.204.1
           * checkmarx-plugin 8.90.4

           

           
          mat1e made changes -
          Description Original: The administrator must be able to choose if the vulnerabilities returned by checkmarx can be visibles or not on Jenkins.

           

          For now, we only patched the plugin to not generate reports :

           

          !image-2020-03-11-11-47-29-476.png|width=812,height=393!

           

          I purpose to add an option on the global configuration of the plugin to block all checkmarx reports generation on Jenkins.

          With this option enabled, the plugin will just run a analysis and get the status.

          To see the full details of the analysis, the user must have the rights to connect to checkmarx.

           
           * Jenkins 2.204.1
           * checkmarx-plugin 8.90.4

           

           
          New: The administrator must be able to choose if the vulnerabilities returned by checkmarx can be visibles or not on Jenkins.

          The option "Hide results" in the global configuration only hide vulnerabilities display on the project's page of Jenkins.

          But if the user configure his build to generate the json and/or the xml report, the report file will be accessible in the build workspace.

           

           

           
           * Jenkins 2.204.1
           * checkmarx-plugin 8.90.4

           

           
          mat1e made changes -
          Description Original: The administrator must be able to choose if the vulnerabilities returned by checkmarx can be visibles or not on Jenkins.

          The option "Hide results" in the global configuration only hide vulnerabilities display on the project's page of Jenkins.

          But if the user configure his build to generate the json and/or the xml report, the report file will be accessible in the build workspace.

           

           

           
           * Jenkins 2.204.1
           * checkmarx-plugin 8.90.4

           

           
          New: The administrator must be able to choose if the vulnerabilities returned by checkmarx can be visibles or not on Jenkins.

          The option "Hide results" in the global configuration only hide vulnerabilities display on the project's page of Jenkins.

          But if the user configure his build to generate the json and/or the xml report, the report file will be accessible in the build workspace.

           

          We don't want to see any details of Checkmarx analysis on Jenkins, we only use the Jenkins plugin to run analysis and prefers to access directly on Checkmarx to consult the results.

           

          It is possible to add the options :
           * "Never create OSA report"
           * "Never create SAST report"
           * "Never create SCA report"

          in the Jenkins global configuration ?

           

          For the moment, we comment the call of the methods "createSastReports", "createScaReports" and "createOsaReports" in CxScanBuilder.java.

           
           * Jenkins 2.277.4
           * checkmarx-plugin 2021.2.94

           

           
          mat1e made changes -
          Attachment Original: image-2020-03-11-11-47-29-476.png [ 50642 ]
          mat1e made changes -
          Description Original: The administrator must be able to choose if the vulnerabilities returned by checkmarx can be visibles or not on Jenkins.

          The option "Hide results" in the global configuration only hide vulnerabilities display on the project's page of Jenkins.

          But if the user configure his build to generate the json and/or the xml report, the report file will be accessible in the build workspace.

           

          We don't want to see any details of Checkmarx analysis on Jenkins, we only use the Jenkins plugin to run analysis and prefers to access directly on Checkmarx to consult the results.

           

          It is possible to add the options :
           * "Never create OSA report"
           * "Never create SAST report"
           * "Never create SCA report"

          in the Jenkins global configuration ?

           

          For the moment, we comment the call of the methods "createSastReports", "createScaReports" and "createOsaReports" in CxScanBuilder.java.

           
           * Jenkins 2.277.4
           * checkmarx-plugin 2021.2.94

           

           
          New: The administrator must be able to choose if the vulnerabilities returned by checkmarx can be visibles or not on Jenkins.

          The option "Hide results" in the global configuration only hide vulnerabilities display on the project's page of Jenkins.

          But if the user configure his build to generate the json and/or the xml report, the report file will be accessible in the build workspace.

           

          We don't want to see any details of Checkmarx analysis on Jenkins, we only use the Jenkins plugin to run analysis and prefers to access directly on Checkmarx to consult the results.

           

          It is possible to add the options :
           * "Never create OSA report"
           * "Never create SAST report"
           * "Never create SCA report"

          in the Jenkins global configuration ?

           

          For the moment, we comment the call of the methods "createSastReports", "createScaReports" and "createOsaReports" in CxScanBuilder.java.

          But we have to rebuild at every release.

           
           * Jenkins 2.277.4
           * checkmarx-plugin 2021.2.94

           

           

            sternlir Liran Stern
            mat1e mat1e
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated: