Uploaded image for project: 'Jenkins'
  1. Jenkins
  2. JENKINS-71214

Unclear how to tell Nexus to ignore an artifact during scan

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Unresolved
    • Icon: Major Major
    • nexus-platform-plugin
    • None
    • CloudBees Jenkins Enterprise 2.346.4.1-rolling

      As part of our build-pipeline, we are performing a call to 'nexusPolicyEvaluation'.  The scan works fine and critical-errors result (somewhat expected) because we are scanning a Spring Boot application that includes one or more components with current CVEs - e.g. spring-web.jar or snakeyaml-1.33.jar.    While the CVEs are legitimate vulnerabilities, each of them is conditional, e.g. spring-web requires Java deserialization, e.g. snakeyaml requires untrusted yaml, which do not pertain to our situation.   Having analyzed these problems, I'd like to be able to inform Nexus to ignore that problem so that we can eliminate false positives.

      The plugin offers 2 possible mechanisms, but I am unable to get either to work.  I have tried both:

      iqModuleExcludes: [[moduleExclude: '**/snakeyaml*.jar']]

      advancedProperties: 'fileExcludes=*/snakeyaml.jar'

      Neither of these seems to be effective for what I am trying to do.  Is there a way to make Nexus ignore something that is not really an issue?

            whyjustin Justin Young
            jbennett20912 Jeffrey Bennett
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated: