-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Introduce data section inside sechub configuration file #1098
Labels
Milestone
Comments
|
This was referenced Mar 21, 2022
Closed
Remark: This issue is a precondition for #1152 |
This was referenced Mar 24, 2022
de-jcup
added a commit
that referenced
this issue
Mar 30, 2022
- introducing new classes, changed code scan configuration so same as before, but extending other class - introduced openApi definition #1149 - added default handling for createReducedScanConfigurationCloneJSON . Unsupported clone types have now at least a warning inside logs. - introduce sechub configuration model validator in commons model - changed SechubConfigurationValidator to use commons model validator inside. Rewrote unit tests - added more checks inside commons model validator - added files to SecHubFileSystemConfiguration
de-jcup
added a commit
that referenced
this issue
Mar 30, 2022
de-jcup
added a commit
that referenced
this issue
Mar 30, 2022
- fixed typos (broke one test) - improved one rest doc test #1098 - fixed injection problem
de-jcup
added a commit
that referenced
this issue
Apr 1, 2022
- simplified product execution - removed unnecessary tests - added new tests - removed marker interfaces for different product executors
de-jcup
added a commit
that referenced
this issue
Apr 5, 2022
- renamed "*NetworkTargetData" parts to "*NetworkTargetProductServerData" so it is more clear that the data contains not information about a target but instead target specifici product server information.
This was referenced Apr 5, 2022
de-jcup
added a commit
that referenced
this issue
Apr 5, 2022
- changed ont test inside SecHubExecutionScenarioSecHubClientIntTest to use CLIENT_JSON_SOURCESCAN_GENERIC_TEMPLATE_NO_DATA_SECTION because client does currently not support upload by data-section correctly the sechub client based test does now use only the old approach. - updated #1161 to make it clear that this must implemented for client and tested as well on server side
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Situation
We currently provide only source code uploads inside
codeScan
configuration areas.But we have planned to support also
Which contains binary content as well - and this is currently not possible inside the configuration.
Also it is not possible to reuse an upload for all kind of scan types (e.g. when defining a secretScan and a codeScan in same configuration file )
Wanted
As a SecHub user I want to define a configuration file where I define my data (binary and/or source content), upload it once and use this for different kind of scans in ONE job.
Existing job configurations for users currently only performing code scans shall still work.
Solution
Codescan can be defined as before
We will provide following as before:
But the segment for code scan ("fileSystem" ) is only a shortcut for:
New possiblities for multiple scans for same upload or binary content
While introducing "data" as new element inside our json configuration, we will also
name
attribute inside data object elementsfiles
insidefileSystem
so we can define also single filesHere a full blown example (with massive configurations):
The text was updated successfully, but these errors were encountered: