You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As a user I have a project which uses much java but also contains some code written in go
The configuration of uploaded source code in sechub.json will contain files of both languages, just inside code scan
filesystem configuration content.
Wanted
The administrator configured a product execution profile for the used sechub project which will use gosec and checkmarxproduct executor configurations.
But the admin wants to configure that go files are scanned by gosec and all other parts by checkmarx.
This shall be done at runtime configuration of product executor configuration entries.
Solution
Common product executor config (runtime) parameters to handle those parts
We will extend SecHubFileStructureDataProvider to contain filter patterns (excludes an includes)
Filter data will come from the runtime parameters of executor configurations (done by DefaultExecutorConfigSupport or descendants.
PDSDefaultParameterKeyConstants
introduce pds.config.filefilter.excludes
introduce pds.config.filefilter.includes
On SecHub side we will introduce dedicated entries (where possiblle) but indedicated issues (e.g. for Automate file filtering for Checkmarx #1395 for Checkmarx). Inside this issue only implement PDS filtering.
Both file filter variants will provide a comma separated list - e.g. *.go,*.html will filter all go or HTML files from zip when extracted at execution side (PDS sidevs. executors running on sechub server side)
Filter behavior:
optional include file pattern entries: When empty, all files are included. When defined, only defined parts are included
optional exclude file pattern entries: When empty, all included files are accepted. If set, includes files except these will be accepted
The text was updated successfully, but these errors were encountered:
de-jcup
changed the title
Filter files by product executor configurations
Implement file filter logic inside sechub-commons-archive and automate for PDS
Jun 14, 2022
Situation
This is a sub issue of #1166
As a user I have a project which uses much
java
but also contains some code written ingo
The configuration of uploaded source code in
sechub.json
will contain files of both languages, just inside code scanfilesystem configuration content.
Wanted
The administrator configured a
product execution profile
for the used sechub project which will usegosec
andcheckmarx
product executor configurations
.But the admin wants to configure that
go
files are scanned bygosec
and all other parts by checkmarx.This shall be done at runtime configuration of product executor configuration entries.
Solution
sechub-commons-archive
#1323 we haveArchiveSupport.java
andSecHubFileStructureConfiguration.java
in charge for centralarchive handling combined with data section and binary handling ( PDS: Handle
binaries.tar
with data secion parts on PDS server side #1167)SecHubFileStructureDataProvider
to contain filter patterns (excludes an includes)DefaultExecutorConfigSupport
or descendants.PDSDefaultParameterKeyConstants
pds.config.filefilter.excludes
pds.config.filefilter.includes
*.go,*.html
will filter all go or HTML files from zip when extracted at execution side (PDS sidevs. executors running on sechub server side)include
file pattern entries: When empty, all files are included. When defined, only defined parts are includedexclude
file pattern entries: When empty, all included files are accepted. If set, includes files except these will be acceptedThe text was updated successfully, but these errors were encountered: