-
Notifications
You must be signed in to change notification settings - Fork 67
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
added missing var to envWhitelist #3324
also did some re-formatting
- Loading branch information
Showing
1 changed file
with
72 additions
and
51 deletions.
There are no files selected for viewing
123 changes: 72 additions & 51 deletions
123
sechub-pds-solutions/findsecuritybugs/docker/pds-config.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,53 +1,74 @@ | ||
{ | ||
"apiVersion" : "1.0", | ||
"serverId" : "FINDSECURITYBUGS_CLUSTER", | ||
"products" : [ { | ||
"id" : "PDS_FINDSECURITYBUGS", | ||
"path" : "/pds/scripts/findsecuritybugs.sh", | ||
"envWhitelist" : [ "HELPER_FOLDER", "TOOL_FOLDER" ], | ||
"scanType" : "codeScan", | ||
"description" : "Runs FindSecurityBugs. FindSecurityBugs is a static analysis tool for Java, Kotlin, Scala and Groovy.", | ||
"parameters" : { | ||
"optional" : [ { | ||
"key" : "pds.config.supported.datatypes", | ||
"default" : "binary" | ||
}, { | ||
"key" : "findsecuritybugs.severity", | ||
"description" : "Limit the results to findings above a severity level of EXPERIMENTAL, LOW, MEDIUM and HIGH." | ||
}, { | ||
"key" : "findsecuritybugs.effort", | ||
"description" : "The analysis effort level: MIN, LESS, DEFAULT, MORE, MAX." | ||
}, { | ||
"key" : "findsecuritybugs.include.bugpatterns", | ||
"description" : "Include only the given bug patterns. A list of bug patter names can be found at: https://find-sec-bugs.github.io/bugs.htm. For example: WEAK_MESSAGE_DIGEST_MD5, SQL_INJECTION." | ||
}, { | ||
"key" : "findsecuritybugs.exclude.bugpatterns", | ||
"description" : "Exclude the given bug patterns. A list of bug patter names can be found at: https://find-sec-bugs.github.io/bugs.htm. For example: WEAK_MESSAGE_DIGEST_MD5, SQL_INJECTION." | ||
} ] | ||
"apiVersion": "1.0", | ||
"serverId": "FINDSECURITYBUGS_CLUSTER", | ||
"products": [ | ||
{ | ||
"id": "PDS_FINDSECURITYBUGS", | ||
"path": "/pds/scripts/findsecuritybugs.sh", | ||
"scanType": "codeScan", | ||
"description": "Runs FindSecurityBugs. FindSecurityBugs is a static analysis tool for Java, Kotlin, Scala and Groovy.", | ||
"parameters": { | ||
"optional": [ | ||
{ | ||
"key": "pds.config.supported.datatypes", | ||
"default": "binary" | ||
}, | ||
{ | ||
"key": "findsecuritybugs.severity", | ||
"description": "Limit the results to findings above a severity level of EXPERIMENTAL, LOW, MEDIUM and HIGH." | ||
}, | ||
{ | ||
"key": "findsecuritybugs.effort", | ||
"description": "The analysis effort level: MIN, LESS, DEFAULT, MORE, MAX." | ||
}, | ||
{ | ||
"key": "findsecuritybugs.include.bugpatterns", | ||
"description": "Include only the given bug patterns. A list of bug pattern names can be found at: https://find-sec-bugs.github.io/bugs.htm. For example: WEAK_MESSAGE_DIGEST_MD5, SQL_INJECTION." | ||
}, | ||
{ | ||
"key": "findsecuritybugs.exclude.bugpatterns", | ||
"description": "Exclude the given bug patterns. A list of bug pattern names can be found at: https://find-sec-bugs.github.io/bugs.htm. For example: WEAK_MESSAGE_DIGEST_MD5, SQL_INJECTION." | ||
} | ||
] | ||
}, | ||
"envWhitelist": [ | ||
"HELPER_FOLDER", | ||
"PDS_MAX_FILE_UPLOAD_BYTES", | ||
"TOOL_FOLDER" | ||
] | ||
}, | ||
{ | ||
"id": "PDS_FINDSECURITYBUGS_MOCK", | ||
"path": "/pds/scripts/findsecuritybugs_mock.sh", | ||
"envWhitelist": [ | ||
"MOCK_FOLDER" | ||
], | ||
"scanType": "codeScan", | ||
"description": "Runs FindSecurityBugs mock. It returns a fixed result file.", | ||
"parameters": { | ||
"optional": [ | ||
{ | ||
"key": "pds.config.supported.datatypes", | ||
"default": "binary" | ||
}, | ||
{ | ||
"key": "findsecuritybugs.severity", | ||
"description": "Limit the results to findings above a severity level of EXPERIMENTAL, LOW, MEDIUM and HIGH." | ||
}, | ||
{ | ||
"key": "findsecuritybugs.effort", | ||
"description": "The analysis effort level: MIN, LESS, DEFAULT, MORE, MAX." | ||
}, | ||
{ | ||
"key": "findsecuritybugs.include.bugpatterns", | ||
"description": "Include only the given bug patterns. A list of bug pattern names can be found at: https://find-sec-bugs.github.io/bugs.htm. For example: WEAK_MESSAGE_DIGEST_MD5, SQL_INJECTION." | ||
}, | ||
{ | ||
"key": "findsecuritybugs.exclude.bugpatterns", | ||
"description": "Exclude the given bug patterns. A list of bug pattern names can be found at: https://find-sec-bugs.github.io/bugs.htm. For example: WEAK_MESSAGE_DIGEST_MD5, SQL_INJECTION." | ||
} | ||
] | ||
} | ||
} | ||
}, { | ||
"id" : "PDS_FINDSECURITYBUGS_MOCK", | ||
"path" : "/pds/scripts/findsecuritybugs_mock.sh", | ||
"envWhitelist" : [ "MOCK_FOLDER" ], | ||
"scanType" : "codeScan", | ||
"description" : "Runs FindSecurityBugs mock. It returns a fixed result file.", | ||
"parameters" : { | ||
"optional" : [ { | ||
"key" : "pds.config.supported.datatypes", | ||
"default" : "binary" | ||
}, { | ||
"key" : "findsecuritybugs.severity", | ||
"description" : "Limit the results to findings above a severity level of EXPERIMENTAL, LOW, MEDIUM and HIGH." | ||
}, { | ||
"key" : "findsecuritybugs.effort", | ||
"description" : "The analysis effort level: MIN, LESS, DEFAULT, MORE, MAX." | ||
}, { | ||
"key" : "findsecuritybugs.include.bugpatterns", | ||
"description" : "Include only the given bug patterns. A list of bug patter names can be found at: https://find-sec-bugs.github.io/bugs.htm. For example: WEAK_MESSAGE_DIGEST_MD5, SQL_INJECTION." | ||
}, { | ||
"key" : "findsecuritybugs.exclude.bugpatterns", | ||
"description" : "Exclude the given bug patterns. A list of bug patter names can be found at: https://find-sec-bugs.github.io/bugs.htm. For example: WEAK_MESSAGE_DIGEST_MD5, SQL_INJECTION." | ||
} ] | ||
} | ||
} ] | ||
} | ||
] | ||
} |