The following plugin provides functionality available through Pipeline-compatible steps. Read more about how to integrate steps into your Pipeline in the Steps section of the Pipeline Syntax page.

For a list of other such plugins, see the Pipeline Steps Reference page.

Jacked

jacked: Vulnerability scan with jacked

  • scanDest : String
  • scanName : String
    Input Image name, Directory path, tar file path, or sbom file path.
  • severityType : String
    Select a threshold that will fail the build when equal to or above the severity found in the results.
  • scanType : String
    Scan Type: Image, Directory, Tar File and SBOM File.
    • Image: Provide the image to be scanned.
    • Directory: Provide the target directory path to be scanned.
    • Tar File: Provide the target tar file path to be scanned.
    • SBOM File: Provide the target Diggity JSON Format SBOM file path to be scanned.
  • skipFail : boolean
    • Warning: If the value is checked, it will restrict the plugin from failing the build based on the assessment result.
    • Default: false / unchecked.
  • skipDbUpdate : boolean
    • Warning: If the value is checked, it will skip check database update while scanning.
    • Default: false / unchecked.
  • ignorePackageNames : String
    Usage: Ignore the following package names when scanning. Leave blank if not using.
    • Example Input Format: dpkg,tar,gzip
  • ignoreCves : String
    Usage: Ignore the following CVEs when scanning. Leave blank if not using.
    • Example Input Format: CVE-2022-24775,CVE-2022-1304,TEMP-0000000-6F6CD4
  • content
    • Type: java.util.Map<java.lang.String, java.lang.String>
  • jackedConfig
    • Type: class io.jenkins.plugins.jacked.model.JackedConfig

Was this page helpful?

Please submit your feedback about this page through this quick form.

Alternatively, if you don't wish to complete the quick form, you can simply indicate if you found this page helpful?

    


See existing feedback here.