From b14d906e422345f0bd04c2cfcf4bb6bc2c4334ff Mon Sep 17 00:00:00 2001 From: Mark Waite Date: Sat, 22 Jun 2024 07:50:15 -0600 Subject: [PATCH] Enable Jenkins security scan (#209) It is stated in the `JENKINS SECURITY POLICY` that > The Jenkins project takes security seriously. We make every > possible effort to ensure users can adequately secure their > automation infrastructure. To that end, we work with Jenkins core and > plugin developers, as well as security researchers, to fix security > vulnerabilities in Jenkins in a timely manner, and to improve the security > of Jenkins in general. Apply the Jenkins security scan to this repository. Thanks to @strangelookingnerd for starting this effort! --- .github/workflows/jenkins-security-scan.yml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 .github/workflows/jenkins-security-scan.yml diff --git a/.github/workflows/jenkins-security-scan.yml b/.github/workflows/jenkins-security-scan.yml new file mode 100644 index 0000000..7211385 --- /dev/null +++ b/.github/workflows/jenkins-security-scan.yml @@ -0,0 +1,21 @@ +name: Jenkins Security Scan + +on: + push: + branches: + - master + pull_request: + types: [ opened, synchronize, reopened ] + workflow_dispatch: + +permissions: + security-events: write + contents: read + actions: read + +jobs: + security-scan: + uses: jenkins-infra/jenkins-security-scan/.github/workflows/jenkins-security-scan.yaml@v2 + with: + java-cache: 'maven' # Optionally enable use of a build dependency cache. Specify 'maven' or 'gradle' as appropriate. + java-version: 21 # What version of Java to set up for the build.