Skip to main content

Jenkins Pipeline Workflow

Add the following to your Jenkinsfile. It will trigger on every build and kick off a CodeAnt analysis scan:
pipeline {
    agent any

    environment {
        ACCESS_TOKEN = credentials('codeant-access-token')

        // Uncomment and set to customize which scanners to run
        // Options: sast, sca, secrets, antipatterns, iac, all
        // If not defined, script defaults to: sast,sca
        // SCANNERS = 'all'
    }

    stages {
        stage('Checkout') {
            steps {
                checkout scm
            }
        }

        stage('Fetch CodeAnt scan script') {
            steps {
                sh '''
                    export API_BASE="https://api.codeant.ai"
                    curl -sS -X GET "${API_BASE}/analysis/ci/scan/script/get" \
                        --output start_scan.sh.b64
                '''
            }
        }

        stage('Make script executable') {
            steps {
                sh '''
                    base64 -d start_scan.sh.b64 > start_scan.sh
                    chmod +x start_scan.sh
                '''
            }
        }

        stage('Trigger CodeAnt analysis') {
            steps {
                sh '''
                    bash start_scan.sh \
                        -a "$ACCESS_TOKEN" \
                        -r "${GIT_URL##*/}" \
                        -c "${GIT_COMMIT}" \
                        -b "${GIT_BRANCH##*/}" \
                        -s github \
                        -i "" \
                        -e "" \
                        --scanners "$SCANNERS"
                '''
            }
        }
    }
}

Script Parameters

The start_scan.sh script accepts the following parameters:

Required Parameters

ParameterFlagDescriptionExample
Access Token-a, --access-tokenAuthentication token for CodeAnt API. Can be a Personal Access Token (PAT) or repository token$ACCESS_TOKEN
Repository-r, --repoRepository name in organization/repository formatmyorg/myrepo
Commit ID-c, --commit-idGit commit SHA to analyze${GIT_COMMIT}
Service-s, --serviceGit service providergithub, gitlab, bitbucket

Optional Parameters

ParameterFlagDefaultDescriptionExample
Branch-b, --branch(empty)Branch name for the analysismain, develop
Scanners--scannerssast,scaComma-separated list of scanners to runall, sast, sast,sca,secrets
Include Files-i, --include-files(empty)Glob patterns for files to include in analysis"src/**/*.js"
Exclude Files-e, --exclude-files(empty)Glob patterns for files to exclude from analysis"**/test/**"
Polling Interval-p, --polling-interval30Seconds between result polling attempts20
Timeout-t, --timeout300Maximum seconds to wait for results600
No Wait-n, --no-waitfalseSkip waiting for results, only trigger the scan(flag only)

Scanner Options

🔍 Available Scanners: The --scanners flag allows you to customize which security scanners run during analysis:
  • sast - Static Application Security Testing (code vulnerabilities)
  • sca - Software Composition Analysis (dependency vulnerabilities)
  • secrets - Secret detection (API keys, passwords, tokens)
  • antipatterns - Code quality and duplicate code detection
  • iac - Infrastructure as Code security (Terraform, CloudFormation, etc.)
  • all - Run all available scanners
Default: If not specified, runs sast,sca Examples:
  • Run all scanners: --scanners "all"
  • Only SAST: --scanners "sast"
  • SAST + Secrets: --scanners "sast,secrets"
  • Full security suite: --scanners "sast,sca,secrets,iac"

Execution Time Considerations

⏱️ Performance Options:
  • With result waiting (default): ~7 minutes
    • Triggers scan and waits for complete analysis results
    • Includes both security and SCA (Software Composition Analysis) results
    • Best for comprehensive CI/CD pipelines where you need immediate feedback
  • With --no-wait flag: ~2 minutes
    • Only triggers the scan and returns immediately
    • Results can be fetched later or viewed in the CodeAnt dashboard
    • Ideal for faster CI runs or when results can be processed asynchronously

Example Configurations

Fast CI Mode (No Wait)

stage('Trigger CodeAnt analysis (Fast Mode)') {
    steps {
        sh '''
            export API_BASE="https://api.codeant.ai"
            curl -sS -X GET "${API_BASE}/analysis/ci/scan/script/get" \
                --output start_scan.sh.b64
            base64 -d start_scan.sh.b64 > start_scan.sh
            chmod +x start_scan.sh
            bash start_scan.sh \
                -a "$ACCESS_TOKEN" \
                -r "${GIT_URL##*/}" \
                -c "${GIT_COMMIT}" \
                -s github \
                -n  # Returns in ~2 minutes
        '''
    }
}

Comprehensive Analysis (Wait for Results)

stage('Trigger CodeAnt analysis (Full Results)') {
    steps {
        sh '''
            export API_BASE="https://api.codeant.ai"
            curl -sS -X GET "${API_BASE}/analysis/ci/scan/script/get" \
                --output start_scan.sh.b64
            base64 -d start_scan.sh.b64 > start_scan.sh
            chmod +x start_scan.sh
            bash start_scan.sh \
                -a "$ACCESS_TOKEN" \
                -r "${GIT_URL##*/}" \
                -c "${GIT_COMMIT}" \
                -s github \
                -b "${GIT_BRANCH##*/}" \
                -p 20 \
                -t 600  # Wait up to 10 minutes
        '''
    }
}

Custom File Filtering

stage('Trigger CodeAnt analysis (Custom Files)') {
    steps {
        sh '''
            export API_BASE="https://api.codeant.ai"
            curl -sS -X GET "${API_BASE}/analysis/ci/scan/script/get" \
                --output start_scan.sh.b64
            base64 -d start_scan.sh.b64 > start_scan.sh
            chmod +x start_scan.sh
            bash start_scan.sh \
                -a "$ACCESS_TOKEN" \
                -r "${GIT_URL##*/}" \
                -c "${GIT_COMMIT}" \
                -s github \
                -i "src/**/*.{js,ts}" \
                -e "**/node_modules/**,**/dist/**" \
                -n
        '''
    }
}

Parameterized Pipeline

pipeline {
    agent any
    
    parameters {
        string(name: 'REPO_NAME', defaultValue: 'myorg/myrepo', description: 'Repository name')
        choice(name: 'SERVICE', choices: ['github', 'gitlab', 'bitbucket'], description: 'Git service provider')
        choice(name: 'SCANNERS', choices: ['sast,sca', 'all', 'sast', 'sast,secrets', 'sast,sca,secrets,iac'], description: 'Scanners to run')
        booleanParam(name: 'FAST_MODE', defaultValue: false, description: 'Use fast mode (no-wait)')
        string(name: 'INCLUDE_PATTERN', defaultValue: '', description: 'File include patterns')
        string(name: 'EXCLUDE_PATTERN', defaultValue: '', description: 'File exclude patterns')
    }

    environment {
        ACCESS_TOKEN = credentials('codeant-access-token')
    }

    stages {
        stage('Run CodeAnt analysis') {
            steps {
                script {
                    def noWaitFlag = params.FAST_MODE ? '-n' : ''
                    def includeFlag = params.INCLUDE_PATTERN ? "-i \"${params.INCLUDE_PATTERN}\"" : '-i ""'
                    def excludeFlag = params.EXCLUDE_PATTERN ? "-e \"${params.EXCLUDE_PATTERN}\"" : '-e ""'
                    def scannersFlag = params.SCANNERS ? "--scanners \"${params.SCANNERS}\"" : ''

                    sh """
                        export API_BASE="https://api.codeant.ai"
                        curl -sS -X GET "\${API_BASE}/analysis/ci/scan/script/get" \
                            --output start_scan.sh.b64
                        base64 -d start_scan.sh.b64 > start_scan.sh
                        chmod +x start_scan.sh
                        bash start_scan.sh \
                            -a "\$ACCESS_TOKEN" \
                            -r "${params.REPO_NAME}" \
                            -c "\${GIT_COMMIT}" \
                            -b "\${GIT_BRANCH##*/}" \
                            -s ${params.SERVICE} \
                            ${includeFlag} \
                            ${excludeFlag} \
                            ${scannersFlag} \
                            ${noWaitFlag}
                    """
                }
            }
        }
    }
}
Tips:
  • Add ACCESS_TOKEN as a secret credential in Jenkins → Credentials → System → Global credentials
  • Use --no-wait for PR checks to keep them fast, and full analysis for main branch merges
  • Adjust timeout based on your repository size - larger repos may need more time
  • File patterns support standard glob syntax for precise control over what gets analyzed
  • Customize scanners based on your needs - use --scanners "all" for comprehensive coverage or specific combinations like --scanners "sast,secrets" for targeted security checks
  • Default scanners (sast,sca) provide a good balance between coverage and execution time

How it works

  1. Download script We fetch a small Bash helper (start_scan.sh) from the CodeAnt CI endpoint.
  2. Make it runnable Mark the script executable so you can invoke it directly.
  3. Invoke the scan The script POSTs your repo, commit, and file-globs to /analysis/ci/scan, using your token for auth.
  4. Pipeline feedback
    • On success, you’ll see a parsed JSON response in the job log.
    • On failure (non-2xx HTTP), the script exits non-zero, failing your pipeline immediately.
With this in place, every push will automatically kick off a CodeAnt analysis run—and your CI status will reflect whether any HIGH-severity issues were detected.