-
Notifications
You must be signed in to change notification settings - Fork 4
71 lines (61 loc) · 2.41 KB
/
ShiftLeft.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
# This workflow integrates Scan with GitHub's code scanning feature
# Scan is a free open-source security tool for modern DevOps teams from ShiftLeft
# Visit https://slscan.io/en/latest/integrations/code-scan for help
name: SL Scanning
# This section configures the trigger for the workflow. Feel free to customize depending on your convention
on:
# push:
pull_request:
# The branches below must be a subset of the branches above
jobs:
Scan-Build:
# Scan runs on ubuntu, mac and windows
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v1
# Instructions
# 1. Setup JDK, Node.js, Python etc depending on your project type
# 2. Compile or build the project before invoking scan
# Example: mvn compile, or npm install or pip install goes here
# 3. Invoke Scan with the github token. Leave the workspace empty to use relative url
- name: Perform Scan
uses: ShiftLeftSecurity/scan-action@master
env:
WORKSPACE: https://github.com/${{ github.repository }}/blob/${{ github.sha }}
# GITHUB_TOKEN: ${{ secrets.SL_TOKEN }}
# SCAN_AUTO_BUILD: true
SCAN_ANNOTATE_PR: true
with:
output: reports
# Scan auto-detects the languages in your project. To override uncomment the below variable and set the type
type: depscan
# type: python
- run: mkdir $GITHUB_WORKSPACE/output
- run: cp -r $GITHUB_WORKSPACE/reports/ $GITHUB_WORKSPACE/output
- run: ls $GITHUB_WORKSPACE/output
- run: ls $GITHUB_WORKSPACE/reports
- run: ls $GITHUB_WORKSPACE
- name: Upload report
uses: github/codeql-action/upload-sarif@v1
with:
sarif_file: reports
- name: Artifacts
uses: actions/upload-artifact@v1.0.0
with:
name: shiftleft-scan-reports
path: reports
Scan-test:
# Scan runs on ubuntu, mac and windows
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v1
# Instructions
# 1. Setup JDK, Node.js, Python etc depending on your project type
# 2. Compile or build the project before invoking scan
# Example: mvn compile, or npm install or pip install goes here
# 3. Invoke Scan with the github token. Leave the workspace empty to use relative url
- name: Self dep-scan
uses: AppThreat/dep-scan-action@master
env:
VDB_HOME: ${{ github.workspace }}/db
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}