generated from GITTHUBBD/pyi
-
Notifications
You must be signed in to change notification settings - Fork 0
/
aimn.yml
77 lines (70 loc) · 2.92 KB
/
aimn.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
# This is a basic workflow to help you get started with Actions
name: CI
# Controls when the workflow will run
on:
# Triggers the workflow on push or pull request events but only for the nmai branch
push:
branches: [ nmai ]
pull_request:
branches: [ nmai ]
# Allows you to run this workflow manually from the Actions tab
workflow_dispatch:
# A workflow run is made up of one or more jobs that can run sequentially or in parallel
jobs:
# This workflow contains a single job called "build"
build:
# The type of runner that the job will run on
runs-on: ubuntu-latest
# Steps represent a sequence of tasks that will be executed as part of the job
steps:
# Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it
- uses: actions/checkout@v2
# Runs a single command using the runners shell
- name: Run a one-line script
run: echo Hello, world!
# Runs a set of commands using the runners shell
- name: Run a multi-line script
run: |
echo Add other actions to build,
echo test, and deploy your project.
- name: Export Fortify vulnerability data
# You may pin to the exact commit or the version.
# uses: fortify/gha-export-vulnerabilities@aa32484fd4a17f6df80e92ef6cc68b61ab7f5a92
uses: fortify/gha-export-vulnerabilities@v1.0.0
with:
# SSC Base URL (e.g. https://my.ssc.host/ssc)
ssc_base_url: # optional
# SSC CI authentication token
ssc_auth_token: # optional
# SSC user name
ssc_user: # optional
# SSC password
ssc_password: # optional
# SSC application version id from which to download SAST vulnerabilities
ssc_version_id: # optional
# SSC <application name>:<version name> from which to download SAST vulnerabilities
ssc_version_name: # optional
# SSC filter set id from which to download SAST vulnerabilities
ssc_vuln_filter_set_id: # optional
# FoD Base URL (e.g. https://ams.fortify.com)
fod_base_url: # optional
# FoD User Name
fod_user: # optional
# FoD Password or Access Token
fod_password: # optional
# FoD Tenant
fod_tenant: # optional
# FoD Client Id
fod_client_id: # optional
# FoD Client Secret
fod_client_secret: # optional
# FoD Release ID from which to download SAST vulnerabilities
fod_release_id: # optional
# FoD <application name>:<release name> from which to download SAST vulnerabilities
fod_release_name: # optional
# The system/format to export to, used to determine the FortifyVulnerabilityExporter configuration file to use
export_target: # optional, default is GitHub
# FortifyVulnerabilityExporter configuration file to use, by default determined from source system (SSC or FoD) and the `to` input parameter
export_config: # optional
# Directory where output files will be stored, defaults to GitHub workspace directory
export_dir: # optional, default is ${GITHUB_WORKSPACE}