Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/rugal/local-veracode-scan-action
https://github.com/rugal/local-veracode-scan-action
Last synced: about 6 hours ago
JSON representation
- Host: GitHub
- URL: https://github.com/rugal/local-veracode-scan-action
- Owner: Rugal
- Created: 2021-04-15T00:46:50.000Z (over 3 years ago)
- Default Branch: master
- Last Pushed: 2021-04-15T14:17:22.000Z (over 3 years ago)
- Last Synced: 2024-11-22T10:45:49.634Z (about 2 months ago)
- Size: 4.88 KB
- Stars: 0
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Local Veracode Scan action
This action will do local veracode scan for the specified package.
1. Download `veracode` package
2. Unzip it
3. Run the jar file with provisioned parameters## Inputs
parameter | required | default | note
----|---|---|---
id | true | | The veracode API ID
secret | true || The veracode API secret
severity | false | Very High, High | The severity to fail this run
input-file | false | input.zip | The input package that meets veracode requirement
output-file | false | results.json | The result report file in JSON format, can be converted into SARIF file## Use case
### Without action
According to official document, these workflow steps are required to scan and get JSON report.
```yaml
# download the Veracode Static Analysis Pipeline scan jar
- uses: wei/curl@master
with:
args: -O https://downloads.veracode.com/securityscan/pipeline-scan-LATEST.zip
- run: unzip -o pipeline-scan-LATEST.zip
# running set up java again overwrites the settings.xml
- uses: actions/setup-java@v1
with:
java-version: 1.8
- run: |
java -jar pipeline-scan.jar \
--veracode_api_id "${{secrets.ID}}" \
--veracode_api_key "${{secrets.SECRET}} \
--fail_on_severity="Very High, High"
--file target/binary.jar
continue-on-error: true
```### With action
Now it is simplified as only 1 action.
```yaml
- uses: Rugal/[email protected]
continue-on-error: false
with:
id: ${{secrets.VERACODE_API_ID}}
secret: ${{secrets.VERACODE_API_SECRET}}
input-file: target/binary.jar
```## Example usage
We can use the following workflow to scan our package and report its security issues on github `security` tab.
```yaml
# first use this action to generate JSON report
- uses: Rugal/[email protected]
continue-on-error: false
with:
id: ${{secrets.VERACODE_API_ID}}
secret: ${{secrets.VERACODE_API_SECRET}}
input-file: target/binary.jar
# then upload the results.json file
- uses: actions/upload-artifact@v1
with:
name: ScanResults
path: results.json
# then convert JSON format to SARIF
- name: Convert pipeline scan output to SARIF format
id: convert
uses: veracode/veracode-pipeline-scan-results-to-sarif@master
with:
pipeline-results-json: results.json
# finally upload sarif file so you can see result in Github security tab
- uses: github/codeql-action/upload-sarif@v1
with:
# Path to SARIF file relative to the root of the repository
sarif_file: veracode-results.sarif
```