Skip to content

Bump github/codeql-action from 5f4f998a94c376fff5b313abc48c529e181a51d7 to cf6550fa508d278d4c55bd6bcb552555d4411931 #302

Bump github/codeql-action from 5f4f998a94c376fff5b313abc48c529e181a51d7 to cf6550fa508d278d4c55bd6bcb552555d4411931

Bump github/codeql-action from 5f4f998a94c376fff5b313abc48c529e181a51d7 to cf6550fa508d278d4c55bd6bcb552555d4411931 #302

# This workflow will initiate a Veracode Static Analysis Pipeline scan, return a results.json and convert to SARIF for upload as a code scanning alert
name: Veracode Static Analysis Pipeline Scan
# Controls when the action will run. Triggers the workflow on push or pull request
# events but only for the master branch
on:
push:
branches: [ master ]
pull_request:
branches: [ master ]
# A workflow run is made up of one or more jobs that can run sequentially or in parallel
jobs:
# This workflow contains a job to build and submit pipeline scan, you will need to customize the build process accordingly and make sure the artifact you build is used as the file input to the pipeline scan file parameter
build-and-pipeline-scan:
# The type of runner that the job will run on
runs-on: ubuntu-latest
steps:
# Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it and copies all sources into ZIP file for submitting for analysis. Replace this section with your applications build steps
- name: Harden Runner
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
with:
egress-policy: audit
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.0
with:
repository: ''
- uses: papeloto/action-zip@5f1c4aa587ea41db1110df6a99981dbe19cee310 # v1
with:
files: /
recursive: true
dest: veracode-pipeline-scan-results-to-sarif.zip
- uses: actions/upload-artifact@65c4c4a1ddee5b72f698fdd19549f0f0fb45cf08 # v4.6.0
with:
name: my-artifact
path: veracode-pipeline-scan-results-to-sarif.zip
# download the Veracode Static Analysis Pipeline scan jar
- uses: wei/curl@012398a392d02480afa2720780031f8621d5f94c # master
with:
args: -O https://downloads.veracode.com/securityscan/pipeline-scan-LATEST.zip
- run: unzip -o pipeline-scan-LATEST.zip
- uses: actions/setup-java@7a6d8a8234af8eb26422e24e3006232cccaa061b # v4.6.0
with:
java-version: 1.8
- run: java -jar pipeline-scan.jar --veracode_api_id "${{secrets.VERACODE_API_ID}}" --veracode_api_key "${{secrets.VERACODE_API_KEY}}" --fail_on_severity="Very High, High" --file veracode-pipeline-scan-results-to-sarif.zip
continue-on-error: true
- uses: actions/upload-artifact@65c4c4a1ddee5b72f698fdd19549f0f0fb45cf08 # v4.6.0
with:
name: ScanResults
path: results.json
- name: Convert pipeline scan output to SARIF format
id: convert
uses: veracode/veracode-pipeline-scan-results-to-sarif@bbb92f8ccedc6c38e07d32c16cf2f690e7b4ba08 # master
with:
pipeline-results-json: results.json
- uses: github/codeql-action/upload-sarif@cf6550fa508d278d4c55bd6bcb552555d4411931 # v3.28.6
with:
# Path to SARIF file relative to the root of the repository
sarif_file: veracode-results.sarif