forked from actions/starter-workflows
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'main' into phantsure/pages-validate
- Loading branch information
Showing
26 changed files
with
330 additions
and
42 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -9,7 +9,7 @@ jobs: | |
runs-on: ubuntu-latest | ||
steps: | ||
- name: 'Auto-assign issue' | ||
uses: pozil/[email protected].0 | ||
uses: pozil/[email protected].1 | ||
with: | ||
assignees: phantsure,tiwarishub,anuragc617,vsvipul,bishal-pdmsft | ||
numOfAssignee: 1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,55 @@ | ||
# This workflow uses actions that are not certified by GitHub. | ||
# They are provided by a third-party and are governed by | ||
# separate terms of service, privacy policy, and support | ||
# documentation. | ||
# | ||
# NowSecure: The Mobile Security Experts <https://www.nowsecure.com/>. | ||
# | ||
# To use this workflow, you must have a token for NowSecure Platform. If you are a NowSecure customer, | ||
# you can find it in NowSecure Platform. | ||
# | ||
# If you *are not* a NowSecure customer, click here to sign up for a free trial to get access: | ||
# <https://bit.ly/ns-git-sbom>. | ||
# | ||
# Instructions: | ||
# | ||
# 1. In the settings for your repository, click "Secrets" then "New repository secret". Name the secret "NS_TOKEN" and | ||
# paste in your Platform token. If you do not have a Platform token, or wish to create a new one for GitHub, visit | ||
# NowSecure Platform and go to "Profile & Preferences" then create a token labelled "GitHub". | ||
# | ||
# 2. Follow the annotated workflow below and make any necessary modifications then save the workflow to your repository | ||
# and review the "Dependency graph" tab in the "Insights" pane once the action has run. | ||
|
||
name: "NowSecure Mobile SBOM" | ||
|
||
on: | ||
push: | ||
branches: [ $default-branch, $protected-branches ] | ||
pull_request: | ||
# The branches below must be a subset of the branches above | ||
branches: [ $default-branch ] | ||
schedule: | ||
- cron: $cron-weekly | ||
|
||
permissions: | ||
contents: read | ||
|
||
jobs: | ||
nowsecure: | ||
name: NowSecure Mobile SBOM | ||
runs-on: ubuntu-latest | ||
permissions: | ||
contents: read | ||
steps: | ||
- name: Checkout code | ||
uses: actions/checkout@v3 | ||
|
||
- name: Build your application | ||
run: ./gradlew assembleDebug # Update this to build your Android or iOS application | ||
|
||
- name: NowSecure upload app | ||
uses: nowsecure/nowsecure-sbom-action@ecb731b6f17a83fa53f756f9dae2ec7034c5ed7c | ||
with: | ||
token: ${{ secrets.NS_TOKEN }} | ||
app_file: app-debug.apk # Update this to a path to your .ipa or .apk | ||
group_id: {{ groupId }} # Update this to your desired Platform group ID |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,7 @@ | ||
{ | ||
"name": "Anchore Container Scan", | ||
"creator": "Indeni Cloudrail", | ||
"description": "Produce container image vulnerability and compliance reports based on the open-source Anchore container image scanner.", | ||
"name": "Anchore Grype Vulnerability Scan", | ||
"creator": "Anchore", | ||
"description": "Produce source and container vulnerability reports based on Anchore's open source Grype tool.", | ||
"iconName": "anchore", | ||
"categories": ["Code Scanning", "dockerfile"] | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
21 changes: 21 additions & 0 deletions
21
code-scanning/properties/nowsecure-mobile-sbom.properties.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
{ | ||
"name": "NowSecure Mobile SBOM", | ||
"creator": "NowSecure", | ||
"description": "Generate a Mobile SBOM for an application and submit to Dependency Graph", | ||
"iconName": "nowsecure", | ||
"categories": [ | ||
"Code Scanning", | ||
"Java", | ||
"Kotlin", | ||
"Scala", | ||
"Swift", | ||
"Objective C", | ||
"C", | ||
"C++", | ||
"C#", | ||
"Rust", | ||
"JavaScript", | ||
"TypeScript", | ||
"Node" | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,7 @@ | ||
{ | ||
"name": "Zscaler IaC Scan", | ||
"creator": "Zscaler CWP", | ||
"description": "Scan your Infrastructure as Code files using Zscaler Infrastructure as Code (IaC) Scan app", | ||
"iconName": "zscaler", | ||
"categories": ["Code Scanning"] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
{ | ||
"name": "zScan", | ||
"creator": "Zimperium", | ||
"description": "The zimperium-zscan GitHub action scans your mobile app binary (iOS or Android) and identifies security, privacy, and compliance-related vulnerabilities. ", | ||
"iconName": "zscan", | ||
"categories": [ | ||
"Code Scanning", | ||
"Java", | ||
"Kotlin", | ||
"Scala", | ||
"Swift", | ||
"Objective C" | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,56 @@ | ||
#This workflow uses actions that are not certified by GitHub. | ||
#They are provided by a third party and are governed by | ||
#separate terms of service, privacy policy, and support | ||
#documentation. | ||
|
||
#This workflow runs the Zscaler Infrastructure as Code (IaC) Scan app, | ||
#which detects security misconfigurations in IaC templates and publishes the findings | ||
#under the code scanning alerts section within the repository. | ||
|
||
#Log into the Zscaler Workload Posture (ZWP) Admin Portal to begin the onboarding process. | ||
#Copy the client ID and client secret key generated during the onboarding process and configure. | ||
#GitHub secrets (ZSCANNER_CLIENT_ID, ZSCANNER_CLIENT_SECRET). | ||
|
||
#Refer https://github.com/marketplace/actions/zscaler-iac-scan for additional details on setting up this workflow. | ||
#Any issues with this workflow, please raise it on https://github.com/ZscalerCWP/Zscaler-IaC-Action/issues for further investigation. | ||
|
||
name: Zscaler IaC Scan | ||
on: | ||
push: | ||
branches: [ $default-branch, $protected-branches ] | ||
pull_request: | ||
branches: [ $default-branch ] | ||
schedule: | ||
- cron: $cron-weekly | ||
|
||
permissions: | ||
contents: read | ||
|
||
jobs: | ||
zscaler-iac-scan: | ||
permissions: | ||
contents: read # for actions/checkout to fetch code | ||
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results | ||
runs-on: ubuntu-latest | ||
steps: | ||
- name : Code Checkout | ||
uses: actions/checkout@v3 | ||
- name : Zscaler IAC Scan | ||
uses : ZscalerCWP/Zscaler-IaC-Action@8f0d8b60bd5a8f44062d444463f66f419ab71cfc | ||
id : zscaler-iac-scan | ||
with: | ||
client_id : ${{ secrets.ZSCANNER_CLIENT_ID }} | ||
client_secret : ${{ secrets.ZSCANNER_CLIENT_SECRET }} | ||
#This is the user region specified during the onboarding process within the ZWP Admin Portal. | ||
region : 'US' | ||
iac_dir : #Enter the IaC directory path from root. | ||
iac_file : #Enter the IaC file path from root. | ||
output_format : #(Optional) By default, the output is provided in a human readable format. However, if you require a different format, you can specify it here. | ||
#To fail the build based on policy violations identified in the IaC templates, set the input value (fail_build) to true. | ||
fail_build : #Enter true/false | ||
#Ensure that the following step is included in order to post the scan results under the code scanning alerts section within the repository. | ||
- name: Upload SARIF file | ||
if: ${{ success() || failure() && (steps.zscaler-iac-scan.outputs.sarif_file_path != '') }} | ||
uses: github/codeql-action/upload-sarif@v2 | ||
with: | ||
sarif_file: ${{ steps.zscaler-iac-scan.sarif_file_path }} |
Oops, something went wrong.