forked from tenable/terrascan-action
-
Notifications
You must be signed in to change notification settings - Fork 0
/
action.yml
73 lines (71 loc) · 2.44 KB
/
action.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
name: 'Terrascan IaC scanner'
description: 'Uses Terrascan to detect security violations on Terraform/CloudFormation/k8s/Helm/Kustomize files'
inputs:
iac_dir:
description: 'path to a directory containing one or more IaC files (default ".")'
required: false
default: '.'
iac_type:
description: 'IaC type (helm, k8s, kustomize, terraform)'
required: true
iac_version:
description: 'IaC version (helm: v3, k8s: v1, kustomize: v3, terraform: v12, v14)'
required: false
non_recursive:
description: 'do not scan directories and modules recursively'
required: false
policy_path:
description: 'policy path directory for custom policies'
required: false
policy_type:
description: 'policy type (all, aws, azure, gcp, github, k8s) (default all)'
required: false
skip_rules:
description: 'one or more rules to skip while scanning (example: "ruleID1,ruleID2")'
required: false
config_path:
description: 'config file path'
required: false
only_warn:
description: 'the action will only warn and not error when violations are found'
required: false
sarif_upload:
description: 'if true a sarif file named terrascan.sarif will be generated with the results of the scan'
required: false
verbose:
description: 'will show violations with additional details (applicable for default output)'
required: false
find_vulnerabilities:
description: 'will display vulnerabilities for Docker images present in the IaC files being scanned'
required: false
scm_token:
description: 'will use given access token when authenticating to provided SCM to scan IaC templates/modules'
required: false
webhook_url:
description: 'the URL where scanned report and normalized config json will be sent'
required: false
webhook_token:
description: 'the auth token to call the notification webhook URL'
required: false
runs:
using: 'docker'
image: 'Dockerfile'
args:
- ${{ inputs.iac_dir }}
- ${{ inputs.iac_type }}
- ${{ inputs.iac_version }}
- ${{ inputs.non_recursive }}
- ${{ inputs.policy_path }}
- ${{ inputs.policy_type }}
- ${{ inputs.skip_rules }}
- ${{ inputs.config_path }}
- ${{ inputs.only_warn }}
- ${{ inputs.sarif_upload }}
- ${{ inputs.verbose }}
- ${{ inputs.find_vulnerabilites }}
- ${{ inputs.scm_token }}
- ${{ inputs.webhook_url }}
- ${{ inputs.webhook_token }}
branding:
icon: 'code'
color: 'blue'