Lacework scan #9
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Lacework Scan | |
on: | |
pull_request: | |
branches: | |
- master | |
jobs: | |
lacework-scan: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Checkout code | |
uses: actions/checkout@v2 | |
- name: Scan the repo for vulnerabilities in IaC | |
run: | | |
# Required to pass the GITHUB and Lacework (LW) environment variables to use | |
env | grep "GITHUB_\|LW_\|CI_" > env.list | |
# Required command based on what you want to scan in the repository | |
echo "SCAN_COMMAND=tf-scan" >> env.list | |
# Required if you are not mounting the volume on /app | |
echo "WORKSPACE=src" >> env.list | |
# if we want to fail the step for any critical failed findings (violations) in the assessment scan | |
# echo "EXIT_FLAG='Medium'" >> env.list | |
docker run --env-file env.list -v "$(pwd):/app/src" lacework/codesec-iac:latest > output.txt | |
# display output.txt in the console | |
cat ./output.txt | |
echo "::set-output name=scan_results::$(output.txt)" | |
env: | |
LW_ACCOUNT: ${{ secrets.LW_ACCOUNT }} | |
LW_API_KEY: ${{ secrets.LW_API_KEY }} | |
LW_API_SECRET: ${{ secrets.LW_API_SECRET }} | |
- name: Use Scan Results | |
run: | | |
# Use the output from the previous step | |
echo "Scan Results: ${{ steps.scan_step.outputs.scan_results }}" | |
# - name: Install Azure CLI | |
# run: | | |
# ls -al | |
# npm install -g azure-cli | |
# - name: Open Azure DevOps Ticket | |
# if: steps.sast_number.outputs.number == '2' | |
# run: | | |
# az config set extension.use_dynamic_install=yes_without_prompt | |
# az extension add --name azure-devops | |
# echo ${{ secrets.PAT_AZURE }} | az devops login --organization "https://dev.azure.com/markvolfson/" | |
# az devops configure --defaults organization=https://dev.azure.com/markvolfson/ project=appsec-demo | |
# az boards work-item create --title "PR Failed - Checkmarx Results" --type "Task" --description "${{ steps.extract_info.outputs.description }}" | |
# - name: Quality Gate | |
# id: quality-gate | |
# if: steps.sast_number.outputs.number == '2' | |
# run: | | |
# failure("Code contains security vulnerabilities") |