Skip to content

Commit

Permalink
Merge pull request #43 from fortify/new-fortify-gha
Browse files Browse the repository at this point in the history
New fortify gha
  • Loading branch information
dylanbthomas authored Nov 3, 2023
2 parents a1bd5f3 + 1c7662a commit 2b0ef19
Showing 1 changed file with 14 additions and 38 deletions.
52 changes: 14 additions & 38 deletions .github/workflows/fortify.yml
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,6 @@ on:

jobs:
FoD-SAST-Scan:
# Use the appropriate runner for building your source code.
runs-on: ubuntu-latest
permissions:
actions: read
Expand All @@ -34,46 +33,23 @@ jobs:
- name: Check Out Source Code
uses: actions/checkout@v3

# Java is required to run the various Fortify utilities. When scanning a Java application, please use the appropriate Java version for building your application.
# Java is required to run the various Fortify utilities. Ensuring proper version is installed on the runner.
- name: Setup Java
uses: actions/setup-java@v3
with:
java-version: 11
java-version: 17
distribution: 'temurin'

# Prepare source+dependencies for upload. ScanCentral Client documentation is located at https://www.microfocus.com/documentation/fortify-software-security-center/
- name: Download Fortify ScanCentral Client
uses: fortify/gha-setup-scancentral-client@v2
- name: Package Code + Dependencies
run: scancentral package -oss -o package.zip

# Start Fortify on Demand SAST scan and wait until results complete. For more information on FoDUploader commands, see https://github.com/fod-dev/fod-uploader-java
- name: Download Fortify on Demand Universal CI Tool
uses: fortify/gha-setup-fod-uploader@v1
- name: Perform SAST Scan
run: java -jar $FOD_UPLOAD_JAR -z package.zip -aurl $FOD_API_URL -purl $FOD_URL -rid "$FOD_RELEASE_ID" -tc "$FOD_TENANT" -uc "$FOD_USER" "$FOD_PAT" $FOD_UPLOADER_OPTS -n "$FOD_UPLOADER_NOTES"
env:
FOD_URL: "https://ams.fortify.com/"
FOD_API_URL: "https://api.ams.fortify.com/"
FOD_TENANT: ${{ secrets.FOD_TENANT }}
FOD_USER: ${{ secrets.FOD_USER }}
FOD_PAT: ${{ secrets.FOD_PAT }}
FOD_RELEASE_ID: ${{ secrets.FOD_RELEASE_ID }}
FOD_UPLOADER_OPTS: "-ep 2 -pp 0 -I 1 -apf"
FOD_UPLOADER_NOTES: 'Triggered by GitHub Actions (${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }})'

# Once scan completes, pull SAST issues from Fortify on Demand and generate SARIF output.
- name: Export results to GitHub-optimized SARIF
uses: fortify/gha-export-vulnerabilities@v1
# Perform Fortify on Demand SAST + SCA scan and import SAST results into GitHub code scanning alerts
- name: Run FoD SAST Scan
uses: fortify/github-action@v1
with:
fod_base_url: "https://ams.fortify.com/"
fod_tenant: ${{ secrets.FOD_TENANT }}
fod_user: ${{ secrets.FOD_USER }}
fod_password: ${{ secrets.FOD_PAT }}
fod_release_id: ${{ secrets.FOD_RELEASE_ID }}

# Import Fortify on Demand results to GitHub Security Code Scanning
- name: Import Results
uses: github/codeql-action/upload-sarif@v2
with:
sarif_file: ./gh-fortify-sast.sarif
sast-scan: true
env:
FOD_URL: https://ams.fortify.com
FOD_TENANT: ${{secrets.FOD_TENANT}}
FOD_USER: ${{secrets.FOD_USER}}
FOD_PASSWORD: ${{secrets.FOD_PAT}}
FOD_RELEASE: ${{ secrets.FOD_RELEASE_ID }}
EXTRA_PACKAGE_OPTS: -oss
DO_EXPORT: true

0 comments on commit 2b0ef19

Please sign in to comment.