You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# TODO: warning in GA - polaris_assessment_mode is deprecated. Use polaris_test_sast_location=remote and/or polaris_test_sca_location=remote for source upload scans instead.
1118
1128
polaris_waitForScan: 'true'# ${{ inputs.polaris-wait-for-scan }} # defaults to true - is this a boolean or string?
1129
+
# Enable PR comments with severity filtering to fail on HIGH/CRITICAL
# stub to call common GitHub Action (GA) as part of Continuous Integration (CI) Pull Request process checks for main branch
2
+
# inputs are described in the chef/common-github-actions/<GA.yml> with same name as this stub
3
+
#
4
+
# secrets are inherited from the calling workflow, typically SONAR_TOKEN, SONAR_HOST_URL, GH_TOKEN, AKEYLESS_JWT_ID, POLARIS_SERVER_URL and POLARIS_ACCESS_TOKEN
5
+
6
+
name: CI Pull Request on Main Branch
7
+
8
+
on:
9
+
pull_request:
10
+
branches: [ main, release/** ]
11
+
push:
12
+
branches: [ main, release/** ]
13
+
14
+
workflow_dispatch:
15
+
16
+
permissions:
17
+
contents: read
18
+
19
+
env:
20
+
STUB_VERSION: "1.0.5"
21
+
22
+
jobs:
23
+
echo_version:
24
+
name: 'Echo stub version'
25
+
runs-on: ubuntu-latest
26
+
steps:
27
+
- name: echo version of stub and inputs
28
+
run: |
29
+
echo "CI main pull request stub version $STUB_VERSION"
polaris-fail-on-high-critical: true # Fail pipeline if HIGH or CRITICAL vulnerabilities found
93
+
94
+
# perform application build and unit testing, will use custom repository properties when implemented for chef-primary-application, chef-build-profile, and chef-build-language
95
+
build: false
96
+
# ga-build-profile: $chef-ga-build-profile
97
+
# language: $chef-ga-build-language # this will be removed from stub as autodetected in central GA
98
+
unit-tests: false
99
+
100
+
# perform SonarQube scan, with or wihout unit test coverage data
101
+
# requires secrets SONAR_TOKEN and SONAR_HOST_URL (progress.sonar.com)
102
+
perform-sonarqube-scan: true
103
+
# perform-sonar-build: true
104
+
# build-profile: 'default'
105
+
# report-unit-test-coverage: true
106
+
107
+
perform-docker-scan: false # scan Dockerfile and built images with Docker Scout or Trivy; see repo custom properties matching "container"
108
+
109
+
# report to central developer dashboard
110
+
report-to-atlassian-dashboard: false
111
+
quality-product-name: 'Chef-360'# product name for quality reporting, like Chef360, Courier, Inspec
112
+
# quality-product-name: ${{ github.event.repository.name }} # like 'Chef-360' - the product name for quality reporting, like Chef360, Courier, Inspec
113
+
# quality-sonar-app-name: 'YourSonarAppName'
114
+
# quality-testing-type: 'Integration' like Unit, Integration, e2e, api, Performance, Security
115
+
# quality-service-name: 'YourServiceOrRepoName'
116
+
# quality-junit-report: 'path/to/junit/report''
117
+
118
+
# perform native and Habitat packaging, publish to package repositories
publish-packages: false # Publish packages (e.g., container from Dockerfile to ECR, go-releaser binary to releases page, omnibus to artifactory, gems, choco, homebrew, other app stores)
122
+
123
+
# generate and export Software Bill of Materials (SBOM) in various formats
124
+
generate-sbom: true
125
+
export-github-sbom: true # SPDX JSON artifact on job instance
126
+
perform-blackduck-sca-scan: true # combined with generate sbom & generate github-sbom, also needs version above
127
+
blackduck-project-group-name: 'Chef-Chef360'# typically one of (Chef), Chef-Agents, Chef-Automate, Chef-Chef360, Chef-Habitat, Chef-Infrastructure-Server, Chef-Shared-Services, Chef-Non-Product'
128
+
blackduck-project-name: ${{ github.event.repository.name }} # BlackDuck project name, typically the repository name
129
+
blackduck-fail-on-high-critical: true # Fail pipeline if HIGH or CRITICAL vulnerabilities found
130
+
generate-blackduck-sbom: false # obsolete, use perform-blackduck-sca-scan instead
131
+
132
+
generate-msft-sbom: false
133
+
license_scout: false # Run license scout for license compliance (uses .license_scout.yml)
0 commit comments