-
Notifications
You must be signed in to change notification settings - Fork 4
/
action.yaml
125 lines (122 loc) · 3.83 KB
/
action.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
name: "Orca Security - SCA / Secret Scanning"
description: "Configures Orca CLI to run secret detection and/or vulnerabilities scanning"
branding:
icon: "shield"
color: "green"
runs:
using: "docker"
image: "Dockerfile"
env:
WORKSPACE_PATH: $GITHUB_WORKSPACE
inputs:
api_token:
description: "Orca API Token used for Authentication"
required: true
exit_code:
description: "Exit code for failed execution due to policy violations"
required: false
no_color:
description: "Disable color output"
required: false
default: "false"
project_key:
description: "Project Key name"
required: true
silent:
description: "Disable logs and warnings output"
required: false
default: "false"
baseline_context_key:
description: "Use this context key in case of no autodetect is configured on project"
required: false
disable_baseline:
description: "Do not compare to baseline on this scan"
required: false
default: "false"
sync_baseline:
description: "Sync baseline base on this flag"
required: false
disable_err_report:
description: "Suppress error reporting to the monitoring platform"
required: false
default: "false"
disable_secret:
description: "Disables the secret detection scanning"
required: false
default: "false"
hide_vulnerabilities:
description: "Do not show detailed view of the vulnerabilities findings"
required: false
default: "false"
num_cpu:
description: "Number of logical CPUs to be used for secret scanning (default 10)"
required: false
path:
description: "Paths or directories to scan (comma-separated)"
required: true
exceptions_filepath:
description: "exceptions YAML filepath."
required: false
custom_secret_controls:
description: "path to custom secret controls file."
required: false
format:
description: "Format for displaying the results"
required: false
default: "table"
output:
description: "Output directory"
required: false
timeout:
description: 'Set the maximum duration for the CLI execution. valid time units ("s", "m", "h")'
required: false
show_failed_issues_only:
description: "Show only failed issues in CLI results"
required: false
default: "false"
console_output:
description: "Prints results to console in the provided format (only when --output is provided)"
required: false
default: "table"
config:
description: "path to configuration file (json, yaml or toml)"
required: false
show_annotations:
description: "show github annotations on pull requests"
required: false
default: "true"
display_name:
description: "Scan log display name (on Orca platform)"
required: false
hide_skipped_vulnerabilities:
description: "filter out skipped vulnerabilities from result"
required: false
default: "false"
max_secret:
description: "Set the maximum secrets that can be found, when reaching this number secret scan will stop"
required: false
exclude_paths:
description: "List of paths to be excluded from scan (comma-separated). Example: './notToBeScanned/,example.tf'"
required: false
dependency_tree:
description: "Show dependency origin tree of vulnerable packages"
required: false
default: "false"
security_checks:
description: "List of security issues to detect (comma-separated)"
required: false
default: "vulns,secret"
debug:
description: "Debug mode"
required: false
default: "false"
disable_active_verification:
description: "Disable active verification"
required: false
default: "false"
log_path:
description: "The directory path to specify where the logs should be written to on debug mode. Default to the current working directory"
required: false
outputs:
exit_code:
description: "The exit code of the scan"