62 lines
2 KiB
YAML
62 lines
2 KiB
YAML
# Read more about this feature here: https://docs.gitlab.com/ee/user/project/merge_requests/sast.html
|
|
#
|
|
# Configure the scanning tool through the environment variables.
|
|
# List of the variables: https://gitlab.com/gitlab-org/security-products/sast#settings
|
|
# How to set: https://docs.gitlab.com/ee/ci/yaml/#variables
|
|
|
|
sast:
|
|
stage: test
|
|
image: docker:stable
|
|
variables:
|
|
DOCKER_DRIVER: overlay2
|
|
allow_failure: true
|
|
services:
|
|
- docker:stable-dind
|
|
script:
|
|
- export SAST_VERSION=${SP_VERSION:-$(echo "$CI_SERVER_VERSION" | sed 's/^\([0-9]*\)\.\([0-9]*\).*/\1-\2-stable/')}
|
|
- |
|
|
if ! docker info &>/dev/null; then
|
|
if [ -z "$DOCKER_HOST" -a "$KUBERNETES_PORT" ]; then
|
|
export DOCKER_HOST='tcp://localhost:2375'
|
|
fi
|
|
fi
|
|
- | # this is required to avoid undesirable reset of Docker image ENV variables being set on build stage
|
|
function propagate_env_vars() {
|
|
CURRENT_ENV=$(printenv)
|
|
|
|
for VAR_NAME; do
|
|
echo $CURRENT_ENV | grep "${VAR_NAME}=" > /dev/null && echo "--env $VAR_NAME "
|
|
done
|
|
}
|
|
- |
|
|
docker run \
|
|
$(propagate_env_vars \
|
|
SAST_ANALYZER_IMAGES \
|
|
SAST_ANALYZER_IMAGE_PREFIX \
|
|
SAST_ANALYZER_IMAGE_TAG \
|
|
SAST_DEFAULT_ANALYZERS \
|
|
SAST_EXCLUDED_PATHS \
|
|
SAST_BANDIT_EXCLUDED_PATHS \
|
|
SAST_BRAKEMAN_LEVEL \
|
|
SAST_GOSEC_LEVEL \
|
|
SAST_FLAWFINDER_LEVEL \
|
|
SAST_GITLEAKS_ENTROPY_LEVEL \
|
|
SAST_DOCKER_CLIENT_NEGOTIATION_TIMEOUT \
|
|
SAST_PULL_ANALYZER_IMAGE_TIMEOUT \
|
|
SAST_RUN_ANALYZER_TIMEOUT \
|
|
) \
|
|
--volume "$PWD:/code" \
|
|
--volume /var/run/docker.sock:/var/run/docker.sock \
|
|
"registry.gitlab.com/gitlab-org/security-products/sast:$SAST_VERSION" /app/bin/run /code
|
|
artifacts:
|
|
reports:
|
|
sast: gl-sast-report.json
|
|
dependencies: []
|
|
only:
|
|
refs:
|
|
- branches
|
|
variables:
|
|
- $GITLAB_FEATURES =~ /\bsast\b/
|
|
except:
|
|
variables:
|
|
- $SAST_DISABLED
|