Executes the Boost Security Scanner cli tool to scan repositories for vulnerabilities and uploads results to the Boost Security API.
Add the following to your .gitlab-ci.yml
:
include:
- remote: 'https://raw.githubusercontent.com/boostsecurityio/boostsec-scanner-gitlab/main/scanner.yml'
boost-native-scanner:
stage: build
extends:
- .boost_scan
variables:
BOOST_SCANNER_REGISTRY_MODULE: "boostsecurityio/native-scanner"
The scanner job may be configured through the use of the variables
outlined below:
Additional CLI args to pass to the boost
cli.
Enable or disable boost uploading results to the boost api
Overrides the API endpoint url
The Boost Security API token secret.
NOTE: We recommend you not put the API token directly in your pipeline file. Instead, it should be exposed via a secret.
Overrides the cli version to download when performing scans. If undefined, this will default to pulling "1".
Enable or disable the gitlab dependency proxy for docker images. May be set to one of the following values:
- group: enable the group proxy
- direct: enable the direct proxy
Ignore any non-zero exit status and always return a success.
Change the CLI logging level.
The name of the main branch that PRs would merge into. This is automatically detected by querying the git server.
Optional command to execute prior to scanning. This may be used to generate additional files that are not tracked in git.
The relative path towards a module within the Scanner Registry. To streamline the configuration, both the scanners prefix and module.yaml suffix may be omitted.
Optional identifier to uniquely identify the scanner
Optional identifier to identify a a monorepo component
The optional timeout on a diff scan after which the Github check will be marked as failed. This defaults to 120 seconds.
The optional timeout on a main scan after which the Github check will be marked as failed. This defaults to 2 hours.