You're viewing an older version of this GitHub Action. Do you want to see the latest version instead?
GitHub Action
Cloud One Conformity Pipeline Scanner
v19
Pre-release
Pipeline scanner uses Cloud Conformity's Template Scanner to secure your CloudFormation templates before they're deployed.
- Have an Cloud One Conformity account. Sign up for free trial now if it's not already the case!
- A cloud formation template to be scan.
To use the script, specify the following required environment variables:
cc_apikey
(Cloud One Conformity API KEY)cc_region
(Cloud One Conformity account region)templatePath
(Path of the template to be scanned)maxExtreme | maxVeryHigh | maxHigh | maxMedium | maxLow
(Choose any of the options and set a number of how many violations are accepted)
PS.: ALWAYS use secrets to expose your credentials!
Add an Action in your .github/workflow
yml file to scan your cloud formation template with Cloud One Conformity.
name: My CI/CD Pipeline
on:
push:
branches:
- master
jobs:
CloudFormation-Scan:
runs-on: ubuntu-latest
steps:
- name: Cloud One Conformity Pipeline Scanner
uses: raphabot/conformity-template-scanner-pipeline@version
env:
cc_apikey: ${{ secrets.apikey }}
maxExtreme: 0
maxVeryHigh: 1
maxHigh: 3
maxMedium: 5
maxLow: 10
cc_region: us-west-2
templatePath: template/infrastructure.yaml
Official support from Trend Micro is not available. Individual contributors may be Trend Micro employees, but are not official support.