You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Use the appropriate runner for building your source code.
27
+
# Use the appropriate runner for building your source code.
28
28
# TODO: Use a Windows runner for .NET projects that use msbuild. Additional changes to RUN commands will be required to switch to Windows syntax.
29
29
runs-on: ubuntu-latest
30
30
@@ -37,27 +37,27 @@ jobs:
37
37
fetch-depth: 2
38
38
# If this run was triggered by a pull request event, then checkout the head of the pull request instead of the merge commit.
39
39
- run: git checkout HEAD^2
40
-
if: ${{ github.event_name == 'pull_request' }}
40
+
if: ${{ github.event_name == 'pull_request' }}
41
41
# Java 8 required by ScanCentral Client and FoD Uploader(Univeral CI Tool)
42
42
- name: Setup Java
43
43
uses: actions/setup-java@v1
44
44
with:
45
-
java-version: 13
46
-
45
+
java-version: 15
46
+
47
47
# Prepare source+dependencies for upload. The default example is for a Maven project that uses pom.xml.
48
48
# TODO: Update PACKAGE_OPTS based on the ScanCentral Client documentation for your project's included tech stack(s). Helpful hints:
49
49
# ScanCentral Client will download dependencies for maven (-bt mvn) and gradle (-bt gradle).
50
50
# ScanCentral Client can download dependencies for msbuild projects (-bt msbuild); however, you must convert the workflow to use a Windows runner.
51
51
# ScanCentral has additional options that should be set for PHP and Python projects
52
52
# For other build tools, add your build commands to download necessary dependencies and prepare according to Fortify on Demand Packaging documentation.
53
-
# ScanCentral Client documentation is located at https://www.microfocus.com/documentation/fortify-software-security-center/
53
+
# ScanCentral Client documentation is located at https://www.microfocus.com/documentation/fortify-software-security-center/
# Start Fortify on Demand SAST scan and wait until results complete. For more information on FoDUploader commands, see https://github.com/fod-dev/fod-uploader-java
62
62
# TODO: Update ENV variables for your application and create the necessary GitHub Secrets. Helpful hints:
63
63
# Credentials and release ID should be obtained from your FoD tenant (either Personal Access Token or API Key can be used).
# A workflow run is made up of one or more jobs that can run sequentially or in parallel
14
14
jobs:
@@ -17,7 +17,7 @@ jobs:
17
17
# The type of runner that the job will run on
18
18
runs-on: ubuntu-latest
19
19
steps:
20
-
20
+
21
21
# Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it and copies all sources into ZIP file for submitting for analysis. Replace this section with your applications build steps
22
22
- uses: actions/checkout@v2
23
23
with:
@@ -28,28 +28,28 @@ jobs:
28
28
files: /
29
29
recursive: true
30
30
dest: veracode-pipeline-scan-results-to-sarif.zip
31
-
31
+
32
32
- uses: actions/upload-artifact@v1
33
33
with:
34
34
name: my-artifact
35
35
path: veracode-pipeline-scan-results-to-sarif.zip
36
-
36
+
37
37
# download the Veracode Static Analysis Pipeline scan jar
0 commit comments