d2cc841c55
This commit adds CI job that validates all `*.yml` with `yamllint`. This commit fixes all offenses present in repository.
48 lines
1.7 KiB
YAML
48 lines
1.7 KiB
YAML
# Read more about this feature here: https://docs.gitlab.com/ee/user/application_security/dast/
|
|
|
|
# Configure the scanning tool through the environment variables.
|
|
# List of the variables: https://gitlab.com/gitlab-org/security-products/dast#settings
|
|
# How to set: https://docs.gitlab.com/ee/ci/yaml/#variables
|
|
|
|
stages:
|
|
- build
|
|
- test
|
|
- deploy
|
|
- dast
|
|
|
|
dast:
|
|
stage: dast
|
|
image:
|
|
name: "registry.gitlab.com/gitlab-org/security-products/dast:$CI_SERVER_VERSION_MAJOR-$CI_SERVER_VERSION_MINOR-stable"
|
|
variables:
|
|
# URL to scan:
|
|
# DAST_WEBSITE: https://example.com/
|
|
#
|
|
# Time limit for target availability (scan is attempted even when timeout):
|
|
# DAST_TARGET_AVAILABILITY_TIMEOUT: 60
|
|
#
|
|
# Set these variables to scan with an authenticated user:
|
|
# DAST_AUTH_URL: https://example.com/sign-in
|
|
# DAST_USERNAME: john.doe@example.com
|
|
# DAST_PASSWORD: john-doe-password
|
|
# DAST_USERNAME_FIELD: session[user] # the name of username field at the sign-in HTML form
|
|
# DAST_PASSWORD_FIELD: session[password] # the name of password field at the sign-in HTML form
|
|
# DAST_AUTH_EXCLUDE_URLS: http://example.com/sign-out,http://example.com/sign-out-2 # optional: URLs to skip during the authenticated scan; comma-separated, no spaces in between
|
|
#
|
|
# Perform ZAP Full Scan, which includes both passive and active scanning:
|
|
# DAST_FULL_SCAN_ENABLED: "true"
|
|
allow_failure: true
|
|
script:
|
|
- export DAST_WEBSITE=${DAST_WEBSITE:-$(cat environment_url.txt)}
|
|
- /analyze -t $DAST_WEBSITE
|
|
artifacts:
|
|
reports:
|
|
dast: gl-dast-report.json
|
|
only:
|
|
refs:
|
|
- branches
|
|
variables:
|
|
- $GITLAB_FEATURES =~ /\bdast\b/
|
|
except:
|
|
variables:
|
|
- $DAST_DISABLED
|