diff --git a/README.md b/README.md index ca020ac..b1b8143 100644 --- a/README.md +++ b/README.md @@ -12,7 +12,8 @@ keyword. ```yaml include: - - component: gitlab.com/components/sast/sast@ + - component: gitlab.com/components/sast/sast@ # To include SAST Scanning + - component: gitlab.com/components/sast/iac-kics-sast@ # To include IaC Scanning ``` where `` is the latest released tag or `main`. diff --git a/templates/iac-kics-sast.yml b/templates/iac-kics-sast.yml new file mode 100644 index 0000000..ff6e530 --- /dev/null +++ b/templates/iac-kics-sast.yml @@ -0,0 +1,40 @@ +# Component created based on GitLab's IAC SAST Scanning template +# Read more about this feature here: https://docs.gitlab.com/ee/user/application_security/iac_scanning/ + +spec: + inputs: + stage: + default: test + excluded_paths: + default: "spec, test, tests, tmp" + excluded_analyzers: + default: "" + image_prefix: + default: "$CI_TEMPLATE_REGISTRY_HOST/security-products" + image_suffix: + dafault: "" + search_max_depth: + default: 4 + image_tag: + default: 6 + +--- +kics-iac-sast: + stage: $[[ inputs.stage ]] + image: + name: "$[[ inputs.image_prefix ]]/kics:$[[ inputs.image_tag ]]$[[ inputs.image_suffix ]]" + variables: + SEARCH_MAX_DEPTH: $[[ inputs.search_max_depth ]] + script: + - /analyzer run + artifacts: + access: 'developer' + reports: + sast: gl-sast-report.json + allow_failure: true + rules: + - if: $SAST_DISABLED == 'true' || $SAST_DISABLED == '1' + when: never + - if: $[[ inputs.excluded_analyzers ]] =~ /kics/ + when: never + - if: $CI_COMMIT_BRANCH