Skip to content

Commit aac4ab9

Browse files
Release: v0.1.8 (#61)
## What's Changed * Update deps by @sethvargo in #60 **Full Changelog**: v0.1.7...v0.1.8
1 parent 957e69d commit aac4ab9

File tree

4 files changed

+16
-16
lines changed

4 files changed

+16
-16
lines changed

README.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -85,10 +85,10 @@ jobs:
8585
8686
<!-- BEGIN_AUTOGEN_INPUTS -->
8787
88-
- <a name="organization_id"></a><a href="#user-content-organization_id"><code>organization_id</code></a>: _(Required)_ Google Cloud organization ID for the organization which includes the
88+
- <a name="__input_organization_id"></a><a href="#user-content-__input_organization_id"><code>organization_id</code></a>: _(Required)_ Google Cloud organization ID for the organization which includes the
8989
resources that you want to modify. For example, '1234'.
9090
91-
- <a name="scan_file_ref"></a><a href="#user-content-scan_file_ref"><code>scan_file_ref</code></a>: _(Required)_ Path to a file, relative to the local workspace, for the IaC file to scan.
91+
- <a name="__input_scan_file_ref"></a><a href="#user-content-__input_scan_file_ref"><code>scan_file_ref</code></a>: _(Required)_ Path to a file, relative to the local workspace, for the IaC file to scan.
9292
For example:
9393
9494
./tf_plan.json
@@ -97,16 +97,16 @@ jobs:
9797
9898
./artifacts/tf_plan.json
9999
100-
- <a name="iac_type"></a><a href="#user-content-iac_type"><code>iac_type</code></a>: _(Required, default: `terraform`)_ The IaC template type. Currently only Terraform is supported.
100+
- <a name="__input_iac_type"></a><a href="#user-content-__input_iac_type"><code>iac_type</code></a>: _(Required, default: `terraform`)_ The IaC template type. Currently only Terraform is supported.
101101

102-
- <a name="scan_timeout"></a><a href="#user-content-scan_timeout"><code>scan_timeout</code></a>: _(Optional, default: `3m`)_ The maximum time before the scanning stops. The value must be between "1m"
102+
- <a name="__input_scan_timeout"></a><a href="#user-content-__input_scan_timeout"><code>scan_timeout</code></a>: _(Optional, default: `3m`)_ The maximum time before the scanning stops. The value must be between "1m"
103103
and `10m`.
104104

105-
- <a name="ignore_violations"></a><a href="#user-content-ignore_violations"><code>ignore_violations</code></a>: _(Optional)_ Whether violations found in IaC file should be ignored when determining
105+
- <a name="__input_ignore_violations"></a><a href="#user-content-__input_ignore_violations"><code>ignore_violations</code></a>: _(Optional)_ Whether violations found in IaC file should be ignored when determining
106106
the build status. This input doesn't apply to violations that are related
107107
to generating SARIF reports and determining the `iac_scan_result`.
108108

109-
- <a name="failure_criteria"></a><a href="#user-content-failure_criteria"><code>failure_criteria</code></a>: _(Optional, default: `Critical:1, High:1, Medium:1, Low:1, Operator:OR`)_ The failure criteria that determines the workflow build status. You can
109+
- <a name="__input_failure_criteria"></a><a href="#user-content-__input_failure_criteria"><code>failure_criteria</code></a>: _(Optional, default: `Critical:1, High:1, Medium:1, Low:1, Operator:OR`)_ The failure criteria that determines the workflow build status. You can
110110
set a threshold for the number of critical, high, medium, and low severity
111111
issues and use an aggregator (either `and` or `or`) to evaluate the
112112
criteria.
@@ -126,7 +126,7 @@ jobs:
126126
If the `failure_criteria` evaluates to `true`, the workflow is marked as
127127
`FAILED`. Otherwise, the workflow is marked as `SUCCESS`.
128128

129-
- <a name="fail_silently"></a><a href="#user-content-fail_silently"><code>fail_silently</code></a>: _(Optional)_ If set to true, the workflow will not fail in case of any internal error
129+
- <a name="__input_fail_silently"></a><a href="#user-content-__input_fail_silently"><code>fail_silently</code></a>: _(Optional)_ If set to true, the workflow will not fail in case of any internal error
130130
including invalid credentials and plugin dependency failure.
131131

132132
Note: This GitHub Action will always fail in case of any input validation
@@ -140,7 +140,7 @@ jobs:
140140

141141
<!-- BEGIN_AUTOGEN_OUTPUTS -->
142142

143-
- `iac_scan_result`: The result of the security scan. One of:
143+
- <a name="__output_iac_scan_result"></a><a href="#user-content-__output_iac_scan_result"><code>iac_scan_result</code></a>: The result of the security scan. One of:
144144

145145
- `passed`: No violations were found or the `failure_criteria` was not
146146
satisfied.
@@ -150,7 +150,7 @@ jobs:
150150
- `error`: The action ran into an execution error, generally due to a
151151
misconfiguration or invalid credentials.
152152

153-
- `iac_scan_result_sarif_path`: Path for the SARIF report file. This file is only available when
153+
- <a name="__output_iac_scan_result_sarif_path"></a><a href="#user-content-__output_iac_scan_result_sarif_path"><code>iac_scan_result_sarif_path</code></a>: Path for the SARIF report file. This file is only available when
154154
violations are found in the scan file.
155155

156156

dist/main/index.js

Lines changed: 4 additions & 4 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

package-lock.json

Lines changed: 2 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"name": "@google-github-actions/analyze-code-security-scc",
3-
"version": "0.1.7",
3+
"version": "0.1.8",
44
"description": "Provides functionality to scan code for vulnerability during the build step of the project.",
55
"main": "dist/main/index.js",
66
"scripts": {

0 commit comments

Comments
 (0)