This manual page describes built-in fcli actions that can be run through
the fcli action run <action-name> command.
ci
Run CI pipeline
Synopsis
fcli action run ci [fcli action run options] [action options, see below]
Description
This action can be used to run a full, standardized CI pipeline that performs the following activities:
-
Create & configure SSC application version / FoD release if needed
-
Install ScanCentral Client for packaging
-
Package source code using ScanCentral Client
-
Submit SAST scan request
-
Wait for SAST scan completion
-
Perform post-scan activities, like checking security policy outcome, exporting results, …
Configuration for this fcli action is done through environment variables; the sections below list the environment variables supported by this action.
Fortify on Demand
Session
| Environment Variable | Description |
|---|---|
FOD_URL |
Fortify on Demand URL, for example |
FOD_CLIENT_ID FOD_CLIENT_SECRET |
Required when authenticating with an API key: Fortify on Demand Client ID (API key) and Secret (API secret). |
FOD_TENANT FOD_USER FOD_PASSWORD |
Required when authenticating with user credentials: Fortify on Demand tenant, user and password. It is recommended to use a Personal Access Token instead of an actual user password. |
FOD_LOGIN_EXTRA_OPTS |
Extra login options, for example for disabling SSL checks or changing connection time-outs; see |
Release Configuration
| Environment Variable | Description |
|---|---|
FOD_RELEASE |
Fortify on Demand release to use with this action. This should be specified as |
DO_SETUP SETUP_ACTION SETUP_EXTRA_OPTS |
If Depending on your Git workflow, it is recommended to copy state from the release representing your default branch by passing the |
Packaging Configuration
| Environment Variable | Description |
|---|---|
PACKAGE_ACTION PACKAGE_ACTION_EXTRA_OPTS |
By default, when running a SAST scan, the fcli actionRef:package#_package action is used to (optionally) package the source code to be scanned; see next entry for information on how to configure the default actionRef:package#_package action. If the standard fcli actionRef:package#_package action doesn’t meet your needs, for example if you want to perform a local translation using Fortify Static Code Analyzer, you can use |
USE_PACKAGE PACKAGE_EXTRA_OPTS SC_CLIENT_VERSION SC_CLIENT_HOME SOURCE_DIR TOOL_DEFINITIONS |
These environment variables define packaging behavior. If |
Scan Configuration
| Environment Variable | Description |
|---|---|
DO_SAST_SCAN SAST_SCAN_EXTRA_OPTS |
The fcli |
DO_WAIT DO_SAST_WAIT SAST_WAIT_EXTRA_OPTS |
By default, the fcli |
Post-Scan Configuration
| Environment Variable | Description |
|---|---|
DO_RELEASE_SUMMARY RELEASE_SUMMARY_ACTION RELEASE_SUMMARY_EXTRA_OPTS |
If |
DO_CHECK_POLICY CHECK_POLICY_ACTION CHECK_POLICY_EXTRA_OPTS |
If |
DO_PR_COMMENT PR_COMMENT_ACTION PR_COMMENT_EXTRA_OPTS |
(PREVIEW) If |
DO_SAST_EXPORT SAST_EXPORT_ACTION SAST_EXPORT_EXTRA_OPTS |
If |
Fortify Software Security Center
Session
| Environment Variable | Description |
|---|---|
SSC_URL |
Software Security Center (SSC) URL, for example |
SSC_TOKEN |
Required when authenticating with an SSC token (recommended). Most actions should work fine with a CIToken. |
SSC_USER SSC_PASSWORD |
Required when authenticating with SSC user credentials. |
SC_SAST_TOKEN |
ScanCentral SAST Client Authentication Token for authenticating with ScanCentral SAST Controller. This environment variable is required when running a ScanCentral SAST scan. |
SSC_LOGIN_EXTRA_OPTS |
Extra SSC login options, for example for disabling SSL checks or changing connection time-outs; see |
Application Version Configuration
| Environment Variable | Description |
|---|---|
SSC_APPVERSION |
Fortify SSC application version to use with this action. This should be specified as |
DO_SETUP SETUP_ACTION SETUP_EXTRA_OPTS |
If Depending on your Git workflow, it is recommended to copy state from the application version representing your default branch by passing the |
Packaging Configuration
| Environment Variable | Description |
|---|---|
PACKAGE_ACTION PACKAGE_ACTION_EXTRA_OPTS |
By default, when running a SAST scan, the fcli actionRef:package#_package action is used to (optionally) package the source code to be scanned; see next entry for information on how to configure the default actionRef:package#_package action. If the standard fcli actionRef:package#_package action doesn’t meet your needs, for example if you want to perform a local translation using Fortify Static Code Analyzer, you can use |
USE_PACKAGE PACKAGE_EXTRA_OPTS SC_CLIENT_VERSION SC_CLIENT_HOME SOURCE_DIR TOOL_DEFINITIONS |
These environment variables define packaging behavior. If |
Scan Configuration
| Environment Variable | Description |
|---|---|
DO_SAST_SCAN SAST_SCAN_EXTRA_OPTS |
The fcli |
DO_DEBRICKED_SCAN DEBRICKED_SCAN_EXTRA_OPTS DEBRICKED_ACCESS_TOKEN DEBRICKED_VERSION DEBRICKED_HOME |
The fcli |
DO_WAIT DO_SAST_WAIT SAST_WAIT_EXTRA_OPTS DEBRICKED_WAIT_EXTRA_OPTS |
By default, the fcli |
Post-Scan Configuration
| Environment Variable | Description |
|---|---|
AVIATOR_URL AVIATOR_TOKEN AVIATOR_LOGIN_EXTRA_OPTS |
Aviator URL and JWT token to use for Aviator operations (see below). The |
DO_AVIATOR_AUDIT AVIATOR_APP AVIATOR_AUDIT_EXTRA_OPTS AVIATOR_WAIT_EXTRA_OPTS |
If |
DO_APPVERSION_SUMMARY APPVERSION_SUMMARY_ACTION APPVERSION_SUMMARY_EXTRA_OPTS |
If |
DO_CHECK_POLICY CHECK_POLICY_ACTION CHECK_POLICY_EXTRA_OPTS |
If |
DO_PR_COMMENT PR_COMMENT_ACTION PR_COMMENT_EXTRA_OPTS |
(PREVIEW) If |
DO_SAST_EXPORT SAST_EXPORT_ACTION SAST_EXPORT_EXTRA_OPTS |
If |
DO_DEBRICKED_EXPORT DEBRICKED_EXPORT_ACTION DEBRICKED_EXPORT_EXTRA_OPTS |
If |
detect-env
Collect environment-specific data
Synopsis
fcli action run detect-env [fcli action run options] [action options, see below]
Description
This action collects data about the current environment in which fcli is being run, like the current CI/CD platform (GitHub, GitLab, Azure DevOps, …), Git data from current source code directory, … Collected data is stored in global.ci.* action variables for use by other actions, and printed to the output for user reference. This includes both environment-specific data, and any data derived from that data, like default FoD release name and SSC application version name.