This manual page describes built-in fcli actions that can be run through
the fcli action run <action-name> command.
ci
Run CI pipeline
Synopsis
fcli action run ci [fcli action run options] [action options, see below]
Description
This action can be used to run a full, standardized CI pipeline that performs the following activities:
-
Create & configure SSC application version / FoD release if needed
-
Install ScanCentral Client for packaging
-
Package source code using ScanCentral Client
-
Submit SAST scan request
-
Wait for SAST scan completion
-
Perform post-scan activities, like checking security policy outcome, exporting results, …
Configuration for this fcli action is done through environment variables; the sections below list the environment variables supported by this action.
Bootstrap & Setup
The fcli ci action uses the following environment variables to control bootstrapping behavior for supporting tools.
Environment Variable |
Description |
TOOL_DEFINITIONS |
Supporting tools like ScanCentral Client or Debricked CLI are by default downloaded from the URLs defined in the default Fortify tool definitions. For airgapped environments, point this environment variable to an internally hosted custom tool definitions zip file to download these tools from an internal mirror. |
PREINSTALLED |
Set to |
Authentication & Connection
Configure credentials and connection details for OpenText Core Application Security (Fortify on Demand).
Environment Variable |
Description |
FOD_URL |
OpenText Core Application Security (Fortify on Demand) URL, for example |
FOD_CLIENT_ID |
Required when authenticating with an API key: OpenText Core Application Security (Fortify on Demand) Client ID (API key) and Secret (API secret). |
FOD_TENANT |
Required when authenticating with user credentials: OpenText Core Application Security (Fortify on Demand) tenant, user and password. It is recommended to use a Personal Access Token instead of an actual user password. |
FOD_LOGIN_EXTRA_OPTS |
Extra login options, for example for disabling SSL checks or changing connection time-outs; see |
Release Management
Configure OpenText Core Application Security (Fortify on Demand) release settings, including automatic creation and setup of applications and releases if they don’t exist.
Environment Variable |
Description |
FOD_RELEASE |
OpenText Core Application Security (Fortify on Demand) release to use with this action. This should be specified as |
DO_SETUP |
If |
COPY_FROM_RELEASE |
Depending on your Git workflow, when a new release is created, it is recommended to copy state from the release representing your default branch by either setting this environment variable or by passing the |
SAST_ASSESSMENT_TYPE |
By default, when setting up a release for SAST scanning, the SAST scan will be configured with the |
DO_AVIATOR_AUDIT |
To enable Aviator audits, set this environment variable to true or pass |
DO_SCA_SCAN |
To enable Software Composition Analysis in your SAST scans, set this environment variable to true or pass |
Package Configuration
Configure source code packaging behavior for SAST scans. Control whether to use custom packaging actions, specify pre-built packages, or customize ScanCentral Client usage.
Environment Variable |
Description |
PACKAGE_ACTION |
By default, when running a SAST scan, the fcli package action is used to (optionally) package the source code to be scanned; see next entry for information on how to configure the default package action. If the standard fcli package action doesn’t meet your needs, for example if you want to perform a local translation using Fortify Static Code Analyzer, you can use |
USE_PACKAGE |
These environment variables define packaging behavior. If |
Scan Execution
Configure SAST scan execution and waiting behavior for OpenText Core Application Security (Fortify on Demand).
Environment Variable |
Description |
DO_SAST_SCAN |
The fcli |
DO_WAIT |
By default, the fcli |
Post-Scan Actions
Configure post-scan tasks including release summaries, policy checks, pull request comments, and vulnerability data exports for OpenText Core Application Security (Fortify on Demand). NOTE: Availability and behavior of post-scan tasks may vary across CI/CD systems and fcli versions.
Environment Variable |
Description |
DO_RELEASE_SUMMARY |
If |
DO_CHECK_POLICY |
If |
DO_PR_COMMENT |
(PREVIEW) If |
DO_SAST_EXPORT |
If |
Authentication & Connection
Configure credentials and connection details for OpenText Application Security (Fortify Software Security Center).
Environment Variable |
Description |
SSC_URL |
OpenText Application Security (Fortify Software Security Center) URL, for example |
SSC_TOKEN |
Required when authenticating with an SSC token (recommended). Most actions should work fine with a CIToken. |
SSC_USER |
Required when authenticating with SSC user credentials. |
SC_SAST_TOKEN |
ScanCentral SAST Client Authentication Token for authenticating with ScanCentral SAST Controller. This environment variable is required when running a ScanCentral SAST scan. |
SSC_LOGIN_EXTRA_OPTS |
Extra SSC login options, for example for disabling SSL checks or changing connection time-outs; see |
Application Version Management
Configure OpenText Application Security (Fortify Software Security Center) application version settings, including automatic creation of application versions if they don’t exist.
Environment Variable |
Description |
SSC_APPVERSION |
Fortify SSC application version to use with this action. This should be specified as |
DO_SETUP |
If |
Package Configuration
Configure source code packaging behavior for SAST scans. Control whether to use custom packaging actions, specify pre-built packages, or customize ScanCentral Client usage.
Environment Variable |
Description |
PACKAGE_ACTION |
By default, when running a SAST scan, the fcli package action is used to (optionally) package the source code to be scanned; see next entry for information on how to configure the default package action. If the standard fcli package action doesn’t meet your needs, for example if you want to perform a local translation using Fortify Static Code Analyzer, you can use |
USE_PACKAGE |
These environment variables define packaging behavior. If |
Scan Execution
Configure SAST and Debricked scan execution and waiting behavior for OpenText Application Security (Fortify Software Security Center).
Environment Variable |
Description |
DO_SAST_SCAN |
The fcli |
DO_DEBRICKED_SCAN |
The fcli |
DO_WAIT |
By default, the fcli |
Post-Scan Actions
Configure post-scan tasks including Aviator auditing, application version summaries, policy checks, pull request comments, and vulnerability data exports for OpenText Application Security (Fortify Software Security Center). NOTE: Availability and behavior of post-scan tasks may vary across CI/CD systems and fcli versions.
Environment Variable |
Description |
AVIATOR_URL |
Aviator URL and JWT token to use for Aviator operations (see below). The |
DO_AVIATOR_AUDIT |
If |
DO_APPVERSION_SUMMARY |
If |
DO_CHECK_POLICY |
If |
DO_PR_COMMENT |
(PREVIEW) If |
DO_SAST_EXPORT |
If |
DO_DEBRICKED_EXPORT |
If |
detect-env
Collect environment-specific data
Synopsis
fcli action run detect-env [fcli action run options] [action options, see below]
Description
This action collects data about the current environment in which fcli is being run, like the current CI/CD platform (GitHub, GitLab, Azure DevOps, …), Git data from current source code directory, … Collected data is stored in global.ci.* action variables for use by other actions, and printed to the output for user reference. This includes both environment-specific data, and any data derived from that data, like default FoD release name and SSC application version name.