55 script : |
66 #!/usr/bin/env bash
77
8- echo "setup"
8+ echo $STAGE
99
1010 # Download Go
1111 GO_VERSION=$(get_env go-version)
7878 script : |
7979 #!/usr/bin/env bash
8080
81+ echo $STAGE
82+
8183 PERIODIC_SCAN=$(get_env periodic-rescan)
8284 PERIODIC_SCAN="$(echo "$PERIODIC_SCAN" | tr '[:upper:]' '[:lower:]')"
8385
@@ -108,6 +110,8 @@ static-scan:
108110 script : |
109111 #!/usr/bin/env bash
110112
113+ echo $STAGE
114+
111115 PERIODIC_SCAN=$(get_env periodic-rescan)
112116 PERIODIC_SCAN="$(echo "$PERIODIC_SCAN" | tr '[:upper:]' '[:lower:]')"
113117
@@ -116,6 +120,14 @@ static-scan:
116120 exit 0
117121 fi
118122
123+ SKIP_SCANS=$(get_env SKIP_SCANS)
124+ SKIP_SCANS="$(echo "$SKIP_SCANS" | tr '[:upper:]' '[:lower:]')"
125+
126+ if [[ ! -z "$SKIP_SCANS" && "$SKIP_SCANS" != "false" && "$SKIP_SCANS" != "no" ]]; then
127+ echo "Skipping static-scan. This is a test run only"
128+ exit 0
129+ fi
130+
119131 BRANCH=$(get_env branch)
120132 read -r SONAR_HOST_URL <<< "$(get_env sonarqube | jq -r '.parameters.dashboard_url' | sed 's:/*$::')"
121133 read -r SONAR_USER <<< "$(get_env sonarqube | jq -r '.parameters.user_login')"
@@ -139,7 +151,52 @@ static-scan:
139151
140152 ## Perform static lint
141153 ./scripts/pipeline/static-linter-scan.sh --git-token $(get_env git-token) --static-linter-version $(get_env static-linter-version)
154+
155+ compliance-checks :
156+ image : icr.io/continuous-delivery/pipeline/pipeline-base-ubi:3.3
157+ dind : true
158+ abort_on_failure : false
159+ image_pull_policy : IfNotPresent
160+ sources :
161+ - repo : https://github.ibm.com/open-toolchain/compliance-commons.git
162+ sha : 38149a3644798c0b5679e6d8cdf999ce7f6e5142
163+ path : cra
164+ - repo : https://github.ibm.com/open-toolchain/compliance-commons.git
165+ sha : 56cb780f891167b93b95d6f477ad7dce79f3df16
166+ path : doi
167+ - repo : https://github.ibm.com/open-toolchain/compliance-commons.git
168+ sha : 7815b2273f9721d6edbdaf9bddb18e44d070b238
169+ path : detect-secrets
170+ - repo : https://github.ibm.com/open-toolchain/compliance-commons.git
171+ sha : 38149a3644798c0b5679e6d8cdf999ce7f6e5142
172+ path : compliance-checks
173+ - repo : https://github.ibm.com/open-toolchain/compliance-commons.git
174+ sha : 3e927695cfdb4f1bb8b25697ae67a10983de9a8c
175+ path : mend
176+
177+ script : |
178+ #!/usr/bin/env bash
142179
180+ echo $STAGE
181+
182+ PERIODIC_SCAN=$(get_env periodic-rescan)
183+ PERIODIC_SCAN="$(echo "$PERIODIC_SCAN" | tr '[:upper:]' '[:lower:]')"
184+
185+ if [[ ! -z "$PERIODIC_SCAN" && "$PERIODIC_SCAN" != "false" && "$PERIODIC_SCAN" != "no" ]]; then
186+ echo "Skipping static-scan. This is a periodic run that is only meant to produce CVE information."
187+ exit 0
188+ fi
189+
190+ SKIP_SCANS=$(get_env SKIP_SCANS)
191+ SKIP_SCANS="$(echo "$SKIP_SCANS" | tr '[:upper:]' '[:lower:]')"
192+
193+ if [[ ! -z "$SKIP_SCANS" && "$SKIP_SCANS" != "false" && "$SKIP_SCANS" != "no" ]]; then
194+ echo "Skipping static-scan. This is a test run only"
195+ exit 0
196+ fi
197+
198+ "${COMMONS_PATH}"/compliance-checks/run.sh
199+
143200containerize :
144201 dind : true
145202 abort_on_failure : true
@@ -349,7 +406,8 @@ sign-artifact:
349406 image : icr.io/continuous-delivery/pipeline/image-signing:1.0.0@sha256:e9d8e354668ba3d40be2aaee08298d2aa7f0e1c8a1829cca4094ec93830e3e6a
350407 script : |
351408 #!/usr/bin/env bash
352- echo "sign-artifact"
409+
410+ echo $STAGE
353411
354412 PERIODIC_SCAN=$(get_env periodic-rescan)
355413 PERIODIC_SCAN="$(echo "$PERIODIC_SCAN" | tr '[:upper:]' '[:lower:]')"
@@ -359,12 +417,21 @@ sign-artifact:
359417 exit 0
360418 fi
361419
420+ SKIP_SCANS=$(get_env SKIP_SCANS)
421+ SKIP_SCANS="$(echo "$SKIP_SCANS" | tr '[:upper:]' '[:lower:]')"
422+
423+ if [[ ! -z "$SKIP_SCANS" && "$SKIP_SCANS" != "false" && "$SKIP_SCANS" != "no" ]]; then
424+ echo "Skipping static-scan. This is a test run only"
425+ exit 0
426+ fi
427+
362428deploy :
363429 image : icr.io/continuous-delivery/pipeline/pipeline-base-ubi:3.12
364430
365431 script : |
366432 #!/usr/bin/env bash
367433
434+ echo $STAGE
368435
369436 PERIODIC_SCAN=$(get_env periodic-rescan)
370437 PERIODIC_SCAN="$(echo "$PERIODIC_SCAN" | tr '[:upper:]' '[:lower:]')"
@@ -386,7 +453,9 @@ dynamic-scan:
386453 image : icr.io/continuous-delivery/pipeline/pipeline-base-ubi:3.12
387454 script : |
388455 #!/usr/bin/env bash
389- echo "dynamic-scan"
456+
457+ echo $STAGE
458+
390459 PERIODIC_SCAN=$(get_env periodic-rescan)
391460 PERIODIC_SCAN="$(echo "$PERIODIC_SCAN" | tr '[:upper:]' '[:lower:]')"
392461
@@ -395,6 +464,14 @@ dynamic-scan:
395464 exit 0
396465 fi
397466
467+ SKIP_SCANS=$(get_env SKIP_SCANS)
468+ SKIP_SCANS="$(echo "$SKIP_SCANS" | tr '[:upper:]' '[:lower:]')"
469+
470+ if [[ ! -z "$SKIP_SCANS" && "$SKIP_SCANS" != "false" && "$SKIP_SCANS" != "no" ]]; then
471+ echo "Skipping static-scan. This is a test run only"
472+ exit 0
473+ fi
474+
398475 #export APP_URL=$(cat ../app-url)
399476 # feature preview this until evidence locker v2 usage is full feature ready
400477 # can be triggered, and owasp will run for preview purposes
@@ -449,6 +526,16 @@ scan-artifact:
449526 script : |
450527 #!/usr/bin/env bash
451528
529+ echo $STAGE
530+
531+ SKIP_SCANS=$(get_env SKIP_SCANS)
532+ SKIP_SCANS="$(echo "$SKIP_SCANS" | tr '[:upper:]' '[:lower:]')"
533+
534+ if [[ ! -z "$SKIP_SCANS" && "$SKIP_SCANS" != "false" && "$SKIP_SCANS" != "no" ]]; then
535+ echo "Skipping static-scan. This is a test run only"
536+ exit 0
537+ fi
538+
452539 # ========== Security Scanner ==========
453540 ./scripts/pipeline/ci_to_secure_pipeline_scan.sh
454541
@@ -457,6 +544,9 @@ release:
457544 image : icr.io/continuous-delivery/pipeline/pipeline-base-ubi:3.12
458545 script : |
459546 #!/usr/bin/env bash
547+
548+ echo $STAGE
549+
460550 PERIODIC_SCAN=$(get_env periodic-rescan)
461551 PERIODIC_SCAN="$(echo "$PERIODIC_SCAN" | tr '[:upper:]' '[:lower:]')"
462552
@@ -465,6 +555,14 @@ release:
465555 exit 0
466556 fi
467557
558+ SKIP_SCANS=$(get_env SKIP_SCANS)
559+ SKIP_SCANS="$(echo "$SKIP_SCANS" | tr '[:upper:]' '[:lower:]')"
560+
561+ if [[ ! -z "$SKIP_SCANS" && "$SKIP_SCANS" != "false" && "$SKIP_SCANS" != "no" ]]; then
562+ echo "Skipping static-scan. This is a test run only"
563+ exit 0
564+ fi
565+
468566 RELEASE_FLAG=$(get_env release "false")
469567
470568 if [[ $RELEASE_FLAG != "true" ]]; then
0 commit comments