Commit d875027
authored
refactor: use reusable workflow for semgrep (#311)
Updated the build-test-release workflow to use
[sast-scan](https://github.com/splunk/sast-scanning) owned by product
security team instead of using custom implementation.
Ref: https://splunk.atlassian.net/browse/ADDON-72309
Test workflow run:
https://github.com/splunk/splunk-add-on-for-servicenow/actions/runs/10596615468
Tested on PR:
splunk/splunk-add-on-for-servicenow#751
Workflow is not tested for the failure scenario because we need to have
blocker findings by the semgrep in order to fail the workflow. Currently
all rules are in monitor mode so any findings by the semgrep will be
non-blocker resulting in semgrep stage to pass everytime.
Discussion with the semgrep team:
https://splunk.slack.com/archives/C011ELTV7FG/p17249234963715291 parent 273675b commit d875027
1 file changed
+4
-12
lines changed| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
305 | 305 | | |
306 | 306 | | |
307 | 307 | | |
308 | | - | |
| 308 | + | |
309 | 309 | | |
310 | | - | |
311 | | - | |
312 | | - | |
313 | | - | |
314 | | - | |
315 | | - | |
316 | | - | |
317 | | - | |
318 | | - | |
319 | | - | |
320 | | - | |
| 310 | + | |
| 311 | + | |
| 312 | + | |
321 | 313 | | |
322 | 314 | | |
323 | 315 | | |
| |||
0 commit comments