This action helps to integrate the kubescape tool into your pipelines. Supported parameters are the following: How to use kubescape in CI. Sample actions. Desired features (schematically, with parameters):
- name: Run Kubescape
uses: otomato-gh/kubescape-action@master
with:
ksversion: 'v2.0.155'
# [⚠️ Required]
# A version of involved binary (See ARMO releases page: https://github.com/armosec/kubescape/releases ).
path: ''
# [⚙️ Optional]
# A path where to look for deployments' YAML to scan. Default is repo's home dir.
threshold: 20
# [⚙️ Optional]
# A threshold value 0..100. This action will fail if, in terms of vulnerability points, your deployment scores more than the value specified.
format: 'json'
# [⚙️ Optional]
# An output's format: "pretty-printer", "json", "junit", "prometheus", "pdf" (default is "pretty-printer" (raw console dump)).
context: ''
# [⚙️ Optional]
# K8s cluster's context (kube-context) to run scan on (default is empty, so not set, and thus we're going to scan YAML files only).
Scanning process itself is to be performed inside a docker container. For "json", "junit" and "pdf" this action provides report saving implemented as an uploaded artifact. This is mean, the report may be downloaded for consequent analysis.
🐞 Please keep in mind: due to kubescape
command syntax you can choose to scan only one thing: either path
or context
. It makes no sense to set both parameters at the same time.