From 162b906b5aac067d4d478f34c0ab6cf865c0e340 Mon Sep 17 00:00:00 2001 From: isamauny Date: Fri, 9 Feb 2024 18:15:10 +0100 Subject: [PATCH] Add CICD option to script calls --- .github/workflows/42c-scan.yaml | 2 +- azure-pipelines-scan.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/.github/workflows/42c-scan.yaml b/.github/workflows/42c-scan.yaml index dc1facb..37ec2ef 100644 --- a/.github/workflows/42c-scan.yaml +++ b/.github/workflows/42c-scan.yaml @@ -49,7 +49,7 @@ jobs: - name: get_photoapi_token id: get_photoapi_token run: | - login_response=$(python .42c/scripts/pixi-login.py -u ${{ env.USER_NAME }} -p ${{ env.USER_PASS }} -t ${{ env.TARGET_URL }}) + login_response=$(python .42c/scripts/pixi-login.py -c GITHUB -u ${{ env.USER_NAME }} -p ${{ env.USER_PASS }} -t ${{ env.TARGET_URL }}) echo "PHOTO_API_TOKEN=$login_response" >> $GITHUB_OUTPUT - name: Scan API for vulnerabilities uses: 42Crunch/api-security-scan-action-freemium@v1.1 diff --git a/azure-pipelines-scan.yaml b/azure-pipelines-scan.yaml index 266fbb5..b71d1e9 100644 --- a/azure-pipelines-scan.yaml +++ b/azure-pipelines-scan.yaml @@ -37,7 +37,7 @@ jobs: inputs: scriptSource: 'filePath' # Options: filePath, inline scriptPath: $(Build.Repository.LocalPath)/.42c/scripts/pixi-login.py - arguments: -u $(USER_NAME) -p $(USER_PASS) -t $(TARGET_URL) + arguments: -u $(USER_NAME) -p $(USER_PASS) -t $(TARGET_URL) -c AZURE - task: APISecurityScanFreemium@1 displayName: Scan API inputs: