Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
29 changes: 15 additions & 14 deletions templates/gitlab/go/devsecops.yml
Original file line number Diff line number Diff line change
Expand Up @@ -87,6 +87,20 @@ cast-quality:
cast-gate:
stage: cast-gate
image: alpine:latest
variables:
DEFAULT_REGO: |
package main

import future.keywords.if
import future.keywords.in

deny[msg] if {
run := input.runs[_]
result := run.results[_]
result.level == "error"
tool := run.tool.driver.name
msg := sprintf("[CRITICAL] %s — %s (rule: %s)", [tool, result.message.text, result.ruleId])
}
needs:
- job: cast-secrets
artifacts: false
Expand All @@ -112,20 +126,7 @@ cast-gate:
# https://github.com/castops/cast/tree/main/policy
if [ ! -d policy ] || [ -z "$(ls -A policy/*.rego 2>/dev/null)" ]; then
mkdir -p policy
cat > policy/active.rego << 'REGO'
package main

import future.keywords.if
import future.keywords.in

deny[msg] if {
run := input.runs[_]
result := run.results[_]
result.level == "error"
tool := run.tool.driver.name
msg := sprintf("[CRITICAL] %s — %s (rule: %s)", [tool, result.message.text, result.ruleId])
}
REGO
printf '%s' "$DEFAULT_REGO" > policy/active.rego
fi
- |
SARIF_FILES=""
Expand Down
29 changes: 15 additions & 14 deletions templates/gitlab/nodejs/devsecops.yml
Original file line number Diff line number Diff line change
Expand Up @@ -87,6 +87,20 @@ cast-quality:
cast-gate:
stage: cast-gate
image: alpine:latest
variables:
DEFAULT_REGO: |
package main

import future.keywords.if
import future.keywords.in

deny[msg] if {
run := input.runs[_]
result := run.results[_]
result.level == "error"
tool := run.tool.driver.name
msg := sprintf("[CRITICAL] %s — %s (rule: %s)", [tool, result.message.text, result.ruleId])
}
needs:
- job: cast-secrets
artifacts: false
Expand All @@ -112,20 +126,7 @@ cast-gate:
# https://github.com/castops/cast/tree/main/policy
if [ ! -d policy ] || [ -z "$(ls -A policy/*.rego 2>/dev/null)" ]; then
mkdir -p policy
cat > policy/active.rego << 'REGO'
package main

import future.keywords.if
import future.keywords.in

deny[msg] if {
run := input.runs[_]
result := run.results[_]
result.level == "error"
tool := run.tool.driver.name
msg := sprintf("[CRITICAL] %s — %s (rule: %s)", [tool, result.message.text, result.ruleId])
}
REGO
printf '%s' "$DEFAULT_REGO" > policy/active.rego
fi
- |
SARIF_FILES=""
Expand Down
29 changes: 15 additions & 14 deletions templates/gitlab/python/devsecops.yml
Original file line number Diff line number Diff line change
Expand Up @@ -87,6 +87,20 @@ cast-quality:
cast-gate:
stage: cast-gate
image: alpine:latest
variables:
DEFAULT_REGO: |
package main

import future.keywords.if
import future.keywords.in

deny[msg] if {
run := input.runs[_]
result := run.results[_]
result.level == "error"
tool := run.tool.driver.name
msg := sprintf("[CRITICAL] %s — %s (rule: %s)", [tool, result.message.text, result.ruleId])
}
needs:
- job: cast-secrets
artifacts: false
Expand All @@ -112,20 +126,7 @@ cast-gate:
# https://github.com/castops/cast/tree/main/policy
if [ ! -d policy ] || [ -z "$(ls -A policy/*.rego 2>/dev/null)" ]; then
mkdir -p policy
cat > policy/active.rego << 'REGO'
package main

import future.keywords.if
import future.keywords.in

deny[msg] if {
run := input.runs[_]
result := run.results[_]
result.level == "error"
tool := run.tool.driver.name
msg := sprintf("[CRITICAL] %s — %s (rule: %s)", [tool, result.message.text, result.ruleId])
}
REGO
printf '%s' "$DEFAULT_REGO" > policy/active.rego
fi
- |
SARIF_FILES=""
Expand Down
29 changes: 15 additions & 14 deletions templates/go/devsecops.yml
Original file line number Diff line number Diff line change
Expand Up @@ -153,26 +153,27 @@ jobs:
tar xzf conftest.tar.gz conftest
chmod +x conftest && sudo mv conftest /usr/local/bin/
- name: Write default policy
env:
DEFAULT_REGO: |
package main

import future.keywords.if
import future.keywords.in

deny[msg] if {
run := input.runs[_]
result := run.results[_]
result.level == "error"
tool := run.tool.driver.name
msg := sprintf("[CRITICAL] %s — %s (rule: %s)", [tool, result.message.text, result.ruleId])
}
run: |
# Use local policy/ directory if present; otherwise write the built-in default.
# For strict/permissive mode, copy the desired .rego from:
# https://github.com/castops/cast/tree/main/policy
if [ ! -d policy ] || [ -z "$(ls -A policy/*.rego 2>/dev/null)" ]; then
mkdir -p policy
cat > policy/active.rego << 'REGO'
package main

import future.keywords.if
import future.keywords.in

deny[msg] if {
run := input.runs[_]
result := run.results[_]
result.level == "error"
tool := run.tool.driver.name
msg := sprintf("[CRITICAL] %s — %s (rule: %s)", [tool, result.message.text, result.ruleId])
}
REGO
printf '%s' "$DEFAULT_REGO" > policy/active.rego
fi
- name: Evaluate policy
run: |
Expand Down
29 changes: 15 additions & 14 deletions templates/nodejs/devsecops.yml
Original file line number Diff line number Diff line change
Expand Up @@ -153,26 +153,27 @@ jobs:
tar xzf conftest.tar.gz conftest
chmod +x conftest && sudo mv conftest /usr/local/bin/
- name: Write default policy
env:
DEFAULT_REGO: |
package main

import future.keywords.if
import future.keywords.in

deny[msg] if {
run := input.runs[_]
result := run.results[_]
result.level == "error"
tool := run.tool.driver.name
msg := sprintf("[CRITICAL] %s — %s (rule: %s)", [tool, result.message.text, result.ruleId])
}
run: |
# Use local policy/ directory if present; otherwise write the built-in default.
# For strict/permissive mode, copy the desired .rego from:
# https://github.com/castops/cast/tree/main/policy
if [ ! -d policy ] || [ -z "$(ls -A policy/*.rego 2>/dev/null)" ]; then
mkdir -p policy
cat > policy/active.rego << 'REGO'
package main

import future.keywords.if
import future.keywords.in

deny[msg] if {
run := input.runs[_]
result := run.results[_]
result.level == "error"
tool := run.tool.driver.name
msg := sprintf("[CRITICAL] %s — %s (rule: %s)", [tool, result.message.text, result.ruleId])
}
REGO
printf '%s' "$DEFAULT_REGO" > policy/active.rego
fi
- name: Evaluate policy
run: |
Expand Down
29 changes: 15 additions & 14 deletions templates/python/devsecops.yml
Original file line number Diff line number Diff line change
Expand Up @@ -147,26 +147,27 @@ jobs:
tar xzf conftest.tar.gz conftest
chmod +x conftest && sudo mv conftest /usr/local/bin/
- name: Write default policy
env:
DEFAULT_REGO: |
package main

import future.keywords.if
import future.keywords.in

deny[msg] if {
run := input.runs[_]
result := run.results[_]
result.level == "error"
tool := run.tool.driver.name
msg := sprintf("[CRITICAL] %s — %s (rule: %s)", [tool, result.message.text, result.ruleId])
}
run: |
# Use local policy/ directory if present; otherwise write the built-in default.
# For strict/permissive mode, copy the desired .rego from:
# https://github.com/castops/cast/tree/main/policy
if [ ! -d policy ] || [ -z "$(ls -A policy/*.rego 2>/dev/null)" ]; then
mkdir -p policy
cat > policy/active.rego << 'REGO'
package main

import future.keywords.if
import future.keywords.in

deny[msg] if {
run := input.runs[_]
result := run.results[_]
result.level == "error"
tool := run.tool.driver.name
msg := sprintf("[CRITICAL] %s — %s (rule: %s)", [tool, result.message.text, result.ruleId])
}
REGO
printf '%s' "$DEFAULT_REGO" > policy/active.rego
fi
- name: Evaluate policy
run: |
Expand Down
Loading