Skip to content

Comments

Fix blackduck sca scan getting skipped#21

Open
sandhi18 wants to merge 12 commits intomainfrom
sandhi/fix-blackduc-sca
Open

Fix blackduck sca scan getting skipped#21
sandhi18 wants to merge 12 commits intomainfrom
sandhi/fix-blackduc-sca

Conversation

@sandhi18
Copy link
Contributor

@sandhi18 sandhi18 commented Feb 16, 2026

This pull request updates several GitHub Actions workflow files to improve support for multi-language projects (especially Ruby, Go, and Erlang), enhance security scanning controls, and increase flexibility for monorepo and non-root project structures. The changes add new input parameters, improve environment setup for different languages, and refine the handling of security and SCA scans.

Key changes:

Enhanced Security Scanning Controls

  • Added a trivy-fail-on-high-critical input to .github/workflows/ci-main-pull-request.yml and a corresponding fail-on-high-critical input to .github/workflows/trivy.yml, allowing the pipeline to fail if Trivy finds HIGH or CRITICAL vulnerabilities. The Trivy workflow now conditionally fails the build based on this input. [1] [2] [3] [4]

Improved Support for Monorepo and Non-root Ruby Projects

  • Introduced a ruby-app-directory input to both the main CI and SBOM workflows, enabling specification of a subdirectory containing the Ruby Gemfile. All relevant steps (Ruby setup, bundle install, artifact upload, and BlackDuck scan) now respect this input, making the workflows compatible with monorepos or projects where the Gemfile is not in the root. [1] [2] [3] [4] [5] [6] [7]

Language-specific Environment Setup

  • Added steps to set up Erlang/OTP and rebar3 for Erlang projects, and improved Ruby setup (including disabling bundler cache and supporting directory overrides). Also added a stub for bundle in Erlang SAST scans to bypass unnecessary Ruby gem installations. [1] [2]

  • For Go projects, added steps to configure git for private Go modules using the GH_TOKEN secret. [1] [2]

Improved Flexibility for Coverity/Polaris SAST Scans

  • Updated polaris-coverity-clean-command and polaris-coverity-build-command defaults and descriptions to allow empty values for buildless analysis (e.g., Ruby, Python), increasing flexibility for language-specific SAST scans.

Workflow Robustness and Minor Fixes

  • Changed continue-on-error to false for the Black Duck Polaris scan, ensuring that the pipeline fails on scan errors.
  • Adjusted workflow dependencies to use the correct job (checkout) for SBOM generation and related steps.

These changes collectively make the CI/CD workflows more robust, modular, and suitable for complex multi-language repositories.

Signed-off-by: sandhi <sagarwal@progress.com>
Signed-off-by: sandhi <sagarwal@progress.com>
Signed-off-by: sandhi <sagarwal@progress.com>
@sandhi18 sandhi18 force-pushed the sandhi/fix-blackduc-sca branch from 0321931 to 2c287a2 Compare February 17, 2026 09:43
Signed-off-by: sandhi <sagarwal@progress.com>
Signed-off-by: sandhi <sagarwal@progress.com>
Signed-off-by: sandhi <sagarwal@progress.com>
@sandhi18 sandhi18 force-pushed the sandhi/fix-blackduc-sca branch 2 times, most recently from 7c99705 to 0a6f563 Compare February 18, 2026 05:24
Signed-off-by: sandhi <sagarwal@progress.com>
@sandhi18 sandhi18 force-pushed the sandhi/fix-blackduc-sca branch 18 times, most recently from 9c76312 to ab046cc Compare February 18, 2026 10:54
@sandhi18 sandhi18 force-pushed the sandhi/fix-blackduc-sca branch 15 times, most recently from 859a181 to 9a4164d Compare February 24, 2026 13:19
Signed-off-by: sandhi <sagarwal@progress.com>
@sandhi18 sandhi18 force-pushed the sandhi/fix-blackduc-sca branch from 9a4164d to ca2e00f Compare February 24, 2026 13:28
@sandhi18 sandhi18 force-pushed the sandhi/fix-blackduc-sca branch 10 times, most recently from da39336 to 64eac6d Compare February 24, 2026 16:04
Signed-off-by: sandhi <sagarwal@progress.com>
@sandhi18 sandhi18 force-pushed the sandhi/fix-blackduc-sca branch from 64eac6d to 8f14667 Compare February 24, 2026 16:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants