Commit 22804559 authored by Philippe Lafoucrière's avatar Philippe Lafoucrière Committed by Achilleas Pipinellis

Make the usage of our templates consistent

parent 95296bae
......@@ -85,7 +85,7 @@ Add the following to your `.gitlab-ci.yml` file:
```yaml
include:
template: Container-Scanning.gitlab-ci.yml
- template: Container-Scanning.gitlab-ci.yml
```
The included template will:
......
......@@ -71,7 +71,7 @@ Add the following to your `.gitlab-ci.yml` file:
```yaml
include:
template: DAST.gitlab-ci.yml
- template: DAST.gitlab-ci.yml
variables:
DAST_WEBSITE: https://example.com
......@@ -111,7 +111,7 @@ It's also possible to authenticate the user before performing the DAST checks:
```yaml
include:
template: DAST.gitlab-ci.yml
- template: DAST.gitlab-ci.yml
variables:
DAST_WEBSITE: https://example.com
......@@ -135,7 +135,7 @@ includes both passive and active scanning against the same target website:
```yaml
include:
template: DAST.gitlab-ci.yml
- template: DAST.gitlab-ci.yml
variables:
DAST_FULL_SCAN_ENABLED: "true"
......@@ -151,7 +151,7 @@ Domain validation is not required by default. It can be required by setting the
```yaml
include:
template: DAST.gitlab-ci.yml
- template: DAST.gitlab-ci.yml
variables:
DAST_FULL_SCAN_ENABLED: "true"
......@@ -260,7 +260,7 @@ For example:
```yaml
include:
template: DAST.gitlab-ci.yml
- template: DAST.gitlab-ci.yml
variables:
DAST_WEBSITE: https://example.com
......@@ -278,7 +278,7 @@ template inclusion and specify any additional keys under it. For example:
```yaml
include:
template: DAST.gitlab-ci.yml
- template: DAST.gitlab-ci.yml
dast:
stage: dast # IMPORTANT: don't forget to add this
......@@ -447,7 +447,7 @@ for DAST by overwriting the `script` key in the DAST template:
```yaml
include:
template: DAST.gitlab-ci.yml
- template: DAST.gitlab-ci.yml
dast:
script:
......
......@@ -79,7 +79,7 @@ Add the following to your `.gitlab-ci.yml` file:
```yaml
include:
template: Dependency-Scanning.gitlab-ci.yml
- template: Dependency-Scanning.gitlab-ci.yml
```
The included template will create a `dependency_scanning` job in your CI/CD
......@@ -99,7 +99,7 @@ For example:
```yaml
include:
template: Dependency-Scanning.gitlab-ci.yml
- template: Dependency-Scanning.gitlab-ci.yml
variables:
DS_PYTHON_VERSION: 2
......@@ -116,7 +116,7 @@ after the template inclusion and specify any additional keys under it. For examp
```yaml
include:
template: Dependency-Scanning.gitlab-ci.yml
- template: Dependency-Scanning.gitlab-ci.yml
dependency_scanning:
variables:
......@@ -187,7 +187,7 @@ This does not require running the executor in privileged mode. For example:
```yaml
include:
template: Dependency-Scanning.gitlab-ci.yml
- template: Dependency-Scanning.gitlab-ci.yml
variables:
DS_DISABLE_DIND: "true"
......
......@@ -88,7 +88,7 @@ Add the following to your `.gitlab-ci.yml` file:
```yaml
include:
template: License-Scanning.gitlab-ci.yml
- template: License-Scanning.gitlab-ci.yml
```
The included template will create a `license_scanning` job in your CI/CD pipeline
......@@ -141,7 +141,7 @@ For example:
```yaml
include:
template: License-Scanning.gitlab-ci.yml
- template: License-Scanning.gitlab-ci.yml
variables:
LICENSE_MANAGEMENT_SETUP_CMD: sh my-custom-install-script.sh
......@@ -158,7 +158,7 @@ after the template inclusion and specify any additional keys under it. For examp
```yaml
include:
template: License-Scanning.gitlab-ci.yml
- template: License-Scanning.gitlab-ci.yml
license_scanning:
variables:
......@@ -173,7 +173,7 @@ Feel free to use it for the customization of Maven execution. For example:
```yaml
include:
template: License-Scanning.gitlab-ci.yml
- template: License-Scanning.gitlab-ci.yml
license_scanning:
variables:
......@@ -201,7 +201,7 @@ by setting the `LM_PYTHON_VERSION` environment variable to `2`.
```yaml
include:
template: License-Scanning.gitlab-ci.yml
- template: License-Scanning.gitlab-ci.yml
license_scanning:
variables:
......@@ -223,7 +223,7 @@ For example, the following `.gitlab-ci.yml`:
```yaml
include:
template: License-Management.gitlab-ci.yml
- template: License-Management.gitlab-ci.yml
license_management:
artifacts:
......@@ -235,7 +235,7 @@ Should be changed to:
```yaml
include:
template: License-Scanning.gitlab-ci.yml
- template: License-Scanning.gitlab-ci.yml
license_scanning:
artifacts:
......
......@@ -49,7 +49,7 @@ In `.gitlab-ci.yml` define:
```yaml
include:
template: SAST.gitlab-ci.yml
- template: SAST.gitlab-ci.yml
variables:
SAST_ANALYZER_IMAGE_PREFIX: my-docker-registry/gl-images
......@@ -66,7 +66,7 @@ In `.gitlab-ci.yml` define:
```yaml
include:
template: SAST.gitlab-ci.yml
- template: SAST.gitlab-ci.yml
variables:
SAST_DEFAULT_ANALYZERS: "bandit,flawfinder"
......@@ -82,7 +82,7 @@ default analyzers. In `.gitlab-ci.yml` define:
```yaml
include:
template: SAST.gitlab-ci.yml
- template: SAST.gitlab-ci.yml
variables:
SAST_DEFAULT_ANALYZERS: ""
......@@ -98,7 +98,7 @@ In `.gitlab-ci.yml` define:
```yaml
include:
template: SAST.gitlab-ci.yml
- template: SAST.gitlab-ci.yml
variables:
SAST_ANALYZER_IMAGES: "my-docker-registry/analyzers/csharp,amy-docker-registry/analyzers/perl"
......
......@@ -225,7 +225,7 @@ stages:
- test
include:
template: SAST.gitlab-ci.yml
- template: SAST.gitlab-ci.yml
variables:
SAST_DISABLE_DIND: "true"
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment