Skip to content

Added failover

Added failover #32

# This workflow locates REST API file contracts
# (Swagger or OpenAPI format, v2 and v3, JSON and YAML)
# and runs 200+ security checks on them using 42Crunch Security Audit technology.
#
# Documentation is located here: https://docs.42crunch.com/latest/content/tasks/integrate_github_actions.htm
#
# To use this workflow, you will need to complete the following setup steps.
#
# 1. Create a free 42Crunch account at https://platform.42crunch.com/register
#
# 2. Follow steps at https://docs.42crunch.com/latest/content/tasks/integrate_github_actions.htm
# to create an API Token on the 42Crunch platform
#
# 3. Add a secret in GitHub as explained in https://docs.42crunch.com/latest/content/tasks/integrate_github_actions.htm,
# store the 42Crunch API Token in that secret, and supply the secret's name as api-token parameter in this workflow
#
# If you have any questions or need help contact https://support.42crunch.com
name: "42Crunch REST API Static Security Testing"
# follow standard Code Scanning triggers
on:
push:
branches: [ main, mainv1 ]
pull_request:
# The branches below must be a subset of the branches above
branches: [ main ]
schedule:
- cron: '43 8 * * 5'
jobs:
api_audit_job:
runs-on: ubuntu-latest
name: Audit OpenAPI files
steps:
...

Check failure on line 36 in .github/workflows/crunch42-analysis.yml

View workflow run for this annotation

GitHub Actions / .github/workflows/crunch42-analysis.yml

Invalid workflow file

You have an error in your yaml syntax on line 36
- uses: 42Crunch/api-security-audit-action@v2
with:
api-token: ${{ secrets.API_TOKEN }}
min-score: 85
log-level: DEBUG
share-everyone: READ_ONLY
upload-to-code-scanning: true