Fortinet black logo

GitHub Actions

GitHub Actions

Following is a sample code segment that can be configured in main.yml file.

Note: Make sure to update the parameters in the sample code according to your environment before using it.

name: FortiDAST Proxy Server
on:
  push:
   branches: [ main ]
  pull_request:
   branches: [ main ]
jobs:
  build:
   runs-on: self-hosted
   steps:
   - uses: actions/checkout@v2
   - name: FPT_PROXY_SERVER
     run: |
        export EMAIL=account_email LICENSE_SERIAL=your_serial_number ASSET_TOKEN=your_asset_token SCANURL=target_asset_url SCANTYPE=1 ASSET=asset_UUID
        env | grep -E "EMAIL|LICENSE_SERIAL|ASSET_TOKEN|SCANURL|SCANTYPE|ASSET" > /tmp/env
        docker pull registry.fortidast.forticloud.com/dastdevopsproxy:latest
        docker run --rm --env-file /tmp/env --network=host registry.fortidast.forticloud.com/dastdevopsproxy:latest

GitHub Actions

Following is a sample code segment that can be configured in main.yml file.

Note: Make sure to update the parameters in the sample code according to your environment before using it.

name: FortiDAST Proxy Server
on:
  push:
   branches: [ main ]
  pull_request:
   branches: [ main ]
jobs:
  build:
   runs-on: self-hosted
   steps:
   - uses: actions/checkout@v2
   - name: FPT_PROXY_SERVER
     run: |
        export EMAIL=account_email LICENSE_SERIAL=your_serial_number ASSET_TOKEN=your_asset_token SCANURL=target_asset_url SCANTYPE=1 ASSET=asset_UUID
        env | grep -E "EMAIL|LICENSE_SERIAL|ASSET_TOKEN|SCANURL|SCANTYPE|ASSET" > /tmp/env
        docker pull registry.fortidast.forticloud.com/dastdevopsproxy:latest
        docker run --rm --env-file /tmp/env --network=host registry.fortidast.forticloud.com/dastdevopsproxy:latest