The command line interface for Anchore.
Step Module Reference
Executes a Red Hat Ansible playbook.
Deploys an Azure Resource Manager template to Microsoft Azure.
Stops pipeline execution with Failed status if the assertion expression evaluates to false.
Executes AWS CLI commands to manage AWS resources.
Creates a stack from a CloudFormation template on Amazon Web Services (AWS).
Executes Azure CLI commands.
Executes the Bridgecrew Checkov IaC static code analysis tool. Checkov can scan Terraform, CloudFormation, Kubernetes, and other IaC files for security vulnerabilities and misconfigurations.
Compares the configuration of a target system to CIS Benchmark recommendations and reports conformance on a scale of 0-100
Skips execution of all child steps of this step, according to a condition.
Creates a credential dynamically within a pipeline run. This module is useful for importing credentials from external systems, such as key stores, vaults, and CMDBs.
Prints a message to the pipeline run events. Useful for debugging variable values during execution.
Builds a container image and optionally pushes it to a registry using Docker. This module uses the Docker Buildx plugin to enable advanced build scenarios, and automatically authenticates with a Docker registry.
Deploys resources to Google Cloud Platform using Deployment Manager templates.
Clones a git repository onto the runner.
Executes a Go program.
Deploys a Helm chart to an existing Kubernetes cluster.
Execute Helm commands using a shell script.
Sends an HTTP request.
Installs the Anchore CLI on the runner.
Installs Red Hat Ansible on the runner.
Installs the AWS CLI executable on the runner.
Installs the Azure CLI executable on the runner.
Installs the Bridgecrew Checkov CLI on the runner.
Installs the CIS-CAT Assessor
Installs the Google gcloud executable on the runner.
Installs the Golang runtime on the runner.
Installs the Helm CLI on the runner.
Installs the Java executable on the runner.
Installs the Kubernetes kubectl executable on the runner.
Installs the Node.js executable on the runner.
Installs the PowerShell executable on the runner.
Installs the Python executable on the runner.
Installs the SonarScanner CLI on the runner.
Installs the HashiCorp Terraform executable on the runner.
Installs Terrascan on the runner.
Installs Trivy on the runner.
Installs twistcli on the runner.
Installs the HashiCorp Vault CLI executable on the runner.
Installs the ZAProxy CLI on the runner.
Modify resources on a Kubernetes cluster using the kubectl CLI.
Executes a Node.js script.
OpenSCAP is a command line utility for working with the Security Content Automation Protocol (SCAP).
Pauses pipeline execution for a specified duration.
Executes a PowerShell script.
Executes a Python script.
Creates or deletes a Resource Group on Microsoft Azure.
Adds a set of variables to the current
Executes a shell script.
SonarScanner performs vulnerability scanning and automated code review on source code, and uploads the results to a SonarQube server for analysis.
Operates on a Terraform project. Can validate, plan, and apply Terraform configurations.
Terrascan detects security vulnerabilities and compliance violations across your Infrastructure as Code.
Trivy is a simple and comprehensive vulnerability scanner for containers and other artifacts.
The command line interface for Prisma Cloud.
Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault handles leasing, key revocation, key rolling, auditing, and provides secrets as a service through a unified API.
Writes content to a file on the runner.