Skip to main content

Workflow Tools

Workflow Tools are security scanners and custom scripts that run between the core pipeline stages. Click the + button between stage nodes in the workflow builder to add tools.

Workflow details with tool nodes


Available Tools

ToolStageDescription
Detect-SecretsPre-BuildScans source code for hardcoded secrets such as API keys, credentials, and passwords.
TrivyPost-BuildScans the built container image for known security vulnerabilities (CVEs).
SonarQubePost-BuildRuns code quality analysis including bugs, vulnerabilities, code smells, and quality gate checks.
Custom ScriptPre-Build, Post-Build, Post-Push, Post-DeployExecutes custom shell scripts for specialized tasks at any stage.

Pre-Build Tools

Pre-build tools run after the source code is cloned and before the Docker build begins. Click the + button next to the Source stage to add pre-build tools.

Pre-build tools panel

Detect-Secrets

Scans all files in the repository for hardcoded secrets.

FieldDescription
Enable/DisableToggle to enable or disable the scan.
Failure StrategyAbort — stop the pipeline if secrets are detected. Skip — log the results and continue the pipeline.

When secrets are detected, a report is generated and available in the Reports tab.

Pre-Build Custom Script

Run a custom shell script before the build stage.

FieldDescription
ScriptThe shell script content to execute.
CPUCPU allocation for the script container (default: 100m).
MemoryMemory allocation for the script container (default: 500 Mi).
VolumeStorage volume for the script container (default: 10 Gi).

Post-Build Tools

Post-build tools run after the Docker image is built and before it is pushed to the registry. Click the + button next to the Build stage to add post-build tools.

Post-build tools panel

Trivy

Scans the built container image for known vulnerabilities.

FieldDescription
Enable/DisableToggle to enable or disable the scan.
Max Critical VulnerabilitiesMaximum number of critical-severity CVEs allowed before triggering the failure strategy.
Max High VulnerabilitiesMaximum number of high-severity CVEs allowed before triggering the failure strategy.
Failure StrategyAbort — stop the pipeline if thresholds are exceeded. Skip — log the results and continue.

A CSV report is generated with columns: severity, CVE ID, package name, installed version, and fixed version.

SonarQube

Runs static code analysis for code quality and security.

FieldDescription
Enable/DisableToggle to enable or disable the analysis.
Failure StrategyAbort — stop the pipeline if the quality gate fails. Skip — log the results and continue.

SonarQube checks the code against a configured quality gate and reports bugs, vulnerabilities, code smells, and overall quality status.

Post-Build Custom Script

Run a custom shell script after the build stage.

FieldDescription
ScriptThe shell script content to execute.
CPUCPU allocation for the script container.
MemoryMemory allocation for the script container.
VolumeStorage volume for the script container.

Post-Push Tools

Post-push tools run after the image is pushed to the container registry and before the deploy stage. You can add a custom script at this stage.

Post-Push Custom Script

FieldDescription
ScriptThe shell script content to execute after the image is pushed.
CPUCPU allocation for the script container.
MemoryMemory allocation for the script container.
VolumeStorage volume for the script container.

Post-Deploy Tools

Post-deploy tools run after the application is deployed to the target environment. Click the + button next to the Deploy stage to add post-deploy tools.

Post-deploy tools panel

Post-Deploy Custom Script

Run a custom script after deployment — commonly used for database migrations, cache warming, or smoke tests.

FieldDescription
EnvironmentThe active environment where the post-deploy script will execute.
Container TypeThe container image used to run the script (see table below).
ScriptThe shell script content to execute.

Container Types

Select the runtime environment for the post-deploy script:

TypeImageUse Case
ApplicationUses the deployed application's own imageRun scripts that require the application runtime.
Ubuntuubuntu:22.04General-purpose scripts.
Alpinealpine:latestLightweight scripts.
Pythonpython:3.9-slimPython-based scripts and migrations.
Nodenode:18-alpineNode.js scripts.
Golanggolang:1.19-alpineGo-based scripts.
Javaopenjdk:17-alpineJava-based scripts.
PHPphp:8.1-cli-alpinePHP scripts.
PostgreSQLpostgres:14Database operations.
Redisredis:7-alpineRedis operations.
Nginxnginx:alpineWeb server configuration scripts.
CustomUser-specified imageProvide a custom container image URL.
info

Post-deploy scripts run as Kubernetes Jobs in the target environment's namespace. Jobs are automatically cleaned up 1 hour after completion.


Failure Strategies

All tools support a failure strategy that determines what happens when the tool reports an issue:

StrategyBehavior
AbortThe pipeline stops immediately. Subsequent stages are not executed. The execution status is set to Failed.
SkipThe tool's results are logged but the pipeline continues to the next stage.