Skip to content

Commit 561f140

Browse files
author
Michael Long
committed
testing CSV with no vulns
1 parent 3aa7bb2 commit 561f140

File tree

2 files changed

+41
-4
lines changed

2 files changed

+41
-4
lines changed

.github/workflows/test_containers.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -35,12 +35,12 @@ jobs:
3535
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.3
3636
with:
3737
artifact_type: 'container'
38-
artifact_path: 'alpine:latest'
38+
artifact_path: 'ubuntu:14.04'
3939
display_vulnerability_findings: "enabled"
40-
sbomgen_version: "1.4.0"
40+
sbomgen_version: "1.3.1"
4141

42-
- name: Display scan results (CSV)
43-
run: cat ${{ steps.inspector.outputs.inspector_scan_results_csv }}
42+
- name: Display scan results
43+
run: cat ${{ steps.inspector.outputs.inspector_scan_results }}
4444

4545
- name: Validate scan content
4646
run: python3 validator/validate_inspector_scan.py --file ${{ steps.inspector.outputs.inspector_scan_results }}
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
name: Test CSV no vulns
2+
3+
on:
4+
push:
5+
branches: #
6+
- '*'
7+
8+
jobs:
9+
daily_job:
10+
runs-on: ubuntu-latest
11+
environment:
12+
name: plugin-development
13+
14+
steps:
15+
16+
- name: Checkout this repository
17+
uses: actions/checkout@v4
18+
19+
- name: Configure AWS credentials
20+
uses: aws-actions/configure-aws-credentials@v4
21+
with:
22+
aws-region: ${{ secrets.AWS_REGION }}
23+
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
24+
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
25+
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
26+
27+
- name: Test container scan
28+
id: inspector
29+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.3
30+
with:
31+
artifact_type: 'container'
32+
artifact_path: 'alpine:latest'
33+
display_vulnerability_findings: "enabled"
34+
sbomgen_version: "latest"
35+
36+
- name: Display scan results
37+
run: cat ${{ steps.inspector.outputs.inspector_scan_results_csv }}

0 commit comments

Comments
 (0)