|
| 1 | +name: Test CSV no vulns |
| 2 | + |
| 3 | +on: |
| 4 | + push: |
| 5 | + branches: # |
| 6 | + - '*' |
| 7 | + |
| 8 | +jobs: |
| 9 | + daily_job: |
| 10 | + runs-on: ubuntu-latest |
| 11 | + environment: |
| 12 | + name: plugin-development |
| 13 | + |
| 14 | + steps: |
| 15 | + |
| 16 | + - name: Checkout this repository |
| 17 | + uses: actions/checkout@v4 |
| 18 | + |
| 19 | + - name: Configure AWS credentials |
| 20 | + uses: aws-actions/configure-aws-credentials@v4 |
| 21 | + with: |
| 22 | + aws-region: ${{ secrets.AWS_REGION }} |
| 23 | + aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} |
| 24 | + aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} |
| 25 | + role-to-assume: ${{ secrets.AWS_IAM_ROLE }} |
| 26 | + |
| 27 | + - name: Test container scan |
| 28 | + id: inspector |
| 29 | + uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.3.0 |
| 30 | + with: |
| 31 | + artifact_type: 'container' |
| 32 | + artifact_path: 'alpine:latest' |
| 33 | + display_vulnerability_findings: "enabled" |
| 34 | + sbomgen_version: "latest" |
| 35 | + |
| 36 | + - name: Display scan results |
| 37 | + run: cat ${{ steps.inspector.outputs.inspector_scan_results_csv }} |
| 38 | + |
| 39 | + - name: Display scan results (JSON) |
| 40 | + run: cat ${{ steps.inspector.outputs.inspector_scan_results }} |
| 41 | + |
| 42 | + - name: Display package vulns (CSV) |
| 43 | + run: cat ${{ steps.inspector.outputs.inspector_scan_results_csv }} |
| 44 | + |
| 45 | + - name: Display package vulns (MD) |
| 46 | + run: cat ${{ steps.inspector.outputs.inspector_scan_results_markdown }} |
| 47 | + |
| 48 | + - name: Display Dockerfile vulns (CSV) |
| 49 | + run: cat ${{ steps.inspector.outputs.inspector_dockerfile_scan_results_csv }} |
| 50 | + |
| 51 | + - name: Display Dockerfile vulns (MD) |
| 52 | + run: cat ${{ steps.inspector.outputs.inspector_dockerfile_scan_results_markdown }} |
0 commit comments