Skip to content

Commit ae0421a

Browse files
bluesentinelsecMichael Long
andauthored
WIP: v1.1.0 bug fixes (#54)
* update workflow definitions to v1.1.0 * Handle non-existing files in step summary * add try-except to file write * Debugging * log.error to info since GHA treats err as failure --------- Co-authored-by: Michael Long <[email protected]>
1 parent a18de02 commit ae0421a

12 files changed

+38
-26
lines changed

.github/workflows/build_scan_container.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ jobs:
4747
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
4848

4949
- name: Scan built image with Inspector
50-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@test_sbomgen_1.2.0-beta
50+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.0
5151
id: inspector
5252
with:
5353
artifact_type: 'container'
@@ -63,7 +63,7 @@ jobs:
6363
medium_threshold: 1
6464
low_threshold: 1
6565
other_threshold: 1
66-
sbomgen_version: "1.2.0-beta"
66+
sbomgen_version: "latest"
6767

6868
- name: Demonstrate SBOM Output (JSON)
6969
run: cat ${{ steps.inspector.outputs.artifact_sbom }}

.github/workflows/example_display_findings.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ jobs:
2929
# modify this block to scan your intended artifact
3030
- name: Inspector Scan
3131
id: inspector
32-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.0.0
32+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.0
3333
with:
3434
# change artifact_type to either 'repository', 'container', 'binary', or 'archive'.
3535
# this example scans a container image
@@ -54,7 +54,7 @@ jobs:
5454
medium_threshold: 1
5555
low_threshold: 1
5656
other_threshold: 1
57-
sbomgen_version: "1.2.0-beta"
57+
sbomgen_version: "latest"
5858

5959
# Additional input arguments are available.
6060
# See 'action.yml' for additional input/output options.

.github/workflows/test_archive.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,12 +32,12 @@ jobs:
3232

3333
- name: Test archive scan
3434
id: inspector
35-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@main
35+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.0
3636
with:
3737
artifact_type: 'archive'
3838
artifact_path: 'entrypoint/tests/test_data/artifacts/archives/testData.zip'
3939
display_vulnerability_findings: "enabled"
40-
sbomgen_version: "1.2.0-beta"
40+
sbomgen_version: "latest"
4141

4242
- name: Display scan results
4343
run: cat ${{ steps.inspector.outputs.inspector_scan_results }}

.github/workflows/test_binary.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,12 +32,12 @@ jobs:
3232

3333
- name: Test binary scan
3434
id: inspector
35-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@main
35+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.0
3636
with:
3737
artifact_type: 'binary'
3838
artifact_path: 'entrypoint/tests/test_data/artifacts/binaries/inspector-sbomgen'
3939
display_vulnerability_findings: "enabled"
40-
sbomgen_version: "1.2.0-beta"
40+
sbomgen_version: "latest"
4141

4242
- name: Display scan results
4343
run: cat ${{ steps.inspector.outputs.inspector_scan_results }}

.github/workflows/test_containers.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,12 +32,12 @@ jobs:
3232

3333
- name: Test container scan
3434
id: inspector
35-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@main
35+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.0
3636
with:
3737
artifact_type: 'container'
3838
artifact_path: 'ubuntu:14.04'
3939
display_vulnerability_findings: "enabled"
40-
sbomgen_version: "1.2.0-beta"
40+
sbomgen_version: "latest"
4141

4242
- name: Display scan results
4343
run: cat ${{ steps.inspector.outputs.inspector_scan_results }}

.github/workflows/test_dockerfile_vulns.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,12 +31,12 @@ jobs:
3131

3232
- name: Scan Dockerfiles
3333
id: inspector
34-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@test_sbomgen_1.2.0-beta
34+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.0
3535
with:
3636
artifact_type: 'repository'
3737
artifact_path: './'
3838
display_vulnerability_findings: "enabled"
39-
sbomgen_version: "1.2.0-beta"
39+
sbomgen_version: "latest"
4040

4141
- name: Display scan results (JSON)
4242
run: cat ${{ steps.inspector.outputs.inspector_scan_results }}

.github/workflows/test_installation.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,12 +28,12 @@ jobs:
2828
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
2929

3030
- name: Test Amazon Inspector GitHub Actions plugin
31-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@main
31+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.0
3232
with:
3333
artifact_type: 'container'
3434
artifact_path: 'alpine:latest'
3535
display_vulnerability_findings: "enabled"
36-
sbomgen_version: "1.2.0-beta"
36+
sbomgen_version: "latest"
3737

3838
# only run if the previous step failed
3939
- name: Notify maintainers of installation failure

.github/workflows/test_no_vulns.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ jobs:
2828

2929
- name: Test binary scan
3030
id: inspector
31-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@test_sbomgen_1.2.0-beta
31+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.0
3232
with:
3333
artifact_type: 'binary'
3434
artifact_path: 'entrypoint/tests/test_data/artifacts/binaries/test_go_binary'
@@ -38,7 +38,7 @@ jobs:
3838
output_inspector_scan_path_csv: 'inspector_pkg_scan.csv'
3939
output_inspector_dockerfile_scan_path_csv: 'inspector_dockerfile_scan.csv'
4040
output_inspector_dockerfile_scan_path_markdown: 'inspector_dockerfile_scan.md'
41-
sbomgen_version: "1.2.0-beta"
41+
sbomgen_version: "latest"
4242

4343
- name: Demonstrate Upload Scan Results
4444
uses: actions/upload-artifact@v4

.github/workflows/test_repository.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,12 +31,12 @@ jobs:
3131

3232
- name: Test repository scan
3333
id: inspector
34-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@main
34+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.0
3535
with:
3636
artifact_type: 'repository'
3737
artifact_path: './'
3838
display_vulnerability_findings: "enabled"
39-
sbomgen_version: "1.2.0-beta"
39+
sbomgen_version: "latest"
4040

4141
- name: Display scan results
4242
run: cat ${{ steps.inspector.outputs.inspector_scan_results }}

.github/workflows/test_vuln_thresholds.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ jobs:
3030
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
3131

3232
- name: Scan artifact with Inspector
33-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@main
33+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.0
3434
id: inspector
3535
with:
3636
artifact_type: 'archive'
@@ -44,7 +44,7 @@ jobs:
4444
medium_threshold: 1
4545
low_threshold: 1
4646
other_threshold: 1
47-
sbomgen_version: "1.2.0-beta"
47+
sbomgen_version: "latest"
4848

4949
- name: Fail if vulnerability threshold is exceeded
5050
run: if [[ ${{ steps.inspector.outputs.vulnerability_threshold_exceeded }} != "1" ]]; then echo "test failed"; else echo "test passed"; fi

0 commit comments

Comments
 (0)