Skip to content

🌱 Use OSV-Scanner release binary and Reporter action workflow instead of pointing to a file #47

🌱 Use OSV-Scanner release binary and Reporter action workflow instead of pointing to a file

🌱 Use OSV-Scanner release binary and Reporter action workflow instead of pointing to a file #47

# This file is adapted from https://github.com/google/osv-scanner
name: OSV-Scanner Scan
on:
schedule:
- cron: "12 12 * * 1"
pull_request:
branches: [ main ]
# Restrict jobs in this workflow to have no permissions by default; permissions
# should be granted per job as needed using a dedicated `permissions` block
permissions: {}
jobs:
scan-scheduled:
permissions:
actions: read
contents: read # to fetch code (actions/checkout)
security-events: write # for uploading SARIF files
### Condition temporarily removed for testing
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
- name: Calculate go version
id: vars
run: echo "go_version=$(make go-version)" >> $GITHUB_OUTPUT
- name: Set up Go
uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
with:
go-version: ${{ steps.vars.outputs.go_version }}
- name: Debug Container Context
run: |
cat /proc/1/cgroup
cat /etc/os-release
env | grep CONTAINER
- name: Run OSV Scanner
uses: google/osv-scanner/actions/scanner@b13f37e1a1e4cb98556c1d34cd3256a876929be1 # v1.9.1
with:
scan-args: |-
--output=results.json
--format=json
-r
--skip-git
./
env:
GOROOT: /opt/hostedtoolcache/go/${{ steps.vars.outputs.go_version }}/x64

Check failure on line 48 in .github/workflows/osv-scanner-scan.yml

View workflow run for this annotation

GitHub Actions / OSV-Scanner Scan

Invalid workflow file

The workflow is not valid. .github/workflows/osv-scanner-scan.yml (Line: 48, Col: 13): A mapping was not expected
PATH: /opt/hostedtoolcache/go/${{ steps.vars.outputs.go_version }}/x64/bin:$PATH
- name: "Run osv-scanner-reporter"
uses: google/osv-scanner/actions/reporter@b13f37e1a1e4cb98556c1d34cd3256a876929be1 # v1.9.1
with:
scan-args: |-
--output=results.sarif
--new=results.json
--gh-annotations=false
- name: Upload SARIF file
uses: github/codeql-action/upload-sarif@v2
with:
sarif_file: results.sarif