|
53 | 53 | medium_threshold: 1 |
54 | 54 | low_threshold: 1 |
55 | 55 | other_threshold: 1 |
56 | | - # set additional arguments as needed |
| 56 | + |
| 57 | + # The following steps illustrate how to |
| 58 | + # display scan results in the GitHub Actions job terminal. |
| 59 | + - name: Display CycloneDX SBOM (JSON) |
| 60 | + run: cat ${{ steps.inspector.outputs.artifact_sbom }} |
| 61 | + |
| 62 | + - name: Display Inspector vulnerability scan results (JSON) |
| 63 | + run: cat ${{ steps.inspector.outputs.inspector_scan_results }} |
| 64 | + |
| 65 | + - name: Display Inspector vulnerability scan results (CSV) |
| 66 | + run: cat ${{ steps.inspector.outputs.inspector_scan_results_csv }} |
| 67 | + |
| 68 | + - name: Display Inspector vulnerability scan results (Markdown) |
| 69 | + run: cat ${{ steps.inspector.outputs.inspector_scan_results_markdown }} |
| 70 | + |
| 71 | + |
| 72 | + # The following steps illustrate how to |
| 73 | + # upload scan results as a GitHub actions job artifact |
| 74 | + - name: Upload Scan Results |
| 75 | + uses: actions/upload-artifact@v4 |
| 76 | + with: |
| 77 | + name: Inspector Vulnerability Scan Artifacts |
| 78 | + path: | |
| 79 | + ${{ steps.inspector.outputs.inspector_scan_results }} |
| 80 | + ${{ steps.inspector.outputs.inspector_scan_results_csv }} |
| 81 | + ${{ steps.inspector.outputs.artifact_sbom }} |
| 82 | + ${{ steps.inspector.outputs.inspector_scan_results_markdown }} |
| 83 | +
|
| 84 | +
|
| 85 | + # This step illustrates how to add custom logic if |
| 86 | + # the vulnerability threshold is exceeded. This example |
| 87 | + # simply prints the 'vulnerability_threshold_exceeded' value |
| 88 | + # to the GitHub actions job terminal. |
| 89 | + # Replace 'echo' with 'exit' if you want to fail the job. |
| 90 | + - name: On vulnerability threshold exceeded |
| 91 | + run: echo ${{ steps.inspector.outputs.vulnerability_threshold_exceeded }} |
| 92 | + |
| 93 | + |
| 94 | + |
57 | 95 |
|
58 | 96 |
|
59 | 97 |
|
|
0 commit comments