Skip to content

Commit 69133a5

Browse files
committed
move stuff around
1 parent ebd9baa commit 69133a5

File tree

1 file changed

+44
-42
lines changed

1 file changed

+44
-42
lines changed

.github/workflows/main.yaml

+44-42
Original file line numberDiff line numberDiff line change
@@ -425,6 +425,50 @@ jobs:
425425
docker run otp "erl ${OPTION} -noshell -s init stop"
426426
done
427427
428+
extract-deps:
429+
name: Extract Dependencies
430+
runs-on: ubuntu-latest
431+
needs:
432+
- pack
433+
steps:
434+
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # ratchet:actions/[email protected]
435+
- uses: ./.github/actions/build-base-image
436+
with:
437+
BASE_BRANCH: ${{ env.BASE_BRANCH }}
438+
439+
# check that PRs do not introduce vulnerabilities in vendor dependencies
440+
- name: 'Vendor Vulnerability Scanning'
441+
run: |
442+
docker run -v $PWD/:/github -v $HOME:$HOME otp \
443+
"/github/.github/scripts/otp-compliance.es sbom osv-scan"
444+
445+
# Upload the deps
446+
- name: "upload osv-scanner deps"
447+
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # ratchet:actions/[email protected]
448+
with:
449+
name: converted-OSV-Scanner-deps
450+
path: $PWD/osv-scanner.json
451+
retention-days: 2
452+
453+
scan-pr:
454+
# run-scheduled-scan triggers this job
455+
# PRs and pushes trigger this job
456+
needs: extract-deps
457+
permissions:
458+
# Require writing security events to upload SARIF file to security tab
459+
security-events: write
460+
# Required to upload SARIF file to CodeQL.
461+
# See: https://github.com/github/codeql-action/issues/2117
462+
actions: read
463+
contents: read
464+
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@6fc714450122bda9d00e4ad5d639ad6a39eedb1f" # ratchet:google/osv-scanner-action/.github/workflows/[email protected]
465+
with:
466+
download-artifact: converted-OSV-Scanner-deps
467+
upload-sarif: ${{ github.repository == 'erlang/otp' }}
468+
scan-args: |-
469+
--lockfile=osv-scanner:osv-scanner.json
470+
471+
428472
build:
429473
name: Build Erlang/OTP
430474
runs-on: ubuntu-latest
@@ -880,48 +924,6 @@ jobs:
880924
if: github.event_name == 'push'
881925
uses: advanced-security/spdx-dependency-submission-action@5530bab9ee4bbe66420ce8280624036c77f89746 # ratchet:advanced-security/[email protected]
882926

883-
extract-deps:
884-
name: Extract Dependencies
885-
runs-on: ubuntu-latest
886-
needs:
887-
- pack
888-
steps:
889-
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # ratchet:actions/[email protected]
890-
- uses: ./.github/actions/build-base-image
891-
with:
892-
BASE_BRANCH: ${{ env.BASE_BRANCH }}
893-
894-
# check that PRs do not introduce vulnerabilities in vendor dependencies
895-
- name: 'Vendor Vulnerability Scanning'
896-
run: |
897-
docker run -v $PWD/:/github -v $HOME:$HOME otp \
898-
"/github/.github/scripts/otp-compliance.es sbom osv-scan"
899-
900-
- name: "upload osv-scanner deps" # Upload the deps
901-
uses: actions/upload-artifact@v4
902-
with:
903-
name: converted-OSV-Scanner-deps
904-
path: osv-scanner.json
905-
retention-days: 2
906-
907-
scan-pr:
908-
# run-scheduled-scan triggers this job
909-
# PRs and pushes trigger this job
910-
needs: extract-deps
911-
permissions:
912-
# Require writing security events to upload SARIF file to security tab
913-
security-events: write
914-
# Required to upload SARIF file to CodeQL.
915-
# See: https://github.com/github/codeql-action/issues/2117
916-
actions: read
917-
contents: read
918-
uses: "google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@6fc714450122bda9d00e4ad5d639ad6a39eedb1f" # ratchet:google/osv-scanner-action/.github/workflows/[email protected]
919-
with:
920-
download-artifact: converted-OSV-Scanner-deps
921-
upload-sarif: ${{ github.repository == 'erlang/otp' }}
922-
scan-args: |-
923-
--lockfile=osv-scanner:osv-scanner.json
924-
925927
# vendor-analysis:
926928
# name: Vendor Vulnerability Scanning
927929
# runs-on: ubuntu-latest

0 commit comments

Comments
 (0)