@@ -880,12 +880,11 @@ jobs:
880
880
if : github.event_name == 'push'
881
881
uses :
advanced-security/spdx-dependency-submission-action@5530bab9ee4bbe66420ce8280624036c77f89746 # ratchet:advanced-security/[email protected]
882
882
883
- vendor-analysis :
884
- name : Vendor Vulnerability Scanning
883
+ extract-deps :
884
+ name : Extract Dependencies
885
885
runs-on : ubuntu-latest
886
886
needs :
887
- - pack
888
-
887
+ - pack
889
888
steps :
890
889
-
uses :
actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # ratchet:actions/[email protected]
891
890
- uses : ./.github/actions/build-base-image
@@ -898,6 +897,49 @@ jobs:
898
897
docker run -v $PWD/:/github -v $HOME:$HOME otp \
899
898
"/github/.github/scripts/otp-compliance.es sbom osv-scan"
900
899
900
+ - name : " upload osv-scanner deps" # Upload the deps
901
+ uses : actions/upload-artifact@v4
902
+ with :
903
+ name : converted-OSV-Scanner-deps
904
+ path : osv-scanner.json
905
+ retention-days : 2
906
+
907
+ scan-pr :
908
+ # run-scheduled-scan triggers this job
909
+ # PRs and pushes trigger this job
910
+ needs : extract-deps
911
+ permissions :
912
+ # Require writing security events to upload SARIF file to security tab
913
+ security-events : write
914
+ # Required to upload SARIF file to CodeQL.
915
+ # See: https://github.com/github/codeql-action/issues/2117
916
+ actions : read
917
+ contents : read
918
+ uses :
" google/osv-scanner-action/.github/workflows/osv-scanner-reusable.yml@6fc714450122bda9d00e4ad5d639ad6a39eedb1f" # ratchet:google/osv-scanner-action/.github/workflows/[email protected]
919
+ with :
920
+ download-artifact : converted-OSV-Scanner-deps
921
+ upload-sarif : ${{ github.repository == 'erlang/otp' }}
922
+ scan-args : |-
923
+ --lockfile=osv-scanner:osv-scanner.json
924
+
925
+ # vendor-analysis:
926
+ # name: Vendor Vulnerability Scanning
927
+ # runs-on: ubuntu-latest
928
+ # needs:
929
+ # - pack
930
+
931
+ # steps:
932
+ # - uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # ratchet:actions/[email protected]
933
+ # - uses: ./.github/actions/build-base-image
934
+ # with:
935
+ # BASE_BRANCH: ${{ env.BASE_BRANCH }}
936
+
937
+ # # check that PRs do not introduce vulnerabilities in vendor dependencies
938
+ # - name: 'Vendor Vulnerability Scanning'
939
+ # run: |
940
+ # docker run -v $PWD/:/github -v $HOME:$HOME otp \
941
+ # "/github/.github/scripts/otp-compliance.es sbom osv-scan"
942
+
901
943
# # If this is an "OTP-*" tag that has been pushed we do some release work
902
944
release :
903
945
name : Release Erlang/OTP
0 commit comments