Skip to content

Commit d30e74d

Browse files
committed
Add GitHub workflow to generate SBOM with OWASP dep-scan
Signed-off-by: tdruez <[email protected]>
1 parent 8a4708d commit d30e74d

File tree

1 file changed

+43
-0
lines changed

1 file changed

+43
-0
lines changed
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
name: Generate SBOM with OWASP dep-scan and load into ScanCode.io
2+
3+
on:
4+
workflow_dispatch:
5+
pull_request:
6+
push:
7+
branches:
8+
- main
9+
permissions:
10+
contents: read
11+
12+
env:
13+
IMAGE_REFERENCE: "python:3.13.0-slim"
14+
15+
jobs:
16+
generate-and-load-sbom:
17+
runs-on: ubuntu-24.04
18+
steps:
19+
- name: Generate SBOM with OWASP dep-scan
20+
run: |
21+
docker run --rm -v $PWD:/app \
22+
ghcr.io/owasp-dep-scan/dep-scan depscan \
23+
--src ${{ env.IMAGE_REFERENCE }} \
24+
--reports-dir /app/reports \
25+
--report-name depscan-sbom.cdx.json
26+
27+
- name: Upload SBOM as GitHub Artifact
28+
uses: actions/upload-artifact@v4
29+
with:
30+
name: depscan-sbom
31+
path: "$PWD/reports/depscan-sbom.cdx.json"
32+
retention-days: 20
33+
34+
# - name: Import SBOM into ScanCode.io
35+
# uses: aboutcode-org/scancode-action@main
36+
# with:
37+
# pipelines: "load_sbom"
38+
# inputs-path: "depscan-sbom.cdx.json"
39+
#
40+
# - name: Verify SBOM Analysis Results in ScanCode.io
41+
# shell: bash
42+
# run: |
43+
# scanpipe shell --command "from scanpipe.models import DiscoveredPackage, DiscoveredDependency; package_manager = DiscoveredPackage.objects; assert package_manager.count() > 340; assert package_manager.vulnerable().count() == 0; assert DiscoveredDependency.objects.count() == 0"

0 commit comments

Comments
 (0)