Generate SBOM with SBOM tool and load into ScanCode.io #22
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Generate SBOM with SBOM tool and load into ScanCode.io | |
# This workflow: | |
# 1. Generates a CycloneDX SBOM for a container image using SBOM tool. | |
# 2. Uploads the SBOM as a GitHub artifact for future inspection. | |
# 3. Loads the SBOM into ScanCode.io for further analysis. | |
# 4. Runs assertions to verify that the SBOM was properly processed in ScanCode.io. | |
# | |
# It runs on demand, and once a week (scheduled). | |
on: | |
workflow_dispatch: | |
schedule: | |
# Run once a week (every 7 days) at 00:00 UTC on Sunday | |
- cron: "0 0 * * 0" | |
permissions: | |
contents: read | |
env: | |
IMAGE_REFERENCE: "python:3.13.0-slim" | |
jobs: | |
generate-and-load-sbom: | |
runs-on: ubuntu-24.04 | |
steps: | |
- name: Download SBOM tool | |
run: | | |
curl -Lo $RUNNER_TEMP/sbom-tool https://github.com/microsoft/sbom-tool/releases/latest/download/sbom-tool-linux-x64 | |
chmod +x $RUNNER_TEMP/sbom-tool | |
- name: Generate SBOM with SBOM tool | |
run: | | |
mkdir -p sbom-output | |
$RUNNER_TEMP/sbom-tool generate \ | |
-di ${{ env.IMAGE_REFERENCE }} \ | |
-pn DockerImage \ | |
-pv 1.0.0 \ | |
-ps Company \ | |
-nsb https://sbom.company.com \ | |
-m sbom-output \ | |
-V Verbose | |
- name: Upload SBOM artifact | |
uses: actions/upload-artifact@v4 | |
with: | |
name: sbom-output | |
path: sbom-output | |
- name: Import SBOM into ScanCode.io | |
uses: aboutcode-org/scancode-action@main | |
with: | |
pipelines: "load_sbom" | |
inputs-path: "sbom-output/_manifest/spdx_2.2/manifest.spdx.json" | |
scancodeio-repo-branch: "main" | |
- name: Verify SBOM Analysis Results in ScanCode.io | |
shell: bash | |
run: | | |
scanpipe shell --command "from scanpipe.models import DiscoveredPackage, DiscoveredDependency; package_manager = DiscoveredPackage.objects; assert package_manager.count() > 90; assert package_manager.vulnerable().count() == 0; assert DiscoveredDependency.objects.count() > 90" |