Skip to content
This repository was archived by the owner on May 24, 2025. It is now read-only.

Commit 6e3e934

Browse files
committed
Update README
1 parent 04202eb commit 6e3e934

File tree

1 file changed

+8
-15
lines changed

1 file changed

+8
-15
lines changed

README.md

Lines changed: 8 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -37,10 +37,7 @@ go install github.com/rm3l/container-scan-to-sarif@latest
3737

3838
### In GitHub Workflows
3939

40-
I plan to provide a GitHub Action that would make it even easier to integrate this in your Workflows.
41-
42-
Meanwhile, you can integrate `container-scan-to-sarif` manually in your existing Workflows, right after the execution
43-
of the Azure Container Scan Action, like so:
40+
You may want to use the following Action in your Workflows: [rm3l/container-scan-to-sarif-action](https://github.com/rm3l/container-scan-to-sarif-action), like so:
4441

4542
```yaml
4643
- name: Scan Container Image
@@ -49,24 +46,20 @@ of the Azure Container Scan Action, like so:
4946
uses: Azure/[email protected]
5047
with:
5148
image-name: my-container-image
52-
49+
5350
- name: Convert Container Scan Report to SARIF
51+
id: scan-to-sarif
52+
uses: rm3l/container-scan-to-sarif-action@v1
5453
if: ${{ always() }}
55-
env:
56-
CONTAINER_SCAN_REPORT: ${{ steps.scan.outputs.scan-report-path }}
57-
CONTAINER_SCAN_TO_SARIF_VERSION: 0.2.2
58-
run: |
59-
mkdir -p bin
60-
curl -L "https://github.com/rm3l/container-scan-to-sarif/releases/download/${CONTAINER_SCAN_TO_SARIF_VERSION}/container-scan-to-sarif_${CONTAINER_SCAN_TO_SARIF_VERSION}_Linux_x86_64.tar.gz" \
61-
| tar zx -C bin
62-
chmod +x ./bin/container-scan-to-sarif
63-
./bin/container-scan-to-sarif -input "${CONTAINER_SCAN_REPORT}" -output ./containerscanreport.sarif
54+
with:
55+
converter-version: 0.2.2
56+
input-file: ${{ steps.scan.outputs.scan-report-path }}
6457

6558
- name: Upload SARIF reports to GitHub Security tab
6659
uses: github/codeql-action/upload-sarif@v1
6760
if: ${{ always() }}
6861
with:
69-
sarif_file: 'containerscanreport.sarif'
62+
sarif_file: ${{ steps.scan-to-sarif.outputs.sarif-report-path }}
7063
```
7164
7265
After your Workflow run passes, you should then be able to navigate the container scan report under your "Security > Code scanning alerts" tab.

0 commit comments

Comments
 (0)