@@ -151,9 +151,18 @@ jobs:
151151 echo "uses_java=false" >> "$GITHUB_OUTPUT"
152152 fi
153153
154- - name : Check licenses (Makefile)
155- run : |
156- make check-licenses
154+ - name : Check licenses
155+ uses : aquasecurity/trivy-action@0.33.1
156+ with :
157+ scan-type : " fs"
158+ scan-ref : " ."
159+ scanners : " license"
160+ format : " table"
161+ output : " license_scan.txt"
162+ exit-code : " 1"
163+ - name : Show license scan output
164+ if : always()
165+ run : cat license_scan.txt
157166
158167 - name : Run code lint
159168 run : make lint
@@ -173,20 +182,20 @@ jobs:
173182 - name : Run unit tests
174183 run : make test
175184
176- - name : Generate and check SBOMs
185+ - name : Generate and check python SBOMs
186+ if : ${{ steps.check_poetry.outputs.uses_poetry == 'true' }}
177187 uses : aquasecurity/trivy-action@0.33.1
178188 with :
179189 scan-type : " fs"
180- scan-ref : " . "
190+ scan-ref : " poetry.lock "
181191 severity : " CRITICAL,HIGH"
182- skip-files : " nhsd-rules-deny.txt "
192+ scanners : " vuln "
183193 format : " table"
184- output : " dependency-results .txt"
194+ output : " dependency_results_python .txt"
185195 exit-code : " 1"
186196 - name : Show scan output
187197 if : always()
188- run : cat dependency-results.txt
189-
198+ run : cat dependency_results_python.txt
190199 - name : " check is SONAR_TOKEN exists"
191200 env :
192201 super_secret : ${{ secrets.SONAR_TOKEN }}
@@ -205,7 +214,7 @@ jobs:
205214 SONAR_TOKEN : ${{ secrets.SONAR_TOKEN }}
206215
207216 # CloudFormation validation (runs only if templates exist, ~3-5 minutes)
208- cloudformation -validation :
217+ IaC -validation :
209218 runs-on : ubuntu-22.04
210219 steps :
211220 - name : Checkout code
0 commit comments