Skip to content

Commit

Permalink
Using docker run
Browse files Browse the repository at this point in the history
  • Loading branch information
balda-rdx committed Aug 7, 2023
1 parent fa008b3 commit d9b3d54
Showing 1 changed file with 1 addition and 3 deletions.
4 changes: 1 addition & 3 deletions .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,8 +14,6 @@ on:
jobs:
snyk-scan:
runs-on: ubuntu-latest
container:
image: snyk/snyk:python-3.9
permissions:
id-token: write
pull-requests: read
Expand All @@ -32,7 +30,7 @@ jobs:
secret_name: ${{ secrets.AWS_SECRET_NAME_SNYK }}
parse_json: true
- name: Run Snyk to check for deps vulnerabilities
run: snyk test --file=./node-runner-cli/Pipfile --org=${{ env.SNYK_NETWORK_ORG_ID }} --severity-threshold=critical
run: docker run --entrypoint=snyk -v $PWD:/source -w /source snyk/snyk:python-3.9 test --file=./node-runner-cli/Pipfile --org=${{ env.SNYK_NETWORK_ORG_ID }} --severity-threshold=critical

Check warning on line 33 in .github/workflows/ci.yml

View workflow job for this annotation

GitHub Actions / actionlint

[actionlint] .github/workflows/ci.yml#L33

shellcheck reported issue in this script: SC2086:info:1:33: Double quote to prevent globbing and word splitting [shellcheck]
Raw output
.github/workflows/ci.yml:33:9: shellcheck reported issue in this script: SC2086:info:1:33: Double quote to prevent globbing and word splitting [shellcheck]
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
- name: Run Snyk to check for code vulnerabilities
Expand Down

0 comments on commit d9b3d54

Please sign in to comment.