A GitHub Action for creating a software bill of materials (SBOM) using Syft.
- uses: anchore/sbom-action@v0
By default, this action will execute a Syft scan in the workspace directory and upload a workflow artifact SBOM in SPDX format. It will also detect if being run during a GitHub release and upload the SBOM as a release asset.
To scan a container image, use the image
parameter:
- uses: anchore/sbom-action@v0
with:
image: ghcr.io/example/image_name:tag
The image will be fetched using the Docker daemon if available, which will use any authentication available to the daemon.
If the Docker daemon is not available, the action will retrieve the image directly from the container registry.
It is also possible to directly connect to the container registry with the
registry-username
and registry-password
parameters. This will always bypass the
Docker daemon:
- uses: anchore/sbom-action@v0
with:
image: my-registry.com/my/image
registry-username: mr_awesome
registry-password: ${{ secrets.REGISTRY_PASSWORD }}
Use the path
parameter, relative to the repository root:
- uses: anchore/sbom-action@v0
with:
path: ./build/
The sbom-action
will detect being run during a
GitHub release
and automatically upload all SBOMs as release assets. However,
it may be desirable to upload SBOMs generated with other tools or using Syft
outside this action. To do this, use the anchore/sbom-action/publish-sbom
sub-action
and specify a regular expression with the sbom-artifact-match
parameter:
- uses: anchore/sbom-action/publish-sbom@v0
with:
sbom-artifact-match: ".*\\.spdx$"
By default, this action will upload an artifact named
<repo>-<job-name>[-<step-id|step-number>].<extension>
, for
example:
build-sbom:
steps:
- uses: anchore/sbom-action@v0
- uses: anchore/sbom-action@v0
- uses: anchore/sbom-action@v0
id: myid
Will create 3 artifacts:
my-repo-build-sbom.spdx.json
my-repo-build-sbom-2.spdx.json
my-repo-build-sbom-myid.spdx.json
You may need to name these artifacts differently, simply
use the artifact-name
parameter:
- uses: anchore/sbom-action@v0
with:
artifact-name: sbom.spdx
The main SBOM action, responsible for generating SBOMs and uploading them as workflow artifacts and release assets.
Parameter | Description | Default |
---|---|---|
path |
A path on the filesystem to scan. This is mutually exclusive to image . |
<current directory> |
image |
A container image to scan. This is mutually exclusive to path . See Scan a container image for more information. |
|
registry-username |
The registry username to use when authenticating to an external registry | |
registry-password |
The registry password to use when authenticating to an external registry | |
artifact-name |
The name to use for the generated SBOM artifact. See: Naming the SBOM output | sbom-<job>-<step-id>.spdx |
format |
The SBOM format to export. One of: spdx , spdx-json , cyclonedx |
spdx-json |
A sub-action to upload multiple SBOMs to GitHub releases.
Parameter | Description | Default |
---|---|---|
sbom-artifact-match |
A pattern to find SBOM artifacts. | .*\\.spdx\\.json$ |
A sub-action to download Syft.
No input parameters.
Output parameters:
Parameter | Description |
---|---|
cmd |
a reference to the Syft binary. |
cmd
can be referenced in a workflow like other output parameters:
${{ steps.<step-id>.outputs.cmd }}
Windows is currently supported via Windows Subsystem for Linux (WSL). It is
required to set up a WSL distribution prior to invoking the sbom-action
, for
example, you can add the small Alpine image:
- uses: Vampire/setup-wsl@v1
with:
distribution: Alpine
This action makes extensive use of GitHub Action debug logging,
which can be enabled as described here
by setting a secret in your repository of ACTIONS_STEP_DEBUG
to true
.