Skip to content

Add improvements to syntax #14

Add improvements to syntax

Add improvements to syntax #14

name: Run Image Scan for Amazon CloudWatch Observability Helm Chart
on:
schedule:
- cron: 0 13 * * 1 # Every Monday at 1PM UTC (9AM EST)
workflow_dispatch:
permissions:
id-token: write
contents: read
env:
TERRAFORM_AWS_ASSUME_ROLE: ${{ secrets.TERRAFORM_AWS_ASSUME_ROLE }}
AWS_DEFAULT_REGION: us-west-2
jobs:
ContainerImageScan:
runs-on: ubuntu-latest
strategy:
fail-fast: false
matrix:
container_images:
- registry: ".manager.image.repositoryDomainMap.public"
repository: ".manager.image.repository"
tag: ".manager.image.tag"
- registry: ".manager.autoInstrumentationImage.java.repositoryDomain"
repository: ".manager.autoInstrumentationImage.java.repository"
tag: ".manager.autoInstrumentationImage.java.tag"
- registry: ".manager.autoInstrumentationImage.python.repositoryDomain"
repository: ".manager.autoInstrumentationImage.python.repository"
tag: ".manager.autoInstrumentationImage.python.tag"
- registry: ".manager.autoInstrumentationImage.dotnet.repositoryDomain"
repository: ".manager.autoInstrumentationImage.dotnet.repository"
tag: ".manager.autoInstrumentationImage.dotnet.tag"

Check failure on line 38 in .github/workflows/amazon-cloudwatch-observability-image-scan.yaml

View workflow run for this annotation

GitHub Actions / .github/workflows/amazon-cloudwatch-observability-image-scan.yaml

Invalid workflow file

You have an error in your yaml syntax on line 38
- registry: ".agent.image.repositoryDomainMap.public",
repository: ".agent.image.repository",
tag": ".agent.image.tag"
- registry: ".dcgmExporter.image.repositoryDomainMap.public"
repository: ".dcgmExporter.image.repository"
tag: ".dcgmExporter.image.tag"
- registry: ".neuronMonitor.image.repositoryDomainMap.public"
repository: ".neuronMonitor.image.repository"
tag: ".neuronMonitor.image.tag"
steps:
- uses: actions/checkout@v3
with:
fetch-depth: 0
- name: Configure AWS Credentials
uses: aws-actions/configure-aws-credentials@v2
with:
role-to-assume: ${{ env.TERRAFORM_AWS_ASSUME_ROLE }}
aws-region: ${{ env.AWS_DEFAULT_REGION }}
- name: Login ECR
uses: aws-actions/amazon-ecr-login@v1
- name: "Get image paths"
id: image
uses: mikefarah/yq@master
with:
cmd:
echo CONTAINER_IMAGE="$(yq '${{ matrix.container_images.registry }}' charts/amazon-cloudwatch-observability/values.yaml)/$(yq '${{ matrix.container_images.repository }}' charts/amazon-cloudwatch-observability/values.yaml):$(yq '${{ matrix.container_images.tag }}' charts/amazon-cloudwatch-observability/values.yaml)" >> $GITHUB_OUTPUT
- name: "Scan for vulnerabilities"
uses: crazy-max/ghaction-container-scan@v3
with:
image: ${{ steps.image.outputs.CONTAINER_IMAGE }}
severity_threshold: HIGH