Skip to content

Commit 15c40ad

Browse files
refactor: update callers to use VulnScanOutput instead of tuple unpacking
- Replace tuple unpacking with single VulnScanOutput object in execute() - Update vulnerability processing to use structured scan_success flag - Pass VulnScanOutput to downstream functions (breaking change) - Update test to use VulnScanOutput instead of tuple format - Add TODO for threshold logic adaptation
1 parent 742e501 commit 15c40ad

File tree

2 files changed

+10
-10
lines changed

2 files changed

+10
-10
lines changed

entrypoint/entrypoint/orchestrator.py

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -36,18 +36,18 @@ def execute(args) -> int:
3636
set_github_actions_output('inspector_scan_results', output_config.output_inspector_scan_path)
3737

3838
logging.info("tallying vulnerabilities")
39-
succeeded, scan_result, fixed_vuln_counts = get_scan_result(args, config, output_config)
40-
require_true(succeeded, "unable to tally vulnerabilities")
39+
vuln_scan_result = get_scan_result(args, config, output_config)
40+
require_true(vuln_scan_result.scan_success, f"unable to tally vulnerabilities: {vuln_scan_result.error_message}")
4141

42-
print_vuln_count_summary(scan_result)
42+
print_vuln_count_summary(vuln_scan_result)
4343

44-
vuln_counts = fixed_vuln_counts if output_config.threshold_fixable_only else scan_result
44+
vuln_counts = vuln_scan_result # TODO: Need to adapt threshold logic
4545
set_env_var_if_vuln_threshold_exceeded(output_config, vuln_counts)
4646

47-
write_pkg_vuln_report_csv(output_config.output_inspector_scan_path_csv, scan_result)
47+
write_pkg_vuln_report_csv(output_config.output_inspector_scan_path_csv, vuln_scan_result)
4848
set_github_actions_output('inspector_scan_results_csv', output_config.output_inspector_scan_path_csv)
4949

50-
pkg_vuln_markdown = write_pkg_vuln_report_markdown(output_config.output_inspector_scan_path_markdown, scan_result)
50+
pkg_vuln_markdown = write_pkg_vuln_report_markdown(output_config.output_inspector_scan_path_markdown, vuln_scan_result)
5151
post_pkg_vuln_github_actions_step_summary(output_config, pkg_vuln_markdown)
5252
set_github_actions_output('inspector_scan_results_markdown', output_config.output_inspector_scan_path_markdown)
5353

entrypoint/tests/test_orchestrator.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -178,11 +178,11 @@ def test_system_against_dockerfile_findings(self):
178178
config = ScanConfig.from_args(args)
179179
output_config = OutputConfig.from_args(args)
180180

181-
succeeded, scan_result, fixed_vuln_counts = orchestrator.get_scan_result(args, config, output_config)
182-
self.assertTrue(succeeded)
181+
vuln_scan_result = orchestrator.get_scan_result(args, config, output_config)
182+
self.assertTrue(vuln_scan_result.scan_success)
183183

184-
orchestrator.write_pkg_vuln_report_csv(args.out_scan_csv, scan_result)
185-
orchestrator.write_pkg_vuln_report_markdown(args.out_scan_markdown, scan_result)
184+
orchestrator.write_pkg_vuln_report_csv(args.out_scan_csv, vuln_scan_result)
185+
orchestrator.write_pkg_vuln_report_markdown(args.out_scan_markdown, vuln_scan_result)
186186
dockerfile.write_dockerfile_report_csv(args.out_scan, args.out_dockerfile_scan_csv)
187187
dockerfile.write_dockerfile_report_md(args.out_scan, args.out_dockerfile_scan_md)
188188

0 commit comments

Comments
 (0)