diff --git a/.circleci/config.yml b/.circleci/config.yml index 6d49d4d7..95e5adb1 100644 --- a/.circleci/config.yml +++ b/.circleci/config.yml @@ -338,6 +338,9 @@ jobs: steps: - setup_remote_docker - checkout + - run: + name: Install AWS CLI dependencies + command: *defaults_awsCliDependencies - attach_workspace: at: /tmp - run: @@ -363,7 +366,13 @@ jobs: printf "\n%s\n" "The following vulnerabilities were found:" jq '[.vulnerabilities | group_by(.package) | .[] | {package: .[0].package, vuln: [.[].vuln]}]' anchore-reports/*vuln*.json fi - + - run: + name: Upload Anchore reports to s3 + command: | + aws s3 cp anchore-reports ${AWS_S3_DIR_ANCHORE_REPORTS}/${CIRCLE_PROJECT_REPONAME}/ --recursive + aws s3 rm ${AWS_S3_DIR_ANCHORE_REPORTS}/latest/ --recursive --exclude "*" --include "${CIRCLE_PROJECT_REPONAME}*" + aws s3 cp anchore-reports ${AWS_S3_DIR_ANCHORE_REPORTS}/latest/ --recursive + # TODO: Enable this when we want to increase the strictness of our security policies # failCount=$(cat anchore-reports/*policy*.json | grep 'fail' | wc -l) # echo "FailCount is: ${failCount}" @@ -371,7 +380,6 @@ jobs: # printf "Failed with a policy failure count of: ${failCount}" # exit 1 # fi - - store_artifacts: path: anchore-reports diff --git a/package-lock.json b/package-lock.json index de81259f..e51fa5f9 100644 --- a/package-lock.json +++ b/package-lock.json @@ -1,6 +1,6 @@ { "name": "central-settlement", - "version": "8.6.0", + "version": "8.8.0", "lockfileVersion": 1, "requires": true, "dependencies": { diff --git a/package.json b/package.json index 4ed2c495..0b0482dc 100644 --- a/package.json +++ b/package.json @@ -1,7 +1,7 @@ { "name": "central-settlement", "description": "Central settlements hosted by a scheme to record and make settlements", - "version": "8.6.0", + "version": "8.8.0", "license": "Apache-2.0", "private": false, "author": "ModusBox",