@@ -90,7 +90,7 @@ Perform the following steps to quickly add this action to your GitHub Actions pi
90
90
# modify this block to scan your intended artifact
91
91
- name : Inspector Scan
92
92
id : inspector
93
- uses : aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.0.0
93
+ uses : aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1
94
94
with :
95
95
# change artifact_type to either 'repository', 'container', 'binary', or 'archive'.
96
96
artifact_type : ' repository'
@@ -175,7 +175,7 @@ The below example shows how to enable action outputs in various locations and fo
175
175
` ` ` yaml
176
176
- name : Scan container
177
177
id : inspector
178
- uses : aws/vulnerability-scan-github-action-for-amazon-inspector@v1.0.0
178
+ uses : aws/vulnerability-scan-github-action-for-amazon-inspector@v1
179
179
with :
180
180
artifact_type : ' container'
181
181
artifact_path : ' ubuntu:14.04'
@@ -219,7 +219,7 @@ The example below shows how to set up vulnerability thresholds and fail the job
219
219
` ` ` yaml
220
220
- name : Invoke Amazon Inspector Scan
221
221
id : inspector
222
- uses : aws/vulnerability-scan-github-action-for-amazon-inspector@v1.0.0
222
+ uses : aws/vulnerability-scan-github-action-for-amazon-inspector@v1
223
223
with :
224
224
artifact_type : ' repository'
225
225
artifact_path : ' ./'
@@ -294,7 +294,7 @@ jobs:
294
294
role-to-assume : " arn:aws:iam::<AWS_ACCOUNT_ID>:role/<IAM_ROLE_NAME>"
295
295
296
296
- name : Scan built image with Inspector
297
- uses : aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.0.0
297
+ uses : aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1
298
298
id : inspector
299
299
with :
300
300
artifact_type : ' container'
0 commit comments