Skip to content

Commit 0ef860b

Browse files
bluesentinelsecMichael Long
andauthored
update README (#97)
Co-authored-by: Michael Long <mlongii@amazon.com>
1 parent d62e2b9 commit 0ef860b

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ Perform the following steps to quickly add this action to your GitHub Actions pi
9090
# modify this block to scan your intended artifact
9191
- name: Inspector Scan
9292
id: inspector
93-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.0.0
93+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1
9494
with:
9595
# change artifact_type to either 'repository', 'container', 'binary', or 'archive'.
9696
artifact_type: 'repository'
@@ -175,7 +175,7 @@ The below example shows how to enable action outputs in various locations and fo
175175
```yaml
176176
- name: Scan container
177177
id: inspector
178-
uses: aws/vulnerability-scan-github-action-for-amazon-inspector@v1.0.0
178+
uses: aws/vulnerability-scan-github-action-for-amazon-inspector@v1
179179
with:
180180
artifact_type: 'container'
181181
artifact_path: 'ubuntu:14.04'
@@ -219,7 +219,7 @@ The example below shows how to set up vulnerability thresholds and fail the job
219219
```yaml
220220
- name: Invoke Amazon Inspector Scan
221221
id: inspector
222-
uses: aws/vulnerability-scan-github-action-for-amazon-inspector@v1.0.0
222+
uses: aws/vulnerability-scan-github-action-for-amazon-inspector@v1
223223
with:
224224
artifact_type: 'repository'
225225
artifact_path: './'
@@ -294,7 +294,7 @@ jobs:
294294
role-to-assume: "arn:aws:iam::<AWS_ACCOUNT_ID>:role/<IAM_ROLE_NAME>"
295295

296296
- name: Scan built image with Inspector
297-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.0.0
297+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1
298298
id: inspector
299299
with:
300300
artifact_type: 'container'

0 commit comments

Comments
 (0)