You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
refactor: organize action.yml into logical groups (#148)
- Group inputs by function: Artifact Config, SBOM Generation, Thresholds, Output
- Improve artifact_path description with clearer examples per artifact type
- Clarify threshold descriptions to explain vulnerability_threshold_exceeded output
- Maintain full backward compatibility with existing input names and defaults
Copy file name to clipboardExpand all lines: action.yml
+65-61Lines changed: 65 additions & 61 deletions
Original file line number
Diff line number
Diff line change
@@ -5,81 +5,27 @@ branding:
5
5
icon: cloud
6
6
7
7
inputs:
8
+
# Artifact Configuration
8
9
artifact_type:
9
10
description: 'The artifact you would like to scan with Amazon Inspector. Valid choices are "repository", "container", "binary", or "archive".'
10
11
required: True
11
12
default: 'repository'
12
13
13
14
artifact_path:
14
-
description: 'The file path to the artifact you would like to scan with Amazon Inspector. File paths are relative to the root project directory. If scanning a container image, you must provide a value that follows the docker pull convention: "NAME[:TAG|@DIGEST]", for example, "alpine:latest", or a path to an image exported as tarball using "docker save".'
15
+
description: 'Path to the artifact to scan. For repositories/files: relative path from project root (e.g., "./", "src/"). For containers: image reference that follows the docker pull convention: "NAME[:TAG|@DIGEST]" (e.g., "alpine:latest") or path to saved tarball. For binaries/archives: file path relative to project root.'
15
16
required: True
16
17
default: './'
17
18
18
-
display_vulnerability_findings:
19
-
description: 'If set to "enabled", the action will display detailed vulnerability findings in the step summary page; see here for an example report: https://github.com/aws-actions/vulnerability-scan-github-action-for-amazon-inspector/actions/runs/8878213714'
20
-
required: True
21
-
default: "disabled"
22
-
23
-
output_sbom_path:
24
-
description: "The destination file path for the generated SBOM."
25
-
required: False
26
-
default: './sbom_${{ github.run_id }}.json'
27
-
28
-
output_inspector_scan_path:
29
-
description: "The destination file path for Inspector's vulnerability scan (JSON format)."
description: "The destination file path for Inspector's Dockerfile vulnerability scan (markdown format)."
19
+
platform:
20
+
description: "Specifies the OS and CPU arch of the container image you wish to scan. Valid inputs are of the form 'os/cpu/variant' for example, 'linux/amd64', 'linux/arm64/v8', etc. If no platform is specified, the system will use the same platform as the host that is performing the scan. This argument only affects container image scans. Requires inspector-sbomgen 1.5.1 or later."
description: "The inspector-sbomgen version you wish to use for SBOM generation. See here for more info: https://docs.aws.amazon.com/inspector/latest/user/sbom-generator.html"
55
26
required: False
56
27
default: "latest"
57
28
58
-
critical_threshold:
59
-
description: "Specifies the number of critical vulnerabilities needed to set the 'vulnerability_threshold_exceeded' flag."
60
-
required: False
61
-
default: 0
62
-
63
-
high_threshold:
64
-
description: "Specifies the number of high vulnerabilities needed to set the 'vulnerability_threshold_exceeded' flag."
65
-
required: False
66
-
default: 0
67
-
68
-
medium_threshold:
69
-
description: "Specifies the number of medium vulnerabilities needed to set the 'vulnerability_threshold_exceeded' flag."
70
-
required: False
71
-
default: 0
72
-
73
-
low_threshold:
74
-
description: "Specifies the number of low vulnerabilities needed to set the 'vulnerability_threshold_exceeded' flag."
75
-
required: False
76
-
default: 0
77
-
78
-
other_threshold:
79
-
description: "Specifies the number of other vulnerabilities needed to set the 'vulnerability_threshold_exceeded' flag."
80
-
required: False
81
-
default: 0
82
-
83
29
scanners:
84
30
description: "Specifies the file scanners that you would like inspector-sbomgen to execute. By default, inspector-sbomgen will try to run all file scanners that are applicable to the target artifact. If this argument is set, inspector-sbomgen will only execute the specified file scanners. Provide your input as a single string. Separate each file scanner with a comma. To view a list of available file scanners, execute 'inspector-sbomgen list-scanners'. See here for more info: https://docs.aws.amazon.com/inspector/latest/user/sbom-generator.html"
85
31
required: False
@@ -106,22 +52,80 @@ inputs:
106
52
required: False
107
53
default: 600# 10 minutes
108
54
109
-
platform:
110
-
description: "Specifies the OS and CPU arch of the container image you wish to scan. Valid inputs are of the form 'os/cpu/variant' for example, 'linux/amd64', 'linux/arm64/v8', etc. If no platform is specified, the system will use the same platform as the host that is performing the scan. This argument only affects container image scans. Requires inspector-sbomgen 1.5.1 or later."
55
+
# Vulnerability Threshold Configuration
56
+
critical_threshold:
57
+
description: "Set 'vulnerability_threshold_exceeded' output to true if critical vulnerabilities found >= this number. Set to 0 to ignore critical vulnerabilities."
58
+
required: False
59
+
default: 0
60
+
61
+
high_threshold:
62
+
description: "Set 'vulnerability_threshold_exceeded' output to true if critical vulnerabilities found >= this number. Set to 0 to ignore high vulnerabilities."
63
+
required: False
64
+
default: 0
65
+
66
+
medium_threshold:
67
+
description: "Set 'vulnerability_threshold_exceeded' output to true if critical vulnerabilities found >= this number. Set to 0 to ignore medium vulnerabilities."
68
+
required: False
69
+
default: 0
70
+
71
+
low_threshold:
72
+
description: "Set 'vulnerability_threshold_exceeded' output to true if critical vulnerabilities found >= this number. Set to 0 to ignore low vulnerabilities."
111
73
required: False
74
+
default: 0
75
+
76
+
other_threshold:
77
+
required: False
78
+
description: "Set 'vulnerability_threshold_exceeded' output to true if critical vulnerabilities found >= this number. Set to 0 to ignore other vulnerabilities."
79
+
default: 0
112
80
113
81
threshold_fixable_only:
114
82
description: 'If set to true, only count vulnerabilities with a fix towards threshold exceeded condition.'
115
83
required: False
116
84
default: false
117
85
type: boolean
118
86
87
+
# Output Configuration
88
+
display_vulnerability_findings:
89
+
description: 'If set to "enabled", the action will display detailed vulnerability findings in the step summary page; see here for an example report: https://github.com/aws-actions/vulnerability-scan-github-action-for-amazon-inspector/actions/runs/8878213714'
90
+
required: True
91
+
default: "disabled"
92
+
119
93
show_only_fixable_vulns:
120
94
description: "If set to true, this action will show only fixed vulnerabilities in the GitHub Actions step summary page. All vulnerability metadata is still retained in the raw Inspector scan files."
121
95
required: False
122
96
default: false
123
97
type: boolean
124
98
99
+
output_sbom_path:
100
+
description: "The destination file path for the generated SBOM."
101
+
required: False
102
+
default: './sbom_${{ github.run_id }}.json'
103
+
104
+
output_inspector_scan_path:
105
+
description: "The destination file path for Inspector's vulnerability scan (JSON format)."
0 commit comments