@@ -84,7 +84,7 @@ Perform the following steps to quickly add this action to your GitHub Actions pi
8484 # modify this block to scan your intended artifact
8585 - name : Inspector Scan
8686 id : inspector
87- uses : aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1
87+ uses : aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.0.0
8888 with :
8989 # change artifact_type to either 'repository', 'container', 'binary', or 'archive'.
9090 artifact_type : ' repository'
@@ -169,7 +169,7 @@ The below example shows how to enable action outputs in various locations and fo
169169` ` ` yaml
170170- name : Scan container
171171 id : inspector
172- uses : aws/vulnerability-scan-github-action-for-amazon-inspector@v1
172+ uses : aws/vulnerability-scan-github-action-for-amazon-inspector@v1.0.0
173173 with :
174174 artifact_type : ' container'
175175 artifact_path : ' ubuntu:14.04'
@@ -213,7 +213,7 @@ The example below shows how to set up vulnerability thresholds and fail the job
213213` ` ` yaml
214214- name : Invoke Amazon Inspector Scan
215215 id : inspector
216- uses : aws/vulnerability-scan-github-action-for-amazon-inspector@v1
216+ uses : aws/vulnerability-scan-github-action-for-amazon-inspector@v1.0.0
217217 with :
218218 artifact_type : ' repository'
219219 artifact_path : ' ./'
@@ -288,7 +288,7 @@ jobs:
288288 role-to-assume : " arn:aws:iam::<AWS_ACCOUNT_ID>:role/<IAM_ROLE_NAME>"
289289
290290 - name : Scan built image with Inspector
291- uses : aws/amazon-inspector-github-actions-plugin@v1
291+ uses : aws/amazon-inspector-github-actions-plugin@v1.0.0
292292 id : inspector
293293 with :
294294 artifact_type : ' container'
0 commit comments