Skip to content

Commit cdcff85

Browse files
author
Michael Long
committed
Set example workflows to main branch for testing
1 parent 2acdf07 commit cdcff85

11 files changed

+26
-11
lines changed

.github/workflows/build_scan_container.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ jobs:
4747
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
4848

4949
- name: Scan built image with Inspector
50-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.3
50+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@main
5151
id: inspector
5252
with:
5353
artifact_type: 'container'

.github/workflows/example_display_findings.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ jobs:
2929
# modify this block to scan your intended artifact
3030
- name: Inspector Scan
3131
id: inspector
32-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.3
32+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@main
3333
with:
3434
# change artifact_type to either 'repository', 'container', 'binary', or 'archive'.
3535
# this example scans a container image

.github/workflows/test_archive.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ jobs:
3232

3333
- name: Test archive scan
3434
id: inspector
35-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.3
35+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@main
3636
with:
3737
artifact_type: 'archive'
3838
artifact_path: 'entrypoint/tests/test_data/artifacts/archives/testData.zip'

.github/workflows/test_binary.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ jobs:
3232

3333
- name: Test binary scan
3434
id: inspector
35-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.3
35+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@main
3636
with:
3737
artifact_type: 'binary'
3838
artifact_path: 'entrypoint/tests/test_data/artifacts/binaries/inspector-sbomgen'

.github/workflows/test_containers.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,12 +32,12 @@ jobs:
3232

3333
- name: Test container scan
3434
id: inspector
35-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.3
35+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@main
3636
with:
3737
artifact_type: 'container'
3838
artifact_path: 'ubuntu:14.04'
3939
display_vulnerability_findings: "enabled"
40-
sbomgen_version: "1.3.1"
40+
sbomgen_version: "latest"
4141

4242
- name: Display scan results
4343
run: cat ${{ steps.inspector.outputs.inspector_scan_results }}

.github/workflows/test_dockerfile_vulns.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ jobs:
3131

3232
- name: Scan Dockerfiles
3333
id: inspector
34-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.3
34+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@main
3535
with:
3636
artifact_type: 'repository'
3737
artifact_path: './'

.github/workflows/test_installation.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ jobs:
2828
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
2929

3030
- name: Test Amazon Inspector GitHub Actions plugin
31-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.3
31+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@main
3232
with:
3333
artifact_type: 'container'
3434
artifact_path: 'alpine:latest'

.github/workflows/test_no_vulns.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ jobs:
2828

2929
- name: Test binary scan
3030
id: inspector
31-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.3
31+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@main
3232
with:
3333
artifact_type: 'binary'
3434
artifact_path: 'entrypoint/tests/test_data/artifacts/binaries/test_go_binary'

.github/workflows/test_csv_no_vulns.yml renamed to .github/workflows/test_reports_no_vulns.yml

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,3 +35,18 @@ jobs:
3535

3636
- name: Display scan results
3737
run: cat ${{ steps.inspector.outputs.inspector_scan_results_csv }}
38+
39+
- name: Display scan results (JSON)
40+
run: cat ${{ steps.inspector.outputs.inspector_scan_results }}
41+
42+
- name: Display package vulns (CSV)
43+
run: cat ${{ steps.inspector.outputs.inspector_scan_results_csv }}
44+
45+
- name: Display package vulns (MD)
46+
run: cat ${{ steps.inspector.outputs.inspector_scan_results_markdown }}
47+
48+
- name: Display Dockerfile vulns (CSV)
49+
run: cat ${{ steps.inspector.outputs.inspector_dockerfile_scan_results_csv }}
50+
51+
- name: Display Dockerfile vulns (MD)
52+
run: cat ${{ steps.inspector.outputs.inspector_dockerfile_scan_results_markdown }}

.github/workflows/test_repository.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ jobs:
3131

3232
- name: Test repository scan
3333
id: inspector
34-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.1.3
34+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@main
3535
with:
3636
artifact_type: 'repository'
3737
artifact_path: './'

0 commit comments

Comments
 (0)