Skip to content

Commit 873ffae

Browse files
revert test workflows to v1.4.0
1 parent 0c2ec1c commit 873ffae

12 files changed

+12
-12
lines changed

.github/workflows/build_scan_container.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ jobs:
5252
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
5353

5454
- name: Scan built image with Inspector
55-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@investigate_multi_arch
55+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.4.0
5656
id: inspector
5757
with:
5858
artifact_type: 'container'

.github/workflows/example_display_findings.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ jobs:
3333
# modify this block to scan your intended artifact
3434
- name: Inspector Scan
3535
id: inspector
36-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@investigate_multi_arch
36+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.4.0
3737
with:
3838
# change artifact_type to either 'repository', 'container', 'binary', or 'archive'.
3939
# this example scans a container image

.github/workflows/example_vulnerability_threshold_exceeded.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ jobs:
4848

4949
# Inspector scan
5050
- name: Scan container with Inspector
51-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@investigate_multi_arch
51+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.4.0
5252
id: inspector
5353
with:
5454
artifact_type: 'container' # configure Inspector for scanning a container

.github/workflows/test_archive.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ jobs:
3636

3737
- name: Test archive scan
3838
id: inspector
39-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@investigate_multi_arch
39+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.4.0
4040
with:
4141
artifact_type: 'archive'
4242
artifact_path: 'entrypoint/tests/test_data/artifacts/archives/testData.zip'

.github/workflows/test_binary.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ jobs:
3636

3737
- name: Test binary scan
3838
id: inspector
39-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@investigate_multi_arch
39+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.4.0
4040
with:
4141
artifact_type: 'binary'
4242
artifact_path: 'entrypoint/tests/test_data/artifacts/binaries/inspector-sbomgen'

.github/workflows/test_containers.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ jobs:
3636

3737
- name: Test container scan
3838
id: inspector
39-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@investigate_multi_arch
39+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.4.0
4040
with:
4141
artifact_type: 'container'
4242
artifact_path: 'ubuntu:14.04'

.github/workflows/test_dockerfile_vulns.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ jobs:
3535

3636
- name: Scan Dockerfiles
3737
id: inspector
38-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@investigate_multi_arch
38+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.4.0
3939
with:
4040
artifact_type: 'repository'
4141
artifact_path: './'

.github/workflows/test_installation.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ jobs:
3232
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
3333

3434
- name: Test Amazon Inspector GitHub Actions plugin
35-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@investigate_multi_arch
35+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.4.0
3636
with:
3737
artifact_type: 'container'
3838
artifact_path: 'alpine:latest'

.github/workflows/test_no_vulns.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ jobs:
3232

3333
- name: Test binary scan
3434
id: inspector
35-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@investigate_multi_arch
35+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.4.0
3636
with:
3737
artifact_type: 'binary'
3838
artifact_path: 'entrypoint/tests/test_data/artifacts/binaries/test_go_binary'

.github/workflows/test_reports_no_vulns.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ jobs:
3131

3232
- name: Test container scan
3333
id: inspector
34-
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@investigate_multi_arch
34+
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.4.0
3535
with:
3636
artifact_type: 'container'
3737
artifact_path: 'alpine:latest'

0 commit comments

Comments
 (0)