File tree Expand file tree Collapse file tree 12 files changed +22
-22
lines changed Expand file tree Collapse file tree 12 files changed +22
-22
lines changed Original file line number Diff line number Diff line change 5555        uses : aws-powertools/actions/.github/actions/cached-node-modules@743fa57a003787b157991ea5c6e3cf0d40468676 
5656      - id : credentials 
5757        name : AWS Credentials 
58-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b  
58+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98  
5959        with :
6060          aws-region : ${{ inputs.region }} 
6161          role-to-assume : ${{ secrets.REGION_IAM_ROLE }} 
9494    steps :
9595      - id : credentials 
9696        name : AWS Credentials 
97-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
97+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
9898        with :
9999          aws-region : us-east-1 
100100          role-to-assume : ${{ secrets.REGION_IAM_ROLE }} 
Original file line number Diff line number Diff line change 4343      statuses : read 
4444    steps :
4545      - name : Configure AWS credentials 
46-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
46+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
4747        with :
4848          aws-region : eu-central-1 
4949          role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }} 
Original file line number Diff line number Diff line change 5959    environment : Prod (Readonly) 
6060    steps :
6161      - name : Configure AWS Credentials 
62-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
62+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
6363        with :
6464          role-to-assume : ${{ secrets.AWS_IAM_ROLE }} 
6565          aws-region : us-east-1 
@@ -116,7 +116,7 @@ jobs:
116116          SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json') 
117117          test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1 
118118name : Configure AWS Credentials 
119-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
119+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
120120        with :
121121          role-to-assume : ${{ secrets.AWS_IAM_ROLE }} 
122122          aws-region : us-gov-east-1 
@@ -185,7 +185,7 @@ jobs:
185185          SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json') 
186186          test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1 
187187name : Configure AWS Credentials 
188-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
188+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
189189        with :
190190          role-to-assume : ${{ secrets.AWS_IAM_ROLE }} 
191191          aws-region : us-gov-west-1 
Original file line number Diff line number Diff line change 5555    environment : Prod (Readonly) 
5656    steps :
5757      - name : Configure AWS Credentials 
58-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
58+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
5959        with :
6060          role-to-assume : ${{ secrets.AWS_IAM_ROLE }} 
6161          aws-region : us-east-1 
@@ -108,7 +108,7 @@ jobs:
108108          SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json') 
109109          test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1 
110110name : Configure AWS Credentials 
111-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
111+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
112112        with :
113113          role-to-assume : ${{ secrets.AWS_IAM_ROLE }} 
114114          aws-region : us-gov-east-1 
@@ -173,7 +173,7 @@ jobs:
173173          SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json') 
174174          test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1 
175175name : Configure AWS Credentials 
176-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
176+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
177177        with :
178178          role-to-assume : ${{ secrets.AWS_IAM_ROLE }} 
179179          aws-region : us-gov-west-1 
Original file line number Diff line number Diff line change 3939    environment : Prod (Readonly) 
4040    steps :
4141      - name : Configure AWS Credentials 
42-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
42+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
4343        with :
4444          role-to-assume : ${{ secrets.AWS_IAM_ROLE }} 
4545          aws-region : us-east-1 
6969    environment : GovCloud Prod (East) 
7070    steps :
7171      - name : Configure AWS Credentials 
72-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
72+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
7373        with :
7474          role-to-assume : ${{ secrets.AWS_IAM_ROLE }} 
7575          aws-region : us-gov-east-1 
@@ -100,7 +100,7 @@ jobs:
100100    environment : GovCloud Prod (West) 
101101    steps :
102102      - name : Configure AWS Credentials 
103-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
103+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
104104        with :
105105          role-to-assume : ${{ secrets.AWS_IAM_ROLE }} 
106106          aws-region : us-gov-east-1 
Original file line number Diff line number Diff line change 8787          - x86_64 
8888    steps :
8989      - name : Configure AWS Credentials 
90-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
90+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
9191        with :
9292          role-to-assume : ${{ secrets.AWS_IAM_ROLE }} 
9393          aws-region : us-east-1 
@@ -136,7 +136,7 @@ jobs:
136136        run : | 
137137          echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT" 
138138name : Configure AWS Credentials 
139-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
139+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
140140        with :
141141          role-to-assume : ${{ secrets[format('IAM_ROLE_{0}', steps.transform.outputs.CONVERTED_REGION)] }} 
142142          aws-region : ${{ matrix.region}} 
Original file line number Diff line number Diff line change 8484          - x86_64 
8585    steps :
8686      - name : Configure AWS Credentials 
87-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
87+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
8888        with :
8989          role-to-assume : ${{ secrets.AWS_IAM_ROLE }} 
9090          aws-region : us-east-1 
@@ -148,7 +148,7 @@ jobs:
148148        run : | 
149149          echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT" 
150150name : Configure AWS Credentials 
151-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
151+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
152152        with :
153153          role-to-assume : ${{ secrets[format('IAM_ROLE_{0}', steps.transform.outputs.CONVERTED_REGION)] }} 
154154          aws-region : ${{ matrix.region}} 
Original file line number Diff line number Diff line change @@ -161,7 +161,7 @@ jobs:
161161          pipx install git+https://github.com/python-poetry/poetry@bd500dd3bdfaec3de6894144c9cedb3a9358be84 # v2.0.1 
162162          pipx inject poetry git+https://github.com/python-poetry/poetry-plugin-export@8c83d26603ca94f2e203bfded7b6d7f530960e06 # v1.8.0 
163163name : Configure AWS credentials 
164-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
164+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
165165        with :
166166          aws-region : ${{ matrix.region }} 
167167          role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }} 
Original file line number Diff line number Diff line change 8787
8888
8989      - name : Configure AWS credentials 
90-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
90+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
9191        with :
9292          aws-region : ${{ env.AWS_REGION }} 
9393          role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }} 
9898      #  we then jump to our specific SAR Account with the correctly scoped IAM Role
9999      #  this allows us to have a single trail when a release occurs for a given layer (beta+prod+SAR beta+SAR prod)
100100      - name : AWS credentials SAR role 
101-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
101+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
102102        id : aws-credentials-sar-role 
103103        with :
104104          aws-access-key-id : ${{ env.AWS_ACCESS_KEY_ID }} 
Original file line number Diff line number Diff line change 6868env :
6969          BRANCH : ${{ inputs.git_ref }} 
7070      - name : Configure AWS credentials 
71-         uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b   #  v4.3.0
71+         uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98   #  v4.3.0
7272        with :
7373          aws-region : us-east-1 
7474          role-to-assume : ${{ secrets.AWS_DOCS_ROLE_ARN }} 
 
 
   
 
     
   
   
          
    
    
     
    
      
     
     
    You can’t perform that action at this time.
  
 
    
  
    
      
        
     
       
      
     
   
 
    
    
  
 
  
 
     
    
0 commit comments