diff --git a/.github/workflows/AutoUpdateBootstrap.yml b/.github/workflows/AutoUpdateBootstrap.yml index 3b3cdd1c..c28f30d1 100644 --- a/.github/workflows/AutoUpdateBootstrap.yml +++ b/.github/workflows/AutoUpdateBootstrap.yml @@ -22,7 +22,7 @@ jobs: aws-region: us-west-2 - name: Retrieve secret from AWS Secrets Manager - uses: aws-actions/aws-secretsmanager-get-secrets@5e19ff380d035695bdd56bbad320ca535c9063f2 #v2.0.9 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 #v2.0.10 with: secret-ids: | AWS_SECRET, ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_NAME }} diff --git a/.github/workflows/create-release-pr.yml b/.github/workflows/create-release-pr.yml index 8528d457..1071c71d 100644 --- a/.github/workflows/create-release-pr.yml +++ b/.github/workflows/create-release-pr.yml @@ -31,7 +31,7 @@ jobs: aws-region: us-west-2 # Retrieve the Access Token from Secrets Manager - name: Retrieve secret from AWS Secrets Manager - uses: aws-actions/aws-secretsmanager-get-secrets@5e19ff380d035695bdd56bbad320ca535c9063f2 #v2.0.9 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 #v2.0.10 with: secret-ids: | AWS_SECRET, ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_NAME }} diff --git a/.github/workflows/semgrep-analysis.yml b/.github/workflows/semgrep-analysis.yml index af352183..b886b910 100644 --- a/.github/workflows/semgrep-analysis.yml +++ b/.github/workflows/semgrep-analysis.yml @@ -30,7 +30,7 @@ jobs: p/owasp-top-ten - name: Upload SARIF file for GitHub Advanced Security Dashboard - uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 #v3.29.0 + uses: github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b #v3.29.2 with: sarif_file: semgrep.sarif if: always() diff --git a/.github/workflows/sync-main-dev.yml b/.github/workflows/sync-main-dev.yml index 2de87805..3e3ea817 100644 --- a/.github/workflows/sync-main-dev.yml +++ b/.github/workflows/sync-main-dev.yml @@ -32,7 +32,7 @@ jobs: aws-region: us-west-2 # Retrieve the Access Token from Secrets Manager - name: Retrieve secret from AWS Secrets Manager - uses: aws-actions/aws-secretsmanager-get-secrets@5e19ff380d035695bdd56bbad320ca535c9063f2 #v2.0.9 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 #v2.0.10 with: secret-ids: | AWS_SECRET, ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_NAME }} diff --git a/test/AWS.Deploy.CLI.IntegrationTests/WebAppNoDockerFileTests.cs b/test/AWS.Deploy.CLI.IntegrationTests/WebAppNoDockerFileTests.cs index 527a7df0..80e208f5 100644 --- a/test/AWS.Deploy.CLI.IntegrationTests/WebAppNoDockerFileTests.cs +++ b/test/AWS.Deploy.CLI.IntegrationTests/WebAppNoDockerFileTests.cs @@ -214,7 +214,7 @@ public async Task BeanstalkArmDeployment() interactiveService.StdInWriter.Write(Environment.NewLine); // Confirm selection and deploy interactiveService.StdInWriter.WriteLine("more"); // Select "Environment Architecture" interactiveService.StdInWriter.WriteLine("1"); // Select "EC2 Instance Type" - interactiveService.StdInWriter.WriteLine("n"); // Don't select free tier which forces t3.micro to be used instead of t2.micro + interactiveService.StdInWriter.WriteLine("y"); // select free tier which includes t3.micro interactiveService.StdInWriter.WriteLine("1"); // Select "x86_64" interactiveService.StdInWriter.WriteLine("1"); // Select "CPU Cores" interactiveService.StdInWriter.WriteLine("1"); // Select "Instance Memory"