From 44490285fbe5dbb16e12c6f59299071164feb869 Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Tue, 1 Jul 2025 13:42:44 +0000 Subject: [PATCH 1/3] build(deps): bump github/codeql-action from 3.29.0 to 3.29.2 Bumps [github/codeql-action](https://github.com/github/codeql-action) from 3.29.0 to 3.29.2. - [Release notes](https://github.com/github/codeql-action/releases) - [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md) - [Commits](https://github.com/github/codeql-action/compare/ce28f5bb42b7a9f2c824e633a3f6ee835bab6858...181d5eefc20863364f96762470ba6f862bdef56b) --- updated-dependencies: - dependency-name: github/codeql-action dependency-version: 3.29.2 dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] --- .github/workflows/semgrep-analysis.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/semgrep-analysis.yml b/.github/workflows/semgrep-analysis.yml index af352183..b886b910 100644 --- a/.github/workflows/semgrep-analysis.yml +++ b/.github/workflows/semgrep-analysis.yml @@ -30,7 +30,7 @@ jobs: p/owasp-top-ten - name: Upload SARIF file for GitHub Advanced Security Dashboard - uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 #v3.29.0 + uses: github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b #v3.29.2 with: sarif_file: semgrep.sarif if: always() From 520a18b3e0eb05dc25b632a65a8bf56c311778d5 Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Tue, 1 Jul 2025 13:56:20 +0000 Subject: [PATCH 2/3] build(deps): bump aws-actions/aws-secretsmanager-get-secrets Bumps [aws-actions/aws-secretsmanager-get-secrets](https://github.com/aws-actions/aws-secretsmanager-get-secrets) from 2.0.9 to 2.0.10. - [Release notes](https://github.com/aws-actions/aws-secretsmanager-get-secrets/releases) - [Commits](https://github.com/aws-actions/aws-secretsmanager-get-secrets/compare/5e19ff380d035695bdd56bbad320ca535c9063f2...a9a7eb4e2f2871d30dc5b892576fde60a2ecc802) --- updated-dependencies: - dependency-name: aws-actions/aws-secretsmanager-get-secrets dependency-version: 2.0.10 dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] --- .github/workflows/AutoUpdateBootstrap.yml | 2 +- .github/workflows/create-release-pr.yml | 2 +- .github/workflows/sync-main-dev.yml | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/.github/workflows/AutoUpdateBootstrap.yml b/.github/workflows/AutoUpdateBootstrap.yml index 3b3cdd1c..c28f30d1 100644 --- a/.github/workflows/AutoUpdateBootstrap.yml +++ b/.github/workflows/AutoUpdateBootstrap.yml @@ -22,7 +22,7 @@ jobs: aws-region: us-west-2 - name: Retrieve secret from AWS Secrets Manager - uses: aws-actions/aws-secretsmanager-get-secrets@5e19ff380d035695bdd56bbad320ca535c9063f2 #v2.0.9 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 #v2.0.10 with: secret-ids: | AWS_SECRET, ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_NAME }} diff --git a/.github/workflows/create-release-pr.yml b/.github/workflows/create-release-pr.yml index 8528d457..1071c71d 100644 --- a/.github/workflows/create-release-pr.yml +++ b/.github/workflows/create-release-pr.yml @@ -31,7 +31,7 @@ jobs: aws-region: us-west-2 # Retrieve the Access Token from Secrets Manager - name: Retrieve secret from AWS Secrets Manager - uses: aws-actions/aws-secretsmanager-get-secrets@5e19ff380d035695bdd56bbad320ca535c9063f2 #v2.0.9 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 #v2.0.10 with: secret-ids: | AWS_SECRET, ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_NAME }} diff --git a/.github/workflows/sync-main-dev.yml b/.github/workflows/sync-main-dev.yml index 2de87805..3e3ea817 100644 --- a/.github/workflows/sync-main-dev.yml +++ b/.github/workflows/sync-main-dev.yml @@ -32,7 +32,7 @@ jobs: aws-region: us-west-2 # Retrieve the Access Token from Secrets Manager - name: Retrieve secret from AWS Secrets Manager - uses: aws-actions/aws-secretsmanager-get-secrets@5e19ff380d035695bdd56bbad320ca535c9063f2 #v2.0.9 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 #v2.0.10 with: secret-ids: | AWS_SECRET, ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_NAME }} From 37fa9d2d72fb35f47d37e2d76132003915b0cddc Mon Sep 17 00:00:00 2001 From: Garrett Beatty Date: Sat, 12 Jul 2025 10:54:12 -0400 Subject: [PATCH 3/3] fix t2.nano usage --- test/AWS.Deploy.CLI.IntegrationTests/WebAppNoDockerFileTests.cs | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/test/AWS.Deploy.CLI.IntegrationTests/WebAppNoDockerFileTests.cs b/test/AWS.Deploy.CLI.IntegrationTests/WebAppNoDockerFileTests.cs index 527a7df0..80e208f5 100644 --- a/test/AWS.Deploy.CLI.IntegrationTests/WebAppNoDockerFileTests.cs +++ b/test/AWS.Deploy.CLI.IntegrationTests/WebAppNoDockerFileTests.cs @@ -214,7 +214,7 @@ public async Task BeanstalkArmDeployment() interactiveService.StdInWriter.Write(Environment.NewLine); // Confirm selection and deploy interactiveService.StdInWriter.WriteLine("more"); // Select "Environment Architecture" interactiveService.StdInWriter.WriteLine("1"); // Select "EC2 Instance Type" - interactiveService.StdInWriter.WriteLine("n"); // Don't select free tier which forces t3.micro to be used instead of t2.micro + interactiveService.StdInWriter.WriteLine("y"); // select free tier which includes t3.micro interactiveService.StdInWriter.WriteLine("1"); // Select "x86_64" interactiveService.StdInWriter.WriteLine("1"); // Select "CPU Cores" interactiveService.StdInWriter.WriteLine("1"); // Select "Instance Memory"