File tree Expand file tree Collapse file tree 12 files changed +22
-22
lines changed
Expand file tree Collapse file tree 12 files changed +22
-22
lines changed Original file line number Diff line number Diff line change 5555 uses : aws-powertools/actions/.github/actions/cached-node-modules@3b5b8e2e58b7af07994be982e83584a94e8c76c5
5656 - id : credentials
5757 name : AWS Credentials
58- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838
58+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708
5959 with :
6060 aws-region : ${{ inputs.region }}
6161 role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
9696 steps :
9797 - id : credentials
9898 name : AWS Credentials
99- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
99+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
100100 with :
101101 aws-region : us-east-1
102102 role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
Original file line number Diff line number Diff line change 4343 statuses : read
4444 steps :
4545 - name : Configure AWS credentials
46- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
46+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
4747 with :
4848 aws-region : eu-central-1
4949 role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
Original file line number Diff line number Diff line change 6060 environment : Prod (Readonly)
6161 steps :
6262 - name : Configure AWS Credentials
63- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
63+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
6464 with :
6565 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
6666 aws-region : us-east-1
@@ -118,7 +118,7 @@ jobs:
118118 SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
119119 test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
120120 - name : Configure AWS Credentials
121- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
121+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
122122 with :
123123 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
124124 aws-region : us-gov-east-1
@@ -188,7 +188,7 @@ jobs:
188188 SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
189189 test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
190190 - name : Configure AWS Credentials
191- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
191+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
192192 with :
193193 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
194194 aws-region : us-gov-west-1
Original file line number Diff line number Diff line change 5555 environment : Prod (Readonly)
5656 steps :
5757 - name : Configure AWS Credentials
58- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
58+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
5959 with :
6060 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
6161 aws-region : us-east-1
@@ -108,7 +108,7 @@ jobs:
108108 SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
109109 test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
110110 - name : Configure AWS Credentials
111- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
111+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
112112 with :
113113 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
114114 aws-region : us-gov-east-1
@@ -173,7 +173,7 @@ jobs:
173173 SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
174174 test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
175175 - name : Configure AWS Credentials
176- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
176+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
177177 with :
178178 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
179179 aws-region : us-gov-west-1
Original file line number Diff line number Diff line change 4040 environment : Prod (Readonly)
4141 steps :
4242 - name : Configure AWS Credentials
43- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
43+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
4444 with :
4545 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
4646 aws-region : us-east-1
7171 environment : GovCloud Prod (East)
7272 steps :
7373 - name : Configure AWS Credentials
74- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
74+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
7575 with :
7676 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
7777 aws-region : us-gov-east-1
@@ -103,7 +103,7 @@ jobs:
103103 environment : GovCloud Prod (West)
104104 steps :
105105 - name : Configure AWS Credentials
106- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
106+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
107107 with :
108108 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
109109 aws-region : us-gov-east-1
Original file line number Diff line number Diff line change 8888 - x86_64
8989 steps :
9090 - name : Configure AWS Credentials
91- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
91+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
9292 with :
9393 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
9494 aws-region : us-east-1
@@ -138,7 +138,7 @@ jobs:
138138 run : |
139139 echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT"
140140 - name : Configure AWS Credentials
141- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
141+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
142142 with :
143143 role-to-assume : ${{ secrets[format('IAM_ROLE_{0}', steps.transform.outputs.CONVERTED_REGION)] }}
144144 aws-region : ${{ matrix.region}}
Original file line number Diff line number Diff line change 8585 - x86_64
8686 steps :
8787 - name : Configure AWS Credentials
88- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
88+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
8989 with :
9090 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
9191 aws-region : us-east-1
@@ -150,7 +150,7 @@ jobs:
150150 run : |
151151 echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT"
152152 - name : Configure AWS Credentials
153- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
153+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
154154 with :
155155 role-to-assume : ${{ secrets[format('IAM_ROLE_{0}', steps.transform.outputs.CONVERTED_REGION)] }}
156156 aws-region : ${{ matrix.region}}
Original file line number Diff line number Diff line change @@ -161,7 +161,7 @@ jobs:
161161 pipx install git+https://github.com/python-poetry/poetry@bd500dd3bdfaec3de6894144c9cedb3a9358be84 # v2.0.1
162162 pipx inject poetry git+https://github.com/python-poetry/poetry-plugin-export@8c83d26603ca94f2e203bfded7b6d7f530960e06 # v1.8.0
163163 - name : Configure AWS credentials
164- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
164+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
165165 with :
166166 aws-region : ${{ matrix.region }}
167167 role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
Original file line number Diff line number Diff line change 8787
8888
8989 - name : Configure AWS credentials
90- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
90+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
9191 with :
9292 aws-region : ${{ env.AWS_REGION }}
9393 role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
9898 # we then jump to our specific SAR Account with the correctly scoped IAM Role
9999 # this allows us to have a single trail when a release occurs for a given layer (beta+prod+SAR beta+SAR prod)
100100 - name : AWS credentials SAR role
101- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
101+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
102102 id : aws-credentials-sar-role
103103 with :
104104 aws-access-key-id : ${{ env.AWS_ACCESS_KEY_ID }}
Original file line number Diff line number Diff line change 6868 env :
6969 BRANCH : ${{ inputs.git_ref }}
7070 - name : Configure AWS credentials
71- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v4.3.0
71+ uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4.3.0
7272 with :
7373 aws-region : us-east-1
7474 role-to-assume : ${{ secrets.AWS_DOCS_ROLE_ARN }}
You can’t perform that action at this time.
0 commit comments