File tree Expand file tree Collapse file tree 8 files changed +11
-11
lines changed
Expand file tree Collapse file tree 8 files changed +11
-11
lines changed Original file line number Diff line number Diff line change 5454 uses : aws-powertools/actions/.github/actions/cached-node-modules@29979bc5339bf54f76a11ac36ff67701986bb0f0
5555 - id : credentials
5656 name : AWS Credentials
57- uses : aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a
57+ uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838
5858 with :
5959 aws-region : ${{ inputs.region }}
6060 role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
8181 steps :
8282 - id : credentials
8383 name : AWS Credentials
84- uses : aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a
84+ uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838
8585 with :
8686 aws-region : us-east-1
8787 role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
Original file line number Diff line number Diff line change 4545 steps :
4646 - id : credentials
4747 name : AWS Credentials
48- uses : aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a
48+ uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838
4949 with :
5050 aws-region : us-east-1
5151 role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
Original file line number Diff line number Diff line change 8484 environment : Prod (Readonly)
8585 steps :
8686 - name : Configure AWS Credentials
87- uses : aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a # v4.3.1
87+ uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0
8888 with :
8989 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
9090 aws-region : us-east-1
@@ -124,7 +124,7 @@ jobs:
124124 run : |
125125 echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT"
126126 - name : Configure AWS Credentials
127- uses : aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a # v4.3.1
127+ uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0
128128 with :
129129 # Dynamic secret access is safe here - secrets are scoped per environment
130130 role-to-assume : ${{ secrets[format('IAM_ROLE_{0}', steps.transform.outputs.CONVERTED_REGION)] }}
Original file line number Diff line number Diff line change 9393 environment : Prod (Readonly)
9494 steps :
9595 - name : Configure AWS Credentials
96- uses : aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a # v4.3.1
96+ uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0
9797 with :
9898 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
9999 aws-region : us-east-1
@@ -148,7 +148,7 @@ jobs:
148148 run : |
149149 echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT"
150150 - name : Configure AWS Credentials
151- uses : aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a # v4.3.1
151+ uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0
152152 with :
153153 # Dynamic secret access is safe here - secrets are scoped per environment
154154 role-to-assume : ${{ secrets[format('IAM_ROLE_{0}', steps.transform.outputs.CONVERTED_REGION)] }}
Original file line number Diff line number Diff line change 7575 - name : checkout
7676 uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
7777 - name : aws credentials
78- uses : aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a # v4.3.1
78+ uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0
7979 with :
8080 aws-region : ${{ matrix.region }}
8181 role-to-assume : ${{ secrets.target-account-role }}
Original file line number Diff line number Diff line change 8383 rm -rf site
8484 mkdocs build
8585 - name : Configure AWS credentials
86- uses : aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a # v4.3.1
86+ uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0
8787 with :
8888 aws-region : us-east-1
8989 role-to-assume : ${{ secrets.AWS_DOCS_ROLE_ARN }}
Original file line number Diff line number Diff line change 5555 with :
5656 node-version : ' 22'
5757 - name : Setup AWS credentials
58- uses : aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a # v4.3.1
58+ uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0
5959 with :
6060 role-to-assume : ${{ secrets.E2E_IAM_ROLE_ARN }}
6161 aws-region : eu-west-1
Original file line number Diff line number Diff line change @@ -121,7 +121,7 @@ jobs:
121121 run : |
122122 echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT"
123123 - id : creds
124- uses : aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a
124+ uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838
125125 with :
126126 aws-region : ${{ matrix.region }}
127127 # Dynamic secret access is safe here - secrets are scoped per environment
You can’t perform that action at this time.
0 commit comments