File tree Expand file tree Collapse file tree 9 files changed +11
-11
lines changed
Expand file tree Collapse file tree 9 files changed +11
-11
lines changed Original file line number Diff line number Diff line change 5454 uses : aws-powertools/actions/.github/actions/cached-node-modules@29979bc5339bf54f76a11ac36ff67701986bb0f0
5555 - id : credentials
5656 name : AWS Credentials
57- uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708
57+ uses : aws-actions/configure-aws-credentials@8df5847569e6427dd6c4fb1cf565c83acfa8afa7
5858 with :
5959 aws-region : ${{ inputs.region }}
6060 role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
8484 steps :
8585 - id : credentials
8686 name : AWS Credentials
87- uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708
87+ uses : aws-actions/configure-aws-credentials@8df5847569e6427dd6c4fb1cf565c83acfa8afa7
8888 with :
8989 aws-region : us-east-1
9090 role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
Original file line number Diff line number Diff line change 4545 steps :
4646 - id : credentials
4747 name : AWS Credentials
48- uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708
48+ uses : aws-actions/configure-aws-credentials@8df5847569e6427dd6c4fb1cf565c83acfa8afa7
4949 with :
5050 aws-region : us-east-1
5151 role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
Original file line number Diff line number Diff line change 8484 environment : Prod (Readonly)
8585 steps :
8686 - name : Configure AWS Credentials
87- uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v5.1.1
87+ uses : aws-actions/configure-aws-credentials@8df5847569e6427dd6c4fb1cf565c83acfa8afa7 # v6.0.0
8888 with :
8989 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
9090 aws-region : us-east-1
@@ -127,7 +127,7 @@ jobs:
127127 run : |
128128 echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT"
129129 - name : Configure AWS Credentials
130- uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v5.1.1
130+ uses : aws-actions/configure-aws-credentials@8df5847569e6427dd6c4fb1cf565c83acfa8afa7 # v6.0.0
131131 with :
132132 # Dynamic secret access is safe here - secrets are scoped per environment
133133 role-to-assume : ${{ secrets[format('IAM_ROLE_{0}', steps.transform.outputs.CONVERTED_REGION)] }}
Original file line number Diff line number Diff line change 7171 environment : Prod (Readonly)
7272 steps :
7373 - name : Configure AWS Credentials
74- uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v5.1.1
74+ uses : aws-actions/configure-aws-credentials@8df5847569e6427dd6c4fb1cf565c83acfa8afa7 # v6.0.0
7575 with :
7676 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
7777 aws-region : us-east-1
Original file line number Diff line number Diff line change 5454 echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT"
5555
5656 - name : Configure AWS Credentials
57- uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v5.1.1
57+ uses : aws-actions/configure-aws-credentials@8df5847569e6427dd6c4fb1cf565c83acfa8afa7 # v6.0.0
5858 with :
5959 role-to-assume : ${{ secrets[format('IAM_ROLE_{0}', steps.transform.outputs.CONVERTED_REGION)] }}
6060 aws-region : ${{ matrix.region }}
Original file line number Diff line number Diff line change 7575 - name : checkout
7676 uses : actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
7777 - name : aws credentials
78- uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v5.1.1
78+ uses : aws-actions/configure-aws-credentials@8df5847569e6427dd6c4fb1cf565c83acfa8afa7 # v6.0.0
7979 with :
8080 aws-region : ${{ matrix.region }}
8181 role-to-assume : ${{ secrets.target-account-role }}
Original file line number Diff line number Diff line change 9090 rm -rf site
9191 mkdocs build
9292 - name : Configure AWS credentials
93- uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v5.1.1
93+ uses : aws-actions/configure-aws-credentials@8df5847569e6427dd6c4fb1cf565c83acfa8afa7 # v6.0.0
9494 with :
9595 aws-region : us-east-1
9696 role-to-assume : ${{ secrets.AWS_DOCS_ROLE_ARN }}
Original file line number Diff line number Diff line change 6060 with :
6161 node-version : 24
6262 - name : Setup AWS credentials
63- uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v5.1.1
63+ uses : aws-actions/configure-aws-credentials@8df5847569e6427dd6c4fb1cf565c83acfa8afa7 # v6.0.0
6464 with :
6565 role-to-assume : ${{ secrets.E2E_IAM_ROLE_ARN }}
6666 aws-region : eu-west-1
Original file line number Diff line number Diff line change @@ -121,7 +121,7 @@ jobs:
121121 run : |
122122 echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT"
123123 - id : creds
124- uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708
124+ uses : aws-actions/configure-aws-credentials@8df5847569e6427dd6c4fb1cf565c83acfa8afa7
125125 with :
126126 aws-region : ${{ matrix.region }}
127127 # Dynamic secret access is safe here - secrets are scoped per environment
You can’t perform that action at this time.
0 commit comments