File tree Expand file tree Collapse file tree 12 files changed +22
-22
lines changed Expand file tree Collapse file tree 12 files changed +22
-22
lines changed Original file line number Diff line number Diff line change 55
55
uses : aws-powertools/actions/.github/actions/cached-node-modules@743fa57a003787b157991ea5c6e3cf0d40468676
56
56
- id : credentials
57
57
name : AWS Credentials
58
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b
58
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98
59
59
with :
60
60
aws-region : ${{ inputs.region }}
61
61
role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
94
94
steps :
95
95
- id : credentials
96
96
name : AWS Credentials
97
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
97
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
98
98
with :
99
99
aws-region : us-east-1
100
100
role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
Original file line number Diff line number Diff line change 43
43
statuses : read
44
44
steps :
45
45
- name : Configure AWS credentials
46
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
46
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
47
47
with :
48
48
aws-region : eu-central-1
49
49
role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
Original file line number Diff line number Diff line change 59
59
environment : Prod (Readonly)
60
60
steps :
61
61
- name : Configure AWS Credentials
62
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
62
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
63
63
with :
64
64
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
65
65
aws-region : us-east-1
@@ -116,7 +116,7 @@ jobs:
116
116
SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
117
117
test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
118
118
- name : Configure AWS Credentials
119
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
119
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
120
120
with :
121
121
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
122
122
aws-region : us-gov-east-1
@@ -185,7 +185,7 @@ jobs:
185
185
SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
186
186
test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
187
187
- name : Configure AWS Credentials
188
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
188
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
189
189
with :
190
190
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
191
191
aws-region : us-gov-west-1
Original file line number Diff line number Diff line change 55
55
environment : Prod (Readonly)
56
56
steps :
57
57
- name : Configure AWS Credentials
58
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
58
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
59
59
with :
60
60
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
61
61
aws-region : us-east-1
@@ -108,7 +108,7 @@ jobs:
108
108
SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
109
109
test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
110
110
- name : Configure AWS Credentials
111
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
111
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
112
112
with :
113
113
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
114
114
aws-region : us-gov-east-1
@@ -173,7 +173,7 @@ jobs:
173
173
SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
174
174
test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
175
175
- name : Configure AWS Credentials
176
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
176
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
177
177
with :
178
178
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
179
179
aws-region : us-gov-west-1
Original file line number Diff line number Diff line change 39
39
environment : Prod (Readonly)
40
40
steps :
41
41
- name : Configure AWS Credentials
42
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
42
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
43
43
with :
44
44
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
45
45
aws-region : us-east-1
69
69
environment : GovCloud Prod (East)
70
70
steps :
71
71
- name : Configure AWS Credentials
72
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
72
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
73
73
with :
74
74
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
75
75
aws-region : us-gov-east-1
@@ -100,7 +100,7 @@ jobs:
100
100
environment : GovCloud Prod (West)
101
101
steps :
102
102
- name : Configure AWS Credentials
103
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
103
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
104
104
with :
105
105
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
106
106
aws-region : us-gov-east-1
Original file line number Diff line number Diff line change 87
87
- x86_64
88
88
steps :
89
89
- name : Configure AWS Credentials
90
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
90
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
91
91
with :
92
92
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
93
93
aws-region : us-east-1
@@ -136,7 +136,7 @@ jobs:
136
136
run : |
137
137
echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT"
138
138
- name : Configure AWS Credentials
139
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
139
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
140
140
with :
141
141
role-to-assume : ${{ secrets[format('IAM_ROLE_{0}', steps.transform.outputs.CONVERTED_REGION)] }}
142
142
aws-region : ${{ matrix.region}}
Original file line number Diff line number Diff line change 84
84
- x86_64
85
85
steps :
86
86
- name : Configure AWS Credentials
87
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
87
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
88
88
with :
89
89
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
90
90
aws-region : us-east-1
@@ -148,7 +148,7 @@ jobs:
148
148
run : |
149
149
echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT"
150
150
- name : Configure AWS Credentials
151
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
151
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
152
152
with :
153
153
role-to-assume : ${{ secrets[format('IAM_ROLE_{0}', steps.transform.outputs.CONVERTED_REGION)] }}
154
154
aws-region : ${{ matrix.region}}
Original file line number Diff line number Diff line change @@ -161,7 +161,7 @@ jobs:
161
161
pipx install git+https://github.com/python-poetry/poetry@bd500dd3bdfaec3de6894144c9cedb3a9358be84 # v2.0.1
162
162
pipx inject poetry git+https://github.com/python-poetry/poetry-plugin-export@8c83d26603ca94f2e203bfded7b6d7f530960e06 # v1.8.0
163
163
- name : Configure AWS credentials
164
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
164
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
165
165
with :
166
166
aws-region : ${{ matrix.region }}
167
167
role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
Original file line number Diff line number Diff line change 87
87
88
88
89
89
- name : Configure AWS credentials
90
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
90
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
91
91
with :
92
92
aws-region : ${{ env.AWS_REGION }}
93
93
role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
98
98
# we then jump to our specific SAR Account with the correctly scoped IAM Role
99
99
# this allows us to have a single trail when a release occurs for a given layer (beta+prod+SAR beta+SAR prod)
100
100
- name : AWS credentials SAR role
101
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
101
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
102
102
id : aws-credentials-sar-role
103
103
with :
104
104
aws-access-key-id : ${{ env.AWS_ACCESS_KEY_ID }}
Original file line number Diff line number Diff line change 68
68
env :
69
69
BRANCH : ${{ inputs.git_ref }}
70
70
- name : Configure AWS credentials
71
- uses : aws-actions/configure-aws-credentials@59b441846ad109fa4a1549b73ef4e149c4bfb53b # v4.3.0
71
+ uses : aws-actions/configure-aws-credentials@aa1f74b81b53cb3adb28afcdb21d7b9f3fceea98 # v4.3.0
72
72
with :
73
73
aws-region : us-east-1
74
74
role-to-assume : ${{ secrets.AWS_DOCS_ROLE_ARN }}
You can’t perform that action at this time.
0 commit comments