File tree 12 files changed +21
-21
lines changed
12 files changed +21
-21
lines changed Original file line number Diff line number Diff line change 45
45
steps :
46
46
- id : credentials
47
47
name : AWS Credentials
48
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
48
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
49
49
with :
50
50
aws-region : ${{ inputs.region }}
51
51
role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
89
89
steps :
90
90
- id : credentials
91
91
name : AWS Credentials
92
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
92
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
93
93
with :
94
94
aws-region : us-east-1
95
95
role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
Original file line number Diff line number Diff line change 43
43
statuses : read
44
44
steps :
45
45
- name : Configure AWS credentials
46
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
46
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
47
47
with :
48
48
aws-region : eu-central-1
49
49
role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
Original file line number Diff line number Diff line change 59
59
environment : Prod (Readonly)
60
60
steps :
61
61
- name : Configure AWS Credentials
62
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
62
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
63
63
with :
64
64
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
65
65
aws-region : us-east-1
@@ -116,7 +116,7 @@ jobs:
116
116
SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
117
117
test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
118
118
- name : Configure AWS Credentials
119
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
119
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
120
120
with :
121
121
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
122
122
aws-region : us-gov-east-1
@@ -185,7 +185,7 @@ jobs:
185
185
SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
186
186
test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
187
187
- name : Configure AWS Credentials
188
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
188
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
189
189
with :
190
190
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
191
191
aws-region : us-gov-west-1
Original file line number Diff line number Diff line change 55
55
environment : Prod (Readonly)
56
56
steps :
57
57
- name : Configure AWS Credentials
58
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
58
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
59
59
with :
60
60
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
61
61
aws-region : us-east-1
@@ -108,7 +108,7 @@ jobs:
108
108
SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
109
109
test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
110
110
- name : Configure AWS Credentials
111
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
111
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
112
112
with :
113
113
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
114
114
aws-region : us-gov-east-1
@@ -173,7 +173,7 @@ jobs:
173
173
SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
174
174
test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
175
175
- name : Configure AWS Credentials
176
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
176
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
177
177
with :
178
178
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
179
179
aws-region : us-gov-west-1
Original file line number Diff line number Diff line change 39
39
environment : Prod (Readonly)
40
40
steps :
41
41
- name : Configure AWS Credentials
42
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
42
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
43
43
with :
44
44
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
45
45
aws-region : us-east-1
69
69
environment : GovCloud Prod (East)
70
70
steps :
71
71
- name : Configure AWS Credentials
72
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
72
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
73
73
with :
74
74
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
75
75
aws-region : us-gov-east-1
@@ -100,7 +100,7 @@ jobs:
100
100
environment : GovCloud Prod (West)
101
101
steps :
102
102
- name : Configure AWS Credentials
103
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
103
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
104
104
with :
105
105
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
106
106
aws-region : us-gov-east-1
Original file line number Diff line number Diff line change @@ -153,7 +153,7 @@ jobs:
153
153
- name : Install poetry
154
154
run : pipx install git+https://github.com/python-poetry/poetry@bd500dd3bdfaec3de6894144c9cedb3a9358be84 # v2.0.1
155
155
- name : Configure AWS Credentials
156
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
156
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
157
157
with :
158
158
aws-region : ${{ matrix.region }}
159
159
role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
Original file line number Diff line number Diff line change 90
90
artifact_name : ${{ inputs.source_code_artifact_name }}
91
91
92
92
- name : Configure AWS credentials
93
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
93
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
94
94
with :
95
95
aws-region : ${{ env.AWS_REGION }}
96
96
role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
@@ -101,7 +101,7 @@ jobs:
101
101
# we then jump to our specific SAR Account with the correctly scoped IAM Role
102
102
# this allows us to have a single trail when a release occurs for a given layer (beta+prod+SAR beta+SAR prod)
103
103
- name : AWS credentials SAR role
104
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
104
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
105
105
id : aws-credentials-sar-role
106
106
with :
107
107
aws-access-key-id : ${{ env.AWS_ACCESS_KEY_ID }}
Original file line number Diff line number Diff line change @@ -161,7 +161,7 @@ jobs:
161
161
pipx install git+https://github.com/python-poetry/poetry@bd500dd3bdfaec3de6894144c9cedb3a9358be84 # v2.0.1
162
162
pipx inject poetry git+https://github.com/python-poetry/poetry-plugin-export@8c83d26603ca94f2e203bfded7b6d7f530960e06 # v1.8.0
163
163
- name : Configure AWS credentials
164
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
164
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
165
165
with :
166
166
aws-region : ${{ matrix.region }}
167
167
role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
Original file line number Diff line number Diff line change 87
87
88
88
89
89
- name : Configure AWS credentials
90
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
90
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
91
91
with :
92
92
aws-region : ${{ env.AWS_REGION }}
93
93
role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
98
98
# we then jump to our specific SAR Account with the correctly scoped IAM Role
99
99
# this allows us to have a single trail when a release occurs for a given layer (beta+prod+SAR beta+SAR prod)
100
100
- name : AWS credentials SAR role
101
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
101
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
102
102
id : aws-credentials-sar-role
103
103
with :
104
104
aws-access-key-id : ${{ env.AWS_ACCESS_KEY_ID }}
Original file line number Diff line number Diff line change 79
79
poetry run mike set-default --push latest
80
80
81
81
- name : Configure AWS credentials
82
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
82
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
83
83
with :
84
84
aws-region : us-east-1
85
85
role-to-assume : ${{ secrets.AWS_DOCS_ROLE_ARN }}
Original file line number Diff line number Diff line change 72
72
- name : Install dependencies
73
73
run : make dev-quality-code
74
74
- name : Configure AWS credentials
75
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
75
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
76
76
with :
77
77
role-to-assume : ${{ secrets.AWS_TEST_ROLE_ARN }}
78
78
aws-region : ${{ env.AWS_DEFAULT_REGION }}
Original file line number Diff line number Diff line change 65
65
run : |
66
66
echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT"
67
67
- id : creds
68
- uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1 .0
68
+ uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2 .0
69
69
with :
70
70
aws-region : ${{ matrix.region }}
71
71
role-to-assume : ${{ secrets[format('{0}', steps.transform.outputs.CONVERTED_REGION)] }}
You can’t perform that action at this time.
0 commit comments