File tree Expand file tree Collapse file tree 8 files changed +11
-11
lines changed Expand file tree Collapse file tree 8 files changed +11
-11
lines changed Original file line number Diff line number Diff line change 5454 uses : aws-powertools/actions/.github/actions/cached-node-modules@29979bc5339bf54f76a11ac36ff67701986bb0f0
5555 - id : credentials
5656 name : AWS Credentials
57- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838
57+ uses : aws-actions/configure-aws-credentials@00943011d9042930efac3dcd3a170e4273319bc8
5858 with :
5959 aws-region : ${{ inputs.region }}
6060 role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
8484 steps :
8585 - id : credentials
8686 name : AWS Credentials
87- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838
87+ uses : aws-actions/configure-aws-credentials@00943011d9042930efac3dcd3a170e4273319bc8
8888 with :
8989 aws-region : us-east-1
9090 role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
Original file line number Diff line number Diff line change 4545 steps :
4646 - id : credentials
4747 name : AWS Credentials
48- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838
48+ uses : aws-actions/configure-aws-credentials@00943011d9042930efac3dcd3a170e4273319bc8
4949 with :
5050 aws-region : us-east-1
5151 role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
Original file line number Diff line number Diff line change 8484 environment : Prod (Readonly)
8585 steps :
8686 - name : Configure AWS Credentials
87- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0 .0
87+ uses : aws-actions/configure-aws-credentials@00943011d9042930efac3dcd3a170e4273319bc8 # v5.1 .0
8888 with :
8989 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
9090 aws-region : us-east-1
@@ -127,7 +127,7 @@ jobs:
127127 run : |
128128 echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT"
129129 - name : Configure AWS Credentials
130- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0 .0
130+ uses : aws-actions/configure-aws-credentials@00943011d9042930efac3dcd3a170e4273319bc8 # v5.1 .0
131131 with :
132132 # Dynamic secret access is safe here - secrets are scoped per environment
133133 role-to-assume : ${{ secrets[format('IAM_ROLE_{0}', steps.transform.outputs.CONVERTED_REGION)] }}
Original file line number Diff line number Diff line change 9393 environment : Prod (Readonly)
9494 steps :
9595 - name : Configure AWS Credentials
96- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0 .0
96+ uses : aws-actions/configure-aws-credentials@00943011d9042930efac3dcd3a170e4273319bc8 # v5.1 .0
9797 with :
9898 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
9999 aws-region : us-east-1
@@ -151,7 +151,7 @@ jobs:
151151 run : |
152152 echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT"
153153 - name : Configure AWS Credentials
154- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0 .0
154+ uses : aws-actions/configure-aws-credentials@00943011d9042930efac3dcd3a170e4273319bc8 # v5.1 .0
155155 with :
156156 # Dynamic secret access is safe here - secrets are scoped per environment
157157 role-to-assume : ${{ secrets[format('IAM_ROLE_{0}', steps.transform.outputs.CONVERTED_REGION)] }}
Original file line number Diff line number Diff line change 7575 - name : checkout
7676 uses : actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
7777 - name : aws credentials
78- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0 .0
78+ uses : aws-actions/configure-aws-credentials@00943011d9042930efac3dcd3a170e4273319bc8 # v5.1 .0
7979 with :
8080 aws-region : ${{ matrix.region }}
8181 role-to-assume : ${{ secrets.target-account-role }}
Original file line number Diff line number Diff line change 9090 rm -rf site
9191 mkdocs build
9292 - name : Configure AWS credentials
93- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0 .0
93+ uses : aws-actions/configure-aws-credentials@00943011d9042930efac3dcd3a170e4273319bc8 # v5.1 .0
9494 with :
9595 aws-region : us-east-1
9696 role-to-assume : ${{ secrets.AWS_DOCS_ROLE_ARN }}
Original file line number Diff line number Diff line change 5858 with :
5959 node-version : ' 22'
6060 - name : Setup AWS credentials
61- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0 .0
61+ uses : aws-actions/configure-aws-credentials@00943011d9042930efac3dcd3a170e4273319bc8 # v5.1 .0
6262 with :
6363 role-to-assume : ${{ secrets.E2E_IAM_ROLE_ARN }}
6464 aws-region : eu-west-1
Original file line number Diff line number Diff line change @@ -121,7 +121,7 @@ jobs:
121121 run : |
122122 echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT"
123123 - id : creds
124- uses : aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838
124+ uses : aws-actions/configure-aws-credentials@00943011d9042930efac3dcd3a170e4273319bc8
125125 with :
126126 aws-region : ${{ matrix.region }}
127127 # Dynamic secret access is safe here - secrets are scoped per environment
You can’t perform that action at this time.
0 commit comments