File tree Expand file tree Collapse file tree 13 files changed +23
-23
lines changed Expand file tree Collapse file tree 13 files changed +23
-23
lines changed Original file line number Diff line number Diff line change 4545 steps :
4646 - id : credentials
4747 name : AWS Credentials
48- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
48+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
4949 with :
5050 aws-region : ${{ inputs.region }}
5151 role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
9191 steps :
9292 - id : credentials
9393 name : AWS Credentials
94- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
94+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
9595 with :
9696 aws-region : us-east-1
9797 role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
Original file line number Diff line number Diff line change 4343 statuses : read
4444 steps :
4545 - name : Configure AWS credentials
46- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
46+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
4747 with :
4848 aws-region : eu-central-1
4949 role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
Original file line number Diff line number Diff line change 5959 environment : Prod (Readonly)
6060 steps :
6161 - name : Configure AWS Credentials
62- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
62+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
6363 with :
6464 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
6565 aws-region : us-east-1
@@ -116,7 +116,7 @@ jobs:
116116 SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
117117 test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
118118 - name : Configure AWS Credentials
119- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
119+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
120120 with :
121121 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
122122 aws-region : us-gov-east-1
@@ -185,7 +185,7 @@ jobs:
185185 SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
186186 test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
187187 - name : Configure AWS Credentials
188- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
188+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
189189 with :
190190 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
191191 aws-region : us-gov-west-1
Original file line number Diff line number Diff line change 5555 environment : Prod (Readonly)
5656 steps :
5757 - name : Configure AWS Credentials
58- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
58+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
5959 with :
6060 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
6161 aws-region : us-east-1
@@ -108,7 +108,7 @@ jobs:
108108 SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
109109 test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
110110 - name : Configure AWS Credentials
111- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
111+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
112112 with :
113113 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
114114 aws-region : us-gov-east-1
@@ -173,7 +173,7 @@ jobs:
173173 SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
174174 test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
175175 - name : Configure AWS Credentials
176- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
176+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
177177 with :
178178 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
179179 aws-region : us-gov-west-1
Original file line number Diff line number Diff line change 3939 environment : Prod (Readonly)
4040 steps :
4141 - name : Configure AWS Credentials
42- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
42+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
4343 with :
4444 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
4545 aws-region : us-east-1
6969 environment : GovCloud Prod (East)
7070 steps :
7171 - name : Configure AWS Credentials
72- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
72+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
7373 with :
7474 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
7575 aws-region : us-gov-east-1
@@ -100,7 +100,7 @@ jobs:
100100 environment : GovCloud Prod (West)
101101 steps :
102102 - name : Configure AWS Credentials
103- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
103+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
104104 with :
105105 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
106106 aws-region : us-gov-east-1
Original file line number Diff line number Diff line change 5656 environment : layer-prod
5757 steps :
5858 - name : Configure AWS Credentials
59- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
59+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
6060 with :
6161 role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
6262 aws-region : us-east-1
@@ -140,7 +140,7 @@ jobs:
140140 SHA=$(jq -r '.Content.CodeSha256' ${{ matrix.layer }}_x86_64.json)
141141 test $(openssl dgst -sha256 -binary ${{ matrix.layer }}_x86_64.zip | openssl enc -base64) == $SHA && echo "SHA OK: ${SHA}" || exit 1
142142 - name : Configure AWS Credentials
143- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
143+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
144144 with :
145145 role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
146146 aws-region : ${{ matrix.region }}
Original file line number Diff line number Diff line change @@ -153,7 +153,7 @@ jobs:
153153 - name : Install poetry
154154 run : pipx install git+https://github.com/python-poetry/poetry@bd500dd3bdfaec3de6894144c9cedb3a9358be84 # v2.0.1
155155 - name : Configure AWS Credentials
156- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
156+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
157157 with :
158158 aws-region : ${{ matrix.region }}
159159 role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
Original file line number Diff line number Diff line change 9090 artifact_name : ${{ inputs.source_code_artifact_name }}
9191
9292 - name : Configure AWS credentials
93- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
93+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
9494 with :
9595 aws-region : ${{ env.AWS_REGION }}
9696 role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
@@ -101,7 +101,7 @@ jobs:
101101 # we then jump to our specific SAR Account with the correctly scoped IAM Role
102102 # this allows us to have a single trail when a release occurs for a given layer (beta+prod+SAR beta+SAR prod)
103103 - name : AWS credentials SAR role
104- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
104+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
105105 id : aws-credentials-sar-role
106106 with :
107107 aws-access-key-id : ${{ env.AWS_ACCESS_KEY_ID }}
Original file line number Diff line number Diff line change @@ -157,7 +157,7 @@ jobs:
157157 pipx install git+https://github.com/python-poetry/poetry@bd500dd3bdfaec3de6894144c9cedb3a9358be84 # v2.0.1
158158 pipx inject poetry git+https://github.com/python-poetry/poetry-plugin-export@8c83d26603ca94f2e203bfded7b6d7f530960e06 # v1.8.0
159159 - name : Configure AWS credentials
160- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
160+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
161161 with :
162162 aws-region : ${{ matrix.region }}
163163 role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
Original file line number Diff line number Diff line change 8787
8888
8989 - name : Configure AWS credentials
90- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
90+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
9191 with :
9292 aws-region : ${{ env.AWS_REGION }}
9393 role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
9898 # we then jump to our specific SAR Account with the correctly scoped IAM Role
9999 # this allows us to have a single trail when a release occurs for a given layer (beta+prod+SAR beta+SAR prod)
100100 - name : AWS credentials SAR role
101- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
101+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
102102 id : aws-credentials-sar-role
103103 with :
104104 aws-access-key-id : ${{ env.AWS_ACCESS_KEY_ID }}
You can’t perform that action at this time.
0 commit comments