@@ -89,19 +89,19 @@ jobs:
8989 integrity_hash : ${{ inputs.source_code_integrity_hash }}
9090 artifact_name : ${{ inputs.source_code_artifact_name }}
9191
92-
93- - name : AWS credentials
94- uses : aws-actions/configure-aws-credentials@5fd3084fc36e372ff1fff382a39b10d03659f355 # v2.2.0
92+ - name : Configure AWS credentials
93+ uses : aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
9594 with :
9695 aws-region : ${{ env.AWS_REGION }}
9796 role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
97+ mask-aws-account-id : true
9898
99- # NOTE
100- # We connect to Layers account to log our intent to publish a SAR Layer
101- # we then jump to our specific SAR Account with the correctly scoped IAM Role
102- # this allows us to have a single trail when a release occurs for a given layer (beta+prod+SAR beta+SAR prod)
99+ # NOTE
100+ # We connect to Layers account to log our intent to publish a SAR Layer
101+ # we then jump to our specific SAR Account with the correctly scoped IAM Role
102+ # this allows us to have a single trail when a release occurs for a given layer (beta+prod+SAR beta+SAR prod)
103103 - name : AWS credentials SAR role
104- uses : aws-actions/configure-aws-credentials@5fd3084fc36e372ff1fff382a39b10d03659f355 # v2.2.0
104+ uses : aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
105105 id : aws-credentials-sar-role
106106 with :
107107 aws-access-key-id : ${{ env.AWS_ACCESS_KEY_ID }}
@@ -110,6 +110,8 @@ jobs:
110110 role-duration-seconds : 1200
111111 aws-region : ${{ env.AWS_REGION }}
112112 role-to-assume : ${{ secrets.AWS_SAR_V2_ROLE_ARN }}
113+ mask-aws-account-id : true
114+
113115 - name : Setup Node.js
114116 uses : actions/setup-node@39370e3970a6d050c480ffad4ff0ed4d3fdee5af # v4.1.0
115117 with :
0 commit comments