File tree Expand file tree Collapse file tree 12 files changed +21
-21
lines changed Expand file tree Collapse file tree 12 files changed +21
-21
lines changed Original file line number Diff line number Diff line change 4545 steps :
4646 - id : credentials
4747 name : AWS Credentials
48- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
48+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
4949 with :
5050 aws-region : ${{ inputs.region }}
5151 role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
8989 steps :
9090 - id : credentials
9191 name : AWS Credentials
92- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
92+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
9393 with :
9494 aws-region : us-east-1
9595 role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
Original file line number Diff line number Diff line change 4343 statuses : read
4444 steps :
4545 - name : Configure AWS credentials
46- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
46+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
4747 with :
4848 aws-region : eu-central-1
4949 role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
Original file line number Diff line number Diff line change 5959 environment : Prod (Readonly)
6060 steps :
6161 - name : Configure AWS Credentials
62- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
62+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
6363 with :
6464 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
6565 aws-region : us-east-1
@@ -116,7 +116,7 @@ jobs:
116116 SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
117117 test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
118118 - name : Configure AWS Credentials
119- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
119+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
120120 with :
121121 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
122122 aws-region : us-gov-east-1
@@ -185,7 +185,7 @@ jobs:
185185 SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
186186 test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
187187 - name : Configure AWS Credentials
188- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
188+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
189189 with :
190190 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
191191 aws-region : us-gov-west-1
Original file line number Diff line number Diff line change 5555 environment : Prod (Readonly)
5656 steps :
5757 - name : Configure AWS Credentials
58- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
58+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
5959 with :
6060 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
6161 aws-region : us-east-1
@@ -108,7 +108,7 @@ jobs:
108108 SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
109109 test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
110110 - name : Configure AWS Credentials
111- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
111+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
112112 with :
113113 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
114114 aws-region : us-gov-east-1
@@ -173,7 +173,7 @@ jobs:
173173 SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
174174 test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
175175 - name : Configure AWS Credentials
176- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
176+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
177177 with :
178178 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
179179 aws-region : us-gov-west-1
Original file line number Diff line number Diff line change 3939 environment : Prod (Readonly)
4040 steps :
4141 - name : Configure AWS Credentials
42- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
42+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
4343 with :
4444 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
4545 aws-region : us-east-1
6969 environment : GovCloud Prod (East)
7070 steps :
7171 - name : Configure AWS Credentials
72- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
72+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
7373 with :
7474 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
7575 aws-region : us-gov-east-1
@@ -100,7 +100,7 @@ jobs:
100100 environment : GovCloud Prod (West)
101101 steps :
102102 - name : Configure AWS Credentials
103- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
103+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
104104 with :
105105 role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
106106 aws-region : us-gov-east-1
Original file line number Diff line number Diff line change @@ -153,7 +153,7 @@ jobs:
153153 - name : Install poetry
154154 run : pipx install git+https://github.com/python-poetry/poetry@bd500dd3bdfaec3de6894144c9cedb3a9358be84 # v2.0.1
155155 - name : Configure AWS Credentials
156- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
156+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
157157 with :
158158 aws-region : ${{ matrix.region }}
159159 role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
Original file line number Diff line number Diff line change 9090 artifact_name : ${{ inputs.source_code_artifact_name }}
9191
9292 - name : Configure AWS credentials
93- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
93+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
9494 with :
9595 aws-region : ${{ env.AWS_REGION }}
9696 role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
@@ -101,7 +101,7 @@ jobs:
101101 # we then jump to our specific SAR Account with the correctly scoped IAM Role
102102 # this allows us to have a single trail when a release occurs for a given layer (beta+prod+SAR beta+SAR prod)
103103 - name : AWS credentials SAR role
104- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
104+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
105105 id : aws-credentials-sar-role
106106 with :
107107 aws-access-key-id : ${{ env.AWS_ACCESS_KEY_ID }}
Original file line number Diff line number Diff line change @@ -161,7 +161,7 @@ jobs:
161161 pipx install git+https://github.com/python-poetry/poetry@bd500dd3bdfaec3de6894144c9cedb3a9358be84 # v2.0.1
162162 pipx inject poetry git+https://github.com/python-poetry/poetry-plugin-export@8c83d26603ca94f2e203bfded7b6d7f530960e06 # v1.8.0
163163 - name : Configure AWS credentials
164- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
164+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
165165 with :
166166 aws-region : ${{ matrix.region }}
167167 role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
Original file line number Diff line number Diff line change 8787
8888
8989 - name : Configure AWS credentials
90- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
90+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
9191 with :
9292 aws-region : ${{ env.AWS_REGION }}
9393 role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
9898 # we then jump to our specific SAR Account with the correctly scoped IAM Role
9999 # this allows us to have a single trail when a release occurs for a given layer (beta+prod+SAR beta+SAR prod)
100100 - name : AWS credentials SAR role
101- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
101+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
102102 id : aws-credentials-sar-role
103103 with :
104104 aws-access-key-id : ${{ env.AWS_ACCESS_KEY_ID }}
Original file line number Diff line number Diff line change 7979 poetry run mike set-default --push latest
8080
8181 - name : Configure AWS credentials
82- uses : aws-actions/configure-aws-credentials@f24d7193d98baebaeacc7e2227925dd47cc267f5 # v4.2.0
82+ uses : aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df # v4.2.1
8383 with :
8484 aws-region : us-east-1
8585 role-to-assume : ${{ secrets.AWS_DOCS_ROLE_ARN }}
You can’t perform that action at this time.
0 commit comments