Skip to content

Commit 07e8767

Browse files
authored
fix(ci): revert aws credentials action (#3010)
* Revert "fix(ci): change SAR assume role options (#3005)" This reverts commit d437bf5. * Revert "chore(deps): bump aws-actions/configure-aws-credentials from 2.2.0 to 3.0.0 (#3000)" This reverts commit f0088bd.
1 parent d437bf5 commit 07e8767

5 files changed

+9
-7
lines changed

.github/workflows/dispatch_analytics.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ jobs:
4343
statuses: read
4444
steps:
4545
- name: Configure AWS credentials
46-
uses: aws-actions/configure-aws-credentials@ef93a73b1313f148011965ef7361f667f371f58b # v3.0.0
46+
uses: aws-actions/configure-aws-credentials@5fd3084fc36e372ff1fff382a39b10d03659f355 # v2.2.0
4747
with:
4848
aws-region: eu-central-1
4949
role-to-assume: ${{ secrets.AWS_ANALYTICS_ROLE_ARN }}

.github/workflows/reusable_deploy_v2_layer_stack.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ jobs:
151151
- name: Install poetry
152152
run: pipx install git+https://github.com/python-poetry/poetry@68b88e5390720a3dd84f02940ec5200bfce39ac6 # v1.5.0
153153
- name: aws credentials
154-
uses: aws-actions/configure-aws-credentials@ef93a73b1313f148011965ef7361f667f371f58b # v3.0.0
154+
uses: aws-actions/configure-aws-credentials@5fd3084fc36e372ff1fff382a39b10d03659f355 # v2.2.0
155155
with:
156156
aws-region: ${{ matrix.region }}
157157
role-to-assume: ${{ secrets.AWS_LAYERS_ROLE_ARN }}

.github/workflows/reusable_deploy_v2_sar.yml

+5-3
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ jobs:
9191

9292

9393
- name: AWS credentials
94-
uses: aws-actions/configure-aws-credentials@ef93a73b1313f148011965ef7361f667f371f58b # v3.0.0
94+
uses: aws-actions/configure-aws-credentials@5fd3084fc36e372ff1fff382a39b10d03659f355 # v2.2.0
9595
with:
9696
aws-region: ${{ env.AWS_REGION }}
9797
role-to-assume: ${{ secrets.AWS_LAYERS_ROLE_ARN }}
@@ -101,10 +101,12 @@ jobs:
101101
# we then jump to our specific SAR Account with the correctly scoped IAM Role
102102
# this allows us to have a single trail when a release occurs for a given layer (beta+prod+SAR beta+SAR prod)
103103
- name: AWS credentials SAR role
104-
uses: aws-actions/configure-aws-credentials@ef93a73b1313f148011965ef7361f667f371f58b # v3.0.0
104+
uses: aws-actions/configure-aws-credentials@5fd3084fc36e372ff1fff382a39b10d03659f355 # v2.2.0
105105
id: aws-credentials-sar-role
106106
with:
107-
role-chaining: true
107+
aws-access-key-id: ${{ env.AWS_ACCESS_KEY_ID }}
108+
aws-secret-access-key: ${{ env.AWS_SECRET_ACCESS_KEY }}
109+
aws-session-token: ${{ env.AWS_SESSION_TOKEN }}
108110
role-duration-seconds: 1200
109111
aws-region: ${{ env.AWS_REGION }}
110112
role-to-assume: ${{ secrets.AWS_SAR_V2_ROLE_ARN }}

.github/workflows/reusable_publish_docs.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ jobs:
7979
poetry run mike set-default --push latest
8080
8181
- name: Configure AWS credentials
82-
uses: aws-actions/configure-aws-credentials@ef93a73b1313f148011965ef7361f667f371f58b
82+
uses: aws-actions/configure-aws-credentials@5fd3084fc36e372ff1fff382a39b10d03659f355
8383
with:
8484
aws-region: us-east-1
8585
role-to-assume: ${{ secrets.AWS_DOCS_ROLE_ARN }}

.github/workflows/run-e2e-tests.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ jobs:
7171
- name: Install dependencies
7272
run: make dev
7373
- name: Configure AWS credentials
74-
uses: aws-actions/configure-aws-credentials@ef93a73b1313f148011965ef7361f667f371f58b # v3.0.0
74+
uses: aws-actions/configure-aws-credentials@5fd3084fc36e372ff1fff382a39b10d03659f355 # v2.2.0
7575
with:
7676
role-to-assume: ${{ secrets.AWS_TEST_ROLE_ARN }}
7777
aws-region: ${{ env.AWS_DEFAULT_REGION }}

0 commit comments

Comments
 (0)