@@ -89,19 +89,19 @@ jobs:
89
89
integrity_hash : ${{ inputs.source_code_integrity_hash }}
90
90
artifact_name : ${{ inputs.source_code_artifact_name }}
91
91
92
-
93
- - name : AWS credentials
94
- uses : aws-actions/configure-aws-credentials@5fd3084fc36e372ff1fff382a39b10d03659f355 # v2.2.0
92
+ - name : Configure AWS credentials
93
+ uses : aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
95
94
with :
96
95
aws-region : ${{ env.AWS_REGION }}
97
96
role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
97
+ mask-aws-account-id : true
98
98
99
- # NOTE
100
- # We connect to Layers account to log our intent to publish a SAR Layer
101
- # we then jump to our specific SAR Account with the correctly scoped IAM Role
102
- # this allows us to have a single trail when a release occurs for a given layer (beta+prod+SAR beta+SAR prod)
99
+ # NOTE
100
+ # We connect to Layers account to log our intent to publish a SAR Layer
101
+ # we then jump to our specific SAR Account with the correctly scoped IAM Role
102
+ # this allows us to have a single trail when a release occurs for a given layer (beta+prod+SAR beta+SAR prod)
103
103
- name : AWS credentials SAR role
104
- uses : aws-actions/configure-aws-credentials@5fd3084fc36e372ff1fff382a39b10d03659f355 # v2.2.0
104
+ uses : aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
105
105
id : aws-credentials-sar-role
106
106
with :
107
107
aws-access-key-id : ${{ env.AWS_ACCESS_KEY_ID }}
@@ -110,6 +110,8 @@ jobs:
110
110
role-duration-seconds : 1200
111
111
aws-region : ${{ env.AWS_REGION }}
112
112
role-to-assume : ${{ secrets.AWS_SAR_V2_ROLE_ARN }}
113
+ mask-aws-account-id : true
114
+
113
115
- name : Setup Node.js
114
116
uses : actions/setup-node@39370e3970a6d050c480ffad4ff0ed4d3fdee5af # v4.1.0
115
117
with :
0 commit comments