File tree 13 files changed +23
-23
lines changed
13 files changed +23
-23
lines changed Original file line number Diff line number Diff line change 45
45
steps :
46
46
- id : credentials
47
47
name : AWS Credentials
48
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
48
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
49
49
with :
50
50
aws-region : ${{ inputs.region }}
51
51
role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
91
91
steps :
92
92
- id : credentials
93
93
name : AWS Credentials
94
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
94
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
95
95
with :
96
96
aws-region : us-east-1
97
97
role-to-assume : ${{ secrets.REGION_IAM_ROLE }}
Original file line number Diff line number Diff line change 43
43
statuses : read
44
44
steps :
45
45
- name : Configure AWS credentials
46
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
46
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
47
47
with :
48
48
aws-region : eu-central-1
49
49
role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
Original file line number Diff line number Diff line change 59
59
environment : Prod (Readonly)
60
60
steps :
61
61
- name : Configure AWS Credentials
62
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
62
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
63
63
with :
64
64
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
65
65
aws-region : us-east-1
@@ -116,7 +116,7 @@ jobs:
116
116
SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
117
117
test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
118
118
- name : Configure AWS Credentials
119
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
119
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
120
120
with :
121
121
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
122
122
aws-region : us-gov-east-1
@@ -185,7 +185,7 @@ jobs:
185
185
SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
186
186
test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
187
187
- name : Configure AWS Credentials
188
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
188
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
189
189
with :
190
190
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
191
191
aws-region : us-gov-west-1
Original file line number Diff line number Diff line change 55
55
environment : Prod (Readonly)
56
56
steps :
57
57
- name : Configure AWS Credentials
58
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
58
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
59
59
with :
60
60
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
61
61
aws-region : us-east-1
@@ -108,7 +108,7 @@ jobs:
108
108
SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
109
109
test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
110
110
- name : Configure AWS Credentials
111
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
111
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
112
112
with :
113
113
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
114
114
aws-region : us-gov-east-1
@@ -173,7 +173,7 @@ jobs:
173
173
SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
174
174
test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
175
175
- name : Configure AWS Credentials
176
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
176
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
177
177
with :
178
178
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
179
179
aws-region : us-gov-west-1
Original file line number Diff line number Diff line change 39
39
environment : Prod (Readonly)
40
40
steps :
41
41
- name : Configure AWS Credentials
42
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
42
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
43
43
with :
44
44
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
45
45
aws-region : us-east-1
69
69
environment : GovCloud Prod (East)
70
70
steps :
71
71
- name : Configure AWS Credentials
72
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
72
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
73
73
with :
74
74
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
75
75
aws-region : us-gov-east-1
@@ -100,7 +100,7 @@ jobs:
100
100
environment : GovCloud Prod (West)
101
101
steps :
102
102
- name : Configure AWS Credentials
103
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
103
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
104
104
with :
105
105
role-to-assume : ${{ secrets.AWS_IAM_ROLE }}
106
106
aws-region : us-gov-east-1
Original file line number Diff line number Diff line change 56
56
environment : layer-prod
57
57
steps :
58
58
- name : Configure AWS Credentials
59
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
59
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
60
60
with :
61
61
role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
62
62
aws-region : us-east-1
@@ -140,7 +140,7 @@ jobs:
140
140
SHA=$(jq -r '.Content.CodeSha256' ${{ matrix.layer }}_x86_64.json)
141
141
test $(openssl dgst -sha256 -binary ${{ matrix.layer }}_x86_64.zip | openssl enc -base64) == $SHA && echo "SHA OK: ${SHA}" || exit 1
142
142
- name : Configure AWS Credentials
143
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
143
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
144
144
with :
145
145
role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
146
146
aws-region : ${{ matrix.region }}
Original file line number Diff line number Diff line change @@ -153,7 +153,7 @@ jobs:
153
153
- name : Install poetry
154
154
run : pipx install git+https://github.com/python-poetry/poetry@bd500dd3bdfaec3de6894144c9cedb3a9358be84 # v2.0.1
155
155
- name : Configure AWS Credentials
156
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
156
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
157
157
with :
158
158
aws-region : ${{ matrix.region }}
159
159
role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
Original file line number Diff line number Diff line change 90
90
artifact_name : ${{ inputs.source_code_artifact_name }}
91
91
92
92
- name : Configure AWS credentials
93
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
93
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
94
94
with :
95
95
aws-region : ${{ env.AWS_REGION }}
96
96
role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
@@ -101,7 +101,7 @@ jobs:
101
101
# we then jump to our specific SAR Account with the correctly scoped IAM Role
102
102
# this allows us to have a single trail when a release occurs for a given layer (beta+prod+SAR beta+SAR prod)
103
103
- name : AWS credentials SAR role
104
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
104
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
105
105
id : aws-credentials-sar-role
106
106
with :
107
107
aws-access-key-id : ${{ env.AWS_ACCESS_KEY_ID }}
Original file line number Diff line number Diff line change @@ -157,7 +157,7 @@ jobs:
157
157
pipx install git+https://github.com/python-poetry/poetry@bd500dd3bdfaec3de6894144c9cedb3a9358be84 # v2.0.1
158
158
pipx inject poetry git+https://github.com/python-poetry/poetry-plugin-export@8c83d26603ca94f2e203bfded7b6d7f530960e06 # v1.8.0
159
159
- name : Configure AWS credentials
160
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
160
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
161
161
with :
162
162
aws-region : ${{ matrix.region }}
163
163
role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
Original file line number Diff line number Diff line change 87
87
88
88
89
89
- name : Configure AWS credentials
90
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
90
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
91
91
with :
92
92
aws-region : ${{ env.AWS_REGION }}
93
93
role-to-assume : ${{ secrets.AWS_LAYERS_ROLE_ARN }}
98
98
# we then jump to our specific SAR Account with the correctly scoped IAM Role
99
99
# this allows us to have a single trail when a release occurs for a given layer (beta+prod+SAR beta+SAR prod)
100
100
- name : AWS credentials SAR role
101
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
101
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
102
102
id : aws-credentials-sar-role
103
103
with :
104
104
aws-access-key-id : ${{ env.AWS_ACCESS_KEY_ID }}
Original file line number Diff line number Diff line change 79
79
poetry run mike set-default --push latest
80
80
81
81
- name : Configure AWS credentials
82
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
82
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
83
83
with :
84
84
aws-region : us-east-1
85
85
role-to-assume : ${{ secrets.AWS_DOCS_ROLE_ARN }}
Original file line number Diff line number Diff line change 72
72
- name : Install dependencies
73
73
run : make dev-quality-code
74
74
- name : Configure AWS credentials
75
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
75
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
76
76
with :
77
77
role-to-assume : ${{ secrets.AWS_TEST_ROLE_ARN }}
78
78
aws-region : ${{ env.AWS_DEFAULT_REGION }}
Original file line number Diff line number Diff line change 66
66
run : |
67
67
echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT"
68
68
- id : creds
69
- uses : aws-actions/configure-aws-credentials@4fc4975a852c8cd99761e2de1f4ba73402e44dd9 # v4.0.3
69
+ uses : aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
70
70
with :
71
71
aws-region : ${{ matrix.region }}
72
72
role-to-assume : ${{ secrets[format('{0}', steps.transform.outputs.CONVERTED_REGION)] }}
You can’t perform that action at this time.
0 commit comments