Skip to content

Commit 29ce628

Browse files
chore(deps): update aws-actions/configure-aws-credentials action to v6
1 parent 3bb8d2a commit 29ce628

4 files changed

Lines changed: 9 additions & 9 deletions

File tree

.github/workflows/build_docker_image_and_push_to_ecr.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ jobs:
176176
# First assume GithubOIDCRole role, the trust relationship between GitHub and AWS is defined in IAM GithubOIDCRole in the organization account. This role has permissions to assume Deployer roles only.
177177
- name: assume GithubOIDCRole
178178
if: inputs.useOIDC == true
179-
uses: aws-actions/configure-aws-credentials@v4
179+
uses: aws-actions/configure-aws-credentials@v6
180180
with:
181181
aws-region: ${{ inputs.awsRegion }}
182182
role-to-assume: ${{ inputs.githubOIDCRoleArn }}
@@ -189,7 +189,7 @@ jobs:
189189
# Then assume Deployer role, which can be assumed by GithubOIDCRole and has all the permissions needed to deploy cloudformation stacks.
190190
- name: assume Deployer role
191191
if: inputs.useOIDC == true
192-
uses: aws-actions/configure-aws-credentials@v4
192+
uses: aws-actions/configure-aws-credentials@v6
193193
with:
194194
aws-region: ${{ inputs.awsRegion }}
195195
role-to-assume: ${{ inputs.awsRoleArn }}

.github/workflows/deploy_cloudformation.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ jobs:
143143

144144
- name: assume IAM role
145145
if: inputs.useOIDC == false
146-
uses: aws-actions/configure-aws-credentials@v4
146+
uses: aws-actions/configure-aws-credentials@v6
147147
with:
148148
aws-access-key-id: ${{ secrets.awsAccessKeyId }}
149149
aws-secret-access-key: ${{ secrets.awsSecretAccessKey }}
@@ -158,7 +158,7 @@ jobs:
158158
# First assume GithubOIDCRole role, the trust relationship between GitHub and AWS is defined in IAM GithubOIDCRole in the organization account. This role has permissions to assume Deployer roles only.
159159
- name: assume GithubOIDCRole
160160
if: inputs.useOIDC == true
161-
uses: aws-actions/configure-aws-credentials@v4
161+
uses: aws-actions/configure-aws-credentials@v6
162162
with:
163163
aws-region: ${{ inputs.awsRegion }}
164164
role-to-assume: ${{ inputs.githubOIDCRoleArn }}
@@ -171,7 +171,7 @@ jobs:
171171
# Then assume Deployer role, which can be assumed by GithubOIDCRole and has all the permissions needed to deploy cloudformation stacks.
172172
- name: assume Deployer role
173173
if: inputs.useOIDC == true
174-
uses: aws-actions/configure-aws-credentials@v4
174+
uses: aws-actions/configure-aws-credentials@v6
175175
with:
176176
aws-region: ${{ inputs.awsRegion }}
177177
role-to-assume: ${{ inputs.awsRoleArn }}

.github/workflows/deploy_helmfile.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -197,7 +197,7 @@ jobs:
197197
198198
- name: assume IAM role
199199
if: inputs.useOIDC == false
200-
uses: aws-actions/configure-aws-credentials@v4
200+
uses: aws-actions/configure-aws-credentials@v6
201201
with:
202202
aws-access-key-id: ${{ secrets.awsAccessKeyId }}
203203
aws-secret-access-key: ${{ secrets.awsSecretAccessKey }}
@@ -212,7 +212,7 @@ jobs:
212212
# First assume GithubOIDCRole role, the trust relationship between GitHub and AWS is defined in IAM GithubOIDCRole in the organization account. This role has permissions to assume Deployer roles only.
213213
- name: assume GithubOIDCRole
214214
if: inputs.useOIDC == true
215-
uses: aws-actions/configure-aws-credentials@v4
215+
uses: aws-actions/configure-aws-credentials@v6
216216
with:
217217
aws-region: ${{ inputs.awsRegion }}
218218
role-to-assume: ${{ inputs.githubOIDCRoleArn }}
@@ -225,7 +225,7 @@ jobs:
225225
# Then assume Deployer role, which can be assumed by GithubOIDCRole and has all the permissions needed to deploy cloudformation stacks.
226226
- name: assume Deployer role
227227
if: inputs.useOIDC == true
228-
uses: aws-actions/configure-aws-credentials@v4
228+
uses: aws-actions/configure-aws-credentials@v6
229229
with:
230230
aws-region: ${{ inputs.awsRegion }}
231231
role-to-assume: ${{ inputs.awsRoleArn }}

.github/workflows/invalidate_cloudfront.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ jobs:
5555
runs-on: ubuntu-22.04-arm64
5656
steps:
5757
- name: assume IAM role
58-
uses: aws-actions/configure-aws-credentials@v4
58+
uses: aws-actions/configure-aws-credentials@v6
5959
with:
6060
aws-access-key-id: ${{ secrets.awsAccessKeyId }}
6161
aws-secret-access-key: ${{ secrets.awsSecretAccessKey }}

0 commit comments

Comments
 (0)