Skip to content

Commit d4ec5f2

Browse files
chore(deps): update aws-actions/configure-aws-credentials action to v6
1 parent 974611a commit d4ec5f2

File tree

4 files changed

+11
-11
lines changed

4 files changed

+11
-11
lines changed

.github/workflows/build_docker_image_and_push_to_ecr.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ jobs:
176176
# First assume GithubOIDCRole role, the trust relationship between GitHub and AWS is defined in IAM GithubOIDCRole in the organization account. This role has permissions to assume Deployer roles only.
177177
- name: assume GithubOIDCRole
178178
if: inputs.useOIDC == true
179-
uses: aws-actions/configure-aws-credentials@v4
179+
uses: aws-actions/configure-aws-credentials@v6
180180
with:
181181
aws-region: ${{ inputs.awsRegion }}
182182
role-to-assume: ${{ inputs.githubOIDCRoleArn }}
@@ -189,7 +189,7 @@ jobs:
189189
# Then assume Deployer role, which can be assumed by GithubOIDCRole and has all the permissions needed to deploy cloudformation stacks.
190190
- name: assume Deployer role
191191
if: inputs.useOIDC == true
192-
uses: aws-actions/configure-aws-credentials@v4
192+
uses: aws-actions/configure-aws-credentials@v6
193193
with:
194194
aws-region: ${{ inputs.awsRegion }}
195195
role-to-assume: ${{ inputs.awsRoleArn }}

.github/workflows/deploy_cloudformation.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ jobs:
143143

144144
- name: assume IAM role
145145
if: inputs.useOIDC == false
146-
uses: aws-actions/configure-aws-credentials@v4
146+
uses: aws-actions/configure-aws-credentials@v6
147147
with:
148148
aws-access-key-id: ${{ secrets.awsAccessKeyId }}
149149
aws-secret-access-key: ${{ secrets.awsSecretAccessKey }}
@@ -158,7 +158,7 @@ jobs:
158158
# First assume GithubOIDCRole role, the trust relationship between GitHub and AWS is defined in IAM GithubOIDCRole in the organization account. This role has permissions to assume Deployer roles only.
159159
- name: assume GithubOIDCRole
160160
if: inputs.useOIDC == true
161-
uses: aws-actions/configure-aws-credentials@v4
161+
uses: aws-actions/configure-aws-credentials@v6
162162
with:
163163
aws-region: ${{ inputs.awsRegion }}
164164
role-to-assume: ${{ inputs.githubOIDCRoleArn }}
@@ -171,7 +171,7 @@ jobs:
171171
# Then assume Deployer role, which can be assumed by GithubOIDCRole and has all the permissions needed to deploy cloudformation stacks.
172172
- name: assume Deployer role
173173
if: inputs.useOIDC == true
174-
uses: aws-actions/configure-aws-credentials@v4
174+
uses: aws-actions/configure-aws-credentials@v6
175175
with:
176176
aws-region: ${{ inputs.awsRegion }}
177177
role-to-assume: ${{ inputs.awsRoleArn }}

.github/workflows/deploy_helmfile.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -197,7 +197,7 @@ jobs:
197197
198198
- name: assume IAM role
199199
if: inputs.useOIDC == false
200-
uses: aws-actions/configure-aws-credentials@v4
200+
uses: aws-actions/configure-aws-credentials@v6
201201
with:
202202
aws-access-key-id: ${{ secrets.awsAccessKeyId }}
203203
aws-secret-access-key: ${{ secrets.awsSecretAccessKey }}
@@ -212,7 +212,7 @@ jobs:
212212
# First assume GithubOIDCRole role, the trust relationship between GitHub and AWS is defined in IAM GithubOIDCRole in the organization account. This role has permissions to assume Deployer roles only.
213213
- name: assume GithubOIDCRole
214214
if: inputs.useOIDC == true
215-
uses: aws-actions/configure-aws-credentials@v4
215+
uses: aws-actions/configure-aws-credentials@v6
216216
with:
217217
aws-region: ${{ inputs.awsRegion }}
218218
role-to-assume: ${{ inputs.githubOIDCRoleArn }}
@@ -225,7 +225,7 @@ jobs:
225225
# Then assume Deployer role, which can be assumed by GithubOIDCRole and has all the permissions needed to deploy cloudformation stacks.
226226
- name: assume Deployer role
227227
if: inputs.useOIDC == true
228-
uses: aws-actions/configure-aws-credentials@v4
228+
uses: aws-actions/configure-aws-credentials@v6
229229
with:
230230
aws-region: ${{ inputs.awsRegion }}
231231
role-to-assume: ${{ inputs.awsRoleArn }}

.github/workflows/invalidate_cloudfront.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ jobs:
6666
steps:
6767
- name: assume IAM role
6868
if: inputs.useOIDC == false
69-
uses: aws-actions/configure-aws-credentials@v4
69+
uses: aws-actions/configure-aws-credentials@v6
7070
with:
7171
aws-access-key-id: ${{ secrets.awsAccessKeyId }}
7272
aws-secret-access-key: ${{ secrets.awsSecretAccessKey }}
@@ -81,7 +81,7 @@ jobs:
8181
# First assume GithubOIDCRole role, the trust relationship between GitHub and AWS is defined in IAM GithubOIDCRole in the organization account. This role has permissions to assume Deployer roles only.
8282
- name: assume GithubOIDCRole
8383
if: inputs.useOIDC == true
84-
uses: aws-actions/configure-aws-credentials@v4
84+
uses: aws-actions/configure-aws-credentials@v6
8585
with:
8686
aws-region: ${{ inputs.awsRegion }}
8787
role-to-assume: ${{ inputs.githubOIDCRoleArn }}
@@ -94,7 +94,7 @@ jobs:
9494
# Then assume Deployer role, which can be assumed by GithubOIDCRole and has all the permissions needed.
9595
- name: assume Deployer role
9696
if: inputs.useOIDC == true
97-
uses: aws-actions/configure-aws-credentials@v4
97+
uses: aws-actions/configure-aws-credentials@v6
9898
with:
9999
aws-region: ${{ inputs.awsRegion }}
100100
role-to-assume: ${{ inputs.awsRoleArn }}

0 commit comments

Comments
 (0)