File tree Expand file tree Collapse file tree 6 files changed +12
-12
lines changed
Expand file tree Collapse file tree 6 files changed +12
-12
lines changed Original file line number Diff line number Diff line change 1616 runs-on : ubuntu-latest
1717 steps :
1818 - name : Configure Load Balancer Credentials
19- uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4
19+ uses : aws-actions/configure-aws-credentials@8df5847569e6427dd6c4fb1cf565c83acfa8afa7 # v4
2020 with :
2121 role-to-assume : ${{ secrets.CI_MAIN_TESTING_ACCOUNT_ROLE_ARN }}
2222 role-duration-seconds : 7200
2929 $roleArn=$(cat ./response.json)
3030 "roleArn=$($roleArn -replace '"', '')" >> $env:GITHUB_OUTPUT
3131 - name : Configure Test Runner Credentials
32- uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4
32+ uses : aws-actions/configure-aws-credentials@8df5847569e6427dd6c4fb1cf565c83acfa8afa7 # v4
3333 with :
3434 role-to-assume : ${{ steps.lambda.outputs.roleArn }}
3535 role-duration-seconds : 7200
4141 project-name : ${{ secrets.CI_TESTING_CODE_BUILD_PROJECT_NAME }}
4242 - name : Configure Test Sweeper Lambda Credentials
4343 if : always()
44- uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v4
44+ uses : aws-actions/configure-aws-credentials@8df5847569e6427dd6c4fb1cf565c83acfa8afa7 # v4
4545 with :
4646 role-to-assume : ${{ steps.lambda.outputs.roleArn }}
4747 role-duration-seconds : 7200
Original file line number Diff line number Diff line change @@ -48,13 +48,13 @@ jobs:
4848 - uses : actions/checkout@85e6279cec87321a52edac9c87bce653a07cf6c2 # v4.2.2
4949
5050 - name : Set up QEMU
51- uses : docker/setup-qemu-action@v3
51+ uses : docker/setup-qemu-action@v4
5252
5353 - name : Set up Docker Buildx
54- uses : docker/setup-buildx-action@v3
54+ uses : docker/setup-buildx-action@v4
5555
5656 - name : Build ${{ matrix.name }}
57- uses : docker/build-push-action@v6
57+ uses : docker/build-push-action@v7
5858 with :
5959 context : .
6060 file : ${{ matrix.dockerfile }}
Original file line number Diff line number Diff line change 1616
1717 - name : Get List of Changed Files
1818 id : changed-files
19- uses : tj-actions/changed-files@e0021407031f5be11a464abee9a0776171c79891 # v45
19+ uses : tj-actions/changed-files@22103cc46bda19c2b464ffe86db46df6922fd323 # v45
2020
2121 - name : Check for Change File(s) in .autover/changes/
2222 run : |
Original file line number Diff line number Diff line change @@ -25,13 +25,13 @@ jobs:
2525 steps :
2626 # Assume an AWS Role that provides access to the Access Token
2727 - name : Configure AWS Credentials
28- uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v5.1.1
28+ uses : aws-actions/configure-aws-credentials@8df5847569e6427dd6c4fb1cf565c83acfa8afa7 # v6.0.0
2929 with :
3030 role-to-assume : ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_ROLE_ARN }}
3131 aws-region : us-west-2
3232 # Retrieve the Access Token from Secrets Manager
3333 - name : Retrieve secret from AWS Secrets Manager
34- uses : aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2 .0.10
34+ uses : aws-actions/aws-secretsmanager-get-secrets@3a411b6ec5cace3d626412dd917e7bfeac242cfa # v3 .0.0
3535 with :
3636 secret-ids : |
3737 AWS_SECRET, ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_NAME }}
Original file line number Diff line number Diff line change 3535 p/owasp-top-ten
3636
3737 - name : Upload SARIF file for GitHub Advanced Security Dashboard
38- uses : github/codeql-action/upload-sarif@5d4e8d1aca955e8d8589aabd499c5cae939e33c7 # v4.31.9
38+ uses : github/codeql-action/upload-sarif@c10b8064de6f491fea524254123dbe5e09572f13 # v4.35.1
3939 with :
4040 sarif_file : semgrep.sarif
4141 if : always()
Original file line number Diff line number Diff line change @@ -26,13 +26,13 @@ jobs:
2626 steps :
2727 # Assume an AWS Role that provides access to the Access Token
2828 - name : Configure AWS Credentials
29- uses : aws-actions/configure-aws-credentials@61815dcd50bd041e203e49132bacad1fd04d2708 # v5.1.1
29+ uses : aws-actions/configure-aws-credentials@8df5847569e6427dd6c4fb1cf565c83acfa8afa7 # v6.0.0
3030 with :
3131 role-to-assume : ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_ROLE_ARN }}
3232 aws-region : us-west-2
3333 # Retrieve the Access Token from Secrets Manager
3434 - name : Retrieve secret from AWS Secrets Manager
35- uses : aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2 .0.10
35+ uses : aws-actions/aws-secretsmanager-get-secrets@3a411b6ec5cace3d626412dd917e7bfeac242cfa # v3 .0.0
3636 with :
3737 secret-ids : |
3838 AWS_SECRET, ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_NAME }}
You can’t perform that action at this time.
0 commit comments