Skip to content

Commit a708015

Browse files
Merge branch 'develop' into fix/docs-lambda-metadata-link-8068
2 parents 72c83af + e2612dc commit a708015

19 files changed

Lines changed: 161 additions & 163 deletions

.github/workflows/bootstrap_region.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ jobs:
5555
uses: aws-powertools/actions/.github/actions/cached-node-modules@828e78a26eee3554dc2e1d96048004548fbb169f
5656
- id: credentials
5757
name: AWS Credentials
58-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37
58+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885
5959
with:
6060
aws-region: ${{ inputs.region }}
6161
role-to-assume: ${{ secrets.REGION_IAM_ROLE }}
@@ -96,7 +96,7 @@ jobs:
9696
steps:
9797
- id: credentials
9898
name: AWS Credentials
99-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 # v6.1.0
99+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885 # v6.1.1
100100
with:
101101
aws-region: us-east-1
102102
role-to-assume: ${{ secrets.REGION_IAM_ROLE }}

.github/workflows/dependency-review.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,4 +22,4 @@ jobs:
2222
- name: 'Checkout Repository'
2323
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
2424
- name: 'Dependency Review'
25-
uses: actions/dependency-review-action@2031cfc080254a8a887f58cffee85186f0e49e48 # v4.9.0
25+
uses: actions/dependency-review-action@a1d282b36b6f3519aa1f3fc636f609c47dddb294 # v5.0.0

.github/workflows/layer_govcloud.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ jobs:
6060
environment: Prod (Readonly)
6161
steps:
6262
- name: Configure AWS Credentials
63-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 # v6.1.0
63+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885 # v6.1.1
6464
with:
6565
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
6666
aws-region: us-east-1
@@ -118,7 +118,7 @@ jobs:
118118
SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
119119
test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
120120
- name: Configure AWS Credentials
121-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 # v6.1.0
121+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885 # v6.1.1
122122
with:
123123
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
124124
aws-region: us-gov-east-1
@@ -188,7 +188,7 @@ jobs:
188188
SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
189189
test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
190190
- name: Configure AWS Credentials
191-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 # v6.1.0
191+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885 # v6.1.1
192192
with:
193193
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
194194
aws-region: us-gov-west-1

.github/workflows/layer_govcloud_python313.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ jobs:
5555
environment: Prod (Readonly)
5656
steps:
5757
- name: Configure AWS Credentials
58-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 # v6.1.0
58+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885 # v6.1.1
5959
with:
6060
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
6161
aws-region: us-east-1
@@ -108,7 +108,7 @@ jobs:
108108
SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
109109
test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
110110
- name: Configure AWS Credentials
111-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 # v6.1.0
111+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885 # v6.1.1
112112
with:
113113
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
114114
aws-region: us-gov-east-1
@@ -173,7 +173,7 @@ jobs:
173173
SHA=$(jq -r '.Content.CodeSha256' '${{ matrix.layer }}_${{ matrix.arch }}.json')
174174
test "$(openssl dgst -sha256 -binary ${{ matrix.layer }}_${{ matrix.arch }}.zip | openssl enc -base64)" == "$SHA" && echo "SHA OK: ${SHA}" || exit 1
175175
- name: Configure AWS Credentials
176-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 # v6.1.0
176+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885 # v6.1.1
177177
with:
178178
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
179179
aws-region: us-gov-west-1

.github/workflows/layer_govcloud_verify.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ jobs:
4040
environment: Prod (Readonly)
4141
steps:
4242
- name: Configure AWS Credentials
43-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 # v6.1.0
43+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885 # v6.1.1
4444
with:
4545
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
4646
aws-region: us-east-1
@@ -71,7 +71,7 @@ jobs:
7171
environment: GovCloud Prod (East)
7272
steps:
7373
- name: Configure AWS Credentials
74-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 # v6.1.0
74+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885 # v6.1.1
7575
with:
7676
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
7777
aws-region: us-gov-east-1
@@ -103,7 +103,7 @@ jobs:
103103
environment: GovCloud Prod (West)
104104
steps:
105105
- name: Configure AWS Credentials
106-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 # v6.1.0
106+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885 # v6.1.1
107107
with:
108108
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
109109
aws-region: us-gov-east-1

.github/workflows/layers_partition_verify.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ jobs:
8888
- x86_64
8989
steps:
9090
- name: Configure AWS Credentials
91-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 # v6.1.0
91+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885 # v6.1.1
9292
with:
9393
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
9494
aws-region: us-east-1
@@ -138,7 +138,7 @@ jobs:
138138
run: |
139139
echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT"
140140
- name: Configure AWS Credentials
141-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 # v6.1.0
141+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885 # v6.1.1
142142
with:
143143
role-to-assume: ${{ secrets[format('IAM_ROLE_{0}', steps.transform.outputs.CONVERTED_REGION)] }}
144144
aws-region: ${{ matrix.region}}

.github/workflows/layers_partitions.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ jobs:
8585
- x86_64
8686
steps:
8787
- name: Configure AWS Credentials
88-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 # v6.1.0
88+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885 # v6.1.1
8989
with:
9090
role-to-assume: ${{ secrets.AWS_IAM_ROLE }}
9191
aws-region: us-east-1
@@ -150,7 +150,7 @@ jobs:
150150
run: |
151151
echo 'CONVERTED_REGION=${{ matrix.region }}' | tr 'a-z\-' 'A-Z_' >> "$GITHUB_OUTPUT"
152152
- name: Configure AWS Credentials
153-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 # v6.1.0
153+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885 # v6.1.1
154154
with:
155155
role-to-assume: ${{ secrets[format('IAM_ROLE_{0}', steps.transform.outputs.CONVERTED_REGION)] }}
156156
aws-region: ${{ matrix.region}}

.github/workflows/release-drafter.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,4 +27,4 @@ jobs:
2727
permissions:
2828
contents: write # create release in draft mode
2929
steps:
30-
- uses: release-drafter/release-drafter@563bf132657a13ded0b01fcb723c5a58cdd824e2 # v7.2.1
30+
- uses: release-drafter/release-drafter@c2e2804cc59f45f57076a99af580d0fedb697927 # v7.3.0

.github/workflows/reusable_deploy_v3_layer_stack.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ jobs:
157157
pipx install git+https://github.com/python-poetry/poetry@bd500dd3bdfaec3de6894144c9cedb3a9358be84 # v2.0.1
158158
pipx inject poetry git+https://github.com/python-poetry/poetry-plugin-export@8c83d26603ca94f2e203bfded7b6d7f530960e06 # v1.8.0
159159
- name: Configure AWS credentials
160-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 # v6.1.0
160+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885 # v6.1.1
161161
with:
162162
aws-region: ${{ matrix.region }}
163163
role-to-assume: ${{ secrets.AWS_LAYERS_ROLE_ARN }}

.github/workflows/reusable_deploy_v3_sar.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ jobs:
8787

8888

8989
- name: Configure AWS credentials
90-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 # v6.1.0
90+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885 # v6.1.1
9191
with:
9292
aws-region: ${{ env.AWS_REGION }}
9393
role-to-assume: ${{ secrets.AWS_LAYERS_ROLE_ARN }}
@@ -98,7 +98,7 @@ jobs:
9898
# we then jump to our specific SAR Account with the correctly scoped IAM Role
9999
# this allows us to have a single trail when a release occurs for a given layer (beta+prod+SAR beta+SAR prod)
100100
- name: AWS credentials SAR role
101-
uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 # v6.1.0
101+
uses: aws-actions/configure-aws-credentials@d979d5b3a71173a29b74b5b88418bfda9437d885 # v6.1.1
102102
id: aws-credentials-sar-role
103103
with:
104104
aws-access-key-id: ${{ env.AWS_ACCESS_KEY_ID }}

0 commit comments

Comments
 (0)