diff --git a/.github/workflows/build-push.yml b/.github/workflows/build-push.yml index 448f5d75e..846a38de8 100644 --- a/.github/workflows/build-push.yml +++ b/.github/workflows/build-push.yml @@ -94,7 +94,7 @@ jobs: ~/cds-website-dist key: ${{ runner.os }}-${{ github.sha }} - name: configure aws credentials using OIDC - uses: aws-actions/configure-aws-credentials@67fbcbb121271f7775d2e7715933280b06314838 # tag=v1.7.0 + uses: aws-actions/configure-aws-credentials@04b98b3f9e85f563fb061be8751a0352327246b0 # v3.0.1 with: role-to-assume: arn:aws:iam::521732289257:role/digital-canada-ca-apply # TF apply role-session-name: cache diff --git a/.github/workflows/build-test.yml b/.github/workflows/build-test.yml index b1e9857bf..fdf7f9ca2 100644 --- a/.github/workflows/build-test.yml +++ b/.github/workflows/build-test.yml @@ -86,7 +86,7 @@ jobs: key: ${{ runner.os }}-${{ github.sha }} - name: Configure AWS credentials id: aws-creds - uses: aws-actions/configure-aws-credentials@67fbcbb121271f7775d2e7715933280b06314838 # v1.7.0 + uses: aws-actions/configure-aws-credentials@04b98b3f9e85f563fb061be8751a0352327246b0 # v3.0.1 with: aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} diff --git a/.github/workflows/deploy-staging.yaml b/.github/workflows/deploy-staging.yaml index 480c82e3f..ad566da2a 100644 --- a/.github/workflows/deploy-staging.yaml +++ b/.github/workflows/deploy-staging.yaml @@ -26,7 +26,7 @@ jobs: - name: Configure AWS credentials id: aws-creds - uses: aws-actions/configure-aws-credentials@67fbcbb121271f7775d2e7715933280b06314838 # v1.7.0 + uses: aws-actions/configure-aws-credentials@04b98b3f9e85f563fb061be8751a0352327246b0 # v3.0.1 with: aws-access-key-id: ${{ secrets.STAGING_AWS_ACCESS_KEY_ID }} aws-secret-access-key: ${{ secrets.STAGING_AWS_SECRET_ACCESS_KEY }} @@ -60,7 +60,7 @@ jobs: - name: Configure AWS credentials id: aws-creds - uses: aws-actions/configure-aws-credentials@67fbcbb121271f7775d2e7715933280b06314838 # v1.7.0 + uses: aws-actions/configure-aws-credentials@04b98b3f9e85f563fb061be8751a0352327246b0 # v3.0.1 with: aws-access-key-id: ${{ secrets.STAGING_AWS_ACCESS_KEY_ID }} aws-secret-access-key: ${{ secrets.STAGING_AWS_SECRET_ACCESS_KEY }} diff --git a/.github/workflows/remove-staging.yaml b/.github/workflows/remove-staging.yaml index 597e62eb6..77ed97263 100644 --- a/.github/workflows/remove-staging.yaml +++ b/.github/workflows/remove-staging.yaml @@ -23,7 +23,7 @@ jobs: - name: Configure AWS credentials id: aws-creds - uses: aws-actions/configure-aws-credentials@67fbcbb121271f7775d2e7715933280b06314838 # v1.7.0 + uses: aws-actions/configure-aws-credentials@04b98b3f9e85f563fb061be8751a0352327246b0 # v3.0.1 with: aws-access-key-id: ${{ secrets.STAGING_AWS_ACCESS_KEY_ID }} aws-secret-access-key: ${{ secrets.STAGING_AWS_SECRET_ACCESS_KEY }} @@ -44,7 +44,7 @@ jobs: - name: Configure AWS credentials id: aws-creds - uses: aws-actions/configure-aws-credentials@67fbcbb121271f7775d2e7715933280b06314838 # v1.7.0 + uses: aws-actions/configure-aws-credentials@04b98b3f9e85f563fb061be8751a0352327246b0 # v3.0.1 with: aws-access-key-id: ${{ secrets.STAGING_AWS_ACCESS_KEY_ID }} aws-secret-access-key: ${{ secrets.STAGING_AWS_SECRET_ACCESS_KEY }} diff --git a/.github/workflows/tf_apply_production.yml b/.github/workflows/tf_apply_production.yml index 2c2f4e728..24858b8b1 100644 --- a/.github/workflows/tf_apply_production.yml +++ b/.github/workflows/tf_apply_production.yml @@ -33,7 +33,7 @@ jobs: uses: cds-snc/terraform-tools-setup@v1 - name: configure aws credentials using OIDC - uses: aws-actions/configure-aws-credentials@67fbcbb121271f7775d2e7715933280b06314838 # tag=v1.7.0 + uses: aws-actions/configure-aws-credentials@04b98b3f9e85f563fb061be8751a0352327246b0 # v3.0.1 with: role-to-assume: arn:aws:iam::521732289257:role/digital-canada-ca-apply # TF apply role-session-name: TFApply diff --git a/.github/workflows/tf_plan_production.yml b/.github/workflows/tf_plan_production.yml index 492c8e3df..00caf5981 100644 --- a/.github/workflows/tf_plan_production.yml +++ b/.github/workflows/tf_plan_production.yml @@ -40,7 +40,7 @@ jobs: uses: cds-snc/terraform-tools-setup@v1 - name: configure aws credentials using OIDC - uses: aws-actions/configure-aws-credentials@67fbcbb121271f7775d2e7715933280b06314838 # tag=v1.7.0 + uses: aws-actions/configure-aws-credentials@04b98b3f9e85f563fb061be8751a0352327246b0 # v3.0.1 with: role-to-assume: arn:aws:iam::521732289257:role/digital-canada-ca-plan # TF plan role-session-name: TFPlan