From 3806bf0f4e23df24771c32d46a5c34c3d12d2e36 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Thu, 26 Mar 2026 19:31:13 +0000 Subject: [PATCH] chore(deps): update aws-actions/configure-aws-credentials action to v6 --- .github/workflows/build_docker_image_and_push_to_ecr.yaml | 4 ++-- .github/workflows/deploy_cloudformation.yaml | 6 +++--- .github/workflows/deploy_helmfile.yaml | 6 +++--- .github/workflows/invalidate_cloudfront.yaml | 6 +++--- 4 files changed, 11 insertions(+), 11 deletions(-) diff --git a/.github/workflows/build_docker_image_and_push_to_ecr.yaml b/.github/workflows/build_docker_image_and_push_to_ecr.yaml index a6b56bd0..7c437774 100644 --- a/.github/workflows/build_docker_image_and_push_to_ecr.yaml +++ b/.github/workflows/build_docker_image_and_push_to_ecr.yaml @@ -176,7 +176,7 @@ jobs: # First assume GithubOIDCRole role, the trust relationship between GitHub and AWS is defined in IAM GithubOIDCRole in the organization account. This role has permissions to assume Deployer roles only. - name: assume GithubOIDCRole if: inputs.useOIDC == true - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-region: ${{ inputs.awsRegion }} role-to-assume: ${{ inputs.githubOIDCRoleArn }} @@ -189,7 +189,7 @@ jobs: # Then assume Deployer role, which can be assumed by GithubOIDCRole and has all the permissions needed to deploy cloudformation stacks. - name: assume Deployer role if: inputs.useOIDC == true - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-region: ${{ inputs.awsRegion }} role-to-assume: ${{ inputs.awsRoleArn }} diff --git a/.github/workflows/deploy_cloudformation.yaml b/.github/workflows/deploy_cloudformation.yaml index a8ac61a8..b5d19506 100644 --- a/.github/workflows/deploy_cloudformation.yaml +++ b/.github/workflows/deploy_cloudformation.yaml @@ -143,7 +143,7 @@ jobs: - name: assume IAM role if: inputs.useOIDC == false - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-access-key-id: ${{ secrets.awsAccessKeyId }} aws-secret-access-key: ${{ secrets.awsSecretAccessKey }} @@ -158,7 +158,7 @@ jobs: # First assume GithubOIDCRole role, the trust relationship between GitHub and AWS is defined in IAM GithubOIDCRole in the organization account. This role has permissions to assume Deployer roles only. - name: assume GithubOIDCRole if: inputs.useOIDC == true - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-region: ${{ inputs.awsRegion }} role-to-assume: ${{ inputs.githubOIDCRoleArn }} @@ -171,7 +171,7 @@ jobs: # Then assume Deployer role, which can be assumed by GithubOIDCRole and has all the permissions needed to deploy cloudformation stacks. - name: assume Deployer role if: inputs.useOIDC == true - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-region: ${{ inputs.awsRegion }} role-to-assume: ${{ inputs.awsRoleArn }} diff --git a/.github/workflows/deploy_helmfile.yaml b/.github/workflows/deploy_helmfile.yaml index 72764e5f..1b5edfc1 100644 --- a/.github/workflows/deploy_helmfile.yaml +++ b/.github/workflows/deploy_helmfile.yaml @@ -197,7 +197,7 @@ jobs: - name: assume IAM role if: inputs.useOIDC == false - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-access-key-id: ${{ secrets.awsAccessKeyId }} aws-secret-access-key: ${{ secrets.awsSecretAccessKey }} @@ -212,7 +212,7 @@ jobs: # First assume GithubOIDCRole role, the trust relationship between GitHub and AWS is defined in IAM GithubOIDCRole in the organization account. This role has permissions to assume Deployer roles only. - name: assume GithubOIDCRole if: inputs.useOIDC == true - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-region: ${{ inputs.awsRegion }} role-to-assume: ${{ inputs.githubOIDCRoleArn }} @@ -225,7 +225,7 @@ jobs: # Then assume Deployer role, which can be assumed by GithubOIDCRole and has all the permissions needed to deploy cloudformation stacks. - name: assume Deployer role if: inputs.useOIDC == true - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-region: ${{ inputs.awsRegion }} role-to-assume: ${{ inputs.awsRoleArn }} diff --git a/.github/workflows/invalidate_cloudfront.yaml b/.github/workflows/invalidate_cloudfront.yaml index 2a217fc6..fa9959dc 100644 --- a/.github/workflows/invalidate_cloudfront.yaml +++ b/.github/workflows/invalidate_cloudfront.yaml @@ -66,7 +66,7 @@ jobs: steps: - name: assume IAM role if: inputs.useOIDC == false - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-access-key-id: ${{ secrets.awsAccessKeyId }} aws-secret-access-key: ${{ secrets.awsSecretAccessKey }} @@ -81,7 +81,7 @@ jobs: # First assume GithubOIDCRole role, the trust relationship between GitHub and AWS is defined in IAM GithubOIDCRole in the organization account. This role has permissions to assume Deployer roles only. - name: assume GithubOIDCRole if: inputs.useOIDC == true - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-region: ${{ inputs.awsRegion }} role-to-assume: ${{ inputs.githubOIDCRoleArn }} @@ -94,7 +94,7 @@ jobs: # Then assume Deployer role, which can be assumed by GithubOIDCRole and has all the permissions needed. - name: assume Deployer role if: inputs.useOIDC == true - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-region: ${{ inputs.awsRegion }} role-to-assume: ${{ inputs.awsRoleArn }}