From d4ec5f29345b29c08663cda2ae8428599f60e12e Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 11 Mar 2026 09:40:12 +0000 Subject: [PATCH] chore(deps): update aws-actions/configure-aws-credentials action to v6 --- .github/workflows/build_docker_image_and_push_to_ecr.yaml | 4 ++-- .github/workflows/deploy_cloudformation.yaml | 6 +++--- .github/workflows/deploy_helmfile.yaml | 6 +++--- .github/workflows/invalidate_cloudfront.yaml | 6 +++--- 4 files changed, 11 insertions(+), 11 deletions(-) diff --git a/.github/workflows/build_docker_image_and_push_to_ecr.yaml b/.github/workflows/build_docker_image_and_push_to_ecr.yaml index a6b56bd..7c43777 100644 --- a/.github/workflows/build_docker_image_and_push_to_ecr.yaml +++ b/.github/workflows/build_docker_image_and_push_to_ecr.yaml @@ -176,7 +176,7 @@ jobs: # First assume GithubOIDCRole role, the trust relationship between GitHub and AWS is defined in IAM GithubOIDCRole in the organization account. This role has permissions to assume Deployer roles only. - name: assume GithubOIDCRole if: inputs.useOIDC == true - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-region: ${{ inputs.awsRegion }} role-to-assume: ${{ inputs.githubOIDCRoleArn }} @@ -189,7 +189,7 @@ jobs: # Then assume Deployer role, which can be assumed by GithubOIDCRole and has all the permissions needed to deploy cloudformation stacks. - name: assume Deployer role if: inputs.useOIDC == true - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-region: ${{ inputs.awsRegion }} role-to-assume: ${{ inputs.awsRoleArn }} diff --git a/.github/workflows/deploy_cloudformation.yaml b/.github/workflows/deploy_cloudformation.yaml index a8ac61a..b5d1950 100644 --- a/.github/workflows/deploy_cloudformation.yaml +++ b/.github/workflows/deploy_cloudformation.yaml @@ -143,7 +143,7 @@ jobs: - name: assume IAM role if: inputs.useOIDC == false - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-access-key-id: ${{ secrets.awsAccessKeyId }} aws-secret-access-key: ${{ secrets.awsSecretAccessKey }} @@ -158,7 +158,7 @@ jobs: # First assume GithubOIDCRole role, the trust relationship between GitHub and AWS is defined in IAM GithubOIDCRole in the organization account. This role has permissions to assume Deployer roles only. - name: assume GithubOIDCRole if: inputs.useOIDC == true - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-region: ${{ inputs.awsRegion }} role-to-assume: ${{ inputs.githubOIDCRoleArn }} @@ -171,7 +171,7 @@ jobs: # Then assume Deployer role, which can be assumed by GithubOIDCRole and has all the permissions needed to deploy cloudformation stacks. - name: assume Deployer role if: inputs.useOIDC == true - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-region: ${{ inputs.awsRegion }} role-to-assume: ${{ inputs.awsRoleArn }} diff --git a/.github/workflows/deploy_helmfile.yaml b/.github/workflows/deploy_helmfile.yaml index 72764e5..1b5edfc 100644 --- a/.github/workflows/deploy_helmfile.yaml +++ b/.github/workflows/deploy_helmfile.yaml @@ -197,7 +197,7 @@ jobs: - name: assume IAM role if: inputs.useOIDC == false - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-access-key-id: ${{ secrets.awsAccessKeyId }} aws-secret-access-key: ${{ secrets.awsSecretAccessKey }} @@ -212,7 +212,7 @@ jobs: # First assume GithubOIDCRole role, the trust relationship between GitHub and AWS is defined in IAM GithubOIDCRole in the organization account. This role has permissions to assume Deployer roles only. - name: assume GithubOIDCRole if: inputs.useOIDC == true - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-region: ${{ inputs.awsRegion }} role-to-assume: ${{ inputs.githubOIDCRoleArn }} @@ -225,7 +225,7 @@ jobs: # Then assume Deployer role, which can be assumed by GithubOIDCRole and has all the permissions needed to deploy cloudformation stacks. - name: assume Deployer role if: inputs.useOIDC == true - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-region: ${{ inputs.awsRegion }} role-to-assume: ${{ inputs.awsRoleArn }} diff --git a/.github/workflows/invalidate_cloudfront.yaml b/.github/workflows/invalidate_cloudfront.yaml index 2a217fc..fa9959d 100644 --- a/.github/workflows/invalidate_cloudfront.yaml +++ b/.github/workflows/invalidate_cloudfront.yaml @@ -66,7 +66,7 @@ jobs: steps: - name: assume IAM role if: inputs.useOIDC == false - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-access-key-id: ${{ secrets.awsAccessKeyId }} aws-secret-access-key: ${{ secrets.awsSecretAccessKey }} @@ -81,7 +81,7 @@ jobs: # First assume GithubOIDCRole role, the trust relationship between GitHub and AWS is defined in IAM GithubOIDCRole in the organization account. This role has permissions to assume Deployer roles only. - name: assume GithubOIDCRole if: inputs.useOIDC == true - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-region: ${{ inputs.awsRegion }} role-to-assume: ${{ inputs.githubOIDCRoleArn }} @@ -94,7 +94,7 @@ jobs: # Then assume Deployer role, which can be assumed by GithubOIDCRole and has all the permissions needed. - name: assume Deployer role if: inputs.useOIDC == true - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@v6 with: aws-region: ${{ inputs.awsRegion }} role-to-assume: ${{ inputs.awsRoleArn }}