From 54eec73b69873a8348013928ac2aebae36d28863 Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Thu, 16 Apr 2026 01:33:03 +0000 Subject: [PATCH] github-actions: bump aws-actions/configure-aws-credentials Bumps [aws-actions/configure-aws-credentials](https://github.com/aws-actions/configure-aws-credentials) from 4.3.1 to 6.1.0. - [Release notes](https://github.com/aws-actions/configure-aws-credentials/releases) - [Changelog](https://github.com/aws-actions/configure-aws-credentials/blob/main/CHANGELOG.md) - [Commits](https://github.com/aws-actions/configure-aws-credentials/compare/7474bc4690e29a8392af63c5b98e7449536d5c3a...ec61189d14ec14c8efccab744f656cffd0e33f37) --- updated-dependencies: - dependency-name: aws-actions/configure-aws-credentials dependency-version: 6.1.0 dependency-type: direct:production update-type: version-update:semver-major ... Signed-off-by: dependabot[bot] --- .github/workflows/activate-stack.yml | 2 +- .github/workflows/daily-build.yml | 2 +- .github/workflows/deploy-account-wide-infra.yml | 4 ++-- .github/workflows/persistent-environment.yml | 12 ++++++------ .github/workflows/pr-env-deploy.yml | 14 +++++++------- .github/workflows/pr-env-destroy.yml | 2 +- .github/workflows/release.yml | 2 +- .github/workflows/rollback-stack.yml | 2 +- .github/workflows/update-lambda-permissions.yml | 12 ++++++------ 9 files changed, 26 insertions(+), 26 deletions(-) diff --git a/.github/workflows/activate-stack.yml b/.github/workflows/activate-stack.yml index 300ad1a64..067c94ba1 100644 --- a/.github/workflows/activate-stack.yml +++ b/.github/workflows/activate-stack.yml @@ -37,7 +37,7 @@ jobs: poetry install --no-root - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} diff --git a/.github/workflows/daily-build.yml b/.github/workflows/daily-build.yml index 508b83e0c..1fa6a0dea 100644 --- a/.github/workflows/daily-build.yml +++ b/.github/workflows/daily-build.yml @@ -45,7 +45,7 @@ jobs: run: make test - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} diff --git a/.github/workflows/deploy-account-wide-infra.yml b/.github/workflows/deploy-account-wide-infra.yml index 644b928eb..69a89d5f2 100644 --- a/.github/workflows/deploy-account-wide-infra.yml +++ b/.github/workflows/deploy-account-wide-infra.yml @@ -59,7 +59,7 @@ jobs: run: make build-seed-sandbox-lambda - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} @@ -125,7 +125,7 @@ jobs: poetry install --no-root - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} diff --git a/.github/workflows/persistent-environment.yml b/.github/workflows/persistent-environment.yml index b352e5a63..f2f70f33a 100644 --- a/.github/workflows/persistent-environment.yml +++ b/.github/workflows/persistent-environment.yml @@ -44,7 +44,7 @@ jobs: run: make build - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} @@ -93,7 +93,7 @@ jobs: poetry install --no-root - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} @@ -183,7 +183,7 @@ jobs: fail-on-cache-miss: true - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} @@ -250,7 +250,7 @@ jobs: poetry install --no-root - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} @@ -284,7 +284,7 @@ jobs: poetry install --no-root - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} @@ -318,7 +318,7 @@ jobs: poetry install --no-root - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} diff --git a/.github/workflows/pr-env-deploy.yml b/.github/workflows/pr-env-deploy.yml index 37c0b4c46..45c705517 100644 --- a/.github/workflows/pr-env-deploy.yml +++ b/.github/workflows/pr-env-deploy.yml @@ -69,7 +69,7 @@ jobs: run: make build - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} @@ -129,7 +129,7 @@ jobs: poetry install --no-root - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} @@ -216,7 +216,7 @@ jobs: poetry install --no-root - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} @@ -226,7 +226,7 @@ jobs: run: make truststore-pull-client ENV=dev - name: Configure Dev Account Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-chaining: true @@ -257,7 +257,7 @@ jobs: poetry install --no-root - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} @@ -296,7 +296,7 @@ jobs: poetry install --no-root - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} @@ -306,7 +306,7 @@ jobs: run: make truststore-pull-client ENV=dev - name: Configure Dev Account Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-chaining: true diff --git a/.github/workflows/pr-env-destroy.yml b/.github/workflows/pr-env-destroy.yml index 0eed2a184..80c5ffe1f 100644 --- a/.github/workflows/pr-env-destroy.yml +++ b/.github/workflows/pr-env-destroy.yml @@ -61,7 +61,7 @@ jobs: poetry install --no-root - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.CI_ROLE_NAME }} diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index d90f71ca4..f38901580 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -30,7 +30,7 @@ jobs: poetry install --no-root - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} diff --git a/.github/workflows/rollback-stack.yml b/.github/workflows/rollback-stack.yml index 8015d1bdb..4e940369a 100644 --- a/.github/workflows/rollback-stack.yml +++ b/.github/workflows/rollback-stack.yml @@ -32,7 +32,7 @@ jobs: poetry install --no-root - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} diff --git a/.github/workflows/update-lambda-permissions.yml b/.github/workflows/update-lambda-permissions.yml index aa03ddeae..54149f625 100644 --- a/.github/workflows/update-lambda-permissions.yml +++ b/.github/workflows/update-lambda-permissions.yml @@ -41,7 +41,7 @@ jobs: poetry install --no-root - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} @@ -97,7 +97,7 @@ jobs: poetry install --no-root - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} @@ -134,14 +134,14 @@ jobs: ref: ${{ github.ref }} - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} role-session-name: github-actions-ci-${{ inputs.environment }}-${{ github.run_id }} - name: Configure Account Role - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-chaining: true @@ -198,7 +198,7 @@ jobs: fail-on-cache-miss: true - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }} @@ -267,7 +267,7 @@ jobs: fail-on-cache-miss: true - name: Configure Management Credentials - uses: aws-actions/configure-aws-credentials@7474bc4690e29a8392af63c5b98e7449536d5c3a #v4.3.1 + uses: aws-actions/configure-aws-credentials@ec61189d14ec14c8efccab744f656cffd0e33f37 #v6.1.0 with: aws-region: eu-west-2 role-to-assume: ${{ secrets.MGMT_ROLE_ARN }}