diff --git a/.github/workflows/prereleased.yaml b/.github/workflows/prereleased.yaml index c10a48d..77c7790 100644 --- a/.github/workflows/prereleased.yaml +++ b/.github/workflows/prereleased.yaml @@ -111,7 +111,7 @@ jobs: run: echo "value=$(grep -cE "(medium|high|critical) vulnerability" ${{ steps.scan_sbom.outputs.sarif }})" >> $GITHUB_OUTPUT - name: Configure AWS credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.AWS_S3_SBOMS_ROLE_ARN }} aws-region: ${{ env.AWS_S3_REGION }} @@ -133,7 +133,7 @@ jobs: notion_page_update_properties: '{ "Docker Scan": { "rich_text": [ { "text": { "content": ${{ env.STATUS_ICON }}, "link": ${{ env.STATUS_URL }} } } ] }, "SBOMS": { "url": "https://s3.console.aws.amazon.com/s3/buckets/repos-sboms?region=${{ env.AWS_S3_REGION }}&prefix=${{ github.event.repository.name }}/" } }' - name: Configure AWS credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ env.ECR_ROLE_ARN }} aws-region: ${{ env.PRIVATE_ECR_REGION }} diff --git a/.github/workflows/pull-request.yaml b/.github/workflows/pull-request.yaml index 02ea68d..70986cf 100644 --- a/.github/workflows/pull-request.yaml +++ b/.github/workflows/pull-request.yaml @@ -87,7 +87,7 @@ jobs: echo "value=$(grep -cE "(medium|high|critical) vulnerability" ${{ steps.scan_sbom.outputs.sarif }})" >> $GITHUB_OUTPUT - name: Configure AWS credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.AWS_S3_SBOMS_ROLE_ARN }} aws-region: ${{ env.AWS_S3_REGION }} diff --git a/.github/workflows/released.yaml b/.github/workflows/released.yaml index eef7dee..55b077a 100644 --- a/.github/workflows/released.yaml +++ b/.github/workflows/released.yaml @@ -80,7 +80,7 @@ jobs: steps: - name: Configure AWS credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ env.ECR_ROLE_ARN }} aws-region: ${{ env.PRIVATE_ECR_REGION }}