Skip to content
Merged

Dev #90

Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
17 commits
Select commit Hold shift + click to select a range
c9041e7
Add dependabot configuration (#79)
GarrettBeatty Apr 29, 2025
6742371
Pin commit hash (#80)
GarrettBeatty May 1, 2025
f347f5b
chore: Pinned to v1.6.0 of aws-github-ops/handle-stale-discussions so…
ashishdhingra Jun 3, 2025
c7936a4
chore(deps): bump aws-actions/aws-secretsmanager-get-secrets
dependabot[bot] Jun 6, 2025
97c4ddb
chore(deps): bump actions/checkout from 3.6.0 to 4.2.2
dependabot[bot] Jun 6, 2025
84e0a8b
chore(deps): bump github/codeql-action from 3.28.16 to 3.28.19
dependabot[bot] Jun 6, 2025
6a58474
chore(deps): bump aws-actions/configure-aws-credentials
dependabot[bot] Jun 6, 2025
ba21a25
Merge pull request #87 from awslabs/dependabot/github_actions/dev/aws…
sankettangade Jun 6, 2025
1c9f865
Merge pull request #86 from awslabs/dependabot/github_actions/dev/git…
sankettangade Jun 6, 2025
aa7a58c
Merge pull request #84 from awslabs/dependabot/github_actions/dev/aws…
sankettangade Jun 6, 2025
7f5b9a1
chore(deps): bump tj-actions/changed-files from 45.0.4 to 46.0.5 (#83)
dependabot[bot] Jun 11, 2025
7967efb
Merge pull request #85 from awslabs/dependabot/github_actions/dev/act…
sankettangade Jun 16, 2025
9cf2f0a
Update dependabot.yml
sankettangade Jun 16, 2025
be82d9b
chore(deps): bump github/codeql-action from 3.28.19 to 3.29.0
dependabot[bot] Jun 17, 2025
50e02c4
merge conflicts (#91)
GarrettBeatty Jun 23, 2025
49f85f4
Merge branch 'main' into dev
GarrettBeatty Jun 24, 2025
9b659f2
Merge pull request #92 from awslabs/gcbeatty/merge
GarrettBeatty Jun 24, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,8 @@ updates:
- package-ecosystem: "github-actions"
directory: "/"
schedule:
# Check for updates to GitHub Actions every week
interval: "weekly"
# Check for updates to GitHub Actions every quarter
interval: "quarterly"
labels:
- "Release Not Needed"
target-branch: "dev"
target-branch: "dev"
4 changes: 2 additions & 2 deletions .github/workflows/aws-ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Configure AWS Credentials
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 #v4
uses: aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df #v4
with:
role-to-assume: ${{ secrets.CI_MAIN_TESTING_ACCOUNT_ROLE_ARN }}
role-duration-seconds: 7200
Expand All @@ -29,7 +29,7 @@ jobs:
$roleArn=$(cat ./response.json)
"roleArn=$($roleArn -replace '"', '')" >> $env:GITHUB_OUTPUT
- name: Configure Test Runner Credentials
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 #v4
uses: aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df #v4
with:
role-to-assume: ${{ steps.lambda.outputs.roleArn }}
role-duration-seconds: 7200
Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/change-file-in-pr.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,11 +12,11 @@ jobs:

steps:
- name: Checkout PR code
uses: actions/checkout@f43a0e5ff2bd294095638e18286ca9a3d1956744 #v3.6.0
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 #v4.2.2

- name: Get List of Changed Files
id: changed-files
uses: tj-actions/changed-files@4edd678ac3f81e2dc578756871e4d00c19191daf #v45
uses: tj-actions/changed-files@ed68ef82c095e0d48ec87eccea555d944a631a4c #v45

- name: Check for Change File(s) in .autover/changes/
env:
Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/create-release-pr.yml
Original file line number Diff line number Diff line change
Expand Up @@ -25,13 +25,13 @@ jobs:
steps:
# Assume an AWS Role that provides access to the Access Token
- name: Configure AWS Credentials
uses: aws-actions/configure-aws-credentials@8c3f20df09ac63af7b3ae3d7c91f105f857d8497 #v4
uses: aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df #v4
with:
role-to-assume: ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_ROLE_ARN }}
aws-region: us-west-2
# Retrieve the Access Token from Secrets Manager
- name: Retrieve secret from AWS Secrets Manager
uses: aws-actions/aws-secretsmanager-get-secrets@fbd65ea98e018858715f591f03b251f02b2316cb #v2.0.8
uses: aws-actions/aws-secretsmanager-get-secrets@5e19ff380d035695bdd56bbad320ca535c9063f2 #v2.0.9
with:
secret-ids: |
AWS_SECRET, ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_NAME }}
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/semgrep-analysis.yml
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ jobs:
p/owasp-top-ten

- name: Upload SARIF file for GitHub Advanced Security Dashboard
uses: github/codeql-action/upload-sarif@28deaeda66b76a05916b6923827895f2b14ab387 #v3.28.16
uses: github/codeql-action/upload-sarif@ce28f5bb42b7a9f2c824e633a3f6ee835bab6858 #v3.29.0
with:
sarif_file: semgrep.sarif
if: always()
4 changes: 2 additions & 2 deletions .github/workflows/sync-main-dev.yml
Original file line number Diff line number Diff line change
Expand Up @@ -27,13 +27,13 @@ jobs:
steps:
# Assume an AWS Role that provides access to the Access Token
- name: Configure AWS Credentials
uses: aws-actions/configure-aws-credentials@8c3f20df09ac63af7b3ae3d7c91f105f857d8497 #v4
uses: aws-actions/configure-aws-credentials@b47578312673ae6fa5b5096b330d9fbac3d116df #v4
with:
role-to-assume: ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_ROLE_ARN }}
aws-region: us-west-2
# Retrieve the Access Token from Secrets Manager
- name: Retrieve secret from AWS Secrets Manager
uses: aws-actions/aws-secretsmanager-get-secrets@fbd65ea98e018858715f591f03b251f02b2316cb #v2.0.8
uses: aws-actions/aws-secretsmanager-get-secrets@5e19ff380d035695bdd56bbad320ca535c9063f2 #v2.0.9
with:
secret-ids: |
AWS_SECRET, ${{ secrets.RELEASE_WORKFLOW_ACCESS_TOKEN_NAME }}
Expand Down